Search results for: man in middle attack
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 2185

Search results for: man in middle attack

1675 Understanding Mathematics Achievements among U. S. Middle School Students: A Bayesian Multilevel Modeling Analysis with Informative Priors

Authors: Jing Yuan, Hongwei Yang

Abstract:

This paper aims to understand U.S. middle school students’ mathematics achievements by examining relevant student and school-level predictors. Through a variance component analysis, the study first identifies evidence supporting the use of multilevel modeling. Then, a multilevel analysis is performed under Bayesian statistical inference where prior information is incorporated into the modeling process. During the analysis, independent variables are entered sequentially in the order of theoretical importance to create a hierarchy of models. By evaluating each model using Bayesian fit indices, a best-fit and most parsimonious model is selected where Bayesian statistical inference is performed for the purpose of result interpretation and discussion. The primary dataset for Bayesian modeling is derived from the Program for International Student Assessment (PISA) in 2012 with a secondary PISA dataset from 2003 analyzed under the traditional ordinary least squares method to provide the information needed to specify informative priors for a subset of the model parameters. The dependent variable is a composite measure of mathematics literacy, calculated from an exploratory factor analysis of all five PISA 2012 mathematics achievement plausible values for which multiple evidences are found supporting data unidimensionality. The independent variables include demographics variables and content-specific variables: mathematics efficacy, teacher-student ratio, proportion of girls in the school, etc. Finally, the entire analysis is performed using the MCMCpack and MCMCglmm packages in R.

Keywords: Bayesian multilevel modeling, mathematics education, PISA, multilevel

Procedia PDF Downloads 329
1674 The Discovery and Application of Perspective Representation in Modern Italy

Authors: Matthias Stange

Abstract:

In the early modern period, a different image of man began to prevail in Europe. The focus was on the self-determined human being and his abilities. At first, these developments could be seen in Italian painting and architecture, which again oriented itself to the concepts and forms of antiquity. For example, through the discovery of perspective representation by Brunelleschi or later the orthogonal projection by Alberti, after the ancient knowledge of optics had been forgotten in the Middle Ages. The understanding of reality in the Middle Ages was not focused on the sensually perceptible world but was determined by ecclesiastical dogmas. The empirical part of this study examines the rediscovery and development of perspective. With the paradigm of antiquity, the figure of the architect was also recognised again - the cultural man trained theoretically and practically in numerous subjects, as Vitruvius describes him. In this context, the role of the architect, the influence on the painting of the Quattrocento as well as the influence on architectural representation in the Baroque period are examined. Baroque is commonly associated with the idea of illusionistic appearance as opposed to the tangible reality presented in the Renaissance. The study has shown that the central perspective projection developed by Filippo Brunelleschi enabled another understanding of seeing and the dissemination of painted images. Brunelleschi's development made it possible to understand the sight of nature as a reflection of what is presented to the viewer's eye. Alberti later shortened Brunelleschi's central perspective representation for practical use in painting. In early modern Italian architecture and painting, these developments apparently supported each other. The pictorial representation of architecture initially served the development of an art form before it became established in building practice itself.

Keywords: Alberti, Brunelleschi, central perspective projection, orthogonal projection, quattrocento, baroque

Procedia PDF Downloads 78
1673 Reducing Road Traffic Accident: Rapid Evidence Synthesis for Low and Middle Income Countries

Authors: Tesfaye Dagne, Dagmawit Solomon, Firmaye Bogale, Yosef Gebreyohannes, Samson Mideksa, Mamuye Hadis, Desalegn Ararso, Ermias Woldie, Tsegaye Getachew, Sabit Ababor, Zelalem Kebede

Abstract:

Globally, road traffic accident (RTA) is causing millions of deaths and injuries every year. It is one of the leading causes of death among people of all age groups and the problem is worse among young reproductive age group. Moreover the problem is increasing with an increasing number of vehicles. The majority of the problem happen in low and middle income countries (LMIC), even if the number of vehicles in these countries is low compared to their population. So, the objective of this paper is to summarize the best available evidence on interventions that can reduce road traffic accidents in low and middle income countries (LMIC). Method: A rapid evidence synthesis approach adapted from the SURE Rapid Response Service was applied to search, appraise and summarize the best available evidence on effective intervention in reducing road traffic injury. To answer the question under review, we searched for relevant studies from databases including PubMed, the Cochrane Library, TRANSPORT, Health system evidence, Epistemonikos, and SUPPORT summary. The following key terms were used for searching: Road traffic accident, RTA, Injury, Reduc*, Prevent*, Minimiz*, “Low and middle-income country”, LMIC. We found 18 articles through a search of different databases mentioned above. After screening for the titles and abstracts of the articles, four of them which satisfy the inclusion criteria were included in the final review. Then we appraised and graded the methodological quality of systematic reviews that are deemed to be highly relevant using AMSTAR. Finding: The identified interventions to reduce road traffic accidents were legislation and enforcement, public awareness/education, speed control/ rumble strips, road improvement, mandatory motorcycle helmet, graduated driver license, street lighting. Legislation and Enforcement: Legislation focusing on mandatory motorcycle helmet usage, banning cellular phone usage when driving, seat belt laws, decreasing the legal blood alcohol content (BAC) level from 0.06 g/L to 0.02 g/L bring the best result where enforcement is there. Public Awareness/Education: focusing on seat belt use, child restraint use, educational training in health centers and schools/universities, and public awareness with media through the distribution of videos, posters/souvenirs, and pamphlets are effective in the short run. Speed Control: through traffic calming bumps, or speed bumps, rumbled strips are effective in reducing accidents and fatality. Mandatory Motorcycle Helmet: is associated with reduction in mortality. Graduated driver’s license (GDL): reduce road traffic injury by 19%. Street lighting: is a low-cost intervention which may reduce road traffic accidents.

