Search results for: malware attacks
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 630

Search results for: malware attacks

90 Post Harvest Losses and Food Security in Northeast Nigeria What Are the Key Challenges and Concrete Solutions

Authors: Adebola Adedugbe

Abstract:

The challenge of post-harvest losses poses serious threats for food security in Nigeria and the north-eastern part with the country losing about $9billion annually due to postharvest losses in the sector. Post-harvest loss (PHL) is the quantitative and qualitative loss of food in various post-harvest operations. In Nigeria, post-harvest losses (PHL) have been a major challenge to food security and improved farmer’s income. In 2022, the Nigerian government had said over 30 percent of food produced by Nigerian farmers perish during post-harvest. For many in northeast Nigeria, agriculture is the predominant source of livelihood and income. The persistent communal conflicts, flood, decade-old attacks by boko haram and insurgency in this region have disrupted farming activities drastically, with farmlands becoming insecure and inaccessible as communities are forced to abandon ancestral homes, The impact of climate change is also affecting agricultural and fishing activities, leading to shortage of food supplies, acute hunger and loss of livelihood. This has continued to impact negatively on the region and country’s food production and availability making it loose billions of US dollars annually in income in this sector. The root cause of postharvest losses among others in crops, livestock and fisheries are lack of modern post-harvest equipment, chemical and lack of technologies used for combating losses. The 2019 Global Hunger Index showed Nigeria’s case was progressing from a ‘serious to alarming level’. As part of measures to address the problem of post-harvest losses experienced by farmers, the federal government of Nigeria concessioned 17 silos with 6000 metric tonne storage space to private sector to enable farmers to have access to storage facilities. This paper discusses the causes, effects and solutions in handling post-harvest losses and optimize returns on food security in northeast Nigeria.

Keywords: farmers, food security, northeast Nigeria, postharvest loss

Procedia PDF Downloads 71
89 Analysis of the Impact of Suez Canal on the Robustness of Global Shipping Networks

Authors: Zimu Li, Zheng Wan

Abstract:

The Suez Canal plays an important role in global shipping networks and is one of the most frequently used waterways in the world. The 2021 canal obstruction by ship Ever Given in March 2021, however, completed blocked the Suez Canal for a week and caused significant disruption to world trade. Therefore, it is very important to quantitatively analyze the impact of the accident on the robustness of the global shipping network. However, the current research on maritime transportation networks is usually limited to local or small-scale networks in a certain region. Based on the complex network theory, this study establishes a global shipping complex network covering 2713 nodes and 137830 edges by using the real trajectory data of the global marine transport ship automatic identification system in 2018. At the same time, two attack modes, deliberate (Suez Canal Blocking) and random, are defined to calculate the changes in network node degree, eccentricity, clustering coefficient, network density, network isolated nodes, betweenness centrality, and closeness centrality under the two attack modes, and quantitatively analyze the actual impact of Suez Canal Blocking on the robustness of global shipping network. The results of the network robustness analysis show that Suez Canal blocking was more destructive to the shipping network than random attacks of the same scale. The network connectivity and accessibility decreased significantly, and the decline decreased with the distance between the port and the canal, showing the phenomenon of distance attenuation. This study further analyzes the impact of the blocking of the Suez Canal on Chinese ports and finds that the blocking of the Suez Canal significantly interferes withChina's shipping network and seriously affects China's normal trade activities. Finally, the impact of the global supply chain is analyzed, and it is found that blocking the canal will seriously damage the normal operation of the global supply chain.

Keywords: global shipping networks, ship AIS trajectory data, main channel, complex network, eigenvalue change

Procedia PDF Downloads 181
88 Durability Performances of Epoxy Resin/TiO₂ Composited Alkali-Activated Slag/Fly Ash Pastes in Phosphoric Acid Solution

Authors: Jie Ren, Siyao Guo

Abstract:

Laden with phosphates at a low pH value, sewage wastewater aggressive environments constitute a great threat to concrete-based pipes which is made of alkaline cementitious materials such as ordinary Portland cement (OPC). As a promising alternative for OPC-based binders, alkali-activated slag/fly ash (AASF) cementitious binders are generally believed to gain similar or better properties compared to OPC-based counterparts, especially durability. However, there is limited research on the performance of AASF binders in phosphoric acid solution. Moreover, the behavior of AASF binders composited with epoxy resin/TiO₂ when exposed to acidic media has been rarely explored. In this study, the performance of AASF paste with the precursor slag:fly ash (50:50 in mass ratio) enhanced with epoxy resin/TiO₂ composite in phosphoric acid solution (pH = 3.0-4.0) was investigated. The exposure towards acid attack lasted for 90 days. The same AASF mixture without resin/TiO₂ composite was used as a reference. The compressive strength and porous-related properties prior to acidic immersion were tested. The mass variations and degradation depth of the two mixtures of binders were also monitored which is based on phenolphthalein-videomicroscope method. The results show that the binder with epoxy resin/TiO₂ addition gained a higher compressive strength and lower water absorption than the reference. In addition, it also displayed a higher resistance towards acid attack indicated by a less mass loss and less degradation depth compared to the control sample. This improvement can be attributed to a dense microstructure evidenced by the higher compressive strength and related porous structures. It can be concluded that the microstructure can be improved by adding epoxy resin/TiO₂ composite in order to enhance the resistance of AASF binder towards acid attacks.

