Search results for: attacks
97 Disaster Victim Identification: A Social Science Perspective
Authors: Victor Toom
Abstract:
Albeit it is never possible to anticipate the full range of difficulties after a catastrophe, efforts to identify victims of mass casualty events have become institutionalized and standardized with the aim of effectively and efficiently addressing the many challenges and contingencies. Such ‘disaster victim identification’ (DVI) practices are dependent on the forensic sciences, are subject of national legislation, and are reliant on technical and organizational protocols to mitigate the many complexities in the wake of catastrophe. Apart from such technological, legal and bureaucratic elements constituting a DVI operation, victims’ families and their emotions are also part and parcel of any effort to identify casualties of mass human fatality incidents. Take for example the fact that forensic experts require (antemortem) information from the group of relatives to make identification possible. An identified body or body part is also repatriated to kin. Relatives are thus main stakeholders in DVI operations. Much has been achieved in years past regarding facilitating victims’ families’ issues and their emotions. Yet, how families are dealt with by experts and authorities is still considered a difficult topic. Due to sensitivities and required emphatic interaction with families on the one hand, and the rationalized DVI efforts, on the other hand, there is still scope for improving communication, providing information and meaningful inclusion of relatives in the DVI effort. This paper aims to bridge the standardized world of DVI efforts and families’ experienced realities and makes suggestions to further improve DVI efforts through inclusion of victims’ families. Based on qualitative interviews, the paper narrates involvement and experiences of inter alia DVI practitioners, victims’ families, advocates and clergy in the wake of the 1995 Srebrenica genocide which killed approximately 8,000 men, and the 9/11 in New York City with 2,750 victims. The paper shows that there are several models of including victims’ families into a DVI operation, and it argues for a model of where victims’ families become a partner in DVI operations.Keywords: disaster victim identification (DVI), victims’ families, social science (qualitative), 9/11 attacks, Srebrenica genocide
Procedia PDF Downloads 23296 Intrusion Detection in SCADA Systems
Authors: Leandros A. Maglaras, Jianmin Jiang
Abstract:
The protection of the national infrastructures from cyberattacks is one of the main issues for national and international security. The funded European Framework-7 (FP7) research project CockpitCI introduces intelligent intrusion detection, analysis and protection techniques for Critical Infrastructures (CI). The paradox is that CIs massively rely on the newest interconnected and vulnerable Information and Communication Technology (ICT), whilst the control equipment, legacy software/hardware, is typically old. Such a combination of factors may lead to very dangerous situations, exposing systems to a wide variety of attacks. To overcome such threats, the CockpitCI project combines machine learning techniques with ICT technologies to produce advanced intrusion detection, analysis and reaction tools to provide intelligence to field equipment. This will allow the field equipment to perform local decisions in order to self-identify and self-react to abnormal situations introduced by cyberattacks. In this paper, an intrusion detection module capable of detecting malicious network traffic in a Supervisory Control and Data Acquisition (SCADA) system is presented. Malicious data in a SCADA system disrupt its correct functioning and tamper with its normal operation. OCSVM is an intrusion detection mechanism that does not need any labeled data for training or any information about the kind of anomaly is expecting for the detection process. This feature makes it ideal for processing SCADA environment data and automates SCADA performance monitoring. The OCSVM module developed is trained by network traces off line and detects anomalies in the system real time. The module is part of an IDS (intrusion detection system) developed under CockpitCI project and communicates with the other parts of the system by the exchange of IDMEF messages that carry information about the source of the incident, the time and a classification of the alarm.Keywords: cyber-security, SCADA systems, OCSVM, intrusion detection
Procedia PDF Downloads 55595 Phelipanche Ramosa (L. - Pomel) Control in Field Tomato Crop
Authors: G. Disciglio, F. Lops, A. Carlucci, G. Gatta, A. Tarantino, L. Frabboni, F. Carriero, F. Cibelli, M. L. Raimondo, E. Tarantino
Abstract:
The Phelipanche ramosa is is an important crop whose cultivation in the Mediterranean basin is severely contained the phitoparasitic weed Phelipanche ramose. The semiarid regions of the world are considered the main center of this parasitic weed, where heavy infestation is due to the ability to produce high numbers of seeds (up to 500,000 per plant), that remain viable for extended period (more than 19 years). In this paper 12 treatments of parasitic weed control including chemical, agronomic, biological and biotechnological methods have been carried out. In 2014 a trial was performed at Foggia (southern Italy). on processing tomato (cv Docet), grown in field infested by Phelipanche ramosa, Tomato seedlings were transplant on May 5, 2014 on a clay-loam soil (USDA) fertilized by 100 kg ha-1 of N; 60 kg ha-1 of P2O5 and 20 kg ha-1 of S. Afterwards, top dressing was performed with 70 kg ha-1 of N. The randomized block design with 3 replicates was adopted. During the growing cycle of the tomato, at 56-78 and 92 days after transplantation, the number of parasitic shoots emerged in each pot was detected. At harvesting, on August 18, the major quantity-quality yield parameters were determined (marketable yield, mean weight, dry matter, pH, soluble solids and color of fruits). All data were subjected to analysis of variance (ANOVA), using the JMP software (SAS Institute Inc., Cary, NC, USA), and for comparison of means was used Tukey's test. Each treatment studied did not provide complete control against Phelipanche ramosa. However among the 12 tested methods, Fusarium, gliphosate, radicon biostimulant and Red Setter tomato cv (improved genotypes obtained by Tilling technology) proved to mitigate the virulence of the attacks of Phelipanche ramose. It is assumed that these effects can be improved by combining some of these treatments each other, especially for a gradual and continuing reduction of the “seed bank” of the parasite in the soil.Keywords: control methods, Phelipanche ramosa, tomato crop, mediterranean basin
Procedia PDF Downloads 56394 A Review of Hypnosis Uses for Anxiety and Phobias Treatment
Authors: Fleura Shkëmbi, Sevim Mustafa, Naim Fanaj
Abstract:
Hypnosis, often known as cognitive therapy, is a sort of mind-body psychotherapy. A professional and certified hypnotist or hypnotherapist guides the patient into this extreme level of focus and relaxation during the session by utilizing verbal cues, repetition, and imagery. In recent years, hypnotherapy has gained popularity in the treatment of a variety of disorders, including anxiety and particular phobias. The term "phobia" is commonly used to define fear of a certain trigger. When faced with potentially hazardous situations, the brain naturally experiences dread. While a little dread here and there may keep us safe, phobias can drastically reduce our quality of life. In summary, persons who suffer from anxiety are considered to see particular environmental situations as dangerous, but those who do not suffer from anxiety do not. Hypnosis is essential in the treatment of anxiety disorders. Hypnosis can help patients minimize their anxiety symptoms. This broad concept has aided in the development of models and therapies for anxiety disorders such as generalized anxiety disorder, panic attacks, hypochondria, and obsessional disorders. Hypnosis techniques are supposed to be attentive and mental pictures, which is conceivable; this is why they're associated with improved working memory and visuospatial abilities. In this sense, the purpose of this study is to determine how effectively specific therapeutic methods perform in treating persons with anxiety and phobias. In addition to cognitive-behavioral therapy and other therapies, the approaches emphasized the use of therapeutic hypnosis. This study looks at the use of hypnosis and related psychotherapy procedures in the treatment of anxiety disorders. Following a discussion of the evolution of hypnosis as a therapeutic tool, neurobiological research is used to demonstrate the influence of hypnosis on the change of perception in the brain. The use of hypnosis in the treatment of phobias, stressful situations, and posttraumatic stress disorder is examined, as well as similarities between the hypnotic state and dissociative reactions to trauma. Through an extensive literature evaluation, this study will introduce hypnotherapy procedures that result in more successful anxiety and phobia treatment.Keywords: anxiety, hypnosis, hypnotherapy, phobia, technique, state
Procedia PDF Downloads 11993 Post Harvest Losses and Food Security in Northeast Nigeria What Are the Key Challenges and Concrete Solutions
Authors: Adebola Adedugbe
Abstract:
The challenge of post-harvest losses poses serious threats for food security in Nigeria and the north-eastern part with the country losing about $9billion annually due to postharvest losses in the sector. Post-harvest loss (PHL) is the quantitative and qualitative loss of food in various post-harvest operations. In Nigeria, post-harvest losses (PHL) have been a major challenge to food security and improved farmer’s income. In 2022, the Nigerian government had said over 30 percent of food produced by Nigerian farmers perish during post-harvest. For many in northeast Nigeria, agriculture is the predominant source of livelihood and income. The persistent communal conflicts, flood, decade-old attacks by boko haram and insurgency in this region have disrupted farming activities drastically, with farmlands becoming insecure and inaccessible as communities are forced to abandon ancestral homes, The impact of climate change is also affecting agricultural and fishing activities, leading to shortage of food supplies, acute hunger and loss of livelihood. This has continued to impact negatively on the region and country’s food production and availability making it loose billions of US dollars annually in income in this sector. The root cause of postharvest losses among others in crops, livestock and fisheries are lack of modern post-harvest equipment, chemical and lack of technologies used for combating losses. The 2019 Global Hunger Index showed Nigeria’s case was progressing from a ‘serious to alarming level’. As part of measures to address the problem of post-harvest losses experienced by farmers, the federal government of Nigeria concessioned 17 silos with 6000 metric tonne storage space to private sector to enable farmers to have access to storage facilities. This paper discusses the causes, effects and solutions in handling post-harvest losses and optimize returns on food security in northeast Nigeria.Keywords: farmers, food security, northeast Nigeria, postharvest loss
Procedia PDF Downloads 7292 Analysis of the Impact of Suez Canal on the Robustness of Global Shipping Networks
Abstract:
The Suez Canal plays an important role in global shipping networks and is one of the most frequently used waterways in the world. The 2021 canal obstruction by ship Ever Given in March 2021, however, completed blocked the Suez Canal for a week and caused significant disruption to world trade. Therefore, it is very important to quantitatively analyze the impact of the accident on the robustness of the global shipping network. However, the current research on maritime transportation networks is usually limited to local or small-scale networks in a certain region. Based on the complex network theory, this study establishes a global shipping complex network covering 2713 nodes and 137830 edges by using the real trajectory data of the global marine transport ship automatic identification system in 2018. At the same time, two attack modes, deliberate (Suez Canal Blocking) and random, are defined to calculate the changes in network node degree, eccentricity, clustering coefficient, network density, network isolated nodes, betweenness centrality, and closeness centrality under the two attack modes, and quantitatively analyze the actual impact of Suez Canal Blocking on the robustness of global shipping network. The results of the network robustness analysis show that Suez Canal blocking was more destructive to the shipping network than random attacks of the same scale. The network connectivity and accessibility decreased significantly, and the decline decreased with the distance between the port and the canal, showing the phenomenon of distance attenuation. This study further analyzes the impact of the blocking of the Suez Canal on Chinese ports and finds that the blocking of the Suez Canal significantly interferes withChina's shipping network and seriously affects China's normal trade activities. Finally, the impact of the global supply chain is analyzed, and it is found that blocking the canal will seriously damage the normal operation of the global supply chain.Keywords: global shipping networks, ship AIS trajectory data, main channel, complex network, eigenvalue change
Procedia PDF Downloads 18391 Durability Performances of Epoxy Resin/TiO₂ Composited Alkali-Activated Slag/Fly Ash Pastes in Phosphoric Acid Solution
Abstract:
Laden with phosphates at a low pH value, sewage wastewater aggressive environments constitute a great threat to concrete-based pipes which is made of alkaline cementitious materials such as ordinary Portland cement (OPC). As a promising alternative for OPC-based binders, alkali-activated slag/fly ash (AASF) cementitious binders are generally believed to gain similar or better properties compared to OPC-based counterparts, especially durability. However, there is limited research on the performance of AASF binders in phosphoric acid solution. Moreover, the behavior of AASF binders composited with epoxy resin/TiO₂ when exposed to acidic media has been rarely explored. In this study, the performance of AASF paste with the precursor slag:fly ash (50:50 in mass ratio) enhanced with epoxy resin/TiO₂ composite in phosphoric acid solution (pH = 3.0-4.0) was investigated. The exposure towards acid attack lasted for 90 days. The same AASF mixture without resin/TiO₂ composite was used as a reference. The compressive strength and porous-related properties prior to acidic immersion were tested. The mass variations and degradation depth of the two mixtures of binders were also monitored which is based on phenolphthalein-videomicroscope method. The results show that the binder with epoxy resin/TiO₂ addition gained a higher compressive strength and lower water absorption than the reference. In addition, it also displayed a higher resistance towards acid attack indicated by a less mass loss and less degradation depth compared to the control sample. This improvement can be attributed to a dense microstructure evidenced by the higher compressive strength and related porous structures. It can be concluded that the microstructure can be improved by adding epoxy resin/TiO₂ composite in order to enhance the resistance of AASF binder towards acid attacks.Keywords: alkali-activated paste, epoxy resin/TiO₂, composites, mechanical properties, phosphoric acid
Procedia PDF Downloads 12190 Determination of Rare Earth Element Patterns in Uranium Matrix for Nuclear Forensics Application: Method Development for Inductively Coupled Plasma Mass Spectrometry (ICP-MS) Measurements
Authors: Bernadett Henn, Katalin Tálos, Éva Kováss Széles
Abstract:
During the last 50 years, the worldwide permeation of the nuclear techniques induces several new problems in the environmental and in the human life. Nowadays, due to the increasing of the risk of terrorism worldwide, the potential occurrence of terrorist attacks using also weapon of mass destruction containing radioactive or nuclear materials as e.g. dirty bombs, is a real threat. For instance, the uranium pellets are one of the potential nuclear materials which are suitable for making special weapons. The nuclear forensics mainly focuses on the determination of the origin of the confiscated or found nuclear and other radioactive materials, which could be used for making any radioactive dispersive device. One of the most important signatures in nuclear forensics to find the origin of the material is the determination of the rare earth element patterns (REE) in the seized or found radioactive or nuclear samples. The concentration and the normalized pattern of the REE can be used as an evidence of uranium origin. The REE are the fourteen Lanthanides in addition scandium and yttrium what are mostly found together and really low concentration in uranium pellets. The problems of the REE determination using ICP-MS technique are the uranium matrix (high concentration of uranium) and the interferences among Lanthanides. In this work, our aim was to develop an effective chemical sample preparation process using extraction chromatography for separation the uranium matrix and the rare earth elements from each other following some publications can be found in the literature and modified them. Secondly, our purpose was the optimization of the ICP-MS measuring process for REE concentration. During method development, in the first step, a REE model solution was used in two different types of extraction chromatographic resins (LN® and TRU®) and different acidic media for environmental testing the Lanthanides separation. Uranium matrix was added to the model solution and was proved in the same conditions. Methods were tested and validated using REE UOC (uranium ore concentrate) reference materials. Samples were analyzed by sector field mass spectrometer (ICP-SFMS).Keywords: extraction chromatography, nuclear forensics, rare earth elements, uranium
Procedia PDF Downloads 31089 Data Confidentiality in Public Cloud: A Method for Inclusion of ID-PKC Schemes in OpenStack Cloud
Authors: N. Nalini, Bhanu Prakash Gopularam
Abstract:
The term data security refers to the degree of resistance or protection given to information from unintended or unauthorized access. The core principles of information security are the confidentiality, integrity and availability, also referred as CIA triad. Cloud computing services are classified as SaaS, IaaS and PaaS services. With cloud adoption the confidential enterprise data are moved from organization premises to untrusted public network and due to this the attack surface has increased manifold. Several cloud computing platforms like OpenStack, Eucalyptus, Amazon EC2 offer users to build and configure public, hybrid and private clouds. While the traditional encryption based on PKI infrastructure still works in cloud scenario, the management of public-private keys and trust certificates is difficult. The Identity based Public Key Cryptography (also referred as ID-PKC) overcomes this problem by using publicly identifiable information for generating the keys and works well with decentralized systems. The users can exchange information securely without having to manage any trust information. Another advantage is that access control (role based access control policy) information can be embedded into data unlike in PKI where it is handled by separate component or system. In OpenStack cloud platform the keystone service acts as identity service for authentication and authorization and has support for public key infrastructure for auto services. In this paper, we explain OpenStack security architecture and evaluate the PKI infrastructure piece for data confidentiality. We provide method to integrate ID-PKC schemes for securing data while in transit and stored and explain the key measures for safe guarding data against security attacks. The proposed approach uses JPBC crypto library for key-pair generation based on IEEE P1636.3 standard and secure communication to other cloud services.Keywords: data confidentiality, identity based cryptography, secure communication, open stack key stone, token scoping
Procedia PDF Downloads 38588 Effect of Different Methods to Control the Parasitic Weed Phelipanche ramosa (L. Pomel) in Tomato Crop
Authors: Disciglio G., Lops F., Carlucci A., Gatta G., Tarantino A., Frabboni L, Tarantino E.