Keywords: evidence synthesis, injury, rapid review, reducing, road traffic accident

Procedia PDF Downloads 159
1672 Analytical Study and Conservation Processes of a Wooden Coffin of Middel Kingdom, Ancient Egypt

Authors: Mohamed Ahmed Abd El Kader

Abstract:

This paper describes the conservation processes of an Ancient Egyptian wooden coffin dating back to the Middle Kingdom, ancient Egypt, using several scientific and analytical methods in order to provide a deeper understanding of the deterioration status and a greater awareness of how well preserved the object is. Visual observation and 2D Programs, as well as Optical Microscopy (OM), Environmental scanning Electron Microscopy (ESEM), X-ray Diffraction (XRD) and Fourier Transform Infrared Spectroscopy (FTIR) were used in our study. The identification of wood species and the composition of the pigments and previous restoration materials were made. The coffin was previously conserved and stored in improper conditions, which led to its further deterioration; the surface of the lid dust, which obscured the decorations as well as all necessary restoration work was promptly carried out as soon as the coffin was transferred from the display hall from the Egyptian Museum to the Wood Conservation Laboratory of the Grand Egyptian Museum-Conservation Center (GEM-CC). The analyses provided detailed information concerning the original materials and the materials added during the previous treatment interventions, which was considered when applying the conservation plan. Conservation procedures have been applied with high accuracy to conserve the coffin including cleaning, consolidation of fragile painted layers, and the wooden boards forming the sides of the coffin were reassembled in their original positions. The materials and methods that were applied were extremely effective in stability and reinforcement of the coffin without harmfulness to the original materials and the coffin was successfully conserved and ready to display in the Grand Egyptian Museum (GEM).

Keywords: coffin, middle kingdom, deterioration, 2d program

Procedia PDF Downloads 48
1671 Network Security Attacks and Defences

Authors: Ranbir Singh, Deepinder Kaur

Abstract:

Network security is an important aspect in every field like government offices, Educational Institute and any business organization. Network security consists of the policies adopted to prevent and monitor forbidden access, misuse, modification, or denial of a computer network. Network security is very complicated subject and deal by only well trained and experienced people. However, as more and more people become wired, an increasing number of people need to understand the basics of security in a networked world. The history of the network security included an introduction to the TCP/IP and interworking. Network security starts with authenticating, commonly with a username and a password. In this paper, we study about various types of attacks on network security and how to handle or prevent this attack.

Keywords: network security, attacks, denial, authenticating

Procedia PDF Downloads 394
1670 Taphonomy and Paleoecology of Cenomanian Oysters (Mollusca: Bivalvia) from Egypt

Authors: Ahmed El-Sabbagh, Heba Mansour, Magdy El-Hedeny

Abstract:

This study provided a taphonomic alteration and paleoecology of Cenomanian oysters from the Musabaa Salama area, south western Sinai, Egypt. Three oyster zones can be recognized in the studied area, a lower one of Amphidonte (Ceratostreon) flabellatum (lower-middle Cenomanian), a middle zone of Ilymatogyra (Afrogyra) africana (upper Cenomanian) and an upper one of Exogyra (Costagyra) olisiponensis (upper Cenomanian). Taphonomic features including disarticulation, fragmentation, encrustation and bioerosion were subjected to multivariate statistical analyses. The analyses showed that the distributions of the identified ichnospecies were greatly similar within the identified oyster zones in the Musabaa Salama section. With rare exceptions, Entobia cretacea, Gastrochaenolites torpedo and Maeandropolydora decipiens are considered as common to abundant ichnospecies within the three recorded oyster zones. In contrast, and with some exceptions, E. ovula, E. retiformis and Rogerella pattei are considered as frequent to common ichnospecies within the identified oyster zones. Other ichnospecies, including Caulostrepsis cretacea, G. orbicularis, Trypanites solitarius, E. geometrica and C. taeniola, are mostly recorded in rare to frequent occurrences. Careful investigation of these host shells and the preserved encrusters and/or bioerosion sculptures provided data concerning: 1) the substrate characteristics, 2) time of encrustation and bioerosion, 3) rate of sedimentation, 4) the planktonic productivity level, and 5) the general bathymetry and the rate of transgression across the substrate.

Keywords: oysters, Cenomanian, taphonomy, palaeoecology, Sinai, Egypt

Procedia PDF Downloads 300
1669 The Paleoenvironment and Paleoclimatological Variations during Aptian in North Central Tunisia

Authors: Houda Khaled, Frederic Boulvain, Fredj Chaabani

Abstract:

This paper focuses on the sedimentological and mineralogical studies of Aptian series outcrops in the Serdj and Bellouta Mountain situated in north-central Tunisia. In the Serdj Mountain, the Aptian series is about 590 meters thick and it is defined by tow formations corresponding respectively to the Sidi Hamada formation (Barremian-Gragasian) and the Serdj formation (Middle Gragasian-Late Clansaysian). This later is consisting of five limestones sequences separated by marly levels limestones associated to some siltstones bed. The Bellouta section is especially composed of carbonate rocks and it is attributed to the Middle Gragasian - Late Clansaysian. These sections are studied in detail regarding lithology, micropaleontology, microfacies, magnetic susceptibility and mineralogical composition in order to provide new insights into the paleoenvironmental evolution and paleoclimatological implications during Aptian. The following facies associations representing different ramp palaeoenvironments have been identified: mudstone-wackestone outer ramp facies; skeletal grainstone-packstone mid-ramp facies, packstone-grainstone inner-ramp facies which include a variety of organisms such as ooliths, rudists ostracods associated to athor bioclats. The coastal facies is especially defined by a mudstone -wackestone texture coastal rich with miliolidea and orbitolines. The magnetic susceptibility (Xin) of all samples was compared with the lithological and microfacies variation. The MS curves show that the high values are correlated with the distal facies and the low values are registred in the coastal environment. The X-ray diffractometer analysis show the presence of kaolinite and illite.