Keywords: alkali-activated paste, epoxy resin/TiO₂, composites, mechanical properties, phosphoric acid

Procedia PDF Downloads 120
87 Determination of Rare Earth Element Patterns in Uranium Matrix for Nuclear Forensics Application: Method Development for Inductively Coupled Plasma Mass Spectrometry (ICP-MS) Measurements

Authors: Bernadett Henn, Katalin Tálos, Éva Kováss Széles

Abstract:

During the last 50 years, the worldwide permeation of the nuclear techniques induces several new problems in the environmental and in the human life. Nowadays, due to the increasing of the risk of terrorism worldwide, the potential occurrence of terrorist attacks using also weapon of mass destruction containing radioactive or nuclear materials as e.g. dirty bombs, is a real threat. For instance, the uranium pellets are one of the potential nuclear materials which are suitable for making special weapons. The nuclear forensics mainly focuses on the determination of the origin of the confiscated or found nuclear and other radioactive materials, which could be used for making any radioactive dispersive device. One of the most important signatures in nuclear forensics to find the origin of the material is the determination of the rare earth element patterns (REE) in the seized or found radioactive or nuclear samples. The concentration and the normalized pattern of the REE can be used as an evidence of uranium origin. The REE are the fourteen Lanthanides in addition scandium and yttrium what are mostly found together and really low concentration in uranium pellets. The problems of the REE determination using ICP-MS technique are the uranium matrix (high concentration of uranium) and the interferences among Lanthanides. In this work, our aim was to develop an effective chemical sample preparation process using extraction chromatography for separation the uranium matrix and the rare earth elements from each other following some publications can be found in the literature and modified them. Secondly, our purpose was the optimization of the ICP-MS measuring process for REE concentration. During method development, in the first step, a REE model solution was used in two different types of extraction chromatographic resins (LN® and TRU®) and different acidic media for environmental testing the Lanthanides separation. Uranium matrix was added to the model solution and was proved in the same conditions. Methods were tested and validated using REE UOC (uranium ore concentrate) reference materials. Samples were analyzed by sector field mass spectrometer (ICP-SFMS).

Keywords: extraction chromatography, nuclear forensics, rare earth elements, uranium

Procedia PDF Downloads 306
86 Data Confidentiality in Public Cloud: A Method for Inclusion of ID-PKC Schemes in OpenStack Cloud

Authors: N. Nalini, Bhanu Prakash Gopularam

Abstract:

The term data security refers to the degree of resistance or protection given to information from unintended or unauthorized access. The core principles of information security are the confidentiality, integrity and availability, also referred as CIA triad. Cloud computing services are classified as SaaS, IaaS and PaaS services. With cloud adoption the confidential enterprise data are moved from organization premises to untrusted public network and due to this the attack surface has increased manifold. Several cloud computing platforms like OpenStack, Eucalyptus, Amazon EC2 offer users to build and configure public, hybrid and private clouds. While the traditional encryption based on PKI infrastructure still works in cloud scenario, the management of public-private keys and trust certificates is difficult. The Identity based Public Key Cryptography (also referred as ID-PKC) overcomes this problem by using publicly identifiable information for generating the keys and works well with decentralized systems. The users can exchange information securely without having to manage any trust information. Another advantage is that access control (role based access control policy) information can be embedded into data unlike in PKI where it is handled by separate component or system. In OpenStack cloud platform the keystone service acts as identity service for authentication and authorization and has support for public key infrastructure for auto services. In this paper, we explain OpenStack security architecture and evaluate the PKI infrastructure piece for data confidentiality. We provide method to integrate ID-PKC schemes for securing data while in transit and stored and explain the key measures for safe guarding data against security attacks. The proposed approach uses JPBC crypto library for key-pair generation based on IEEE P1636.3 standard and secure communication to other cloud services.

Keywords: data confidentiality, identity based cryptography, secure communication, open stack key stone, token scoping

Procedia PDF Downloads 384
85 Effect of Different Methods to Control the Parasitic Weed Phelipanche ramosa (L. Pomel) in Tomato Crop

Authors: Disciglio G., Lops F., Carlucci A., Gatta G., Tarantino A., Frabboni L, Tarantino E.

