Search results for: biodiversity threats
691 Characterization and Predictors of Paranoid Ideation in Youths
Authors: Marina Sousa, Célia Barreto Carvalho, Carolina da Motta, Joana Cabral, Vera Pereira, Suzana Nunes Caldeira, Ermelindo Peixoto
Abstract:
Paranoid ideation is a common thought process that constitutes a defense against perceived social threats. The current study aimed at the characterization of paranoid ideation in youths and to explore the possible predictors involved in the development of paranoid ideations. Paranoid ideation, shame, submission, early childhood memories and current depressive, anxious and stress symptomatology was assessed in a sample of 1516 Portuguese youths. Higher frequencies of paranoid ideation were observed, particularly in females and youths from lower socio-economic status. The main predictors identified relates to submissive behaviors and adverse childhood experiences, and especially to shame feelings. The current study emphasizes that the these predictors are similar to findings in adults and clinical populations, and future implications to research and clinical practice aiming at paranoid ideations are discussed, as well as the pertinence of the study of mediating factors that allow a wider understanding of this thought process in younger populations and the prevention of psychopathology in adulthood.Keywords: adolescence, early memories, paranoid ideation, parenting styles, shame, submissiveness
Procedia PDF Downloads 496690 An Analyze on ISIS Terror Organization: The Reasons That Emerged ISIS and Its Effects on Both Local and Global Security
Authors: Serkan Kocapinar
Abstract:
Since June 2014, the extremist terrorist group known as the Islamic State of Iraq and the Levant, with its financial resources, as well as the world’s richest in terms of human resources, is a terrorist organization utilizing the most advanced weapons. It has established a state in the occupied region, appointed provincial and district managers, and declared the so-called Caliphate. Despite being a terrorist organization, it is selling the oil which it has seized from the captured regions with low prices. Consequently, it has been achieving great income from these sales. Currently the actual number of terrorists in the area is around from 20,000 to 31,000 according to the CIA assessment. It is estimated that it has extended its domain beyond from the Middle East to the Asia-Pacific coast and has had millions of supporters worldwide. In addition, it is claimed that it has several sleeper cells in some countries and could perform very catastrophic attacks to the countries fighting against it by activating its cells when necessary. The sharp rise of ISIS in just a year has also attracted the attention of terrorist groups such as Boko Haram around the world and some groups expressed their allegiance to ISIS. With this growing power and influence, ISIS is becoming more and more effective threat for not only the region but also for the entire world. The purpose of this study is to show what lies under the rising of ISIS terror organization and how it affects the security concerns.Keywords: ISIS, security, terrorism, threats
Procedia PDF Downloads 292689 School Curriculum Incorporating Rights to Live in Clean and Healthy Environment: Assessing Its Effectiveness
Authors: Sitaram Dahal
Abstract:
Among many strategic and practical needs in overcoming the threats and challenges being experienced in the global environment, constitutional provision for Rights to live in clean and healthy environment is one and so is the school curriculum incorporating information on such rights. Government of Nepal has also introduced information on rights to live in clean and healthy environment, as provisioned in its interim constitution of 2007, in the secondary level curriculum of formal education. As the predetermined specific objective of such curriculum is to prepare students who are conscious of citizens’ rights and responsibilities and are able to adopt functions, duties and rights of the rights holders and duty bearers; the study was designed to assess the effectiveness of such curriculum. The study was conducted in one private school and a community school to assess the effectiveness of such curriculum. The study shows that such curriculum has been able to make students responsible duty bearers as they were aware of their habits towards environment. Whereas only very few students are aware enough as being rights holders. Students of community schools were aware rights holders as they complain if they are not satisfied with the environment of the school itself. But private school is far behind in this case. It can be said that only curriculum with very few portion of information on such rights might not be capable enough to meet its objective.Keywords: curriculum, environmental rights, constitution, effectiveness
Procedia PDF Downloads 324688 The Acceptance of E-Assessment Considering Security Perspective: Work in Progress
Authors: Kavitha Thamadharan, Nurazean Maarop
Abstract:
The implementation of e-assessment as tool to support the process of teaching and learning in university has become a popular technological means in universities. E-Assessment provides many advantages to the users especially the flexibility in teaching and learning. The e-assessment system has the capability to improve its quality of delivering education. However, there still exists a drawback in terms of security which limits the user acceptance of the online learning system. Even though there are studies providing solutions for identified security threats in e-learning usage, there is no particular model which addresses the factors that influences the acceptance of e-assessment system by lecturers from security perspective. The aim of this study is to explore security aspects of e-assessment in regard to the acceptance of the technology. As a result a conceptual model of secure acceptance of e-assessment is proposed. Both human and security factors are considered in formulation of this conceptual model. In order to increase understanding of critical issues related to the subject of this study, interpretive approach involving convergent mixed method research method is proposed to be used to execute the research. This study will be useful in providing more insightful understanding regarding the factors that influence the user acceptance of e-assessment system from security perspective.Keywords: secure technology acceptance, e-assessment security, e-assessment, education technology