Keywords: Aptian, Serdj formation, mineralogy, petrography

Procedia PDF Downloads 184
1668 Ways to Sustaining Self-Care of Thai Community Women to Achieve Future Healthy Aging

Authors: Manee Arpanantikul, Pennapa Unsanit, Dolrat Rujiwatthanakorn, Aporacha Lumdubwong

Abstract:

In order to continuously perform self-care based on the sufficiency economy philosophy for the length of women’s lives is not easy. However, there are different ways that women can use to carry out self-care activities regularly. Some women individually perform self-care while others perform self-care in groups. Little is known about ways to sustaining self-care of women based on the fundamental principle of Thai culture. The purpose of this study was to investigate ways to sustaining self-care based on the sufficiency economy philosophy of Thai middle-aged women living in the community in order to achieve future healthy aging. This study employed a qualitative research design. Twenty women who were willing to participate in this study were recruited. Data collection were conducted through in-depth interviews with tape recording, doing field notes, and observation. All interviews were transcribed verbatim, and data were analyzed by using content analysis. The findings showed ways to sustaining self-care of Thai community women to achieve future healthy aging consisting of 7 themes: 1) having determination, 2) having a model, 3) developing a leader, 4) carrying on performing activities, 5) setting up rules, 6) building self-care culture, and 7) developing a self-care group/network. The findings of this study suggested that in order to achieve self-care sustainability women should get to know themselves, have intention and belief, together with having the power of community and support. Therefore, having self-care constantly will prevent disease and promote healthy in women’s lives.

Keywords: qualitative research, sufficiency economy philosophy, Thai middle-aged women, ways to sustaining self-care

Procedia PDF Downloads 371
1667 Application of Chinese Remainder Theorem to Find The Messages Sent in Broadcast

Authors: Ayubi Wirara, Ardya Suryadinata

Abstract:

Improper application of the RSA algorithm scheme can cause vulnerability to attacks. The attack utilizes the relationship between broadcast messages sent to the user with some fixed polynomial functions that belong to each user. Scheme attacks carried out by applying the Chinese Remainder Theorem to obtain a general polynomial equation with the same modulus. The formation of the general polynomial becomes a first step to get back the original message. Furthermore, to solve these equations can use Coppersmith's theorem.

Keywords: RSA algorithm, broadcast message, Chinese Remainder Theorem, Coppersmith’s theorem

Procedia PDF Downloads 335
1666 Gross Anatomical and Ultra Structural Microscopic Studies on the Nose of the Dromedary Camel (Camelus Dromederius)

Authors: Mahmoud S Gewaily, Atif Hasan, Mohamed Kassab, Ali A. Mansour

Abstract:

The current study was carried out on the nose of seventeenth healthy adult camels. Specimens were collected from slaughter houses then fixed, dissected and photographed. For ultra structural studies, fresh samples were fixed in different fixatives and prepared for examination by light, scanning and electron microscopes. Grossly, nose of the camel had narrow nostrils, slit like in outline. In the nasal cavity, the nasal vestibule was narrow and has scanty dorsal and lateral cartilaginous support. The Nasal conchae (dorsal, middle and ventral) enclosed the dorsal, middle conchal sinuses and no ventral conchal sinus; instead there was recess and bull a. The ethmoidal conchae (8 in number) were noticeably fewer than in the other domestic animals like ox and horse. The olfactory mucosa was restricted to a small area covering the caudal parts of the ethmoidal conchae. The lining epithelium of the nasal cavity changes gradually from stratified squamous epithelium in the nasal vestibule to pseudo stratified columnar ciliated in the respiratory region and finally, olfactory epithelium covering the caudal parts of the ethmoidal conchae. In the dromedary camel, a special feature was the presence of dense and relatively long hair covering the nostrils and the rostral part of the nasal vestibule. In conclusion, the anatomical features of the nose of the dromedary camel, especially in its rostral parts enable this animal to breathe properly in the sandy dry weather.

Keywords: camel nose, anatomy, dromedary camel, nasal vestibule

Procedia PDF Downloads 430
1665 A CM-Based Model for 802.11 Networks Security Policies Enforcement

Authors: Karl Mabiala Dondia, Jing Ma

Abstract:

In recent years, networks based on the 802.11 standards have gained a prolific deployment. The reason for this massive acceptance of the technology by both home users and corporations is assuredly due to the "plug-and-play" nature of the technology and the mobility. The lack of physical containment due to inherent nature of the wireless medium makes maintenance very challenging from a security standpoint. This study examines via continuous monitoring various predictable threats that 802.11 networks can face, how they are executed, where each attack may be executed and how to effectively defend against them. The key goal is to identify the key components of an effective wireless security policy.

Keywords: wireless LAN, IEEE 802.11 standards, continuous monitoring, security policy

Procedia PDF Downloads 371
1664 Starting Torque Study of Darrieus Wind Turbine

Authors: M. Douak, Z. Aouachria

Abstract:

The aim of our study is to project an optimized wind turbine of Darrieus type. This type of wind turbine is characterized by a low starting torque in comparison with the Savonius rotor allowing them to operate for a period greater than wind speed. This led us to reconsider the Darrieus rotor to optimize a design which will increase its starting torque. The study of a system of monitoring and control of the angle of attack of blade profile, which allows an auto start to wind speeds as low as possible is presented for the straight blade of Darrieus turbine. The study continues to extend to other configurations namely those of parabolic type.