Abstract:

The Phelipanche ramosa is considered the most damaging obligate flowering parasitic weed on a wide species of cultivated plants. The semiarid regions of the world are considered the main center of this parasitic weed, where heavy infestation are due to the ability to produce high numbers of seeds (up to 200,000), that remain viable for extended period (more than 19 years). In this paper 13 treatments of parasitic weed control, as physical, chemical, biological and agronomic methods, including the use of the resistant plants, have been carried out. In 2014 a trial was performed on processing tomato (cv Docet), grown in pots filled with soil taken from a plot heavily infested by Phelipanche ramosa, at the Department of Agriculture, Food and Environment, University of Foggia (southern Italy). Tomato seedlings were transplanted on August 8, 2014 on a clay soil (USDA) 100 kg ha-1 of N; 60 kg ha-1 of P2O5 and 20 kg ha-1 of S. Afterwards, top dressing was performed with 70 kg ha-1 of N. The randomized block design with 3 replicates was adopted. During the growing cycle of the tomato, at 70-75-81 and 88 days after transplantation the number of parasitic shoots emerged in each pot was detected. Also values of leaf chlorophyll Meter SPAD of tomato plants were measured. All data were subjected to analysis of variance (ANOVA) using the JMP software (SAS Institute Inc., Cary, NC, USA), and for comparison of means was used Tukey's test. The results show lower values of the color index SPAD in tomato plants parasitized compared to those healthy. In addition, each treatment studied did not provide complete control against Phelipanche ramosa. However the virulence of the attacks was mitigated by some treatments: radicon product, compost activated with Fusarium, mineral fertilizer nitrogen, sulfur, enzone and resistant tomato genotype. It is assumed that these effects can be improved by combining some of these treatments each other, especially for a gradual and continuing reduction of the “seed bank” of the parasite in the soil.

Keywords: control methods, Phelipanche ramose, tomato crop

Procedia PDF Downloads 612
84 A Qualitative Exploration into Australian Muslims Emerging into Adulthood

Authors: Nuray Okcum, Jenny Sharples

Abstract:

While the scrutinization towards marginalized groups throughout the globe has been existent for decades, prejudice towards Muslims in Western countries has been increasing dramatically. The vicious attacks across the globe by perpetrators who identify with Islam as well as popular political discourse by politicians in Western countries claiming and portraying Muslims as being dangerous, oppressed, or lacking the ability to assimilate into the community, adds to the exclusion and lack of belonging Muslims living in Western countries experience. The early stages of adulthood which have recently been conceptualized as emerging adulthood is a critical and socially ambiguous transition. For a young Muslim emerging into adulthood in a Western country, a variety of different challenges and demands that can exceed their coping abilities can arise. While in search for their identity and in a bid to structure themselves with their past childhood experiences together with their newly forming values, the emerging adult may attempt to direct or change the way in which they are viewed by others. This can be done to gain approval from others and to feel a sense of belonging. A change in the emerging adult’s interpersonal interactions and relationships, the way in which they view themselves and others, their sense of belonging, and their identity, also occurs during this developmental stage. To explore the manner in which Muslims emerging into adulthood carve their identity, their experiences, and representation of their Muslim identity, social identification, and their sense of belonging in Australia, an interpretative phenomenological methodology was utilized. This allowed participants to offer their own subjective experiences. A total of eight emerging adults took part in the study whilst four adults who work with emerging adults took part. Adult participants who work with emerging adults took part in the study to bring forth their insight and experiences. Common experiences were organized into themes. Themes included identifying as a Muslim, social identification, and belonging. Identification included visual identification and name, discrimination and resilience. Findings clearly indicated that Muslims emerging into adulthood in Australia do face various hurdles while they try to retain and represent their religious identity. Despite the unique challenges that they face, they still feel a sense of belonging and identity as being Australian.

Keywords: Muslim, Islam, emerging adulthood, Australia

Procedia PDF Downloads 135
83 In-silico DFT Study, Molecular Docking, ADMET Predictions, and DMS of Isoxazolidine and Isoxazoline Analogs with Anticancer Properties

Authors: Moulay Driss Mellaoui, Khadija Zaki, Khalid Abbiche, Abdallah Imjjad, Rachid Boutiddar, Abdelouahid Sbai, Aaziz Jmiai, Souad El Issami, Al Mokhtar Lamsabhi, Hanane Zejli

Abstract:

This study presents a comprehensive analysis of six isoxazolidine and isoxazoline derivatives, leveraging a multifaceted approach that combines Density Functional Theory (DFT), AdmetSAR analysis, and molecular docking simulations to explore their electronic, pharmacokinetic, and anticancer properties. Through DFT analysis, using the B3LYP-D3BJ functional and the 6-311++G(d,p) basis set, we optimized molecular geometries, analyzed vibrational frequencies, and mapped Molecular Electrostatic Potentials (MEP), identifying key sites for electrophilic attacks and hydrogen bonding. Frontier Molecular Orbital (FMO) analysis and Density of States (DOS) plots revealed varying stability levels among the compounds, with 1b, 2b, and 3b showing slightly higher stability. Chemical potential assessments indicated differences in binding affinities, suggesting stronger potential interactions for compounds 1b and 2b. AdmetSAR analysis predicted favorable human intestinal absorption (HIA) rates for all compounds, highlighting compound 3b superior oral effectiveness. Molecular docking and molecular dynamics simulations were conducted on isoxazolidine and 4-isoxazoline derivatives targeting the EGFR receptor (PDB: 1JU6). Molecular docking simulations confirmed the high affinity of these compounds towards the target protein 1JU6, particularly compound 3b, among the isoxazolidine derivatives, compound 3b exhibited the most favorable binding energy, with a g score of -8.50 kcal/mol. Molecular dynamics simulations over 100 nanoseconds demonstrated the stability and potential of compound 3b as a superior candidate for anticancer applications, further supported by structural analyses including RMSD, RMSF, Rg, and SASA values. This study underscores the promising role of compound 3b in anticancer treatments, providing a solid foundation for future drug development and optimization efforts.

Keywords: isoxazolines, DFT, molecular docking, molecular dynamic, ADMET, drugs.

Procedia PDF Downloads 44
82 Women and Terrorism in Nigeria: Policy Templates for Addressing Complex Challenges in a Changing Democratic State

Authors: Godiya Pius Atsiya

Abstract:

One of the most devastating impacts of terrorism on the Nigerian state is the danger it has posed on women, children and other vulnerable groups. The complexity of terrorism in Nigeria, especially in most parts of Northern Nigeria has entrenched unprecedented security challenges such as refugee crisis, kidnapping, food shortages, increase in death tolls, malnutrition, fear, rape and several other psychological factors. Of particular interest in this paper as it relates to terrorism is the high rate of Internally Displaced Persons(IDPs), with women, children and the aged being the most affected. Empirical evidence arising from recent development in Nigeria’s North-East geo-political zone shows that large numbers of refugees fleeing the Boko Haram attacks have doubled. The attendant consequences of this mass exodus of people in the affected areas are that the victims now suffer untold and unwarranted economic hardship. In another dimension, recent findings have it that most powerless women and young teenage girls have been forcefully conscripted into the Islamic extremist groups and used as shields. In some respect, these groups of people have been used as available tools for suicide bombing and other criminal tendencies, the result of which can be detrimental to social cohesion and integration. This work is a theoretical insight into terrorism discourses; hence, the paper relies on existing works of scholars in carrying out the research. The paper argues that the implications of terrorism on women gender have grounding effects on the moral psyche of women who are supposed to be home managers and custodians of morality in society. The burden of terrorism and all it tends to propagate has literally upturned social lives and hence, Nigeria is gradually being plunged into the Hobesian state of nature. As a panacea to resolving this social malaise, the paper submits that government and indeed, all stakeholders in the nation’s democratic project must expedite action to nip this trend in the bud. The paper sums up with conclusion and other alternative policy measures to mitigate the challenges of terrorism in Nigeria.

Keywords: changing democratic state, policy measures, terrorism, women

Procedia PDF Downloads 230
81 Olfactometer Response of Red Palm Weevil (Rhynchophorus ferrugineus) (Coleoptera: Curculionidae) and Its Biology for the Evaluation of Resistance in the Commercially Grown Date Palm (Phoenix dactylifera L.) Cultivars in Pakistan

Authors: Mujahid Manzoor, Muhammad Shafique, Jam Nazeer Ahmad, Farman Ahmad, Muhammad Ali, Muhammad Rizwan Tariq, Shahbaz Ahmad, Muhammad Saleem Haider

Abstract:

Date palms (P. dactylifera L.) are prominent in the Kingdom of Saudi Arabia (KSA), Iran, UAE, and Iraq, as well as Algeria, Egypt, and Pakistan. Insect pests' attacks on different palm cultivars adversely affected their production in the last few decades. Pakistan ranked sixth for date production around the world. The most commercially grown cultivars are Aseel, Dhaki, Falsi, Karbalai, Mozawati, Jan Swore, Kohra, Hillawi, Kohra, and Begum Jhangi. Red palm weevils are considered as hazardous insect pests responsible for economic loss in palm orchards. This research work depicts the infestation of red palm weevils in eleven different palm cultivars (Hillawi, Mozawati, Kechanr, Aseel, Shamrani, Khudravi, Dhaki, Zeri, Kobra, Zaidi, Denda), which frequently grow in different regions of Pakistan through Y-shaped olfactometer analysis. In addition, the level of both antixenosis and antibiosis was spotted by examining the various parameters such as %age lure of weevils of mature females, general count of laid eggs in addition to their activeness. Furthermore, obtained results depicted that a positive contact was established with minimum antixenotic consequence revealed by a cultivar, “Hillawi” among most hold of RPW adults (22.32%), number of eggs laid (16.66%) and egg hatching (84.66%), while other cultivars, including Mozawati, Aseel, Kechanr, Shamrani, Khudravi, Dhaki, Zeri, and Zaidi, exhibited a greater level of antixenosis. Moreover, “Hillawi” documented the maximum number of eggs, while Kechanr, Mozawati, Aseel Kobra, and Denda showed minimum attraction by red palm weevils. Maximum red palm weevils were attracted in an olfactometer assay of sugarcane varieties.