Procedia PDF Downloads 457687 Monitoring Public Attitudes Towards Tourism Valorisation of the Dinara Nature Park’s Dry Grasslands
Authors: Sven Ratković
Abstract:
The survey of public attitudes and knowledge was conducted as part of the Dinara back to LIFE project during June and July 2020. The aim of the research was to collect public opinions and knowledge on the topics of the biodiversity of Dinara, perception of tourist potential, sustainable development, and acceptance of the project. The research was conducted using the survey method in the cities of Sinj, Knin, Vrlika, and Trilj, and the municipalities of Hrvace, Otok, Kijevo, and Civljane, where a total of 404 people were surveyed. The respondents perceive the cultural and recreational potential of Dinara and recognize it as a potential for agriculture and tourism. According to respondents, the biological diversity of Dinara is most affected by fires and human activity. When it comes to nature protection, the majority of respondents don’t trust local self-government units and relevant ministries. The obtained results indicate the need for informing and educating the community, and they serve to adjust the project activities and better guide the touristic development of the project area. The examination will be repeated in the last project year (2023).Keywords: protected area tourism, Dinara Nature Park, dry grasslands, touristic infrastructure
Procedia PDF Downloads 95686 Enhancing the Effectiveness of Air Defense Systems through Simulation Analysis
Authors: F. Felipe
Abstract:
Air Defense Systems contain high-value assets that are expected to fulfill their mission for several years - in many cases, even decades - while operating in a fast-changing, technology-driven environment. Thus, it is paramount that decision-makers can assess how effective an Air Defense System is in the face of new developing threats, as well as to identify the bottlenecks that could jeopardize the security of the airspace of a country. Given the broad extent of activities and the great variety of assets necessary to achieve the strategic objectives, a systems approach was taken in order to delineate the core requirements and the physical architecture of an Air Defense System. Then, value-focused thinking helped in the definition of the measures of effectiveness. Furthermore, analytical methods were applied to create a formal structure that preliminarily assesses such measures. To validate the proposed methodology, a powerful simulation was also used to determine the measures of effectiveness, now in more complex environments that incorporate both uncertainty and multiple interactions of the entities. The results regarding the validity of this methodology suggest that the approach can support decisions aimed at enhancing the capabilities of Air Defense Systems. In conclusion, this paper sheds some light on how consolidated approaches of Systems Engineering and Operations Research can be used as valid techniques for solving problems regarding a complex and yet vital matter.Keywords: air defense, effectiveness, system, simulation, decision-support
Procedia PDF Downloads 155685 21st Century Provocation: Modern Slavery, the Implications for Individuals on the Autism Spectrum
Authors: Christina Surmei
Abstract:
Autism Spectrum Disorder (ASD) is defined as a diverse range of developmental conditions that affect an individual’s functionality. ASD is not linear, and individuals can present with deficits in social interaction, communication, and demonstrate limited, repetitive patterns of behaviour, interests, or activities. These characteristics may be observed in a variety of ways and range from mild to severe. ASD may include autism disorder, pervasive developmental disorder not otherwise specified, Asperger’s, or other related pervasive developmental disorders. Modern slavery is defined as 'situations of exploitation that a person cannot refuse or leave because of threats, violence, coercion, and abuse of power or deception'. A review of the literature investigated the prevalence of research regarding ASD and modern slavery. Two universal search engines and five online journals were used as the apparatuses of inquiry. The results revealed two editorials, one study, and one act, totaling four publications attesting to ASD and modern slavery as a joint entity. This is representative of a vast absence of research. However, as individual entities research on autism and modern slavery is in a general high occurrence. This paper has identified a significant gap in research on ASD and modern slavery, and initiates the dialogue to unpack a significant global issue in society today.Keywords: autism spectrum, education, modern slavery, support
Procedia PDF Downloads 166684 The Impact of Riparian Alien Plant Removal on Aquatic Invertebrate Communities in the Upper Reaches of Luvuvhu River Catchment, Limpopo Province
Authors: Rifilwe Victor Modiba, Stefan Hendric Foord
Abstract:
Alien invasive plants (IAP’s) have considerable negative impacts on freshwater habitats and South Africa has implemented an innovative Work for Water (WfW) programme for the systematic removal of these plants aimed at, amongst other objectives, restoring biodiversity and ecosystem services in these threatened habitats. These restoration processes are expensive and have to be evidence-based. In this study in-stream macroinvertebrate and adult Odonata assemblages were used as indicators of restoration success by quantifying the response of biodiversity metrics for these two groups to the removal of IAP’s in a strategic water resource of South Africa that is extensively invaded by invasive alien plants (IAP’s). The study consisted of a replicated design that included 45 sampling units, viz. 15 invaded, 15 uninvaded and 15 cleared sites stratified across the upper reaches of six sub-catchments of the Luvuvhu river catchment, Limpopo Province. Cleared sites were only considered if they received at least two WfW treatments in the last 3 years. The Benthic macroinvertebrate and adult Odonate assemblages in each of these sampling were surveyed from between November and March, 2013/2014 and 2014/2015 respectively. Generalized Linear Models (GLM) with a log link function and Poisson error distribution were done for metrics (invaded, cleared, and uninvaded) whose residuals were not normally distributed or had unequal variance and for abundance. RDA was done for EPTO genera (Ephemeroptera, Plecoptera, Trichoptera and Odonata) and adult Odonata species abundance. GLM was done to for the abundance of Genera and Odonates that had the association with the RDA