Keywords: Darrieus turbine, pitch angle, self stating, wind energy

Procedia PDF Downloads 340
1663 Long-Term Variabilities and Tendencies in the Zonally Averaged TIMED-SABER Ozone and Temperature in the Middle Atmosphere over 10°N-15°N

Authors: Oindrila Nath, S. Sridharan

Abstract:

Long-term (2002-2012) temperature and ozone measurements by Sounding of Atmosphere by Broadband Emission Radiometry (SABER) instrument onboard Thermosphere, Ionosphere, Mesosphere Energetics and Dynamics (TIMED) satellite zonally averaged over 10°N-15°N are used to study their long-term changes and their responses to solar cycle, quasi-biennial oscillation and El Nino Southern Oscillation. The region is selected to provide more accurate long-term trends and variabilities, which were not possible earlier with lidar measurements over Gadanki (13.5°N, 79.2°E), which are limited to cloud-free nights, whereas continuous data sets of SABER temperature and ozone are available. Regression analysis of temperature shows a cooling trend of 0.5K/decade in the stratosphere and that of 3K/decade in the mesosphere. Ozone shows a statistically significant decreasing trend of 1.3 ppmv per decade in the mesosphere although there is a small positive trend in stratosphere at 25 km. Other than this no significant ozone trend is observed in stratosphere. Negative ozone-QBO response (0.02ppmv/QBO), positive ozone-solar cycle (0.91ppmv/100SFU) and negative response to ENSO (0.51ppmv/SOI) have been found more in mesosphere whereas positive ozone response to ENSO (0.23ppmv/SOI) is pronounced in stratosphere (20-30 km). The temperature response to solar cycle is more positive (3.74K/100SFU) in the upper mesosphere and its response to ENSO is negative around 80 km and positive around 90-100 km and its response to QBO is insignificant at most of the heights. Composite monthly mean of ozone volume mixing ratio shows maximum values during pre-monsoon and post-monsoon season in middle stratosphere (25-30 km) and in upper mesosphere (85-95 km) around 10 ppmv. Composite monthly mean of temperature shows semi-annual variation with large values (~250-260 K) in equinox months and less values in solstice months in upper stratosphere and lower mesosphere (40-55 km) whereas the SAO becomes weaker above 55 km. The semi-annual variation again appears at 80-90 km, with large values in spring equinox and winter months. In the upper mesosphere (90-100 km), less temperature (~170-190 K) prevails in all the months except during September, when the temperature is slightly more. The height profiles of amplitudes of semi-annual and annual oscillations in ozone show maximum values of 6 ppmv and 2.5 ppmv respectively in upper mesosphere (80-100 km), whereas SAO and AO in temperature show maximum values of 5.8 K and 4.6 K in lower and middle mesosphere around 60-85 km. The phase profiles of both SAO and AO show downward progressions. These results are being compared with long-term lidar temperature measurements over Gadanki (13.5°N, 79.2°E) and the results obtained will be presented during the meeting.

Keywords: trends, QBO, solar cycle, ENSO, ozone, temperature

Procedia PDF Downloads 403
1662 The Existence of Beauveria bassiana in the Third Generation of Corn Seedling

Authors: Itji Diana Daud, Nuniek Widiayani

Abstract:

The fungus Beauveria bassiana can be endophytic in maize. The fungus was recovered in culture from stems, leaves and roots after a month planting. This phenomenon was shown until the third generation of the corn. The result from laboratory shows that B. bassiana appear in F1, F2 and F3 in order 70, 80 and 90% in the roots, 80% in the stems in all generation, 90, 80 and 70% in leaves. In CFU’s ml-1 of B. bassiana in corn seed, show F1 was 8.9 x 106, F2 was 8.1 x 106 and F3 was 7.8 x 106. The research showed that B. Bassiana as endophyte still remain to the third generation. Innovation to the corn seed which is endophyte seed is essential to protect from the attack of corn borer and to avoid the usage of insecticide.

Keywords: endophytic, recovered, third generation, Beauveria bassiana

Procedia PDF Downloads 272
1661 Photomicrograph-Based Neuropathology Consultation in Tanzania; The Utility of Static-Image Neurotelepathology in Low- And Middle-Income Countries

Authors: Francis Zerd, Brian E. Moore, Atuganile E. Malango, Patrick W. Hosokawa, Kevin O. Lillehei, Laurence Lemery Mchome, D. Ryan Ormond

Abstract:

Introduction: Since neuropathologic diagnosis in the developing world is hampered by limitations in technical infrastructure, trained laboratory personnel, and subspecialty-trained pathologists, the use of telepathology for diagnostic support, second-opinion consultations, and ongoing training holds promise as a means of addressing these challenges. This research aims to assess the utility of static teleneuropathology in improving neuropathologic diagnoses in low- and middle-income countries. Methods: Consecutive neurosurgical biopsy and resection specimens obtained at Muhimbili National Hospital in Tanzania between July 1, 2018, and June 30, 2019, were selected for retrospective, blinded static-image neuropathologic review followed by on-site review by an expert neuropathologist. Results: A total of 75 neuropathologic cases were reviewed. The agreement of static images and on-site glass diagnosis was 71% with strict criteria and 88% with less stringent criteria. This represents an overall improvement in diagnostic accuracy from 36% by general pathologists to 71% by a neuropathologist using static telepathology (or 76% to 88% with less stringent criteria). Conclusions: Telepathology offers a suitable means of providing diagnostic support, second-opinion consultations, and ongoing training to pathologists practicing in resource-limited countries. Moreover, static digital teleneuropathology is an uncomplicated, cost-effective, and reliable way to achieve these goals.

Keywords: neuropathology, resource-limited settings, static image, Tanzania, teleneuropathology

Procedia PDF Downloads 100
1660 Is the Addition of Computed Tomography with Angiography Superior to a Non-Contrast Neuroimaging Only Strategy for Patients with Suspected Stroke or Transient Ischemic Attack Presenting to the Emergency Department?