Keywords: P. dactylifera, R. ferrugineus, olfactometer, antixenosis

Procedia PDF Downloads 113
80 Experimental Investigation on Strengthening of Timber Beam Using Glass Fibers and Steel Plates

Authors: Sisaynew Tesfaw Admassu

Abstract:

The strengthening of timber beams can be necessary for several reasons including the increase of live loads (possible in a historical building for a change of destination of use or upgrading to meet new requirements), the reduction of the resistant cross-sections following deterioration (attacks of biological agents such as fungi, and insects) or traumatic events (fires) and the excess of deflection in the members. The main purpose of strengthening an element is not merely to repair it, but also to prevent and minimize the appearance of future problems. This study did an experimental investigation on the behavior of reference and strengthened solid timber beams. The strengthening materials used in this study were CSM-450 glass fiber and steel materials for both flexural and shear strengthening techniques. Twenty-two solid timber beams of Juniperus procera (TID) species with the dimensions of 60 x 90 x 780 mm were used in the present study. The binding material to bond the strengthening materials with timber was general-purpose resin with Luperox® K10 MEKP catalyst. Three beams were used as control beams (unstrengthen beams) while the remaining nineteen beams were strengthened using the strengthening materials for flexure and shear. All the beams were tested for three points loading to failure by using a Universal Testing Machine, UTM-600kN machine. The experimental results showed that the strengthened beams performed better than the unstrengthen beams. The experimental result of flexural strengthened beams showed that the load-bearing capacity of strengthened beams increased between 16.34 – 42.55%. Four layers of Glass Fiber Reinforced polymer on the tension side of the beams was shown to be the most effective way to enhance load-bearing capacity. The strengthened beams also have an enhancement in their flexural stiffness. The stiffness of flexural strengthened beams was increased between 1.18 – 65.53% as compared to the control beams. The highest increment in stiffness has occurred on beams strengthened using 2x60 mm steel plates. The shear-strengthened beams showed a relatively small amount of performance as compared to flexural-strengthened beams; the reason is that the beams are sufficient for shear. The polyester resin used in the experimental work showed good performance in bonding agents between materials. The resin showed more effectiveness in GFRP materials than steel materials.

Keywords: heritage structures, strengthening, stiffness, adhesive, polyester resin, steel plates

Procedia PDF Downloads 70
79 Numerical Investigation of Effect of Throat Design on the Performance of a Rectangular Ramjet Intake

Authors: Subrat Partha Sarathi Pattnaik, Rajan N.K.S.

Abstract:

Integrated rocket ramjet engines are highly suitable for long range missile applications. Designing the fixed geometry intakes for such missiles that can operate efficiently over a range of operating conditions is a highly challenging task. Hence, the present study aims to evaluate the effect of throat design on the performance of a rectangular mixed compression intake for operation in the Mach number range of 1.8 – 2.5. The analysis has been carried out at four different Mach numbers of 1.8, 2, 2.2, 2.5 and two angle-of-attacks of +5 and +10 degrees. For the throat design, three different throat heights have been considered, one corresponding to a 3- external shock design and two heights corresponding to a 2-external shock design leading to different internal contraction ratios. The on-design Mach number for the study is M 2.2. To obtain the viscous flow field in the intake, the theoretical designs have been considered for computational fluid dynamic analysis. For which Favre averaged Navier- Stokes (FANS) equations with two equation SST k-w model have been solved. The analysis shows that for zero angle of attack at on-design and high off-design Mach number operations the three-ramp design leads to a higher total pressure recovery (TPR) compared to the two-ramp design at both contraction ratios maintaining same mass flow ratio (MFR). But at low off-design Mach numbers the total pressure shows an opposite trend that is maximum for the two-ramp low contraction ratio design due to lower shock loss across the external shocks similarly the MFR is higher for low contraction ratio design as the external ramp shocks move closer to the cowl. At both the angle of attack conditions and complete range of Mach numbers the total pressure recovery and mass flow ratios are highest for two ramp low contraction design due to lower stagnation pressure loss across the detached bow shock formed at the ramp and lower mass spillage. Hence, low contraction design is found to be suitable for higher off-design performance.