environmental factors. Sixty four benthic macroinvertebrate families, 57 EPTO genera, and 45 adult Odonata species were recorded across all 45 sampling units. There was no significant difference between the SASS5 total score, ASPT, and family richness of the three invasion classes. Although clearing only had a weak positive effect on the adult Odonate species richness it had a positive impact on DBI scores. These differences were mainly the result of significantly larger DBI scores in the cleared sites as compared to the invaded sites. Results suggest that water quality is positively impacted by repeated clearing pointing to the importance of follow up procedures after initial clearing. Adult Odonate diversity as measured by richness, endemicity, threat and distribution respond positively to all forms of the clearing. The clearing had a significant impact on Odonate assemblage structure but did not affect EPTO structure. Variation partitioning showed that 21.8% of the variation in EPTO assemblage can be explained by spatial and environmental variables, 16% of the variation in Odonate structure was explained by spatial and environmental variables. The response of the diversity metrics to clearing increased in significance at finer taxonomic resolutions, particularly of adult Odonates whose metrics significantly improved with clearing and whose structure responded to both invasion and clearing. The study recommends the use of DBI for surveying river health when hydraulic biotopes are poor.Keywords: DBI, evidence-based conservation, EPTO, macroinvetebrates
Procedia PDF Downloads 184683 Avian Ecological Status in the Gadaïne Eco-Complex (Batna, NE Algeria)
Authors: Marref Cherine, Bezzala Adel, Houhamdimoussa
Abstract:
Wetlands represent ecosystems of great importance through their ecological and socio-economic functions and biological diversity, even if they are most threatened by anthropization. This study aimed to contribute to the creation of an inventory of bird species in the Gadaïne eco-complex (Batna, Algeria) from 2019 to 2021. Counts were carried out from 8:00 to 19:00 using a telescope (20 × 60) and a pair of binoculars (10 × 50) and by employing absolute and relative methods. Birds were categorized by phenology, habitat, biogeography, and diet. A total of 80 species in 58 genera and 19 families were observed. Migratory birds were dominant (38%) phenologically, and the birds of Palearctic origin dominated (26.25%) biogeographically. Invertivorous and carnivorous species were the most common (35%). Ecologically, the majority of species were waterbirds (73.75%), which are protected in Algeria. This study highlights the need for the preservation of ecosystem components and the enhancement of biological resources of protected, rare, and key species. We observed 43797 individuals of Marmaronetta angustirostris during our study and reported the nesting of Podiceps nigricollis, Porphyrio porphyrio, and Tadorna ferruginea. For this reason, it is recommended to propose the area as a Ramsar site.Keywords: biodiversity, avifauna, ecological status, wetlands
Procedia PDF Downloads 61682 The Role of Community Forestry to Combat Climate Change Impacts in Nepal
Authors: Ravi Kumar Pandit
Abstract:
Climate change is regarded as one of the most fundamental threats to sustainable livelihood and global development. There is growing a global concern in linking community-managed forests as potential climate change mitigation projects. This study was conducted to explore the local people’s perception on climate change and the role of community forestry (CF) to combat climate change impacts. Two active community forest user groups (CFUGs) from Kaski and Syangja Districts in Nepal were selected as study sites, and various participatory tools were applied to collect primary data. Although most of the respondents were unaware about the words “Climate Change” in study sites, they were quite familiar with the irregularities in rainfall season and other weather extremities. 60% of the respondents had the idea that, due to increase in precipitation, there is a frequent occurrence of erosion, floods and landslide. Around 85% of the people agreed that community forests help in stabilizing soil, reducing the natural hazards like erosion, landslide. Biogas as an alternative source of cooking energy, and changes in crops and their varieties are the common adaptation measures that local people start practicing in both CFUGs in Nepal.Keywords: climate change, community forestry, global warming, adaptation in Nepal
Procedia PDF Downloads 252681 Factors Affecting Consumers’ Online Shopping Behavior in Vietnam during the COVID-19 Pandemic: A Case Study of Tiki
Authors: Thi Hai Anh Nguyen, Pantea Aria
Abstract:
Tiki is one of the leading e-commerce companies in Viet Nam. Since the beginning of 2020, COVID-19 has been spreading around the world. Thanks to this pandemic, the Tiki platform has many strengths and has faced many threats. Customer behaviour was forecasted to change during the COVID-19 pandemic. The aim of the investigation is (1) Identifying factors affecting online consumer behaviour of Tiki in Ho Chi Minh City, Vietnam, (2) Measuring the level of impact of these factors, and (3) Recommendations for Tiki to improve its business strategy for the next stage. This research studies eight factors and collected 378 online surveys for analysis. Using SPSS software identified five factors (product, price, reliability, and web design) positively influencing customer behaviour. COVID-19 factor does not impact significantly Tiki’s customer behaviour. This research conducted some qualitative interviews to understand shopping experiences and customers’ expectations. One of these interviews’ main points is that Tiki’s customers have high trust in the Tiki brand and its high-quality products. Based on the results, the Tiki corporation should secure its core value. Tiki’s employees and logistics systems should be well-trained and optimized to improve customer experiences.Keywords: COVID-19, e-commerce, impact, pandemic, Vietnam
Procedia PDF Downloads 161680 Role of Medicinal Plants in Treatment of Diseases and Drug Discovery in Azad Kashmir, Pakistan
Authors: Neelam Rashid, Muhammad Zafar, Mushtaq Ahmad, Khafsa Malik, Syed Nasar Shah
Abstract:
The present study was conducted to study the role of medicinal plants used to cure different ailments in Azad Kashmir. Various ethno medicinal surveys were carried out during 2016 to enlist the uses of plants against various ailments by rural communities of the area. Information was obtained from 60 local people including 45 males (10 traditional health practitioners) and 15 females by semi structured interviews and group discussions. 65 plant species belonging to 45 families were reported. The dominant plant habit was herbaceous (56%) while decoction was the most common method of utilization (40%). The most cited turmoil was the gastrointestinal disorders. The data obtained were analyzed using ethno medicinal indices such as FL, UV, ICF, FC, and RFC. Results revealed that various species had numerous uses in curing of diseases. So conservation of biodiversity of these medicinal plants and traditional knowledge can play important role in improving the local health conditions of rural people and modern drug discovery and development.Keywords: medicinal plants, ailments, drug, health, traditional
Procedia PDF Downloads 248679 Potential Impacts of Invasive House Crows (Corvus splendens) Bird Species in Ismailia Governorate, Egypt: Ecology, Control and Risk Management
Authors: Atef Mohamed Kamel Ahmed
Abstract:
House crows (Corvus splendens) have become well-established in Ismailia Governorate, Egypt, where they pose several and serious impacts on native biodiversity, ecosystems and humans health. However, there is a lack of literature on the status and effects of invasive birds in Egypt. Over the past 10 years in Ismailia, House crow have increased at a rate approaching (60000 birds)15% per annum; if this were allowed to continue, the population now 10909 birds and will exceed more by 2013, probably accompanied by an increase in geographical distribution in all Suez canal regions and an exacerbation of the problems caused. Population control is recommended, involving improvements in urban hygiene and the capture of adult crows using stupefying baits. Suitable baits and stupefacient doses were identified and these should be used annually, just before the breeding season. Control should be accompanied by studies of relevant aspects of the biology of house crows in Ismailia Governorate.Keywords: environmental impact t, non-native invasive species, House crow birds, risk management, Ismailia-Egypt
Procedia PDF Downloads 468678 Blockchain for IoT Security and Privacy in Healthcare Sector
Authors: Umair Shafique, Hafiz Usman Zia, Fiaz Majeed, Samina Naz, Javeria Ahmed, Maleeha Zainab
Abstract:
The Internet of Things (IoT) has become a hot topic for the last couple of years. This innovative technology has shown promising progress in various areas, and the world has witnessed exponential growth in multiple application domains. Researchers are working to investigate its aptitudes to get the best from it by harnessing its true potential. But at the same time, IoT networks open up a new aspect of vulnerability and physical threats to data integrity, privacy, and confidentiality. It's is due to centralized control, data silos approach for handling information, and a lack of standardization in the IoT networks. As we know, blockchain is a new technology that involves creating secure distributed ledgers to store and communicate data. Some of the benefits include resiliency, integrity, anonymity, decentralization, and autonomous control. The potential for blockchain technology to provide the key to managing and controlling IoT has created a new wave of excitement around the idea of putting that data back into the hands of the end-users. In this manuscript, we have proposed a model that combines blockchain and IoT networks to address potential security and privacy issues in the healthcare domain. Then we try to describe various application areas, challenges, and future directions in the healthcare sector where blockchain platforms merge with IoT networks.Keywords: IoT, blockchain, cryptocurrency, healthcare, consensus, data
Procedia PDF Downloads 176677 Use of Artificial Intelligence and Two Object-Oriented Approaches (k-NN and SVM) for the Detection and Characterization of Wetlands in the Centre-Val de Loire Region, France
Authors: Bensaid A., Mostephaoui T., Nedjai R.
Abstract:
Nowadays, wetlands are the subject of contradictory debates opposing scientific, political and administrative meanings. Indeed, given their multiple services (drinking water, irrigation, hydrological regulation, mineral, plant and animal resources...), wetlands concentrate many socio-economic and biodiversity issues. In some regions, they can cover vast areas (>100 thousand ha) of the landscape, such as the Camargue area in the south of France, inside the Rhone delta. The high biological productivity of wetlands, the strong natural selection pressures and the diversity of aquatic environments have produced many species of plants and animals that are found nowhere else. These environments are tremendous carbon sinks and biodiversity reserves depending on their age, composition and surrounding environmental conditions, wetlands play an important role in global climate projections. Covering more than 3% of the earth's surface, wetlands have experienced since the beginning of the 1990s a tremendous revival of interest, which has resulted in the multiplication of inventories, scientific studies and management experiments. The geographical and physical characteristics of the wetlands of the central region conceal a large number of natural habitats that harbour a great biological diversity. These wetlands, one of the natural habitats, are still influenced by human activities, especially agriculture, which affects its layout and functioning. In this perspective, decision-makers need to delimit spatial objects (natural habitats) in a certain way to be able to take action. Thus, wetlands are no exception to this rule even if it seems to be a difficult exercise to delimit a type of environment as whose main characteristic is often to occupy the transition between aquatic and terrestrial environment. However, it is possible to map wetlands with databases, derived from the interpretation of photos and satellite images, such as the European database Corine Land cover, which allows quantifying and characterizing for each place the characteristic wetland types. Scientific studies have shown limitations when using high spatial resolution images (SPOT, Landsat, ASTER) for the identification and characterization of small wetlands (1 hectare). To address this limitation, it is important to note that these wetlands generally represent spatially complex features. Indeed, the use of very high spatial resolution images (>3m) is necessary to map small and large areas. However, with the recent evolution of artificial intelligence (AI) and deep learning methods for satellite image processing have shown a much better performance compared to traditional processing based only on pixel structures. Our research work is also based on spectral and textural analysis on THR images (Spot and IRC orthoimage) using two object-oriented approaches, the nearest neighbour approach (k-NN) and the Super Vector Machine approach (SVM). The k-NN approach gave good results for the delineation of wetlands (wet marshes and moors, ponds, artificial wetlands water body edges, ponds, mountain wetlands, river edges and brackish marshes) with a kappa index higher than 85%.Keywords: land development, GIS, sand dunes, segmentation, remote sensing