Authors: Alisha M. Ebrahim, Bijoy K. Menon, Eddy Lang, Shelagh B. Coutts, Katie Lin

Abstract:

Introduction: Frontline emergency physicians require clear and evidence-based approaches to guide neuroimaging investigations for patients presenting with suspected acute stroke or transient ischemic attack (TIA). Various forms of computed tomography (CT) are currently available for initial investigation, including non-contrast CT (NCCT), CT angiography head and neck (CTA), and CT perfusion (CTP). However, there is uncertainty around optimal imaging choice for cost-effectiveness, particularly for minor or resolved neurological symptoms. In addition to the cost of CTA and CTP testing, there is also a concern for increased incidental findings, which may contribute to the burden of overdiagnosis. Methods: In this cross-sectional observational study, analysis was conducted on 586 anonymized triage and diagnostic imaging (DI) reports for neuroimaging orders completed on patients presenting to adult emergency departments (EDs) with a suspected stroke or TIA from January-December 2019. The primary outcome of interest is the diagnostic yield of NCCT+CTA compared to NCCT alone for patients presenting to urban academic EDs with Canadian Emergency Department Information System (CEDIS) complaints of “symptoms of stroke” (specifically acute stroke and TIA indications). DI reports were coded into 4 pre-specified categories (endorsed by a panel of stroke experts): no abnormalities, clinically significant findings (requiring immediate or follow-up clinical action), incidental findings (not meeting prespecified criteria for clinical significance), and both significant and incidental findings. Standard descriptive statistics were performed. A two-sided p-value <0.05 was considered significant. Results: 75% of patients received NCCT+CTA imaging, 21% received NCCT alone, and 4% received NCCT+CTA+CTP. The diagnostic yield of NCCT+CTA imaging for prespecified clinically significant findings was 24%, compared to only 9% in those who received NCCT alone. The proportion of incidental findings was 30% in the NCCT only group and 32% in the NCCT+CTA group. CTP did not significantly increase the yield of significant or incidental findings. Conclusion: In this cohort of patients presenting with suspected stroke or TIA, an NCCT+CTA neuroimaging strategy had a higher diagnostic yield for clinically significant findings than NCCT alone without significantly increasing the number of incidental findings identified.

Keywords: stroke, diagnostic yield, neuroimaging, emergency department, CT

Procedia PDF Downloads 93
1659 Agro-Forestry Expansion in Middle Gangetic Basin: Adopters' Motivations and Experiences in Bihar, India

Authors: Rakesh Tiwary, D. M. Diwakar, Sandhya Mahapatro

Abstract:

Agro-forestry offers huge opportunities for diversification of agriculture in middle Gangetic Basin of India, particularly in the state of Bihar as the region is identified with traditional & stagnant agriculture, low productivity, high population pressure, rural poverty and lack of agro- industrial development. The region is endowed with favourable agro-climatic, soil & drainage conditions; interestingly, there has been an age old tradition of agro-forestry in the state. However, due to demographic pressures, declining land holdings and other socio- economic factors, agro forestry practices have declined in recent decades. The government of Bihar has initiated a special program for expansion of agro-forestry based on modern practices with an aim to raise income level of farmers, make available raw material for wood based industries and increase green cover in the state. The Agro-forestry Schemes – Poplar & Other Species are the key components of the program being implemented by Department of Environment & Forest, Govt. of Bihar. The paper is based on fieldwork based evaluation study on experiences of implementation of the agro-forestry schemes. Understanding adoption patterns, identification of key motives for practising agro-forestry, experiences of farmers well analysing the barriers in expansion constituted the major themes of the research study. This paper is based on primary as well as secondary data. The primary data consists of beneficiary household survey, Focus Group Discussions among beneficiary communities, dialogue and multi stakeholder meetings and field visit to the sites. The secondary data information was collected and analysed from official records, policy documents and reports. Primary data was collected from about 500 beneficiary households of Muzaffarpur & Saharsa- two populous, large and agriculture dominated districts of middle Gangetic basin of North Bihar. Survey also covers 100 households of non-beneficiaries. Probability Proportionate to Size method was used to determine the number of samples to be covered in different blocks of two districts. Qualitative tools were also implemented to have better insights about key research questions. Present paper discusses socio-economic background of farmers practising agro-forestry; the adoption patterns of agro- forestry (choice of plants, methods of plantation and others); and motivation behind adoption of agro-forestry and the comparative benefits of agro-forestry (vis-a-vis traditional agriculture). Experience of beneficiary farmers with agro-forestry based on government programs & promotional campaigns (in terms of awareness, ease of access, knowhow and others) have been covered in the paper. Different aspects of survival of plants have been closely examined. Non beneficiaries but potential adopters were also interviewed to understand barriers of adoption of agro- forestry. Paper provides policy recommendations and interventions required for effective expansion of the agro- forestry and realisation of its future prospects for agricultural diversification in the region.

Keywords: agro-forestry adoption patterns, farmers’ motivations & experiences, Indian middle Gangetic plains, strategies for expansion

Procedia PDF Downloads 197
1658 Stock Market Integration of Emerging Markets around the Global Financial Crisis: Trends and Explanatory Factors

Authors: Najlae Bendou, Jean-Jacques Lilti, Khalid Elbadraoui

Abstract:

In this paper, we examine stock market integration of emerging markets around the global financial turmoil of 2007-2008. Following Pukthuanthong and Roll (2009), we measure the integration of 46 emerging countries using the adjusted R-square from the regression of each country's daily index returns on global factors extracted from the covariance matrix computed using dollar-denominated daily index returns of 17 developed countries. Our sample surrounds the global financial crisis and ranges between 2000 and 2018. We analyze results using four cohorts of emerging countries: East Asia & Pacific and South Asia, Europe & Central Asia, Latin America & Caribbean, Middle East & Africa. We find that the level of integration of emerging countries increases at the commencement of the crisis and during the booming phase of the business cycles. It reaches a maximum point in the middle of the crisis and then tends to revert to its pre-crisis level. This pattern tends to be common among the four geographic zones investigated in this study. Finally, we investigate the determinants of stock market integration of emerging countries in our sample using panel regressions. Our results suggest that the degree of stock market integration of these countries should be put into perspective by some macro-economic factors, such as the size of the equity market, school enrollment rate, international liquidity level, stocks traded volume, tax revenue level, imports and exports volumes.