Keywords: internal contraction ratio, mass flow ratio, mixed compression intake, performance, supersonic flows

Procedia PDF Downloads 106
78 A Simplified Method to Assess the Damage of an Immersed Cylinder Subjected to Underwater Explosion

Authors: Kevin Brochard, Herve Le Sourne, Guillaume Barras

Abstract:

The design of a submarine’s hull is crucial for its operability and crew’s safety, but also complex. Indeed, engineers need to balance lightness, acoustic discretion and resistance to both immersion pressure and environmental attacks. Submarine explosions represent a first-rate threat for the integrity of the hull, whose behavior needs to be properly analyzed. The presented work is focused on the development of a simplified analytical method to study the structural response of a deeply immersed cylinder submitted to an underwater explosion. This method aims to provide engineers a quick estimation of the resulting damage, allowing them to simulate a large number of explosion scenarios. The present research relies on the so-called plastic string on plastic foundation model. A two-dimensional boundary value problem for a cylindrical shell is converted to an equivalent one-dimensional problem of a plastic string resting on a non-linear plastic foundation. For this purpose, equivalence parameters are defined and evaluated by making assumptions on the shape of the displacement and velocity field in the cross-sectional plane of the cylinder. Closed-form solutions for the deformation and velocity profile of the shell are obtained for explosive loading, and compare well with numerical and experimental results. However, the plastic-string model has not yet been adapted for a cylinder in immersion subjected to an explosive loading. In fact, the effects of fluid-structure interaction have to be taken into account. Moreover, when an underwater explosion occurs, several pressure waves are emitted by the gas bubble pulsations, called secondary waves. The corresponding loads, which may produce significant damages to the cylinder, must also be accounted for. The analytical developments carried out to solve the above problem of a shock wave impacting a cylinder, considering fluid-structure interaction will be presented for an unstiffened cylinder. The resulting deformations are compared to experimental and numerical results for different shock factors and different standoff distances.

Keywords: immersed cylinder, rigid plastic material, shock loading, underwater explosion

Procedia PDF Downloads 331
77 Global and Domestic Response to Boko Haram Terrorism on Cameroon 2014-2018

Authors: David Nchinda Keming

Abstract:

The present study is focused on both the national and international collective fight against Boko Haram terrorism on Cameroon and the rule played by the Lake Chad Basin Countries (LCBCs) and the global community to suffocate the sect’s activities in the region. Although countries of the Lake Chad Basin include: Cameroon, Chad, Nigeria and Niger others like Benin also joined the course. The justification for the internationalisation of the fight against Boko Haram could be explained by the ecological and international climatic importance of the Lake Chad and the danger posed by the sect not only to the Lake Chad member countries but to global armed, civil servants and the international political economy. The study, therefore, kick start with Cameroon’s reaction to Boko Haram’s terrorist attacks on its territory. It further expounds on Cameroon’s request on bilateral diplomacy from members of the UN Security Council for an international collective support to staple the winds of the challenging sect. The study relies on the hypothesis that Boko Haram advanced terrorism on Cameroon was more challenging to the domestic military intelligence thus forcing the government to seek for bilateral and multilateral international collective support to secure its territory from the powerful sect. This premise is tested internationally via (multilateral cooperation, bilateral response, regional cooperation) and domestically through (solidarity parade, religious discourse, political manifestations, war efforts, the vigilantes and the way forward). To accomplish our study, we made used of the mixed research methodologies to interpret the primary, secondary and tertiary sources consulted. Our results reveal that the collective response was effectively positive justified by the drastic drop in the sect’s operations in Cameroon and the whole LCBCs. Although the sect was incapacitated, terrorism remains an international malaise and Cameroon hosts a fertile ground for terrorists’ activism. Boko Haram was just weakened and not completely defeated and could reappear someday even under a different appellation. Therefore, to absolutely eradicate terrorism in general and Boko Haram in particular, LCBCs must improve their military intelligence on terrorism and continue to collaborate with advanced experienced countries in fighting terrorism.

Keywords: Boko Haram, terrorism, domestic, international, response

Procedia PDF Downloads 152
76 False Assumptions Made in Cybersecurity Curriculum: K-12

Authors: Nathaniel Evans, Jessica Boersma, Kenneth Kass

Abstract:

With technology and STEM fields growing every day, there is a significant projected shortfall in qualified cybersecurity workers. As such, it is essential to develop a cybersecurity curriculum that builds skills and cultivates interest in cybersecurity early on. With new jobs being created every day and an already significant gap in the job market, it is vital that educators are pro-active in introducing a cybersecurity curriculum where students are able to learn new skills and engage in an age-appropriate cyber curriculum. Within this growing world of cybersecurity, students should engage in age-appropriate technology and cybersecurity curriculum, starting with elementary school (k-5), extending through high school, and ultimately into college. Such practice will provide students with the confidence, skills, and, ultimately, the opportunity to work in the burgeoning information security field. This paper examines educational methods, pedagogical practices, current cybersecurity curricula, and other educational resources and conducts analysis for false assumptions and developmental appropriateness. It also examines and identifies common mistakes with current cyber curriculum and lessons and discuss strategies for improvement. Throughout the lessons that were reviewed, many common mistakes continued to pop up. These mistakes included age appropriateness, technology resources that were available, and consistency of student’s skill levels. Many of these lessons were written for the wrong grade levels. The ones written for the elementary level all had activities that assumed that every student in the class could read at grade level and also had background knowledge of the cyber activity at hand, which is not always the case. Another major mistake was that these lessons assumed that all schools had any kind of technology resource available to them. Some schools are 1:1, and others are only allotted three computers in their classroom where the students have to share. While coming up with a cyber-curriculum, it has to be kept in mind that not all schools are the same, not every classroom is the same. There are many students who are not reading at their grade level or have not had exposure to the digital world. We need to start slow and ease children into the cyber world. Once they have a better understanding, it will be easier to move forward with these lessons and get the students engaged. With a better understanding of common mistakes that are being made, a more robust curriculum and lessons can be created that no only spark a student’s interest in this much-needed career field but encourage learning while keeping our students safe from cyber-attacks.

Keywords: assumptions, cybersecurity, k-12, teacher

Procedia PDF Downloads 165
75 Distribution and Population Status of Canis spp. Threats and Conservation in Lehri Nature Park, Salt Range, District Jhelum

Authors: Muhammad Saad, AzherBaig, Anwar Maqsood, Muhammad Waseem

Abstract:

The grey wolf has been ranked endangered and Asiatic jackal as near threatened in Pakistan. Scientific data on population and threats to these species are not available in Pakistan, which is required for their proper management and conservation. The present study was conducted to collect data on distribution range, population status and threats to both of these Canis species in Lehri Nature Park. The data were collected using direct observations and indirect signs in the field. The population of grey wolf and Asiatic jackal were scattered into pocket of the study area and its surroundings. The current population of grey wolf was estimated 06 individuals and that of Asiatic jackal 28 individuals in the study area. The present study showed that grey wolf and Asiatic jackal were distributed in the northern and southern part of the study area having dense vegetation cover of tress and shrub between the altitudes of 330 m and 515 m. The research finding revealed that the scrub forest is the most preferred habitat of both the species but due to anthropogenic pressure the scrub forest is under severe threat. The dominant trees species were Acacia modesta, Zizyphus nummularia, and Prosopis juliflora and shrubs species of Dodonea-viscosa, Calotropis procera and Adhatoda vasica. Urial is one of the natural prey species: their population is low due to a number of reasons and therefore the maximum dependence of the wolves was on the livestock of the local and nomadic shepherds. The main prey species in the livestock was goats and sheep. The interviews were conducted with the eye witnesses of wolf attacks including livestock being killed by 5-6 numbers of wolves in different hamlets in the study area. The killing rate of the livestock by the wolves was greater when the nomadic shepherds were present in the area and decreased when they left the area. Presence of nomadic shepherds and killing rate has relation with the shifting of the wolves from the study area. It is further concluded that the population of the grey wolf and Asiatic jackal has decreased over time due to less availability of the natural prey species and habitat destruction.

Keywords: wildlife ecology, population conservation, rehabilitation, conservation

Procedia PDF Downloads 500
74 A POX Controller Module to Collect Web Traffic Statistics in SDN Environment

Authors: Wisam H. Muragaa, Kamaruzzaman Seman, Mohd Fadzli Marhusin

Abstract:

Software Defined Networking (SDN) is a new norm of networks. It is designed to facilitate the way of managing, measuring, debugging and controlling the network dynamically, and to make it suitable for the modern applications. Generally, measurement methods can be divided into two categories: Active and passive methods. Active measurement method is employed to inject test packets into the network in order to monitor their behaviour (ping tool as an example). Meanwhile the passive measurement method is used to monitor the traffic for the purpose of deriving measurement values. The measurement methods, both active and passive, are useful for the collection of traffic statistics, and monitoring of the network traffic. Although there has been a work focusing on measuring traffic statistics in SDN environment, it was only meant for measuring packets and bytes rates for non-web traffic. In this study, a feasible method will be designed to measure the number of packets and bytes in a certain time, and facilitate obtaining statistics for both web traffic and non-web traffic. Web traffic refers to HTTP requests that use application layer; while non-web traffic refers to ICMP and TCP requests. Thus, this work is going to be more comprehensive than previous works. With a developed module on POX OpenFlow controller, information will be collected from each active flow in the OpenFlow switch, and presented on Command Line Interface (CLI) and wireshark interface. Obviously, statistics that will be displayed on CLI and on wireshark interfaces include type of protocol, number of bytes and number of packets, among others. Besides, this module will show the number of flows added to the switch whenever traffic is generated from and to hosts in the same statistics list. In order to carry out this work effectively, our Python module will send a statistics request message to the switch requesting its current ports and flows statistics in every five seconds; while the switch will reply with the required information in a message called statistics reply message. Thus, POX controller will be notified and updated with any changes could happen in the entire network in a very short time. Therefore, our aim of this study is to prepare a list for the important statistics elements that are collected from the whole network, to be used for any further researches; particularly, those that are dealing with the detection of the network attacks that cause a sudden rise in the number of packets and bytes like Distributed Denial of Service (DDoS).