Procedia PDF Downloads 69676 Intertidal Fixed Stake Net Trap (Hadrah) Fishery in Kuwait, Distribution, Catch Rate, and Species Composition
Authors: Ali F. Al-Baz, Mohsen M. Al-Husaini, James M. Bishop
Abstract:
Intertidal fixed stake net trap (hadrah) is one of the oldest fishing gears used throughout the Arabian Gulf countries since 1800s and also one of most efficient methods of capturing fish from the intertidal area. This study described the hadrah fishery in Kuwait. From October 2001 to December 2002, more than 37,372 specimens representing 95 species (89 fish, 2 mollusks, 4 crustaceans) were measured from hadrah located in three different areas along Kuwait's coast. In Kuwait Bay, catch rates averaged 62 kg/sir day (range 14 kg/sir-day in February to 160 kg/sir-day in October 2002). Commercial species accounted for 41% of the catches. Catches from Failakah Island averaged 96 kg/sir-day from June through September, with 61% of the catch being commercial species. In the southern area, catches averaged only 32 kg/sir-day, and only 34% were commercially important. Forty percent of the hadrah catches were juveniles which shows that the shallow intertidal waters are prime nursery habitat, particularly in Kuwait Bay. To maintain ecosystem biodiversity and recruitment success of the fishes, we recommended that all hadrah should be removed from Kuwait Bay. In the future, removal of hadrah in other locations should be considered.Keywords: catch and effort, hadrah, intertidal fixed stake net, Kuwait, species composition
Procedia PDF Downloads 499675 Phytodiversity and Phytogeographic Characterization Stands of Pistacia lentiscus L. in the Coastal Region of Honaine, Tlemcen, Western Algeria
Authors: I. Benmehdi, O. Hasnaoui, N. Hachemi, M. Bouazza
Abstract:
The Understanding of the mechanisms structuring of plant diversity in the region of Tlemcen (western Algeria) is a related problem. The current floristic composition of different groups in Pistacia lentiscus L. resulting from the combination of human and climate action. This study is devoted to biodiversity inventory and phytogeographic characterization of Pistacia lentiscus groups in the Honaine coastal (western Algeria). The floristic inventory (150 levels) made in three stations of the study area allowed to count a 109 species belonging to 44 families of vascular plants. The biogeographical analysis of the Pistacia lentiscus groups reveals the most representative elements. The Mediterranean elements are numerically the most dominant with 39.45% represented by: Pistacia lentiscus, Cistus monspeliensis, Plantago lagopus, Linum strictum, Echium vulgare; followed by the western Mediterranean elements with 10.09% and are represented by: Chamaerops humilis, Lavandula dentata, Ampelodesma mauritanicum and Iris xyphium. However, this phytotaxonomic wealth is exposed to anthropogenic impact causing its disruption see its decline.Keywords: Pistacia lentiscus L., phytodiversity, phytogeography, honaine, western Algeria
Procedia PDF Downloads 396674 CSRFDtool: Automated Detection and Prevention of a Reflected Cross-Site Request Forgery
Authors: Alaa A. Almarzuki, Nora A. Farraj, Aisha M. Alshiky, Omar A. Batarfi
Abstract:
The number of internet users is dramatically increased every year. Most of these users are exposed to the dangers of attackers in one way or another. The reason for this lies in the presence of many weaknesses that are not known for native users. In addition, the lack of user awareness is considered as the main reason for falling into the attackers’ snares. Cross Site Request Forgery (CSRF) has placed in the list of the most dangerous threats to security in OWASP Top Ten for 2013. CSRF is an attack that forces the user’s browser to send or perform unwanted request or action without user awareness by exploiting a valid session between the browser and the server. When CSRF attack successes, it leads to many bad consequences. An attacker may reach private and personal information and modify it. This paper aims to detect and prevent a specific type of CSRF, called reflected CSRF. In a reflected CSRF, a malicious code could be injected by the attackers. This paper explores how CSRF Detection Extension prevents the reflected CSRF by checking browser specific information. Our evaluation shows that the proposed solution succeeds in preventing this type of attack.Keywords: CSRF, CSRF detection extension, attackers, attacks
Procedia PDF Downloads 412673 Health Impacts of Size Segregated Particulate Matter and Black Carbon in Industrial Area of Firozabad
Authors: Kalpana Rajouriya, Ajay Taneja
Abstract:
Particulates are ubiquitous in the air environment and cause serious threats to human beings, such as lung cancer, Chronic obstructive pulmonary disease (COPD), and Asthma. Particulates mainly arise from industrial effluent, vehicular emission, and other anthropogenic activities. In the glass industrial city Firozabad, real-time monitoring (mass as well as a number) of size segregated Particulate Matter (PM) and black carbon was done by Aerosol Black Carbon Detector (ABCD) and GRIMM portable aerosol Spectrometer at two different sites in which one site is urban, and another is rural. The average mass concentration of size segregated PM during the study period (March & April 2022) was recorded as PM₁₀ (223.73 g/m-³), PM₅.₀ (44.955 g/m-³), PM₂.₅ (59.275 g/m-³), PM₁.₀ (33.02 g/m-³), PM₀.₅ (2.05 g/m-³), and PM₀.₂₅ (2.99 g/m- ³). In number mode, PM concentration was found as PM₁₀ (27.46g/m-³), PM₅.₀ (233.48g/m-³), PM₂.₅ (646.61g/m-³), PM₁.₀ (1134.94 g/m-³), PM₀.₅ (14056.04g/m-³), and PM₀.₂₅ (182906.4 g/m-³). The highest concentration of BC was found in Urban due to the emissions from diesel engines and wood burning while NO2 was highest at the rural sites. The concentrations of PM₁₀ and PM₂.₅ exceeded the NAAQS and WHO guidelines. The sensitive, exposed population may be at risk of developing health-related problems from exposure to size-segregated PM and BC.Keywords: particulate matter, black carbon, NO2, health risk