Keywords: correlations, determinants of integration, diversification, emerging markets, financial crisis, integration, markets co-movement, panel regressions, r-square, stock markets

Procedia PDF Downloads 177
1657 Capacity Building in Dietary Monitoring and Public Health Nutrition in the Eastern Mediterranean Region

Authors: Marisol Warthon-Medina, Jenny Plumb, Ayoub Aljawaldeh, Mark Roe, Ailsa Welch, Maria Glibetic, Paul M. Finglas

Abstract:

Similar to Western Countries, the Eastern Mediterranean Region (EMR) also presents major public health issues associated with the increased consumption of sugar, fat, and salt. Therefore, one of the policies of the World Health Organization’s (WHO) EMR is to reduce the intake of salt, sugar, and fat (Saturated fatty acids, trans fatty acids) to address the risk of non-communicable diseases (i.e. diabetes, cardiovascular disease, cancer) and obesity. The project objective is to assess status and provide training and capacity development in the use of improved standardized methodologies for updated food composition data, dietary intake methods, use of suitable biomarkers of nutritional value and determine health outcomes in low and middle-income countries (LMIC). Training exchanges have been developed with clusters of countries created resulting from regional needs including Sudan, Egypt and Jordan; Tunisia, Morocco, and Mauritania; and other Middle Eastern countries. This capacity building will lead to the development and sustainability of up-to-date national and regional food composition databases in LMIC for use in dietary monitoring assessment in food and nutrient intakes. Workshops were organized to provide training and capacity development in the use of improved standardized methodologies for food composition and food intake. Training needs identified and short-term scientific missions organized for LMIC researchers including (1) training and knowledge exchange workshops, (2) short-term exchange of researchers, (3) development and application of protocols and (4) development of strategies to reduce sugar and fat intake. An initial training workshop, Morocco 2018 was attended by 25 participants from 10 EMR countries to review status and support development of regional food composition. 4 training exchanges are in progress. The use of improved standardized methodologies for food composition and dietary intake will produce robust measurements that will reinforce dietary monitoring and policy in LMIC. The capacity building from this project will lead to the development and sustainability of up-to-date national and regional food composition databases in EMR countries. Supported by the UK Medical Research Council, Global Challenges Research Fund, (MR/R019576/1), and the World Health Organization’s Eastern Mediterranean Region.

Keywords: dietary intake, food composition, low and middle-income countries, status.

Procedia PDF Downloads 154
1656 Secure Watermarking not at the Cost of Low Robustness

Authors: Jian Cao

Abstract:

This paper describes a novel watermarking technique which we call the random direction embedding (RDE) watermarking. Unlike traditional watermarking techniques, the watermark energy after the RDE embedding does not focus on a fixed direction, leading to the security against the traditional unauthorized watermark removal attack. In addition, the experimental results show that when compared with the existing secure watermarking, namely natural watermarking (NW), the RDE watermarking gains significant improvement in terms of robustness. In fact, the security of the RDE watermarking is not at the cost of low robustness, and it can even achieve more robust than the traditional spread spectrum watermarking, which has been shown to be very insecure.

Keywords: robustness, spread spectrum watermarking, watermarking security, random direction embedding (RDE)

Procedia PDF Downloads 378
1655 China's BRI and Germany's Baghdad Railroad – a Realist Analysis of Hegemonic Conflict and the Circumvention of Maritime Power

Authors: Kamen Kirov

Abstract:

In the late 19th and early 20th centuries, Britain dominated global trade and finance in large part due to its maritime superiority. Germany, a land power, sought to undermine Britain’s position as the primary hegemon but ultimately could not challenge Britain’s maritime position or capabilities. This drove Germany to seek alternative strategies to weaken Britain’s position. Notably, it pushed Germany to create a reliable overland link through the Balkans to the Middle East via railroad. This article will seek to draw parallels between the German-British hegemonic conflict of the early 20th century and the Chinese-American hegemonic conflict taking place today using both secondary historical sources and current scholarly discussions of the changing international sphere. In doing so, it will provide useful insights into how China might attempt to outflank American power. The article will demonstrate that in many ways, the strategic positions and approaches of the early-20th century Germany and modern China are similar. Both countries were faced with a vastly superior foe with respect to maritime and economic power, and in both cases, their response was to undermine their rival hegemon by creating new overland infrastructure. Furthermore, in both cases, a major goal of creating new overland links was to gain further access to and control over Middle Eastern energy markets. It seems that in the modern day, China is conducting such a policy on a much grander scale than Germany did in the early 20th century—which may result in negative consequences for the US strategic position.

Keywords: belt and road Initiative, hegemonic conflict, maritime power, realism

Procedia PDF Downloads 177
1654 The Use of Secondary Crystallization in Cement-Based Composites

Authors: Nikol Žižková, Šárka Keprdová, Rostislav Drochytka

Abstract:

The paper focuses on the study of the properties of cement-based composites produced using secondary crystallization (crystalline additive). In this study, cement mortar made with secondary crystallization was exposed to an aggressive environment and the influence of secondary crystallization on the degradation of the cementitious composite was investigated. The results indicate that the crystalline additive contributed to increasing the resistance of the cement-based composite to the attack of the selected environments (sodium sulphate solution and ammonium chloride solution).

