Search results for: sterotype threat
549 Expression of Gro-El under Phloem-Specific Promoter Protects Transgenic Plants against Diverse Begomovirus-Beta Satellite Complex
Authors: Muhammad Yousaf Ali, Shahid Mansoor, Javeria Qazi, Imran Amin, Musarrat Shaheen
Abstract:
Cotton leaf curl disease (CLCuD) is the major threat to the cotton crop and is transmitted by whitefly (Bemisia tabaci). Since multiple begomoviruses and associated satellites are involved in CLCuD, approaches based on the concept of broad-spectrum resistance are essential for effective disease control. Gro-El and G5 are two proteins from whitefly endosymbiont and M13 bacteriophage origin, respectively. Gro-El encapsulates the virus particle when it enters the whitefly and protects the virus from the immune system of the whitefly as well as prevents viral expression in it. This characteristic of Gro-El can be exploited to get resistance against viruses if expressed in plants. G5 is a single-stranded DNA binding protein, expression of which in transgenic plants will stop viral expression on its binding with ssDNA. The use of tissue-specific promoters is more efficient than constitutive promoters. Transgenics of Nicotiana benthamiana for Gro-El under constitutive promoter and Gro-El under phloem specific promoter were made. In comparison to non-transgenic plants, transgenic plants with Gro-El under NSP promoter showed promising results when challenged against cotton leaf curl Multan virus (CLCuMuV) along with cotton leaf curl Multan beta satellite (CLCuMB), cotton leaf curl Khokhran virus (CLCuKoV) along with cotton leaf curl Multan beta satellite (CLCuMB) and Pedilenthus leaf curl virus (PedLCV) along with Tobacco leaf curl beta satellite (TbLCB).Keywords: cotton leaf curl disease, whitefly, endosymbionts, transgenic, resistance
Procedia PDF Downloads 96548 Public Perception of Energy Security in Lithuania: Between Material Interest and Energy Independence
Authors: Dainius Genys, Vylius Leonavicius, Ricardas Krikstolaitis
Abstract:
Energy security problems in Lithuania are analyzed on a regular basis; however, there is no comprehensive research on the very issue of the concept of public energy security. There is a lack of attention not only to social determinants of perception of energy security, but also a lack of a deeper analysis of the public opinion. This article aims to research the Lithuanian public perception of energy security. Complex tasks were set during the sociological study. Survey questionnaire consisted of different sets of questions: view of energy security (risk perception, political orientation, and energy security; comprehensiveness and energy security); view of energy risks and threats (perception of energy safety factors; individual dependence and burden; disobedience and risk); view of the activity of responsible institutions (energy policy assessment; confidence in institutions and energy security), demographic issues. In this article, we will focus on two aspects: a) We will analyze public opinion on the most important aspects of energy security and social factors influencing them; The hypothesis is made that public perception of energy security is related to value orientations: b) We will analyze how public opinion on energy policy executed by the government and confidence in the government are intertwined with the concept of energy security. Data of the survey, conducted on May 10-19 and June 7-17, 2013, when Seimas and the government consisted of the coalition dominated by Social Democrats with Labor, Order and Justice Parties and the Electoral Action of Poles, were used in this article. It is important to note that the survey was conducted prior to Russia’s occupation of the Crimea.Keywords: energy security, public opinion, risk, energy threat, energy security policy
Procedia PDF Downloads 510547 Enhancing Email Security: A Multi-Layered Defense Strategy Approach and an AI-Powered Model for Identifying and Mitigating Phishing Attacks
Authors: Anastasios Papathanasiou, George Liontos, Athanasios Katsouras, Vasiliki Liagkou, Euripides Glavas
Abstract:
Email remains a crucial communication tool due to its efficiency, accessibility and cost-effectiveness, enabling rapid information exchange across global networks. However, the global adoption of email has also made it a prime target for cyber threats, including phishing, malware and Business Email Compromise (BEC) attacks, which exploit its integral role in personal and professional realms in order to perform fraud and data breaches. To combat these threats, this research advocates for a multi-layered defense strategy incorporating advanced technological tools such as anti-spam and anti-malware software, machine learning algorithms and authentication protocols. Moreover, we developed an artificial intelligence model specifically designed to analyze email headers and assess their security status. This AI-driven model examines various components of email headers, such as "From" addresses, ‘Received’ paths and the integrity of SPF, DKIM and DMARC records. Upon analysis, it generates comprehensive reports that indicate whether an email is likely to be malicious or benign. This capability empowers users to identify potentially dangerous emails promptly, enhancing their ability to avoid phishing attacks, malware infections and other cyber threats.Keywords: email security, artificial intelligence, header analysis, threat detection, phishing, DMARC, DKIM, SPF, ai model
Procedia PDF Downloads 58546 The Mediating Role of Masculine Gender Role Stress on the Relationship between the EFL learners’ Self-Disclosure and English Class Anxiety
Authors: Muhammed Kök & Adem Kantar
Abstract:
Learning a foreign language can be affected by various factors such as age, aptitude, motivation, L2 disposition, etc. Among these factors, masculine gender roles stress (MGRS) that male learners possess is the least touched area that has been examined so far.MGRS can be defined as the traditional male role stress when the male learners feel the masculinity threat against their traditionally adopted masculinity norms. Traditional masculine norms include toughness, accuracy, completeness, and faultlessness. From this perspective, these norms are diametrically opposed to the language learning process since learning a language, by its nature, involves stages such as making mistakes and errors, not recalling words, pronouncing sounds incorrectly, creating wrong sentences, etc. Considering the potential impact of MGRS on the language learning process, the main purpose of this study is to investigate the mediating role of MGRS on the relationship between the EFL learners’ self-disclosure and English class anxiety. Data were collected from Turkish EFL learners (N=282) who study different majors in various state universities across Turkey. Data were analyzed by means of the Bootstraping method using the SPSS Process Macro plugin. The findings show that the indirect effect of self-disclosure level on the English Class Anxiety via MGRS was significant. We conclude that one of the reasons why Turkish EFL learners have English class anxiety might be the pressure that they feel because of their traditional gender role stress.Keywords: masculine, gender role stress, english class anxiety, self-disclosure, masculinity norms