Abstract:
The Phelipanche ramosa is considered the most damaging obligate flowering parasitic weed on a wide species of cultivated plants. The semiarid regions of the world are considered the main center of this parasitic weed, where heavy infestation are due to the ability to produce high numbers of seeds (up to 200,000), that remain viable for extended period (more than 19 years). In this paper 13 treatments of parasitic weed control, as physical, chemical, biological and agronomic methods, including the use of the resistant plants, have been carried out. In 2014 a trial was performed on processing tomato (cv Docet), grown in pots filled with soil taken from a plot heavily infested by Phelipanche ramosa, at the Department of Agriculture, Food and Environment, University of Foggia (southern Italy). Tomato seedlings were transplanted on August 8, 2014 on a clay soil (USDA) 100 kg ha-1 of N; 60 kg ha-1 of P2O5 and 20 kg ha-1 of S. Afterwards, top dressing was performed with 70 kg ha-1 of N. The randomized block design with 3 replicates was adopted. During the growing cycle of the tomato, at 70-75-81 and 88 days after transplantation the number of parasitic shoots emerged in each pot was detected. Also values of leaf chlorophyll Meter SPAD of tomato plants were measured. All data were subjected to analysis of variance (ANOVA) using the JMP software (SAS Institute Inc., Cary, NC, USA), and for comparison of means was used Tukey's test. The results show lower values of the color index SPAD in tomato plants parasitized compared to those healthy. In addition, each treatment studied did not provide complete control against Phelipanche ramosa. However the virulence of the attacks was mitigated by some treatments: radicon product, compost activated with Fusarium, mineral fertilizer nitrogen, sulfur, enzone and resistant tomato genotype. It is assumed that these effects can be improved by combining some of these treatments each other, especially for a gradual and continuing reduction of the “seed bank” of the parasite in the soil.Keywords: control methods, Phelipanche ramose, tomato crop
Procedia PDF Downloads 61487 A Qualitative Exploration into Australian Muslims Emerging into Adulthood
Authors: Nuray Okcum, Jenny Sharples
Abstract:
While the scrutinization towards marginalized groups throughout the globe has been existent for decades, prejudice towards Muslims in Western countries has been increasing dramatically. The vicious attacks across the globe by perpetrators who identify with Islam as well as popular political discourse by politicians in Western countries claiming and portraying Muslims as being dangerous, oppressed, or lacking the ability to assimilate into the community, adds to the exclusion and lack of belonging Muslims living in Western countries experience. The early stages of adulthood which have recently been conceptualized as emerging adulthood is a critical and socially ambiguous transition. For a young Muslim emerging into adulthood in a Western country, a variety of different challenges and demands that can exceed their coping abilities can arise. While in search for their identity and in a bid to structure themselves with their past childhood experiences together with their newly forming values, the emerging adult may attempt to direct or change the way in which they are viewed by others. This can be done to gain approval from others and to feel a sense of belonging. A change in the emerging adult’s interpersonal interactions and relationships, the way in which they view themselves and others, their sense of belonging, and their identity, also occurs during this developmental stage. To explore the manner in which Muslims emerging into adulthood carve their identity, their experiences, and representation of their Muslim identity, social identification, and their sense of belonging in Australia, an interpretative phenomenological methodology was utilized. This allowed participants to offer their own subjective experiences. A total of eight emerging adults took part in the study whilst four adults who work with emerging adults took part. Adult participants who work with emerging adults took part in the study to bring forth their insight and experiences. Common experiences were organized into themes. Themes included identifying as a Muslim, social identification, and belonging. Identification included visual identification and name, discrimination and resilience. Findings clearly indicated that Muslims emerging into adulthood in Australia do face various hurdles while they try to retain and represent their religious identity. Despite the unique challenges that they face, they still feel a sense of belonging and identity as being Australian.Keywords: Muslim, Islam, emerging adulthood, Australia
Procedia PDF Downloads 13686 In-silico DFT Study, Molecular Docking, ADMET Predictions, and DMS of Isoxazolidine and Isoxazoline Analogs with Anticancer Properties
Authors: Moulay Driss Mellaoui, Khadija Zaki, Khalid Abbiche, Abdallah Imjjad, Rachid Boutiddar, Abdelouahid Sbai, Aaziz Jmiai, Souad El Issami, Al Mokhtar Lamsabhi, Hanane Zejli
Abstract:
This study presents a comprehensive analysis of six isoxazolidine and isoxazoline derivatives, leveraging a multifaceted approach that combines Density Functional Theory (DFT), AdmetSAR analysis, and molecular docking simulations to explore their electronic, pharmacokinetic, and anticancer properties. Through DFT analysis, using the B3LYP-D3BJ functional and the 6-311++G(d,p) basis set, we optimized molecular geometries, analyzed vibrational frequencies, and mapped Molecular Electrostatic Potentials (MEP), identifying key sites for electrophilic attacks and hydrogen bonding. Frontier Molecular Orbital (FMO) analysis and Density of States (DOS) plots revealed varying stability levels among the compounds, with 1b, 2b, and 3b showing slightly higher stability. Chemical potential assessments indicated differences in binding affinities, suggesting stronger potential interactions for compounds 1b and 2b. AdmetSAR analysis predicted favorable human intestinal absorption (HIA) rates for all compounds, highlighting compound 3b superior oral effectiveness. Molecular docking and molecular dynamics simulations were conducted on isoxazolidine and 4-isoxazoline derivatives targeting the EGFR receptor (PDB: 1JU6). Molecular docking simulations confirmed the high affinity of these compounds towards the target protein 1JU6, particularly compound 3b, among the isoxazolidine derivatives, compound 3b exhibited the most favorable binding energy, with a g score of -8.50 kcal/mol. Molecular dynamics simulations over 100 nanoseconds demonstrated the stability and potential of compound 3b as a superior candidate for anticancer applications, further supported by structural analyses including RMSD, RMSF, Rg, and SASA values. This study underscores the promising role of compound 3b in anticancer treatments, providing a solid foundation for future drug development and optimization efforts.Keywords: isoxazolines, DFT, molecular docking, molecular dynamic, ADMET, drugs.