Procedia PDF Downloads 35672 Investigation of Diseases and Enemies of Bees of Breeding Apis mellifera intermissa (Buttel-Reepen, 1906)
Authors: S. Zenia, L. Bitta, O. Bouhamam, H. Brines, M. Boudriaa, F. Haddadj, F. Marniche, A. Milla, H. Saadi, A. Smai
Abstract:
The bee Apis mellifera intermissa is a major social insect, in addition to its honey production, it is a pillar of our biodiversity. Several living organisms can come into contact with it: bacteria, viruses, protozoa, fungi, mites, and insects. In Algeria, many beekeepers have reported unusual mortality of local bees, loss of foragers and significant losses of their livestock. Despite the presence of a varied honey-bearing flora and a favourable Mediterranean climate, honey production remains low. This phenomenon can be attributed to the excess winter mortality, but also to the increasing difficulties that beekeepers face in maintaining healthy bee colonies, particularly bee diseases and their transmission facilitated by trade and beekeeping practices. Our survey is based on a questionnaire composed of several parts. The results obtained show that the disease that most affects bees according to beekeepers is varroa mite with 93% followed by fungi with 26%. The most replied enemy of bees is the false ringworm with 73%, followed by the bee-eater with 63%. Our goal is to determine the causes of this low production in two areas: Bejaia and Tizi-Ouzou.Keywords: diseases, Apis mellifera L., varroa, European foulbrood
Procedia PDF Downloads 160671 Analysis of Detection Concealed Objects Based on Multispectral and Hyperspectral Signatures
Authors: M. Kastek, M. Kowalski, M. Szustakowski, H. Polakowski, T. Sosnowski
Abstract:
Development of highly efficient security systems is one of the most urgent topics for science and engineering. There are many kinds of threats and many methods of prevention. It is very important to detect a threat as early as possible in order to neutralize it. One of the very challenging problems is detection of dangerous objects hidden under human’s clothing. This problem is particularly important for safety of airport passengers. In order to develop methods and algorithms to detect hidden objects it is necessary to determine the thermal signatures of such objects of interest. The laboratory measurements were conducted to determine the thermal signatures of dangerous tools hidden under various clothes in different ambient conditions. Cameras used for measurements were working in spectral range 0.6-12.5 μm An infrared imaging Fourier transform spectroradiometer was also used, working in spectral range 7.7-11.7 μm. Analysis of registered thermograms and hyperspectral datacubes has yielded the thermal signatures for two types of guns, two types of knives and home-made explosive bombs. The determined thermal signatures will be used in the development of method and algorithms of image analysis implemented in proposed monitoring systems.Keywords: hyperspectral detection, nultispectral detection, image processing, monitoring systems
Procedia PDF Downloads 347670 Project Management Practices and Operational Challenges in Conflict Areas: Case Study Kewot Woreda North Shewa Zone, Amhara Region, Ethiopia
Authors: Rahel Birhane Eshetu
Abstract:
This research investigates the complex landscape of project management practices and operational challenges in conflict-affected areas, with a specific focus on Kewot Woreda in the North Shewa Zone of the Amhara region in Ethiopia. The study aims to identify essential project management methodologies, the significant operational hurdles faced, and the adaptive strategies employed by project managers in these challenging environments. Utilizing a mixed-methods approach, the research combines qualitative and quantitative data collection. Initially, a comprehensive literature review was conducted to establish a theoretical framework. This was followed by the administration of questionnaires to gather empirical data, which was then analyzed using statistical software. This sequential approach ensures a robust understanding of the context and challenges faced by project managers. The findings reveal that project managers in conflict zones encounter a range of escalating challenges. Initially, they must contend with immediate security threats and the presence of displaced populations, which significantly disrupt project initiation and execution. As projects progress, additional challenges arise, including limited access to essential resources and environmental disruptions such as natural disasters. These factors exacerbate the operational difficulties that project managers must navigate. In response to these challenges, the study highlights the necessity for project managers to implement formal project plans while simultaneously adopting adaptive strategies that evolve over time. Key adaptive strategies identified include flexible risk management frameworks, change management practices, and enhanced stakeholder engagement approaches. These strategies are crucial for maintaining project momentum and ensuring that objectives are met despite the unpredictable nature of conflict environments. The research emphasizes that structured scope management, clear documentation, and thorough requirements analysis are vital components for effectively navigating the complexities inherent in conflict-affected regions. However, the ongoing threats and logistical barriers necessitate a continuous adjustment to project management methodologies. This adaptability is not only essential for the immediate success of projects but also for fostering long-term resilience within the community. Concluding, the study offers actionable recommendations aimed at improving project management practices in conflict zones. These include the adoption of adaptive frameworks specifically tailored to the unique conditions of conflict environments and targeted training for project managers. Such training should focus on equipping managers with the skills to better address the dynamic challenges presented by conflict situations. The insights gained from this research contribute significantly to the broader field of project management, providing a practical guide for practitioners operating in high-risk areas. By emphasizing sustainable and resilient project outcomes, this study underscores the importance of adaptive management strategies in ensuring the success of projects in conflict-affected regions. The findings serve not only to enhance the understanding of project management practices in Kewot Woreda but also to inform future research and practice in similar contexts, ultimately aiming to promote stability and development in areas beset by conflict.Keywords: project management practices, operational challenges, conflict zones, adaptive strategies