Procedia PDF Downloads 98545 Discursive Legitimation Strategies in ISIS’ Online Magazine, Dabiq: A Discourse Historical Approach
Authors: Sahar Rasoulikolamaki
Abstract:
ISIS (also known as DAASH) is an Islamic fundamentalist group that has been known as a global threat to the whole world for their radicalizing approach and application of online platforms as a tool to portray their activities, to disseminate their ideology, and to commit recruiting activities. This study is an attempt to carry out a critical discourse analysis on the argumentative devices by which ISIS legitimizes or delegitimizes positive or negative constructions of social practices in Dabiq. It tries to shed light on how texts in Dabiq as linguistic elements in the micro level of analysis relate to ISIS’ ideology as the higher-up macro level and in other words, how local structures contributed to the construction and transference of a global structure or ideology and vice versa. Therefore, following the relevant analytical frameworks, the study focuses on both micro-level of analysis of arguments (topoi) and macro-structure of legitimation and delegitimation in Dabiq. This purpose is nailed using the analytical categories and tools provided by Wodak’s Discourse Historical Approach (DHA) such as argumentation strategies (topoi), by which the coded language of legitimation/delegitimation and persuasion as used in Dabiq are explored. The ensuing findings demonstrate that Dabiq rigorously relies on the positive representation of the in-group course of actions and justifying its violence and, at the same time, the negative representation of the out-group behavior through implementing various topoi to achieve its desired outcome, which is the ideological manipulation and powerful self-depiction, as well as the supporter recruitment.Keywords: argumentation, discourse-historical approach, ideology, legitimation and delegitimation, topoi
Procedia PDF Downloads 135544 Diversity and Distribution of Butterflies (Lepidoptera-Rhopalocera) along with Altitudinal Gradient and Vegetation Types at Lahoul Valley, Trans-Himalaya Region, India
Authors: Saveena Bogtapa, Jagbir Singh Kirti
Abstract:
Himalaya is one of the most fascinating ranges in the world. In India, it comprises 18 percent of the land area. Lahoul valley which is a part of Trans-Himalaya region is well known for its unique, diverse flora and fauna. It lies in the North-Eastern corner of the state Himachal Pradesh where its altitude ranges between 2500m to 5000m. Vegetation of this region is dry-temperate to alpine type. The diversity of the area is very less, rare, unique and highly endemic. But today, as a lot of environmental degradation has taken place in this hot spot of biodiversity because of frequent developmental and commercial activities which lead to the diversity of this area comes under a real threat. Therefore, as part of the research, butterflies which are known for their attractiveness as well as usefulness to the ecosystem, are used for the study. The diversity of butterflies of a particular area not only provides a healthy environment but also serves as the first step of conservation to the biodiversity. Their distribution in different habitats and altitude type helps us to understand the species richness and abundance in an area. Moreover, different environmental parameters which affect the butterfly community has also recorded. Hence, the present study documents the butterfly diversity in an unexplored habitat and altitude types at Lahoul valley. The valley has been surveyed along with altitudinal gradients (from 2500m to 4500m) and in various habitats like agriculture land, grassland, scrubland, riverine and in different types of forests. Very rare species of butterflies have been explored, and these will be discussed along with different parameters during the presentation.Keywords: butterflies, diversity, Lahoul valley, altitude, vegetation
Procedia PDF Downloads 246543 Women Entrepreneurship as an Inventive Approach to Ensure a Sustainable Development in Anambre State
Authors: S. Muogbo Uju, Akpunonu Uju,
Abstract:
The prevailing harsh environment factors couple with poverty rate and unemployment propels a high rate of entrepreneurial activities in developing countries of the world. Women entrepreneurs operate within gender bias among other constraint that can constitute a threat or create opportunity for women entrepreneurs. This empirical paper investigates and critically examines women entrepreneurship as an inventive approach to sustainable development in Anambra State. The study used descriptive statistics (frequencies, mean, and percentages) to answer the three research questions posed. Hypotheses testing were done with person product moment correlation and multiple regressions were employed in data analysis. SPSS [statistical package for Social Science] software was used to run the analysis. Three hundred and fifty three (353) copies of questionnaires were administered, and one hundred and forty six (146) copies were returned. Consequently, the findings of this study portrayed a significant impact between women entrepreneurship activities, job creation, wealth creation, youth empowerment, poverty reduction, employment generation, and increase in standard of livings of people. Therefore, the findings prescribe that government should ensure that managerial lessons are accompanied with the skill acquisition programs in order for them to understand the rudiment of owing and sustaining a business. The study also recommends that women entrepreneurs that have overcome the inertia of starting a business should come together to create platforms that can help those women who are yet to take a step or kick-start such venture.Keywords: women entrepreneurship, skill acquisition, sustainability, wealth creation
Procedia PDF Downloads 439542 Developing HRCT Criterion to Predict the Risk of Pulmonary Tuberculosis
Authors: Vandna Raghuvanshi, Vikrant Thakur, Anupam Jhobta
Abstract:
Objective: To design HRCT criterion to forecast the threat of pulmonary tuberculosis. Material and methods: This was a prospective study of 69 patients with clinical suspicion of pulmonary tuberculosis. We studied their medical characteristics, numerous separate HRCT-results, and a combination of HRCT findings to foresee the danger for PTB by utilizing univariate and multivariate investigation. Temporary HRCT diagnostic criteria were planned in view of these outcomes to find out the risk of PTB and tested these criteria on our patients. Results: The results of HRCT chest were analyzed, and Rank was given from 1 to 4 according to the HRCT chest findings. Sensitivity, specificity, positive predictive value, and negative predictive value were calculated. Rank 1: Highly suspected PTB. Rank 2: Probable PTB Rank 3: Nonspecific or difficult to differentiate from other diseases Rank 4: Other suspected diseases • Rank 1 (Highly suspected TB) was present in 22 (31.9%) patients, all of them finally diagnosed to have pulmonary tuberculosis. The sensitivity, specificity, and negative likelihood ratio for RANK 1 on HRCT chest was 53.6%, 100%, and 0.43, respectively. • Rank 2 (Probable TB) was present in 13 patients, out of which 12 were tubercular, and 1 was non-tubercular. • The sensitivity, specificity, positive likelihood ratio, and negative likelihood ratio of the combination of Rank 1 and Rank 2 was 82.9%, 96.4%, 23.22, and 0.18, respectively. • Rank 3 (Non-specific TB) was present in 25 patients, and out of these, 7 were tubercular, and 18 were non-tubercular. • When all these 3 ranks were considered together, the sensitivity approached 100% however, the specificity reduced to 35.7%. The positive likelihood ratio and negative likelihood ratio were 1.56 and 0, respectively. • Rank 4 (Other specific findings) was given to 9 patients, and all of these were non-tubercular. Conclusion: HRCT is useful in selecting individuals with greater chances of pulmonary tuberculosis.Keywords: pulmonary, tuberculosis, multivariate, HRCT