Procedia PDF Downloads 4985 Women and Terrorism in Nigeria: Policy Templates for Addressing Complex Challenges in a Changing Democratic State
Authors: Godiya Pius Atsiya
Abstract:
One of the most devastating impacts of terrorism on the Nigerian state is the danger it has posed on women, children and other vulnerable groups. The complexity of terrorism in Nigeria, especially in most parts of Northern Nigeria has entrenched unprecedented security challenges such as refugee crisis, kidnapping, food shortages, increase in death tolls, malnutrition, fear, rape and several other psychological factors. Of particular interest in this paper as it relates to terrorism is the high rate of Internally Displaced Persons(IDPs), with women, children and the aged being the most affected. Empirical evidence arising from recent development in Nigeria’s North-East geo-political zone shows that large numbers of refugees fleeing the Boko Haram attacks have doubled. The attendant consequences of this mass exodus of people in the affected areas are that the victims now suffer untold and unwarranted economic hardship. In another dimension, recent findings have it that most powerless women and young teenage girls have been forcefully conscripted into the Islamic extremist groups and used as shields. In some respect, these groups of people have been used as available tools for suicide bombing and other criminal tendencies, the result of which can be detrimental to social cohesion and integration. This work is a theoretical insight into terrorism discourses; hence, the paper relies on existing works of scholars in carrying out the research. The paper argues that the implications of terrorism on women gender have grounding effects on the moral psyche of women who are supposed to be home managers and custodians of morality in society. The burden of terrorism and all it tends to propagate has literally upturned social lives and hence, Nigeria is gradually being plunged into the Hobesian state of nature. As a panacea to resolving this social malaise, the paper submits that government and indeed, all stakeholders in the nation’s democratic project must expedite action to nip this trend in the bud. The paper sums up with conclusion and other alternative policy measures to mitigate the challenges of terrorism in Nigeria.Keywords: changing democratic state, policy measures, terrorism, women
Procedia PDF Downloads 23384 Olfactometer Response of Red Palm Weevil (Rhynchophorus ferrugineus) (Coleoptera: Curculionidae) and Its Biology for the Evaluation of Resistance in the Commercially Grown Date Palm (Phoenix dactylifera L.) Cultivars in Pakistan
Authors: Mujahid Manzoor, Muhammad Shafique, Jam Nazeer Ahmad, Farman Ahmad, Muhammad Ali, Muhammad Rizwan Tariq, Shahbaz Ahmad, Muhammad Saleem Haider
Abstract:
Date palms (P. dactylifera L.) are prominent in the Kingdom of Saudi Arabia (KSA), Iran, UAE, and Iraq, as well as Algeria, Egypt, and Pakistan. Insect pests' attacks on different palm cultivars adversely affected their production in the last few decades. Pakistan ranked sixth for date production around the world. The most commercially grown cultivars are Aseel, Dhaki, Falsi, Karbalai, Mozawati, Jan Swore, Kohra, Hillawi, Kohra, and Begum Jhangi. Red palm weevils are considered as hazardous insect pests responsible for economic loss in palm orchards. This research work depicts the infestation of red palm weevils in eleven different palm cultivars (Hillawi, Mozawati, Kechanr, Aseel, Shamrani, Khudravi, Dhaki, Zeri, Kobra, Zaidi, Denda), which frequently grow in different regions of Pakistan through Y-shaped olfactometer analysis. In addition, the level of both antixenosis and antibiosis was spotted by examining the various parameters such as %age lure of weevils of mature females, general count of laid eggs in addition to their activeness. Furthermore, obtained results depicted that a positive contact was established with minimum antixenotic consequence revealed by a cultivar, “Hillawi” among most hold of RPW adults (22.32%), number of eggs laid (16.66%) and egg hatching (84.66%), while other cultivars, including Mozawati, Aseel, Kechanr, Shamrani, Khudravi, Dhaki, Zeri, and Zaidi, exhibited a greater level of antixenosis. Moreover, “Hillawi” documented the maximum number of eggs, while Kechanr, Mozawati, Aseel Kobra, and Denda showed minimum attraction by red palm weevils. Maximum red palm weevils were attracted in an olfactometer assay of sugarcane varieties.Keywords: P. dactylifera, R. ferrugineus, olfactometer, antixenosis
Procedia PDF Downloads 11583 Experimental Investigation on Strengthening of Timber Beam Using Glass Fibers and Steel Plates
Authors: Sisaynew Tesfaw Admassu
Abstract:
The strengthening of timber beams can be necessary for several reasons including the increase of live loads (possible in a historical building for a change of destination of use or upgrading to meet new requirements), the reduction of the resistant cross-sections following deterioration (attacks of biological agents such as fungi, and insects) or traumatic events (fires) and the excess of deflection in the members. The main purpose of strengthening an element is not merely to repair it, but also to prevent and minimize the appearance of future problems. This study did an experimental investigation on the behavior of reference and strengthened solid timber beams. The strengthening materials used in this study were CSM-450 glass fiber and steel materials for both flexural and shear strengthening techniques. Twenty-two solid timber beams of Juniperus procera (TID) species with the dimensions of 60 x 90 x 780 mm were used in the present study. The binding material to bond the strengthening materials with timber was general-purpose resin with Luperox® K10 MEKP catalyst. Three beams were used as control beams (unstrengthen beams) while the remaining nineteen beams were strengthened using the strengthening materials for flexure and shear. All the beams were tested for three points loading to failure by using a Universal Testing Machine, UTM-600kN machine. The experimental results showed that the strengthened beams performed better than the unstrengthen beams. The experimental result of flexural strengthened beams showed that the load-bearing capacity of strengthened beams increased between 16.34 – 42.55%. Four layers of Glass Fiber Reinforced polymer on the tension side of the beams was shown to be the most effective way to enhance load-bearing capacity. The strengthened beams also have an enhancement in their flexural stiffness. The stiffness of flexural strengthened beams was increased between 1.18 – 65.53% as compared to the control beams. The highest increment in stiffness has occurred on beams strengthened using 2x60 mm steel plates. The shear-strengthened beams showed a relatively small amount of performance as compared to flexural-strengthened beams; the reason is that the beams are sufficient for shear. The polyester resin used in the experimental work showed good performance in bonding agents between materials. The resin showed more effectiveness in GFRP materials than steel materials.Keywords: heritage structures, strengthening, stiffness, adhesive, polyester resin, steel plates
Procedia PDF Downloads 7482 Numerical Investigation of Effect of Throat Design on the Performance of a Rectangular Ramjet Intake
Authors: Subrat Partha Sarathi Pattnaik, Rajan N.K.S.