Keywords: secondary crystallization, cement-based composites, durability, degradation of the cementitious composite

Procedia PDF Downloads 395
1653 Food Security in the Middle East and North Africa

Authors: Sara D. Garduno-Diaz, Philippe Y. Garduno-Diaz

Abstract:

To date, one of the few comprehensive indicators for the measurement of food security is the Global Food Security Index. This index is a dynamic quantitative and qualitative bench marking model, constructed from 28 unique indicators, that measures drivers of food security across both developing and developed countries. Whereas the Global Food Security Index has been calculated across a set of 109 countries, in this paper we aim to present and compare, for the Middle East and North Africa (MENA), 1) the Food Security Index scores achieved and 2) the data available on affordability, availability, and quality of food. The data for this work was taken from the latest (2014) report published by the creators of the GFSI, which in turn used information from national and international statistical sources. According to the 2014 Global Food Security Index, MENA countries rank from place 17/109 (Israel, although with resent political turmoil this is likely to have changed) to place 91/109 (Yemen) with household expenditure spent in food ranging from 15.5% (Israel) to 60% (Egypt). Lower spending on food as a share of household consumption in most countries and better food safety net programs in the MENA have contributed to a notable increase in food affordability. The region has also however experienced a decline in food availability, owing to more limited food supplies and higher volatility of agricultural production. In terms of food quality and safety the MENA has the top ranking country (Israel). The most frequent challenges faced by the countries of the MENA include public expenditure on agricultural research and development as well as volatility of agricultural production. Food security is a complex phenomenon that interacts with many other indicators of a country’s well-being; in the MENA it is slowly but markedly improving.

Keywords: diet, food insecurity, global food security index, nutrition, sustainability

Procedia PDF Downloads 348
1652 Characterization of Volatiles Botrytis cinerea in Blueberry Using Solid Phase Micro Extraction, Gas Chromatography Mass Spectrometry

Authors: Ahmed Auda, Manjree Agarwala, Giles Hardya, Yonglin Rena

Abstract:

Botrytis cinerea is a major pest for many plants. It can attack a wide range of plant parts. It can attack buds, flowers, and leaves, stems, and fruit. However, B. cinerea can be mixed with other diseases that cause the same damage. There are many species of botrytis and more than one different strains of each. Botrytis might infect the foliage of nursery stock stored through winter in damp conditions. There are no known resistant plants. Botrytis must have nutrients or food source before it infests the plant. Nutrients leaking from wounded plant parts or dying tissue like old flower petals give the required nutrients. From this food, the fungus becomes more attackers and invades healthy tissue. Dark to light brown rot forms in the ill tissue. High humidity conditions support the growth of this fungus. However, we suppose that selection pressure can act on the morphological and neurophysiologic filter properties of the receiver and on both the biochemical and the physiological regulation of the signal. Communication is implied when signal and receiver evolves toward more and more specific matching, culminating. In other hand, receivers respond to portions of a body odor bouquet which is released to the environment not as an (intentional) signal but as an unavoidable consequence of metabolic activity or tissue damage. Each year Botrytis species can cause considerable economic losses to plant crops. Even with the application of strict quarantine and control measures, these fungi can still find their way into crops and cause the imposition of onerous restrictions on exports. Blueberry fruit mould caused by a fungal infection usually results in major losses during post-harvest storage. Therefore, the management of infection in early stages of disease development is necessary to minimize losses. The overall purpose of this study will develop sensitive, cheap, quick and robust diagnostic techniques for the detection of B. cinerea in blueberry. The specific aim was designed to investigate the performance of volatile organic compounds (VOCs) in the detection and discrimination of blueberry fruits infected by fungal pathogens with an emphasis on Botrytis in the early storage stage of post-harvest.

Keywords: botrytis cinerea, blueberry, GC/MS, VOCs

Procedia PDF Downloads 237
1651 Parallel Hybrid Honeypot and IDS Architecture to Detect Network Attacks

Authors: Hafiz Gulfam Ahmad, Chuangdong Li, Zeeshan Ahmad

Abstract:

In this paper, we proposed a parallel IDS and honeypot based approach to detect and analyze the unknown and known attack taxonomy for improving the IDS performance and protecting the network from intruders. The main theme of our approach is to record and analyze the intruder activities by using both the low and high interaction honeypots. Our architecture aims to achieve the required goals by combing signature based IDS, honeypots and generate the new signatures. The paper describes the basic component, design and implementation of this approach and also demonstrates the effectiveness of this approach reducing the probability of network attacks.

Keywords: network security, intrusion detection, honeypot, snort, nmap

Procedia PDF Downloads 554
1650 Automatic Intelligent Analysis of Malware Behaviour

Authors: Hermann Dornhackl, Konstantin Kadletz, Robert Luh, Paul Tavolato

Abstract:

In this paper we describe the use of formal methods to model malware behaviour. The modelling of harmful behaviour rests upon syntactic structures that represent malicious procedures inside malware. The malicious activities are modelled by a formal grammar, where API calls’ components are the terminals and the set of API calls used in combination to achieve a goal are designated non-terminals. The combination of different non-terminals in various ways and tiers make up the attack vectors that are used by harmful software. Based on these syntactic structures a parser can be generated which takes execution traces as input for pattern recognition.

Keywords: malware behaviour, modelling, parsing, search, pattern matching

Procedia PDF Downloads 326
1649 Major Sucking Pests of Rose and Their Seasonal Abundance in Bangladesh

Authors: Md Ruhul Amin

Abstract:

This study was conducted in the experimental field of the Department of Entomology, Bangabandhu Sheikh Mujibur Rahman Agricultural University, Gazipur, Bangladesh during November 2017 to May 2018 with a view to understanding the seasonal abundance of the major sucking pests namely thrips, aphid and red spider mite on rose. The findings showed that the thrips started to build up their population from the middle of January with abundance 1.0 leaf⁻¹, increased continuously, reached to the peak level (2.6 leaf⁻¹) in the middle of February and then declined. Aphid started to build up their population from the second week of November with abundance 6.0 leaf⁻¹, increased continuously, reached to the peak level (8.4 leaf⁻¹) in the last week of December and then declined. Mite started to build up their population from the first week of December with abundance 0.8 leaf⁻¹, increased continuously, reached to the peak level (8.2 leaf⁻¹) in the second week of March and then declined. Thrips and mite prevailed until the last week of April, and aphid showed their abundance till last week of May. The daily mean temperature, relative humidity, and rainfall had an insignificant negative correlation with thrips and significant negative correlation with aphid abundance. The daily mean temperature had significant positive, relative humidity had an insignificant positive, and rainfall had an insignificant negative correlation with mite abundance. The multiple linear regression analysis showed that the weather parameters together contributed 38.1, 41.0 and 8.9% abundance on thrips, aphid and mite on rose, respectively and the equations were insignificant.