Procedia PDF Downloads 172541 Wheat (Triticum Aestivum) Yield Improved with Irrigation Scheduling under Salinity
Authors: Taramani Yadav, Gajender Kumar, R.K. Yadav, H.S. Jat
Abstract:
Soil Salinity and irrigation water salinity is critical threat to enhance agricultural food production to full fill the demand of billion plus people worldwide. Salt affected soils covers 6.73 Mha in India and ~1000 Mha area around the world. Irrigation scheduling of saline water is the way to ensure food security in salt affected areas. Research experiment was conducted at ICAR-Central Soil Salinity Research Institute, Experimental Farm, Nain, Haryana, India with 36 treatment combinations in double split plot design. Three sets of treatments consisted of (i) three regimes of irrigation viz., 60, 80 and 100% (I1, I2 and I3, respectively) of crop ETc (crop evapotranspiration at identified respective stages) in main plot; (ii) four levels of irrigation water salinity (sub plot treatments) viz., 2, 4, 8 and 12 dS m-1 (iii) applications of two PBRs along with control (without PBRs) i.e. salicylic acid (G1; 1 mM) and thiourea (G2; 500 ppm) as sub-sub plot treatments. Grain yield of wheat (Triticum aestivum) was increased with less amount of high salt loaded irrigation water at the same level of salinity (2 dS m-1), the trend was I3>I2>I1 at 2 dS m-1 with 8.10 and 17.07% increase at 80 and 100% ETc, respectively compared to 60% ETc. But contrary results were obtained by increasing amount of irrigation water at same level of highest salinity (12 dS m-1) showing following trend; I1>I2>I3 at 12 dS m-1 with 9.35 and 12.26% increase at 80 and 60% ETc compared to 100% ETc. Enhancement in grain yield of wheat (Triticum aestivum) is not need to increase amount of irrigation water under saline condition, with salty irrigation water less amount of irrigation water gave the maximum wheat (Triticum aestivum) grain yield.Keywords: Irrigation, Salinity, Wheat, Yield
Procedia PDF Downloads 166540 Forest Risk and Vulnerability Assessment: A Case Study from East Bokaro Coal Mining Area in India
Authors: Sujata Upgupta, Prasoon Kumar Singh
Abstract:
The expansion of large scale coal mining into forest areas is a potential hazard for the local biodiversity and wildlife. The objective of this study is to provide a picture of the threat that coal mining poses to the forests of the East Bokaro landscape. The vulnerable forest areas at risk have been assessed and the priority areas for conservation have been presented. The forested areas at risk in the current scenario have been assessed and compared with the past conditions using classification and buffer based overlay approach. Forest vulnerability has been assessed using an analytical framework based on systematic indicators and composite vulnerability index values. The results indicate that more than 4 km2 of forests have been lost from 1973 to 2016. Large patches of forests have been diverted for coal mining projects. Forests in the northern part of the coal field within 1-3 km radius around the coal mines are at immediate risk. The original contiguous forests have been converted into fragmented and degraded forest patches. Most of the collieries are located within or very close to the forests thus threatening the biodiversity and hydrology of the surrounding regions. Based on the vulnerability values estimated, it was concluded that more than 90% of the forested grids in East Bokaro are highly vulnerable to mining. The forests in the sub-districts of Bermo and Chandrapura have been identified as the most vulnerable to coal mining activities. This case study would add to the capacity of the forest managers and mine managers to address the risk and vulnerability of forests at a small landscape level in order to achieve sustainable development.Keywords: forest, coal mining, indicators, vulnerability
Procedia PDF Downloads 389539 The Effects of T-Walls on Urban Landscape and Quality of Life and Anti-Terror Design Concept in Kabul, Afghanistan
Authors: Fakhrullah Sarwari, Hiroko Ono
Abstract:
Kabul city has suffered a lot in 40 years of conflict of civil war and “The war on terror”. After the invasion of Afghanistan by the United States of America and its allies in 2001, the Taliban was removed from operational power, but The Taliban and other terrorist groups remained in remote areas of the country, they started suicide attacks and bombings. Hence to protect from these attacks officials surrounded their office buildings and houses with concrete blast walls. It gives a bad landscape to the city and creates traffic congestions. Our research contains; questionnaire, reviewing Kabul Municipality documents and literature review. Questionnaires were distributed to Kabul citizens to find out how people feel by seeing the T-Walls on Kabul streets? And what problems they face with T-Walls. “The T-Walls pull down commission” of Kabul Municipality documents were reviewed to find out what caused the failure of this commission. A literature review has been done to compare Kabul with Washington D.C on how they designed the city against terrorism threat without turning the cities into lock down. Bogota city of Columbia urban happiness movement is reviewed and compared with Kabul. The finding of research revealed that citizens of Kabul want security but not at the expense of public realm and creating the architecture of fear. It also indicates that increasing the T-walls do not give secure feeling but instead; it increases terror, hatred and affect people’s optimism. At the end, a series of recommendation is suggested on the issue.Keywords: anti-terror design, Kabul, T-Walls, urban happiness
Procedia PDF Downloads 170538 Root Cause Analysis of Surveillance Quality in Tanjung Priok Port to Prevent Epidemic Potential Disease as a Form of Bioterrorism Threat
Authors: Dina A. Amu, Fifi N. Afifah, Catur Rosidati, Tirton Nefianto
Abstract:
Indonesia was shaken up by the avian influenza cases that had caused the country suffered losses of millions of dollars. The avian influenza case had even been suspected as a bioterrorism attack since it was an uncommon case in epidemiology. Furthermore, this avian influenza virus is a high pathogenic one and Indonesia has the highest case of fatality rate in the world. Bioterrorism threats or epidemic potential disease outbreaks currently does not exist in Tanjung Priok port yet. However, the surveillance system enhancement on epidemic potential diseases should be taken as a prevention, especially because Indonesia is currently facing the ASEAN Economic Society (AES). Therefore, this research evaluates the health surveillance system which is organized by Control, Quarantine and Surveillance Department, Health Office of Tanjung Priok Port. This study uses qualitative-evaluative method which utilizes Urgency Seriousness Growth (USG) method to determine priority issues and Root Cause analysis to determine the cause of prior problem. The result of this research shows that the implementation of epidemic potential disease surveillance in Tanjung Priok port has not done in the best possible way. It is because the lack of time allocation and the succinctness of the check list of ship's environmental health inspection. Therefore, Health Ministry of Indonesia should recruit more employees at the health office of Tanjung Priok port, hold a simulation of ship's inspection and simplify the list for ship's environmental health inspection.Keywords: surveillance, epidemic potential disease, port health, bioterrorism
Procedia PDF Downloads 363537 Enhancing Cybersecurity Protective Behaviour: Role of Information Security Competencies and Procedural Information Security Countermeasure Awareness
Authors: Norshima Humaidi, Saif Hussein Abdallah Alghazo
Abstract:
Cybersecurity threat have become a serious issue recently, and one of the cause is because human error, which is usually constituted by carelessness, ignorance, and failure to practice cybersecurity behaviour adequately. Using a data from a quantitative survey, Partial Least Squares-Structural Equation Modelling (PLS-SEM) analysis was used to determine the factors that affect cybersecurity protective behaviour (CPB). This study adapts cybersecurity protective behaviour model by focusing on two constructs that can enhance CPB: manager’s information security competencies (MISI) and procedural information security countermeasure (PCM) awareness. Theory of leadership competencies were adapted to measure user’s perception towards competencies among security managers/leader in the organization. Confirmatory factor analysis (CFA) testing shows that all the measurement items of each constructs were adequate in their validity individually based on their factor loading value. Moreover, each constructs are valid based on their parameter estimates and statistical significance. The quantitative research findings show that PCM awareness strongly influences CPB compared to MISI. Meanwhile, MISI was significantlyPCM awarenss. This study believes that the research findings can contribute to human behaviour in IS studies and are particularly beneficial to policy makers in improving organizations’ strategic plans in information security, especially in this new era. Most organizations spend time and resources to provide and establish strategic plans of information security; however, if employees are not willing to comply and practice information security behaviour appropriately, then these efforts are in vain.Keywords: cybersecurity, protection behaviour, information security, information security competencies, countermeasure awareness
Procedia PDF Downloads 95536 Nuclear Mitochondrial Pseudogenes in Anastrepha fraterculus Complex
Authors: Pratibha Srivastava, Ayyamperumal Jeyaprakash, Gary Steck, Jason Stanley, Leroy Whilby
Abstract:
Exotic, invasive tephritid fruit flies (Diptera: Tephritidae) are a major threat to fruit and vegetable industries in the United States. The establishment of pest fruit fly in the agricultural industries and produce severe ecological and economic impacts on agricultural diversification and trade. Detection and identification of these agricultural pests in a timely manner will facilitate the possibility of eradication from newly invaded areas. Identification of larval stages to species level is difficult, but is required to determine pest loads and their pathways into the United States. The aim of this study is the New World genus, Anastrepha which includes pests of major economic importance. Mitochondrial cytochrome c oxidase I (COI) gene sequences were amplified from Anastrepha fraterculus specimens collected from South America (Ecuador and Peru). Phylogenetic analysis was performed to characterize the Anastrepha fraterculus complex at a molecular level. During phylogenetics analysis numerous nuclear mitochondrial pseudogenes (numts) were discovered in different specimens. The numts are nonfunctional copies of the mtDNA present in the nucleus and are easily coamplified with the mitochondrial COI gene copy by using conserved universal primers. This is problematic for DNA Barcoding, which attempts to characterize all living organisms by using the COI gene. This study is significant for national quarantine use, as morphological diagnostics to separate larvae of the various members remain poorly developed.Keywords: tephritid, Anastrepha fraterculus, COI, numts
Procedia PDF Downloads 239535 Evaluation of the Socio-Economic Impact of Marine Debris in Coastal Nigeria
Authors: Chibuzo Okoye Daniels, Gillian Glegg, Lynda Rodwell
Abstract:
Marine debris from fishing nets to medical equipment to food packaging that play major roles in boosting the economy and protecting human health is now more than an environmental problem that can be solved by legislation, law enforcement and technical solutions. It has also been identified as a cultural problem that can only be addressed by identifying instruments that can be used to change human attitudes and behaviors. This may be through management approaches, education and involvement of all sectors/interests, including the public. To contribute to the sustainable development of coastal Nigeria, two case study areas (Ikoyi and Victoria Islands of Lagos State) were used to evaluate the socio-economic impacts of marine debris problem in coastal Nigeria. The following methods were used: (1) semi-structured interviews with key stakeholders and businesses on beaches, waterfronts and waterways within the study areas and (2) observational study of beaches, waterfronts and waterways within the study areas. The results of the study have shown that marine debris is a cultural and multi-sectoral problem that poses great threat not only to the environmental sustainability of the study areas but also to the wellbeing of its citizens and the economy of coastal Nigeria. Current solid waste and marine debris management practices are inefficient due to inadequate knowledge of how to tackle the problem. To ensure environmental sustainability in coastal Nigeria and avoid waste of scarce financial resources, adequate, appropriate and cost effective solutions to the marine debris problem need to be identified and effectively transferred for implementation in the study areas.Keywords: sustainability, coastal Nigeria, study areas, aquaculture