Abstract:
Integrated rocket ramjet engines are highly suitable for long range missile applications. Designing the fixed geometry intakes for such missiles that can operate efficiently over a range of operating conditions is a highly challenging task. Hence, the present study aims to evaluate the effect of throat design on the performance of a rectangular mixed compression intake for operation in the Mach number range of 1.8 – 2.5. The analysis has been carried out at four different Mach numbers of 1.8, 2, 2.2, 2.5 and two angle-of-attacks of +5 and +10 degrees. For the throat design, three different throat heights have been considered, one corresponding to a 3- external shock design and two heights corresponding to a 2-external shock design leading to different internal contraction ratios. The on-design Mach number for the study is M 2.2. To obtain the viscous flow field in the intake, the theoretical designs have been considered for computational fluid dynamic analysis. For which Favre averaged Navier- Stokes (FANS) equations with two equation SST k-w model have been solved. The analysis shows that for zero angle of attack at on-design and high off-design Mach number operations the three-ramp design leads to a higher total pressure recovery (TPR) compared to the two-ramp design at both contraction ratios maintaining same mass flow ratio (MFR). But at low off-design Mach numbers the total pressure shows an opposite trend that is maximum for the two-ramp low contraction ratio design due to lower shock loss across the external shocks similarly the MFR is higher for low contraction ratio design as the external ramp shocks move closer to the cowl. At both the angle of attack conditions and complete range of Mach numbers the total pressure recovery and mass flow ratios are highest for two ramp low contraction design due to lower stagnation pressure loss across the detached bow shock formed at the ramp and lower mass spillage. Hence, low contraction design is found to be suitable for higher off-design performance.Keywords: internal contraction ratio, mass flow ratio, mixed compression intake, performance, supersonic flows
Procedia PDF Downloads 10881 A Simplified Method to Assess the Damage of an Immersed Cylinder Subjected to Underwater Explosion
Authors: Kevin Brochard, Herve Le Sourne, Guillaume Barras
Abstract:
The design of a submarine’s hull is crucial for its operability and crew’s safety, but also complex. Indeed, engineers need to balance lightness, acoustic discretion and resistance to both immersion pressure and environmental attacks. Submarine explosions represent a first-rate threat for the integrity of the hull, whose behavior needs to be properly analyzed. The presented work is focused on the development of a simplified analytical method to study the structural response of a deeply immersed cylinder submitted to an underwater explosion. This method aims to provide engineers a quick estimation of the resulting damage, allowing them to simulate a large number of explosion scenarios. The present research relies on the so-called plastic string on plastic foundation model. A two-dimensional boundary value problem for a cylindrical shell is converted to an equivalent one-dimensional problem of a plastic string resting on a non-linear plastic foundation. For this purpose, equivalence parameters are defined and evaluated by making assumptions on the shape of the displacement and velocity field in the cross-sectional plane of the cylinder. Closed-form solutions for the deformation and velocity profile of the shell are obtained for explosive loading, and compare well with numerical and experimental results. However, the plastic-string model has not yet been adapted for a cylinder in immersion subjected to an explosive loading. In fact, the effects of fluid-structure interaction have to be taken into account. Moreover, when an underwater explosion occurs, several pressure waves are emitted by the gas bubble pulsations, called secondary waves. The corresponding loads, which may produce significant damages to the cylinder, must also be accounted for. The analytical developments carried out to solve the above problem of a shock wave impacting a cylinder, considering fluid-structure interaction will be presented for an unstiffened cylinder. The resulting deformations are compared to experimental and numerical results for different shock factors and different standoff distances.Keywords: immersed cylinder, rigid plastic material, shock loading, underwater explosion
Procedia PDF Downloads 33980 Global and Domestic Response to Boko Haram Terrorism on Cameroon 2014-2018
Authors: David Nchinda Keming
Abstract:
The present study is focused on both the national and international collective fight against Boko Haram terrorism on Cameroon and the rule played by the Lake Chad Basin Countries (LCBCs) and the global community to suffocate the sect’s activities in the region. Although countries of the Lake Chad Basin include: Cameroon, Chad, Nigeria and Niger others like Benin also joined the course. The justification for the internationalisation of the fight against Boko Haram could be explained by the ecological and international climatic importance of the Lake Chad and the danger posed by the sect not only to the Lake Chad member countries but to global armed, civil servants and the international political economy. The study, therefore, kick start with Cameroon’s reaction to Boko Haram’s terrorist attacks on its territory. It further expounds on Cameroon’s request on bilateral diplomacy from members of the UN Security Council for an international collective support to staple the winds of the challenging sect. The study relies on the hypothesis that Boko Haram advanced terrorism on Cameroon was more challenging to the domestic military intelligence thus forcing the government to seek for bilateral and multilateral international collective support to secure its territory from the powerful sect. This premise is tested internationally via (multilateral cooperation, bilateral response, regional cooperation) and domestically through (solidarity parade, religious discourse, political manifestations, war efforts, the vigilantes and the way forward). To accomplish our study, we made used of the mixed research methodologies to interpret the primary, secondary and tertiary sources consulted. Our results reveal that the collective response was effectively positive justified by the drastic drop in the sect’s operations in Cameroon and the whole LCBCs. Although the sect was incapacitated, terrorism remains an international malaise and Cameroon hosts a fertile ground for terrorists’ activism. Boko Haram was just weakened and not completely defeated and could reappear someday even under a different appellation. Therefore, to absolutely eradicate terrorism in general and Boko Haram in particular, LCBCs must improve their military intelligence on terrorism and continue to collaborate with advanced experienced countries in fighting terrorism.Keywords: Boko Haram, terrorism, domestic, international, response
Procedia PDF Downloads 15579 Understanding the Basics of Information Security: An Act of Defense
Authors: Sharon Q. Yang, Robert J. Congleton
Abstract:
Information security is a broad concept that covers any issues and concerns about the proper access and use of information on the Internet, including measures and procedures to protect intellectual property and private data from illegal access and online theft; the act of hacking; and any defensive technologies that contest such cybercrimes. As more research and commercial activities are conducted online, cybercrimes have increased significantly, putting sensitive information at risk. Information security has become critically important for organizations and private citizens alike. Hackers scan for network vulnerabilities on the Internet and steal data whenever they can. Cybercrimes disrupt our daily life, cause financial losses, and instigate fear in the public. Since the start of the pandemic, most data related cybercrimes targets have been either financial or health information from companies and organizations. Libraries also should have a high interest in understanding and adopting information security methods to protect their patron data and copyrighted materials. But according to information security professionals, higher education and cultural organizations, including their libraries, are the least prepared entities for cyberattacks. One recent example is that of Steven’s Institute of Technology in New Jersey in the US, which had its network hacked in 2020, with the hackers demanding a ransom. As a result, the network of the college was down for two months, causing serious financial loss. There are other cases where libraries, colleges, and universities have been targeted for data breaches. In order to build an effective defense, we need to understand the most common types of cybercrimes, including phishing, whaling, social engineering, distributed denial of service (DDoS) attacks, malware and ransomware, and hacker profiles. Our research will focus on each hacking technique and related defense measures; and the social background and reasons/purpose of hacker and hacking. Our research shows that hacking techniques will continue to evolve as new applications, housing information, and data on the Internet continue to be developed. Some cybercrimes can be stopped with effective measures, while others present challenges. It is vital that people understand what they face and the consequences when not prepared.Keywords: cybercrimes, hacking technologies, higher education, information security, libraries