Procedia PDF Downloads 9669 Social and Cognitive Stress Impact on Neuroscience and PTSD
Authors: Sadra Abbasi
Abstract:
The complex connection between psychological stress and the onset of different diseases has been an ongoing issue in the mental health field for a long time. Multiple studies have demonstrated that long-term stress can greatly heighten the likelihood of developing health issues like heart disease, cancer, arthritis, and severe depression. Recent research in cognitive science has provided insight into the intricate processes involved in posttraumatic stress disorder (PTSD), suggesting that distinct memory systems are accountable for both vivid reliving and normal autobiographical memories of traumatic incidents, as proposed by dual representation theory. This theory has important consequences for our comprehension of the neural mechanisms involved in fear and behavior related to threats, highlighting the amygdala-hippocampus-medial prefrontal cortex circuit as a crucial component in this process. This particular circuit, extensively researched in behavioral neuroscience, is essential for regulating the body's reactions to stress and trauma. This review will examine how incorporating a modern neuroscience viewpoint into an integrative case formulation offers a current way to comprehend the intricate connections among psychological stress, trauma, and disease.Keywords: social, cognitive, stress, neuroscience, behavior, PTSD
Procedia PDF Downloads 34668 Low Probability of Intercept (LPI) Signal Detection and Analysis Using Choi-Williams Distribution
Authors: V. S. S. Kumar, V. Ramya
Abstract:
In the modern electronic warfare, the signal scenario is changing at a rapid pace with the introduction of Low Probability of Intercept (LPI) radars. In the modern battlefield, radar system faces serious threats from passive intercept receivers such as Electronic Attack (EA) and Anti-Radiation Missiles (ARMs). To perform necessary target detection and tracking and simultaneously hide themselves from enemy attack, radar systems should be LPI. These LPI radars use a variety of complex signal modulation schemes together with pulse compression with the aid of advancement in signal processing capabilities of the radar such that the radar performs target detection and tracking while simultaneously hiding enemy from attack such as EA etc., thus posing a major challenge to the ES/ELINT receivers. Today an increasing number of LPI radars are being introduced into the modern platforms and weapon systems so these LPI radars created a requirement for the armed forces to develop new techniques, strategies and equipment to counter them. This paper presents various modulation techniques used in generation of LPI signals and development of Time Frequency Algorithms to analyse those signals.Keywords: anti-radiation missiles, cross terms, electronic attack, electronic intelligence, electronic warfare, intercept receiver, low probability of intercept
Procedia PDF Downloads 469667 An Evaluation of the Effectiveness of Health and Safety Induction Practices in the Zambian Construction Industry
Authors: Josephine Mutwale-Ziko, Nonde Lushinga, Inonge Akakandelwa
Abstract:
The study discusses the effectiveness of health and safety induction practices on construction sites against the background of the Zambian construction industry experience. The research design included the literature review of relevant literature. Questionnaires and interviews were administered to regulatory bodies, health, and safety personnel. Observation was also employed on construction sites to assess the health and safety practices being used. Health and safety in the construction industry are not something to be ignored or overlooked. The construction industry needs to take heed of the serious consequences of inadequate health and safety induction practices. The implications of inadequate health and safety induction procedures included among others threats to profitability, corporate social responsibility and increased turnover of the workforce leading to poor productivity. Adequate health and safety practices can improve the health and wellbeing of employees, reduce financial implications on firms and encourage productivity on construction sites. Despite this, accidents are still prevalent on construction sites in Zambia. The overall result of this research denotes that the implementation of health and safety induction practices is inadequate, as indicated by the negligent and non-adherent attitude to health and safety induction aspects on the sites by most stakeholders on construction sites. Therefore, health and safety induction practices are ineffective as preventive measures for reduction of accidents on construction sites in Zambia.Keywords: accidents, health and safety, inadequate, induction
Procedia PDF Downloads 447666 Communication Layer Security in Smart Farming: A Survey on Wireless Technologies
Authors: Hossein Mohammadi Rouzbahani, Hadis Karimipour, Evan Fraser, Ali Dehghantanha, Emily Duncan, Arthur Green, Conchobhair Russell
Abstract:
Human population growth has driven rising demand for food that has, in turn, imposed huge impacts on the environment. In an effort to reconcile our need to produce more sustenance while also protecting the world’s ecosystems, farming is becoming more reliant on smart tools and communication technologies. Developing a smart farming framework allows farmers to make more efficient use of inputs, thus protecting water quality and biodiversity habitat. Internet of Things (IoT), which has revolutionized every sphere of the economy, is being applied to agriculture by connecting on-farm devices and providing real-time monitoring of everything from environmental conditions to market signals through to animal health data. However, utilizing IoT means farming networks are now vulnerable to malicious activities, mostly when wireless communications are highly employed. With that in mind, this research aims to review different utilized communication technologies in smart farming. Moreover, possible cyber-attacks are investigated to discover the vulnerabilities of communication technologies considering the most frequent cyber-attacks that have been happened.Keywords: smart farming, Internet of Things, communication layer, cyber-attack