Procedia PDF Downloads 554534 From Plate to Self-Perception: Unravelling the Interplay Between Food Security and Self-Esteem Among Malaysian University Students
Authors: Amiraa Ali Mansor, Haslinda Abdullah, Angela Chan Nguk Fong, Norhaida Hanim Binti Ahmad Tajudin, Asnarulkhadi Abu Samah
Abstract:
Obesity has risen sharply over the past three decades, posing a grave public health concern globally. In Malaysia, it has also emerged as a significant health threat. While the second Sustainable Development Goal, "Zero Hunger", aims to ensure equitable access to nutritious food for all, a key challenge lies in addressing food insecurity. Food insecurity not only pertains to the quantity but also the quality of food, with both dimensions playing a pivotal role in health outcomes. To date, much of the research on food security has focused on household levels. There remains a research gap concerning university students, a population transitioning to independence from parental support and grappling with limited resources. This study seeks to bridge this gap by extending the Food Security Theory to incorporate the psychological dimension of self-esteem. Using a quantitative approach, data was collected from 452 public university students in Malaysia through a cross-sectional research design and a multi-stage cluster sampling technique. The anticipated findings will provide novel insights by linking food security with self-esteem. Such insights have implications for healthcare policy and the framing of preventive strategies against obesity. It is hoped that this research will not only contribute to the academic discourse on Food Security Theory but also serve as a foundation for refining national health policies and programs aimed at fostering a healthier lifestyle.Keywords: obesity, food security, body image, self-esteem
Procedia PDF Downloads 76533 AI-Powered Models for Real-Time Fraud Detection in Financial Transactions to Improve Financial Security
Authors: Shanshan Zhu, Mohammad Nasim
Abstract:
Financial fraud continues to be a major threat to financial institutions across the world, causing colossal money losses and undermining public trust. Fraud prevention techniques, based on hard rules, have become ineffective due to evolving patterns of fraud in recent times. Against such a background, the present study probes into distinct methodologies that exploit emergent AI-driven techniques to further strengthen fraud detection. We would like to compare the performance of generative adversarial networks and graph neural networks with other popular techniques, like gradient boosting, random forests, and neural networks. To this end, we would recommend integrating all these state-of-the-art models into one robust, flexible, and smart system for real-time anomaly and fraud detection. To overcome the challenge, we designed synthetic data and then conducted pattern recognition and unsupervised and supervised learning analyses on the transaction data to identify which activities were fishy. With the use of actual financial statistics, we compare the performance of our model in accuracy, speed, and adaptability versus conventional models. The results of this study illustrate a strong signal and need to integrate state-of-the-art, AI-driven fraud detection solutions into frameworks that are highly relevant to the financial domain. It alerts one to the great urgency that banks and related financial institutions must rapidly implement these most advanced technologies to continue to have a high level of security.Keywords: AI-driven fraud detection, financial security, machine learning, anomaly detection, real-time fraud detection
Procedia PDF Downloads 41532 Internet of Things Networks: Denial of Service Detection in Constrained Application Protocol Using Machine Learning Algorithm
Authors: Adamu Abdullahi, On Francisca, Saidu Isah Rambo, G. N. Obunadike, D. T. Chinyio
Abstract:
The paper discusses the potential threat of Denial of Service (DoS) attacks in the Internet of Things (IoT) networks on constrained application protocols (CoAP). As billions of IoT devices are expected to be connected to the internet in the coming years, the security of these devices is vulnerable to attacks, disrupting their functioning. This research aims to tackle this issue by applying mixed methods of qualitative and quantitative for feature selection, extraction, and cluster algorithms to detect DoS attacks in the Constrained Application Protocol (CoAP) using the Machine Learning Algorithm (MLA). The main objective of the research is to enhance the security scheme for CoAP in the IoT environment by analyzing the nature of DoS attacks and identifying a new set of features for detecting them in the IoT network environment. The aim is to demonstrate the effectiveness of the MLA in detecting DoS attacks and compare it with conventional intrusion detection systems for securing the CoAP in the IoT environment. Findings: The research identifies the appropriate node to detect DoS attacks in the IoT network environment and demonstrates how to detect the attacks through the MLA. The accuracy detection in both classification and network simulation environments shows that the k-means algorithm scored the highest percentage in the training and testing of the evaluation. The network simulation platform also achieved the highest percentage of 99.93% in overall accuracy. This work reviews conventional intrusion detection systems for securing the CoAP in the IoT environment. The DoS security issues associated with the CoAP are discussed.Keywords: algorithm, CoAP, DoS, IoT, machine learning
Procedia PDF Downloads 80531 Assessment of Drought Tolerance Maize Hybrids at Grain Growth Stage in Mediterranean Area
Authors: Ayman El Sabagh, Celaleddin Barutçular, Hirofumi Saneoka
Abstract:
Drought is one of the most serious problems posing a grave threat to cereals production including maize. Maize improvement in drought-stress tolerance poses a great challenge as the global need for food and bio-enegry increases. Thus, the current study was planned to explore the variations and determine the performance of target traits of maize hybrids at grain growth stage under drought conditions during 2014 under Adana, Mediterranean climate conditions, Turkey. Maize hybrids (Sancia, Indaco, 71May69, Aaccel, Calgary, 70May82, 72May80) were evaluated under (irrigated and water stress). Results revealed that, grain yield and yield traits had a negative effects because of water stress conditions compared with the normal irrigation. As well as, based on the result under normal irrigation, the maximum biological yield and harvest index were recorded. According to the differences among hybrids were found that, significant differences were observed among hybrids with respect to yield and yield traits under current research. Based on the results, grain weight had more effect on grain yield than grain number during grain filling growth stage under water stress conditions. In this concern, according to low drought susceptibility index (less grain yield losses), the hybrid (Indaco) was more stable in grain number and grain weight. Consequently, it may be concluded that this hybrid would be recommended for use in the future breeding programs for production of drought tolerant hybrids.Keywords: drought susceptibility index, grain growth, grain yield, maize, water stress