Keywords: aphid, mite, thrips, weather factors

Procedia PDF Downloads 158
1648 The Impact of the Media in the Implementation of Qatar’s Foreign Policy on the Public Opinion of the People of the Middle East (2011-2023)

Authors: Negar Vkilbashi, Hassan Kabiri

Abstract:

Modern diplomacy, in its general form, refers to the people and not the governments, and diplomacy tactics are more addressed to the people than to the governments. Media diplomacy and cyber diplomacy are also one of the sub-branches of public diplomacy and, in fact, the role of media in the process of influencing public opinion and directing foreign policy. Mass media, including written, radio and television, theater, satellite, internet, and news agencies, transmit information and demands. What the Qatari government tried to implement in the countries of the region during the Arab Spring and after was through its important media, Al Jazeera. The embargo on Qatar began in 2017, when Saudi Arabia, the United Arab Emirates, Bahrain, and Egypt imposed a land, sea, and air blockade against the country. The media tool constitutes the cornerstone of soft power in the field of foreign policy, which Qatari leaders have consistently resorted to over the past two decades. Undoubtedly, the role it played in covering the events of the Arab Spring has created geopolitical tensions. The United Arab Emirates and other neighboring countries sometimes criticize Al Jazeera for providing a platform for the Muslim Brotherhood, Hamas, and other Islamists to promote their ideology. In 2011, at the same time as the Arab Spring, Al Jazeera reached the peak of its popularity. Al Jazeera's live coverage of protests in Tunisia, Egypt, Yemen, Libya, and Syria helped create a unified narrative of the Arab Spring, with audiences tuning in every Friday to watch simultaneous protests across the Middle East. Al Jazeera operates in three groups: First, it is a powerful base in the hands of the government so that it can direct and influence Arab public opinion. Therefore, this network has been able to benefit from the unlimited financial support of the Qatar government to promote its desired policies and culture. Second, it has provided an attractive platform for politicians and scientific and intellectual elites, thus attracting their support and defense from the government and its rulers. Third, during the last years of Prince Hamad's reign, the Al Jazeera network formed a deterrent weapon to counter the media and political struggle campaigns. The importance of the research is that this network covers a wide range of people in the Middle East and, therefore, has a high influence on the decision-making of countries. On the other hand, Al Jazeera is influential as a tool of public diplomacy and soft power in Qatar's foreign policy, and by studying it, the results of its effectiveness in the past years can be examined. Using a qualitative method, this research analyzes the impact of the media on the implementation of Qatar's foreign policy on the public opinion of the people of the Middle East. Data collection has been done by the secondary method, that is, reading related books, magazine articles, newspaper reports and articles, and analytical reports of think tanks. The most important findings of the research are that Al Jazeera plays an important role in Qatar's foreign policy in Qatar's public diplomacy. So that, in 2011, 2017 and 2023, it played an important role in Qatar's foreign policy in various crises. Also, the people of Arab countries use Al-Jazeera as their first reference.

Keywords: Al Jazeera, Qatar, media, diplomacy

Procedia PDF Downloads 73
1647 Design a Network for Implementation a Hospital Information System

Authors: Abdulqader Rasool Feqi Mohammed, Ergun Erçelebi̇

Abstract:

A large number of hospitals from developed countries are adopting hospital information system to bring efficiency in hospital information system. The purpose of this project is to research on new network security techniques in order to enhance the current network security structure of save a hospital information system (HIS). This is very important because, it will avoid the system from suffering any attack. Security architecture was optimized but there are need to keep researching on best means to protect the network from future attacks. In this final project research, security techniques were uncovered to produce best network security results when implemented in an integrated framework.

Keywords: hospital information system, HIS, network security techniques, internet protocol, IP, network

Procedia PDF Downloads 431
1646 Treatment and Conservation of an Antique Stone Stela by Nano Calcium Hydroxide with Nano Silica in Egyptian Museum of Cairo

Authors: Elhussein Ahmed Elsayed

Abstract:

An ancient limestone stela dating back to the epoch of the middle kingdom and displayed in the exhibition hall of the middle kingdom, it was discovered in Lisht in Giza, registered with No. 3045 and as a result of its display in an inappropriate display as a result of the use of natural lighting in the display, Represented in sunlight through windows opened day and night. The alternation of these daily changes between the temperature degrees of night and day, both daily and seasonally, causes the expansion and contraction of the rocks and then weakens their cohesion, causing fragmentation. This is indeed the current situation of this stela displayed in the hall, in addition to the damage and fading of colors, as well as the use of a high-viscosity restoration material in the consolidation that led to the attraction of dust and dirt and its adhesion to the surface. The color faded as a result of the lack of lighting control inside the exhibition hall, the remnants of the existing colors were blurred as a result of applying a consolidation material with a high viscosity, which led to the attraction of dust and dirt, and then blurring the colors on the inscription. Examinations and analyzes were carried out on the block, and the results of the examination with a polarized microscope showed that it is of primitive limestone, which contains fossils and microorganisms, which helps to damage. The analysis using the Raman device also showed that the high-viscosity material used in restoration in the past is Paralloid B72. The stone stela was consolidated by using two materials; Nano calcium hydroxide with Nano silica in the form of (Core-shell) at a concentration of 10% and it was applied using the brush.

Keywords: Egyptian museum, stone stela, treatment, nano materials, nano silica

Procedia PDF Downloads 71