Procedia PDF Downloads 241665 Growing Acts of Terrorism in Local Conflicts: A Dire Need for International Attention
Authors: Yusuf Abubakar Mamud
Abstract:
Highlighting the imperatives of local conflicts considering the dangerous dimensions of terrorism they are assuming in Africa has not attracted serious academic and political attention. The discourse about conflict in Africa was discussed within five identified conflict zones in the continent. The threats from these local conflicts are diverse and complex and the acts of terrorism in these local conflicts are driven by certain attitudes and behaviours linked to the African leadership. The paper examined and noted that the current conflict resolution model of the African Union (AU) was robust with requisite institutions to address the trends in local conflicts. However, it was observed that the AU peace and security framework lacked the requisite structural and technical capabilities to proactively address the drivers of local conflicts in Africa. It was found that the persistence of local conflicts in the African region may deny her the opportunities of achievement of the targets envisioned in the Sustainable Development Goals (SDGs). Consequently, the paper called on the international community to support Africa through provision of capacity. It urged the African leaders themselves to develop the political will to ensure that all issues concerning peace and security in the continent were guided by the provisions of the AU Constitutive Act. The need to strengthen the APRM in the light of the current trends in local conflicts was also highlighted.Keywords: conflicts, local conflicts, terrorism, sustainable development
Procedia PDF Downloads 275664 A Lifetime-Enhancing Monitoring Node Distribution Using Minimum Spanning Tree in Mobile Ad Hoc Networks
Authors: Sungchul Ha, Hyunwoo Kim
Abstract:
In mobile ad hoc networks, all nodes in a network only have limited resources and calculation ability. Therefore communication topology which have long lifetime is good for all nodes in mobile ad hoc networks. There are a variety of researches on security problems in wireless ad hoc networks. The existing many researches try to make efficient security schemes to reduce network power consumption and enhance network lifetime. Because a new node can join the network at any time, the wireless ad hoc networks are exposed to various threats and can be destroyed by attacks. Resource consumption is absolutely necessary to secure networks, but more resource consumption can be a critical problem to network lifetime. This paper focuses on efficient monitoring node distribution to enhance network lifetime in wireless ad hoc networks. Since the wireless ad hoc networks cannot use centralized infrastructure and security systems of wired networks, a new special IDS scheme is necessary. The scheme should not only cover all nodes in a network but also enhance the network lifetime. In this paper, we propose an efficient IDS node distribution scheme using minimum spanning tree (MST) method. The simulation results show that the proposed algorithm has superior performance in comparison with existing algorithms.Keywords: MANETs, IDS, power control, minimum spanning tree
Procedia PDF Downloads 369663 Combined Safety and Cybersecurity Risk Assessment for Intelligent Distributed Grids
Authors: Anders Thorsén, Behrooz Sangchoolie, Peter Folkesson, Ted Strandberg
Abstract:
As more parts of the power grid become connected to the internet, the risk of cyberattacks increases. To identify the cybersecurity threats and subsequently reduce vulnerabilities, the common practice is to carry out a cybersecurity risk assessment. For safety classified systems and products, there is also a need for safety risk assessments in addition to the cybersecurity risk assessment in order to identify and reduce safety risks. These two risk assessments are usually done separately, but since cybersecurity and functional safety are often related, a more comprehensive method covering both aspects is needed. Some work addressing this has been done for specific domains like the automotive domain, but more general methods suitable for, e.g., intelligent distributed grids, are still missing. One such method from the automotive domain is the Security-Aware Hazard Analysis and Risk Assessment (SAHARA) method that combines safety and cybersecurity risk assessments. This paper presents an approach where the SAHARA method has been modified in order to be more suitable for larger distributed systems. The adapted SAHARA method has a more general risk assessment approach than the original SAHARA. The proposed method has been successfully applied on two use cases of an intelligent distributed grid.Keywords: intelligent distribution grids, threat analysis, risk assessment, safety, cybersecurity
Procedia PDF Downloads 151662 Moroccan Human Ecological Behavior: Grounded Theory Approach
Authors: Dalal Tarfaoui, Salah Zkim
Abstract:
Today, environmental sustainability is everyone’s concern as it contributes in many aspects to a country's development. Morocco is also aware of the increasing threats to its natural resources. Accordingly, many projects and research have been discussed pointing mainly to water security, pollution, desertification, and land degradation, but few studies bothered to dig into the human demeanor to disclose its ecological behavior. Human behavior is accountable for environment deterioration in the first place, but we keep fighting the symptoms instead of limiting the root causes. In the conceptual framework highlighted in the present article, semi-structured interviews have been conducted using a grounded theory approach. Initially this study will serve as a pilot study and a cornerstone to approve a bigger project now in progress. Beyond the existing general ecological measures (GEM), this study has chosen the grounded theory approach to bring out firsthand insights, and probe to which extent an ecological dimension exists in Morocco as a developing country. The discourse of the ecological behavior within the Moroccan context is seen in more realist, social, and community philosophy. The study has revealed an appreciative ecological behavior that is unfortunately repressed by variables beyond people’s control, which would prevent the people’s environmental good intentions to be translated into real ecological actions.Keywords: ecological behavior, ecological dimension, variables beyond people’s control, Morocco
Procedia PDF Downloads 493