Procedia PDF Downloads 330530 Photocatalytic Degradation of Nd₂O₃@SiO₂ Core-Shell Nanocomposites Under UV Irradiation Against Methylene Blue and Rhodamine B Dyes
Abstract:
Over the past years, industrial dyes have emerged as a significant threat to aquatic life, extensively detected in drinking water and groundwater, thus contributing to water pollution due to their improper and excessive use. To address this issue, the utilization of core-shell structures has been prioritized as it demonstrates remarkable efficiency in utilizing light energy for catalytic reactions and exhibiting excellent photocatalytic activity despite the availability of various photocatalysts. This work focuses on the photocatalytic degradation of Nd₂O₃@SiO₂ CSNs under UV light irradiation against MB and RhB dyes. Different characterization techniques, including XRD, FTIR, and TEM analyses, were employed to reveal the material's structure, functional groups, and morphological features. VSM and XPS analyses confirmed the soft, paramagnetic nature and chemical states with respective atomic percentages, respectively. Optical band gaps, determined using the Tauc plot model, indicated 4.24 eV and 4.13 eV for Nd₂O₃ NPs and Nd₂O₃@SiO₂ CSNs, respectively. The reduced bandgap energy of Nd₂O₃@SiO₂ CSNs enhances light absorption in the UV range, potentially leading to improved photocatalytic efficiency. The Nd₂O₃@SiO₂ CSNs exhibited greater degradation efficiency, reaching 95% and 96% against MB and RhB dyes, while Nd₂O₃ NPs showed 90% and 92%, respectively. The enhanced efficiency of Nd₂O₃@SiO₂ CSNs can be attributed to the larger specific surface area provided by the SiO₂ shell, as confirmed by surface area analysis using the BET surface area analyzer through N₂ adsorption-desorption.Keywords: core shell nanocomposites, rare earth oxides, photocatalysis, advanced oxidation process
Procedia PDF Downloads 70529 Perception Study on the Environmental Ramifications of Inadequate Drainage Systems in Jere Local Government Area, Borno State, Nigeria
Authors: Mohammed Bukar Maina, Mohammed Alhaji Bukar
Abstract:
Flooding is a significant threat to human lives, particularly in low- and middle-income nations. This study focuses on the environmental implications of inadequate drainage systems in the Jere Local Government Area of Borno State, Nigeria. By examining community awareness, understanding, and perceived impacts of the absence of drainage systems, as well as exploring potential solutions, this research aims to address the existing knowledge gap. The study focuses on the Fori and 202/303 Quarters, chosen for their lack of drainage infrastructure and environmental challenges. Primary data was collected through questionnaires and observations supplemented by secondary sources. The findings highlight the need for increased awareness of drainage systems and the consequences of inadequate infrastructure. The community faces challenges like flooding, water-logging, contamination of drinking water, waterborne diseases, and property damage, necessitating the implementation of proper drainage systems. Recommendations include prioritizing new drainage systems, awareness campaigns, community participation, involvement of local government and leaders, and regular maintenance. Long-term planning is crucial for integrating drainage infrastructure into future development. Implementing these recommendations will establish sustainable and resilient drainage systems, mitigating environmental hazards. This research provides valuable insights for policymakers, stakeholders, and communities in addressing insufficient drainage systems and safeguarding the community's well-being.Keywords: environment, drainage systems, flooding, lack
Procedia PDF Downloads 26528 Choosing the Lesser Evil: Tribal Alignment Formation in Civil Wars
Authors: Busra Nur Ozguler Aktel
Abstract:
This research aims to understand the factors that affect the ways in which tribes perceive and respond to violent conflicts in fragile states, given that tribes are essential stakeholders in many conflict-ridden fragile states, whether Afghanistan, Iraq, Syria, Libya, Somalia, Nigeria, or Yemen. It explores the primary questions of why some tribes align with extremist groups while others align with states during civil wars and why some tribes switch alignments. It argues that tribes form and switch alignments based on their perception of threats to their traditional tribal structure (internal dynamics) and clientelist relationships (external dynamics). Put differently; threat perceptions lead them to choose either the state or extremist groups that will more likely secure their traditional structure and patronage networks. This study focuses on Iraqi tribes as a case study. It builds a theory of tribal alignment formation based on ethnographic fieldwork in the Middle East, with a particular focus on Iraqi Sunni tribes living in the Kurdish region of Iraq and Jordan. As a result of the interviews with tribal leaders and members, local journalists, researchers, and politicians, it concludes that complex (re)alignments of tribes can determine the course and outcome of the conflicts, either mitigating or escalating violence. This study contributes to the larger body of conflict management and peacebuilding literature by introducing tribes as non-state actors and exploring their interactions with other actors in civil wars.Keywords: civil wars, tribes, alignment formation, side-switching, Iraq
Procedia PDF Downloads 87527 Key Challenges Facing the Management of Archaeological and Tourism Sites in Jordan
Authors: Muna Slehat
Abstract:
Jordan is endowed with over 14,500 productive archaeological sites and also a wealth of heritage sites that need to be protected from the pressing threat of destruction and damage. Archaeological sites in Jordan face significant threats, including insensitive development, urbanization, pollution, tourism, and vandalism, therefore an effective management plan is a key element, not only for the conservation of this heritage, but also to address issues such as tourism and sustainable development. This study highlights the obstacles that confront the management of the archaeological and tourism sites in Jordan, prior to and after the launch of the Strategies for Management of Jordan’s Archaeological Heritage by the Department of Antiquities (DoA) 2007-2010 and 2014-2018, as well as the establishment of the Directorate of the Management of Archaeological Sites in 2010, and instructions for the proper use of tourism sites, 2014, by the Ministry of Tourism and Antiquities (MoTA). The study has revealed that the management of the archaeological and tourism sites under the pretext of improvement of services for tourists and visitors to Jordan would allow access to so-called polarization tourism and facilitate tourism development that would be sustainable economically and provide attractive returns. The data required have been collected through conducting interviews with 18 specialists. The main findings of the study are that management is new in Jordan, and has become a vital and dynamic force in Jordan after 2000 but that there have also been many mistakes, with sustainability of the sites being ignored and a lack of awareness among local communities surrounding these sites. Management of the sites has also suffered from a lack of organizational vision, with no instructions for practical application and no legislative provisions which cater for the efficient management of the sites. All of this needs to be amended to remove gaps, overlaps and ambiguities, so that the authorities responsible for the rehabilitation and promotion, development and management of these sites can overcome the problems, such as lack of human resources (specialists) and financial resources.Keywords: Jordan, management, archaeological sites, tourism, challenges