Procedia PDF Downloads 13578 False Assumptions Made in Cybersecurity Curriculum: K-12
Authors: Nathaniel Evans, Jessica Boersma, Kenneth Kass
Abstract:
With technology and STEM fields growing every day, there is a significant projected shortfall in qualified cybersecurity workers. As such, it is essential to develop a cybersecurity curriculum that builds skills and cultivates interest in cybersecurity early on. With new jobs being created every day and an already significant gap in the job market, it is vital that educators are pro-active in introducing a cybersecurity curriculum where students are able to learn new skills and engage in an age-appropriate cyber curriculum. Within this growing world of cybersecurity, students should engage in age-appropriate technology and cybersecurity curriculum, starting with elementary school (k-5), extending through high school, and ultimately into college. Such practice will provide students with the confidence, skills, and, ultimately, the opportunity to work in the burgeoning information security field. This paper examines educational methods, pedagogical practices, current cybersecurity curricula, and other educational resources and conducts analysis for false assumptions and developmental appropriateness. It also examines and identifies common mistakes with current cyber curriculum and lessons and discuss strategies for improvement. Throughout the lessons that were reviewed, many common mistakes continued to pop up. These mistakes included age appropriateness, technology resources that were available, and consistency of student’s skill levels. Many of these lessons were written for the wrong grade levels. The ones written for the elementary level all had activities that assumed that every student in the class could read at grade level and also had background knowledge of the cyber activity at hand, which is not always the case. Another major mistake was that these lessons assumed that all schools had any kind of technology resource available to them. Some schools are 1:1, and others are only allotted three computers in their classroom where the students have to share. While coming up with a cyber-curriculum, it has to be kept in mind that not all schools are the same, not every classroom is the same. There are many students who are not reading at their grade level or have not had exposure to the digital world. We need to start slow and ease children into the cyber world. Once they have a better understanding, it will be easier to move forward with these lessons and get the students engaged. With a better understanding of common mistakes that are being made, a more robust curriculum and lessons can be created that no only spark a student’s interest in this much-needed career field but encourage learning while keeping our students safe from cyber-attacks.Keywords: assumptions, cybersecurity, k-12, teacher
Procedia PDF Downloads 16777 Distribution and Population Status of Canis spp. Threats and Conservation in Lehri Nature Park, Salt Range, District Jhelum
Authors: Muhammad Saad, AzherBaig, Anwar Maqsood, Muhammad Waseem
Abstract:
The grey wolf has been ranked endangered and Asiatic jackal as near threatened in Pakistan. Scientific data on population and threats to these species are not available in Pakistan, which is required for their proper management and conservation. The present study was conducted to collect data on distribution range, population status and threats to both of these Canis species in Lehri Nature Park. The data were collected using direct observations and indirect signs in the field. The population of grey wolf and Asiatic jackal were scattered into pocket of the study area and its surroundings. The current population of grey wolf was estimated 06 individuals and that of Asiatic jackal 28 individuals in the study area. The present study showed that grey wolf and Asiatic jackal were distributed in the northern and southern part of the study area having dense vegetation cover of tress and shrub between the altitudes of 330 m and 515 m. The research finding revealed that the scrub forest is the most preferred habitat of both the species but due to anthropogenic pressure the scrub forest is under severe threat. The dominant trees species were Acacia modesta, Zizyphus nummularia, and Prosopis juliflora and shrubs species of Dodonea-viscosa, Calotropis procera and Adhatoda vasica. Urial is one of the natural prey species: their population is low due to a number of reasons and therefore the maximum dependence of the wolves was on the livestock of the local and nomadic shepherds. The main prey species in the livestock was goats and sheep. The interviews were conducted with the eye witnesses of wolf attacks including livestock being killed by 5-6 numbers of wolves in different hamlets in the study area. The killing rate of the livestock by the wolves was greater when the nomadic shepherds were present in the area and decreased when they left the area. Presence of nomadic shepherds and killing rate has relation with the shifting of the wolves from the study area. It is further concluded that the population of the grey wolf and Asiatic jackal has decreased over time due to less availability of the natural prey species and habitat destruction.Keywords: wildlife ecology, population conservation, rehabilitation, conservation
Procedia PDF Downloads 50176 A POX Controller Module to Collect Web Traffic Statistics in SDN Environment
Authors: Wisam H. Muragaa, Kamaruzzaman Seman, Mohd Fadzli Marhusin
Abstract:
Software Defined Networking (SDN) is a new norm of networks. It is designed to facilitate the way of managing, measuring, debugging and controlling the network dynamically, and to make it suitable for the modern applications. Generally, measurement methods can be divided into two categories: Active and passive methods. Active measurement method is employed to inject test packets into the network in order to monitor their behaviour (ping tool as an example). Meanwhile the passive measurement method is used to monitor the traffic for the purpose of deriving measurement values. The measurement methods, both active and passive, are useful for the collection of traffic statistics, and monitoring of the network traffic. Although there has been a work focusing on measuring traffic statistics in SDN environment, it was only meant for measuring packets and bytes rates for non-web traffic. In this study, a feasible method will be designed to measure the number of packets and bytes in a certain time, and facilitate obtaining statistics for both web traffic and non-web traffic. Web traffic refers to HTTP requests that use application layer; while non-web traffic refers to ICMP and TCP requests. Thus, this work is going to be more comprehensive than previous works. With a developed module on POX OpenFlow controller, information will be collected from each active flow in the OpenFlow switch, and presented on Command Line Interface (CLI) and wireshark interface. Obviously, statistics that will be displayed on CLI and on wireshark interfaces include type of protocol, number of bytes and number of packets, among others. Besides, this module will show the number of flows added to the switch whenever traffic is generated from and to hosts in the same statistics list. In order to carry out this work effectively, our Python module will send a statistics request message to the switch requesting its current ports and flows statistics in every five seconds; while the switch will reply with the required information in a message called statistics reply message. Thus, POX controller will be notified and updated with any changes could happen in the entire network in a very short time. Therefore, our aim of this study is to prepare a list for the important statistics elements that are collected from the whole network, to be used for any further researches; particularly, those that are dealing with the detection of the network attacks that cause a sudden rise in the number of packets and bytes like Distributed Denial of Service (DDoS).Keywords: mininet, OpenFlow, POX controller, SDN
Procedia PDF Downloads 23775 The Relationship between Body Positioning and Badminton Smash Quality
Authors: Gongbing Shan, Shiming Li, Zhao Zhang, Bingjun Wan
Abstract:
Badminton originated in ancient civilizations in Europe and Asia more than 2000 years ago. Presently, it is played almost everywhere with estimated 220 million people playing badminton regularly, ranging from professionals to recreational players; and it is the second most played sport in the world after soccer. In Asia, the popularity of badminton and involvement of people surpass soccer. Unfortunately, scientific researches on badminton skills are hardly proportional to badminton’s popularity. A search of literature has shown that the literature body of biomechanical investigations is relatively small. One of the dominant skills in badminton is the forehand overhead smash, which consists of 1/5 attacks during games. Empirical evidences show that one has to adjust the body position in relation to the coming shuttlecock to produce a powerful and accurate smash. Therefore, positioning is a fundamental aspect influencing smash quality. A search of literature has shown that there is a dearth/lack of study on this fundamental aspect. The goals of this study were to determine the influence of positioning and training experience on smash quality in order to discover information that could help learn/acquire the skill. Using a 10-camera, 3D motion capture system (VICON MX, 200 frames/s) and 15-segment, full-body biomechanical model, 14 skilled and 15 novice players were measured and analyzed. Results have revealed that the body positioning has direct influence on the quality of a smash, especially on shuttlecock release angle and clearance height (passing over the net) of offensive players. The results also suggest that, for training a proper positioning, one could conduct a self-selected comfort position towards a statically hanged shuttlecock and then step one foot back – a practical reference marker for learning. This perceptional marker could be applied in guiding the learning and training of beginners. As one gains experience through repetitive training, improved limbs’ coordination would increase smash quality further. The researchers hope that the findings will benefit practitioners for developing effective training programs for beginners.Keywords: 3D motion analysis, biomechanical modeling, shuttlecock release speed, shuttlecock release angle, clearance height