Procedia PDF Downloads 310526 Risk Reassessment Using GIS Technologies for the Development of Emergency Response Management Plans for Water Treatment Systems
Authors: Han Gul Lee
Abstract:
When water treatments utilities are designed, an initial construction site risk assessment is conducted. This helps us to understand general safety risks that each utility needs to be complemented in the designing stage. Once it’s built, an additional risk reassessment process secures and supplements its disaster management and response plan. Because of its constantly changing surroundings with city renovation and developments, the degree of various risks that each facility has to face changes. Therefore, to improve the preparedness for spill incidents or disasters, emergency managers should run spill simulations with the available scientific technologies. This research used a two-dimensional flow routing model to simulate its spill disaster scenario based on its digital elevation model (DEM) collected with drone technologies. The results of the simulations can help emergency managers to supplement their response plan with concrete situational awareness in advance. Planning based on this simulation model minimizes its potential loss and damage when an incident like earthquakes man-made disaster happens, which could eventually be a threat in a public health context. This pilot research provides an additional paradigm to increase the preparedness to spill disasters. Acknowledgment: This work was supported by Korea Environmental Industry & Technology Institute (KEITI) through Environmental R&D Project on the Disaster Prevention of Environmental Facilities Program funded by Korea Ministry of Environment (MOE) (No.202002860001).Keywords: risk assessment, disaster management, water treatment utilities, situational awareness, drone technologies
Procedia PDF Downloads 144525 The Global Relationship between the Prevalence of Diabetes Mellitus and Incidence of Tuberculosis: 2000-2012
Authors: Alaa Badawi, Suzan Sayegh, Mohamed Sallam, Eman Sadoun, Mohamed Al-Thani, Muhammad W. Alam, Paul Arora
Abstract:
Background: The dual burden of tuberculosis (TB) and diabetes mellitus (DM) has increased over the past decade with DM prevalence increasing in countries already afflicted with a high burden of TB. The coexistence of the two conditions presents a serious threat to global public health. Objective: The present study examines the global relationship between the prevalence of DM and the incidence of TB to evaluate their coexistence worldwide and their contribution to one another. Methods: This is an ecological longitudinal study covering the period between years 2000 to 2012. We utilized data from the WHO and World Bank sources and International Diabetes Federation to estimate prevalence of DM (%) and the incidence of TB (per 100,000). Measures of central tendency and dispersion as well as the harmonic mean and linear regression were used for different WHO regions. The association between DM prevalence and TB incidence was examined by quartile of DM prevalence. Results: The worldwide average (±S.D.) prevalence of DM within the study period was 6.6±3.8% whereas TB incidence was 135.0±190.5 per 100,000. DM prevalence was highest in the Eastern Mediterranean (8.3±4.1) and West Pacific (8.2±5.6) regions and lowest in the Africa (3.5±2.6). TB incidence was highest in Africa (313.1±275.9 per 100,000) and South-East Asia (216.7±124.9) and lowest in the European (46.5±68.6) and American (47.2±52.9) regions. Only countries with high DM prevalence (>7.6%) showed a significant positive association with TB incidence (r=0.17, p=0.013). Conclusion: A positive association between DM and TB may exist in some – but not all – world regions, a dual burden that necessitates identifying the nature of this coexistence to assist in developing public health approaches that curb their rising burden.Keywords: diabetes mellitus, tuberculosis, disease burden, global association
Procedia PDF Downloads 466524 Acacia mearnsii De Wild-A New Scourge on Cork Oak Forests of El Kala National Park (North-Eastern Algeria)
Authors: Samir Chekchaki, ArifaBeddiar
Abstract:
Nowadays, more and more species are introduced outside their natural range. If most of them remain difficult, some may adopt a much more dynamic behavior. Indeed, we have witnessed in recent decades, the development of high forests of Acacia mearnsii in El Kala National Park. Introduced indefinitely, this leguminous intended to make money (nitrogen supply for industrial plantations of Eucalyptus), became one of the most invasive and more costly in terms of forest management. It has crossed all barriers: it has acclimatized, naturalized and then expanded through diverse landscapes; entry into competition with native species such as cork oak and altered ecosystem functioning. Therefore, it is interesting to analyze this new threat by relying on plants as bio-indicator for assessing biodiversity at different scales. We have identified the species present in several plots distributed in a range of vegetation types subjected to different degrees of disturbance by using the braun-blanquet method. Fifty-six species have been recorded. They are distributed in 48 genera and 29 families. The analysis of the relative frequency of species correlated with relative abundance clearly shows that the Acacia mearnsii feels marginalized. The ecological analysis of this biological invasion shows that disruption of either natural or anthropogenic origin (fire, prolonged drought, cut) represent the factors that exacerbate invasion by opening invasion windows. The lifting of seeds of Acacia mearnsii lasting physical dormancy (and variable) is ensured by the thermal shock in relation to its heliophilous character.Keywords: Acacia mearnsii De Wild, El Kala National park, fire, invasive, vegetation
Procedia PDF Downloads 357523 Bring Your Own Device Security Model in a Financial Institution of South Africa
Authors: Michael Nthabiseng Moeti, Makhulu Relebogile Langa, Joey Jansen van Vuuren
Abstract:
This paper examines the utilization of personal electronic devices like laptops, tablets, and smartphones for professional duties within a financial organization. This phenomenon is known as bring your own device (BYOD). BYOD accords employees the freedom to use their personal devices to access corporate resources from anywhere in the world with Internet access. BYOD arrangements introduce significant security risks for both organizations and users. These setups change the threat landscape for enterprises and demand unique security strategies, as conventional tools tailored for safeguarding managed devices fall short in adequately protecting enterprise assets without active user cooperation. This paper applies protection motivation theory (PMT) to highlight behavioral risks from BYOD users that may impact the security of financial institutions. Thematic analysis was applied to gain a comprehensive understanding of how users perceive this phenomenon. These findings demonstrates that the existence of a security policy does not ensure that all employees will take measures to protect their personal devices. Active promotion of BYOD security policies is crucial for financial institution employees and management. This paper developed a BYOD security model which is useful for understanding compliant behaviors. Given that BYOD security is becoming a major concern across financial sector, it is important. The paper recommends that future research could expand the number of universities from which data is collected.Keywords: BYOD, information security, protection motivation theory, security risks, thematic analysis
Procedia PDF Downloads 31522 Cybersecurity Challenges and Solutions in ICT Management at the Federal Polytechnic, Ado-Ekiti: A Quantitative Study
Authors: Innocent Uzougbo Onwuegbuzie, Siene Elizabeth Eke
Abstract:
This study investigates cybersecurity challenges and solutions in managing Information and Communication Technology (ICT) at the Federal Polytechnic, Ado-Ekiti, South-West Nigeria. The rapid evolution of ICT has revolutionized organizational operations and impacted various sectors, including education, healthcare, and finance. While ICT advancements facilitate seamless communication, complex data analytics, and strategic decision-making, they also introduce significant cybersecurity risks such as data breaches, ransomware, and other malicious attacks. These threats jeopardize the confidentiality, integrity, and availability of information systems, necessitating robust cybersecurity measures. The primary aim of this research is to identify prevalent cybersecurity challenges in ICT management, evaluate their impact on the institution's operations, and assess the effectiveness of current cybersecurity solutions. Adopting a quantitative research approach, data was collected through surveys and structured questionnaires from students, staff, and IT professionals at the Federal Polytechnic, Ado-Ekiti. The findings underscore the critical need for continuous investment in cybersecurity technologies, employee and student training, and regulatory compliance to mitigate evolving cyber threats. This research contributes to bridging the knowledge gap in cybersecurity management and provides valuable insights into effective strategies and technologies for safeguarding ICT systems in educational institutions. The study's objectives are to enhance the security posture of the Federal Polytechnic, Ado-Ekiti, in an increasingly digital world by identifying and addressing the cybersecurity challenges faced by its ICT management.Keywords: cybersecurity challenges, cyber threat mitigation, federal polytechnic Ado-Ekiti, ICT management
Procedia PDF Downloads 39521 Border Control and Human Rights Violations: Lessons Learned from the United States and Potential Solutions for the European Union
Authors: María Elena Menéndez Ibáñez
Abstract:
After the terrorist attacks of 9/11, new measures were adopted by powerful countries and regions like the United States and the European Union in order to safeguard their security. In 2002, the US created the Department of Homeland Security with one sole objective; to protect American soil and people. The US adopted new policies that made every immigrant a potential terrorist and a threat to their national security. Stronger border control became one of the key elements of the fight against organized crime and terrorism. The main objective of this paper is to compare some of the most important and radical measures adopted by the US, even those that resulted in systematic violations of human rights, with some of the European measures adopted after the 2015 Paris attacks of 2015, such as unlawful detainment of prisoners and other measures against foreigners. Through the Schengen agreement, the European Union has tried to eliminate tariffs and border controls, in order to guarantee successful economic growth. Terrorists have taken advantage of this and have made the region vulnerable to attacks. Authorities need to strengthen their surveillance methods in order to safeguard the region and its stability. Through qualitative methods applied to social sciences, this research will also try to explain why some of the mechanisms proven to be useful in the US would not be so in Europe, especially because they would result in human rights violations. Finally, solutions will be offered that would not put the whole Schengen Agreement at risk. Europe cannot reinstate border control, without making individuals vulnerable to human rights violations.Keywords: border control, immigration, international cooperation, national security
Procedia PDF Downloads 138520 Drivers of Deforestation in the Colombian Amazon: An Empirical Causal Loop Diagram of Food Security and Land-Use Change
Authors: Jesica López, Deniz Koca, Asaf Tzachor
Abstract:
In 2016 the historic peace accord between the Colombian government and the Revolutionary Armed Forces of Colombia (FARC) had no strong mechanism for managing changes to land use and the environment. Since the end of a 60-year conflict in Colombia, large areas of forest in the Amazon region have been rapidly converted to agricultural uses, most recently by cattle ranching. This suggests that the peace agreement presents a threat to the conservation of the country's rainforest. We analyze the effects of cattle ranching as a driver and accelerator of deforestation from a systemic perspective, focusing on two key leverage points the legal and illegal activities involved in the cattle ranching practices. We map and understand the inherent dynamic complexity of deforestation, including factors such as land policy instruments, national strategy to tackle deforestation, land use nexus with Amazonian food systems, and loss of biodiversity. Our results show that deforestation inside Colombian Protected Areas (PAs) in the Amazon region and the surrounding buffer areas has accelerated with the onset of peace. By using a systems analysis approach, we contextualized the competition of land between cattle ranching and the need to protect tropical forests and their biodiversity loss. We elaborate on future recommendations for land use management decisions making suggest the inclusion of an Amazonian food system, interconnecting and visualizing the synergies between sustainable development goals, climate action (SDG 13) and life on land (SDG 15).Keywords: tropical rainforest, deforestation, sustainable land use, food security, Colombian Amazon
Procedia PDF Downloads 97