Procedia PDF Downloads 50074 Digital Immunity System for Healthcare Data Security
Authors: Nihar Bheda
Abstract:
Protecting digital assets such as networks, systems, and data from advanced cyber threats is the aim of Digital Immunity Systems (DIS), which are a subset of cybersecurity. With features like continuous monitoring, coordinated reactions, and long-term adaptation, DIS seeks to mimic biological immunity. This minimizes downtime by automatically identifying and eliminating threats. Traditional security measures, such as firewalls and antivirus software, are insufficient for enterprises, such as healthcare providers, given the rapid evolution of cyber threats. The number of medical record breaches that have occurred in recent years is proof that attackers are finding healthcare data to be an increasingly valuable target. However, obstacles to enhancing security include outdated systems, financial limitations, and a lack of knowledge. DIS is an advancement in cyber defenses designed specifically for healthcare settings. Protection akin to an "immune system" is produced by core capabilities such as anomaly detection, access controls, and policy enforcement. Coordination of responses across IT infrastructure to contain attacks is made possible by automation and orchestration. Massive amounts of data are analyzed by AI and machine learning to find new threats. After an incident, self-healing enables services to resume quickly. The implementation of DIS is consistent with the healthcare industry's urgent requirement for resilient data security in light of evolving risks and strict guidelines. With resilient systems, it can help organizations lower business risk, minimize the effects of breaches, and preserve patient care continuity. DIS will be essential for protecting a variety of environments, including cloud computing and the Internet of medical devices, as healthcare providers quickly adopt new technologies. DIS lowers traditional security overhead for IT departments and offers automated protection, even though it requires an initial investment. In the near future, DIS may prove to be essential for small clinics, blood banks, imaging centers, large hospitals, and other healthcare organizations. Cyber resilience can become attainable for the whole healthcare ecosystem with customized DIS implementations.Keywords: digital immunity system, cybersecurity, healthcare data, emerging technology
Procedia PDF Downloads 6973 Outlawing Gender: A Comparative Study of Anti-Gender Studies Legislation in the U.S. and Global Contexts
Authors: Tracey Jean Boisseau
Abstract:
Recently, the rise of concerted right-wing and authoritarian movements has put feminists as well as women, queer, trans, and non-binary folk, immigrants, refugees, the global poor, and people of color in their crosshairs. The U.S. is seeing unprecedented attacks on liberal democratic institutions, escalating “culture wars,” and increased anti-intellectual vitriol specifically targeting feminist and anti-racist educators and scholars. Such vitriol has fueled new legislation curtailing or outright banning of “gender studies” for its ideological commitment to theorizing gender identity as a cultural construct and an inherently political project rather than a “natural” binary that can not be contested or interrogated. At the same time, across the globe—in Afghanistan, Argentina, Brazil, France, Haiti, Hungary, Kenya, Nicaragua, Nigeria, Pakistan, the Philippines, Poland, Russia, South Korea, Sweden, Turkey, Uganda, the United Kingdom, and elsewhere—emergent anti-feminist, nativist, and white-supremacist political parties, as well as established autocratic and authoritarian regimes, have instituted blatantly misogynistic, anti-queer, and anti-trans legislation, often accompanied by governmental and extra-governmental policies explicitly intended to marginalize, erase, suppress, or extinguish gender studies as a legitimate academic discipline, topic of research, and teaching field. This paper considers the origins and effects of such legislation -as well as the strategies exhibited by practitioners of gender studies to counter these effects and resist erasure- from a cross-cultural perspective. The research underpinning this paper’s conclusions includes a survey of nearly 2000 gender studies programs in the U.S. and interviews with dozens of gender studies scholars and administrative leaders of gender-studies programs located worldwide. The goal of this paper is to illuminate distinctions, continuities, and global connections between anti-gender studies legislation that emanates from within national borders but arises from rightwing movements that supercede those borders, and that, ultimately, require globalist responses.Keywords: anti-feminist, anti-LGBTQ, legislation, criminalization, authoritarianism, globalization
Procedia PDF Downloads 7972 Mechanisms of Metals Stabilization in the Soil by Biochar Material as Affected by the Low Molecular Weight Organic Acids
Authors: Md. Shoffikul Islam, Hongqing Hu
Abstract:
Immobilizing trace elements by reducing their mobility and bioavailability through amendment application, especially biochar (BC), is a cost-effective and efficient method to address their toxicity in the soil environment. However, the low molecular weight organic acids (LMWOAs) in the rhizosphere could affect BC's efficiency to immobilize trace metals as the LMWOAs could either mobilize or fix metals in the soils. Therefore, understanding the BC's and LMWOAs' interaction mechanisms on metals stabilization in the rhizosphere is crucial. The present study examined the impact of BC derived from rice husk, tartaric acid (TA), and oxalic acid (OA), and the combination of BC and TA/OA on the changes of cadmium (Cd), lead (Pb), and zinc (Zn) among their geochemical forms through incubation experiment. The changes of zeta potential and X-ray diffraction (XRD) pattern of BC and BC-amended soils to investigate the probable mechanisms of trace elements' immobilization by BC under the attacks of TA and OA were also examined. The rice husk BC at 5% (w/w) was mixed with the air-dry soil (an Anthrosols) contaminated with Cd, Pb, and Zn in the plastic pot. The TA and OA each at 2, 5, 10, and 20 mM kg-1 (w/v) were added separately into the pot. All the ingredients were mixed thoroughly with the soil. A control (CK) treatment was also prepared without BC, TA, and OA addition. After 7, 15, and 60 days of incubation with 60% (w/v) moisture level at 25 °C, the incubated soils were determined for pH and EC and were sequentially extracted to assess the metals' transformation in soil. The electronegative charges and XRD peaks of BC and BC-amended soils were also measured. The BC, low level of TA (2 mM kg-1 soil), and BC plus the low concentration of TA (BC-TA2) addition considerably declined the acid-soluble Cd, Pb, and Zn in which BC-TA2 was found to be the most effective treatment. The trends were reversed concerning the high levels of TA (>5-20 mM kg-1 soil), all levels of OA (2-20 mM kg-1 soil), and the BC plus high levels of TA/OA treatments. BC-TA2 changed the highest amounts of acid-soluble and reducible metals to the oxidizable and residual fractions with time. The most increased electronegative charges of BC-TA2 indicate its (BC-TA2) highest metals' immobilizing efficiency, probably through metals adsorption and fixation with the negative charge sites. The XRD study revealed the presence of P, O, CO32-, and Cl1- in BC, which might be responsible for the precipitation of CdCO3, pyromorphite, and hopeite concerning Cd, Pb, and Zn immobilization, respectively. The findings demonstrated that the low level of TA increased metals immobilization, while the high levels of TA and all levels of OA enhanced their mobilization. The BC-TA2 was the best treatment in stabilizing metals in soil.Keywords: biochar, immobilization, low molecular weight organic acids, trace elements contaminated soil
Procedia PDF Downloads 8271 Mechanical, Thermal and Biodegradable Properties of Bioplast-Spruce Green Wood Polymer Composites
Authors: A. Atli, K. Candelier, J. Alteyrac
Abstract:
Environmental and sustainability concerns push the industries to manufacture alternative materials having less environmental impact. The Wood Plastic Composites (WPCs) produced by blending the biopolymers and natural fillers permit not only to tailor the desired properties of materials but also are the solution to meet the environmental and sustainability requirements. This work presents the elaboration and characterization of the fully green WPCs prepared by blending a biopolymer, BIOPLAST® GS 2189 and spruce sawdust used as filler with different amounts. Since both components are bio-based, the resulting material is entirely environmentally friendly. The mechanical, thermal, structural properties of these WPCs were characterized by different analytical methods like tensile, flexural and impact tests, Thermogravimetric Analysis (TGA), Differential Scanning Calorimetry (DSC) and X-ray Diffraction (XRD). Their water absorption properties and resistance to the termite and fungal attacks were determined in relation with different wood filler content. The tensile and flexural moduli of WPCs increased with increasing amount of wood fillers into the biopolymer, but WPCs became more brittle compared to the neat polymer. Incorporation of spruce sawdust modified the thermal properties of polymer: The degradation, cold crystallization, and melting temperatures shifted to higher temperatures when spruce sawdust was added into polymer. The termite, fungal and water absorption resistance of WPCs decreased with increasing wood amount in WPCs, but remained in durability class 1 (durable) concerning fungal resistance and quoted 1 (attempted attack) in visual rating regarding to the termites resistance except that the WPC with the highest wood content (30 wt%) rated 2 (slight attack) indicating a long term durability. All the results showed the possibility to elaborate the easy injectable composite materials with adjustable properties by incorporation of BIOPLAST® GS 2189 and spruce sawdust. Therefore, lightweight WPCs allow both to recycle wood industry byproducts and to produce a full ecologic material.Keywords: biodegradability, color measurements, durability, mechanical properties, melt flow index, MFI, structural properties, thermal properties, wood-plastic composites, WPCs
Procedia PDF Downloads 13870 Real-World Vehicle to Grid: Case Study on School Buses in New England
Authors: Aaron Huber, Manoj Karwa
Abstract:
Floods, heat waves, drought, wildfires, tornadoes and other environmental disasters are a snapshot of looming national problems that can create increasing demands on the national grid. With nearly 500,000 school buses on the road and the environmental protection agency (EPA) providing nearly $1B for electric school buses, there is a solution for this national issue. Bidirectional batteries in electric school buses enable a future proof solution to sustain the power grid during adverse environmental conditions and other periods of high demand. School buses have larger batteries than standard electric vehicles. When they are not transporting students, these buses can spend peak solar hours parked and plugged into bi-directional direct current fast chargers (DCFC). A partnership with Highland Electric, Proterra and Rhombus enabled over 7 MWh of energy servicing Massachusetts and Vermont grids. The buses were part of a vehicle to grid (V2G) program with National Grid and Green Mountain Power that can charge an average American home for one month with a single bus. V2G infrastructure enables school systems to future proof their charging strategies, strengthen their local grids and can create additional revenue streams with their EV fleets. A bidirectional ecosystem with Highland, Proterra and Rhombus can enable grid resiliency or the ability to withstand power outages caused by excessive demands, natural disasters or rogue nation's attacks with no loss of service. A fleet of school buses is a standalone resilient asset that can be accessed across a city to keep its citizens safe without having any toxic fumes. Nearly 95% of all school buses across USA are powered by diesel internal combustion engines. Diesel exhaust has been classified as a human carcinogen, and it can lead to and exacerbate respiratory conditions. Bidirectional school buses and chargers enable energy justice by providing backup power in case of emergencies or high demand for marginalized communities and aim to make energy more accessible, affordable, clean, and democratically managed.Keywords: V2G, vehicle to grid, electric buses, eBuses, DC fast chargers, DCFC
Procedia PDF Downloads 7769 Revolution and Political Opposition in Contemporary Arabic Poetry: A Thematic Study of Two Poems by Muzaffar Al-Nawwab
Authors: Nasser Y. Athamneh
Abstract:
Muzaffar al-Nawwab (1934--) is a modern Iraqi poet, critic, and painter, well-known to Arab youth of the second half of the 20th century for his revolutionary spirit and political activism. For the greater part of his relatively long life, al-Nawwab was wanted 'dead or alive,' so to speak, by most of the Arab regimes and authorities due to his scathing, and at times unsparingly obscene attacks on them. Hence it is that the Arab masses found in his poetry the rebellious expression of their own anger and frustration, stifled by fear for their physical safety. Thus, al-Nawwab’s contemporary Arab audience loved and embraced him both as an Arab exile and as a poet. They memorized and celebrated his poems and transmitted them secretly by word of mouth and on compact cassette tapes. He himself recited his own poetry and had it recorded on compact cassette tapes for fans to smuggle from one Arab country to the other. The themes of al-Nawwab’s poems are varied, but the most predominant among them is political opposition. In most of his poems, al-Nawwab takes up politics as the major theme. Yet, he often represents it coupled with the leitmotifs of women and wine. Indeed he oscillates almost systematically between political commitment to the revolutionary cause of the masses of his nation and homeland on the one hand and love for women and wine on the other. For the persona in al-Nawwab’s poetry, love-longing for the woman and devotion to the cause of revolution and Pan-Arabism are interrelated; each of them readily evokes the other. In this paper, an attempt is made at investigating the treatment and representation of the theme of revolution and political opposition in some of al-Nawwab’s poems. This investigation will be conducted through close reading and textual analysis of representative sections of the poetic texts under consideration in the paper. The primary texts for the study are selected passages from two representative poems, namely, 'The Night Song of the Bow Strings' (Watariyyaat Layliyyah) and 'In Wine and Sorrow My Heart [Is Immersed]' (bil-khamri wa bil-huzni fu’aady). Other poems and extracts from al-Nawwab’s poetic works will be drawn upon as secondary texts to clarify the arguments in the paper and support its thesis. The discussions and textual analysis of the texts under consideration are meant to show that revolution and undaunted political opposition is a predominant theme in al-Nawwab’s poetry, often represented through the use of the leitmotifs of women and wine.Keywords: Arabic poetry, Muzaffar al-Nawwab, politics, revolution
Procedia PDF Downloads 13868 Efficacy of Different Soil-Applied Fungicides to Manage Phytophthora Root Rot of Chili (Solanum annum) in Pakistan
Authors: Kiran Nawaz, Ahmad Ali Shahid, Sehrish Iftikhar, Waheed Anwar, Muhammad Nasir Subhani
Abstract:
Chili (Solanum annum L.) attacks by many fungal pathogens, including members of Oomycetes which are responsible for root rot in different chili growing areas of the world. Oomycetes pathogens cause economic losses in different regions of the Pakistan. Most of the plant tissues, including roots, crowns, fruit, and leaves, are vulnerable to Phytophthora capsici. It is very difficult to manage the Phytophthora root rot of chili as many commercial varieties are tremendously vulnerable to P. capsici. The causal agent of the disease was isolated on corn meal agar (CMA) and identified on a morphological basis by using available taxonomic keys. The pathogen was also confirmed on the molecular basis through internal transcribed spacer region and with other molecular markers.The Blastn results showed 100% homology with already reported sequences of P. capsici in NCBI database. Most of the farmers have conventionally relied on foliar fungicide applications to control Phytophthora root rot in spite of their incomplete effectiveness. In this study, in vitro plate assay, seed soaking and foliar applications of 6 fungicides were evaluated against root rot of chili. In vitro assay revealed that significant inhibition of linear growth was obtained with Triflumizole at 7.0%, followed by Thiophanate methyl (8.9%), Etridiazole (6.0%), Propamocarb (5.9%) and 7.5% with Mefenoxam and Iprodione for P. capsici. The promising treatments of in vitro plate bioassay were evaluated in pot experiments under controlled conditions in the greenhouse. All fungicides were applied after at 6-day intervals. Results of pot experiment showed that all treatments considerably inhibited the percentage of P. capsici root rot incidence. In addition, application of seed soaking with all six fungicides combined with the foliar spray of the same components showed the significant reduction in root rot incidence. The combine treatments of all fungicides as in vitro bioassay, seed soaking followed by foliar spray is considered non-harmful control methods which have advantages and limitation. Hence, these applications proved effective and harmless for the management of soil-borne plant pathogens.Keywords: blastn, bioassay, corn meal agar(CMA), oomycetes
Procedia PDF Downloads 244