Keywords: mininet, OpenFlow, POX controller, SDN

Procedia PDF Downloads 234
73 The Relationship between Body Positioning and Badminton Smash Quality

Authors: Gongbing Shan, Shiming Li, Zhao Zhang, Bingjun Wan

Abstract:

Badminton originated in ancient civilizations in Europe and Asia more than 2000 years ago. Presently, it is played almost everywhere with estimated 220 million people playing badminton regularly, ranging from professionals to recreational players; and it is the second most played sport in the world after soccer. In Asia, the popularity of badminton and involvement of people surpass soccer. Unfortunately, scientific researches on badminton skills are hardly proportional to badminton’s popularity. A search of literature has shown that the literature body of biomechanical investigations is relatively small. One of the dominant skills in badminton is the forehand overhead smash, which consists of 1/5 attacks during games. Empirical evidences show that one has to adjust the body position in relation to the coming shuttlecock to produce a powerful and accurate smash. Therefore, positioning is a fundamental aspect influencing smash quality. A search of literature has shown that there is a dearth/lack of study on this fundamental aspect. The goals of this study were to determine the influence of positioning and training experience on smash quality in order to discover information that could help learn/acquire the skill. Using a 10-camera, 3D motion capture system (VICON MX, 200 frames/s) and 15-segment, full-body biomechanical model, 14 skilled and 15 novice players were measured and analyzed. Results have revealed that the body positioning has direct influence on the quality of a smash, especially on shuttlecock release angle and clearance height (passing over the net) of offensive players. The results also suggest that, for training a proper positioning, one could conduct a self-selected comfort position towards a statically hanged shuttlecock and then step one foot back – a practical reference marker for learning. This perceptional marker could be applied in guiding the learning and training of beginners. As one gains experience through repetitive training, improved limbs’ coordination would increase smash quality further. The researchers hope that the findings will benefit practitioners for developing effective training programs for beginners.

Keywords: 3D motion analysis, biomechanical modeling, shuttlecock release speed, shuttlecock release angle, clearance height

Procedia PDF Downloads 497
72 Digital Immunity System for Healthcare Data Security

Authors: Nihar Bheda

Abstract:

Protecting digital assets such as networks, systems, and data from advanced cyber threats is the aim of Digital Immunity Systems (DIS), which are a subset of cybersecurity. With features like continuous monitoring, coordinated reactions, and long-term adaptation, DIS seeks to mimic biological immunity. This minimizes downtime by automatically identifying and eliminating threats. Traditional security measures, such as firewalls and antivirus software, are insufficient for enterprises, such as healthcare providers, given the rapid evolution of cyber threats. The number of medical record breaches that have occurred in recent years is proof that attackers are finding healthcare data to be an increasingly valuable target. However, obstacles to enhancing security include outdated systems, financial limitations, and a lack of knowledge. DIS is an advancement in cyber defenses designed specifically for healthcare settings. Protection akin to an "immune system" is produced by core capabilities such as anomaly detection, access controls, and policy enforcement. Coordination of responses across IT infrastructure to contain attacks is made possible by automation and orchestration. Massive amounts of data are analyzed by AI and machine learning to find new threats. After an incident, self-healing enables services to resume quickly. The implementation of DIS is consistent with the healthcare industry's urgent requirement for resilient data security in light of evolving risks and strict guidelines. With resilient systems, it can help organizations lower business risk, minimize the effects of breaches, and preserve patient care continuity. DIS will be essential for protecting a variety of environments, including cloud computing and the Internet of medical devices, as healthcare providers quickly adopt new technologies. DIS lowers traditional security overhead for IT departments and offers automated protection, even though it requires an initial investment. In the near future, DIS may prove to be essential for small clinics, blood banks, imaging centers, large hospitals, and other healthcare organizations. Cyber resilience can become attainable for the whole healthcare ecosystem with customized DIS implementations.

Keywords: digital immunity system, cybersecurity, healthcare data, emerging technology

Procedia PDF Downloads 66
71 Outlawing Gender: A Comparative Study of Anti-Gender Studies Legislation in the U.S. and Global Contexts

Authors: Tracey Jean Boisseau

Abstract:

Recently, the rise of concerted right-wing and authoritarian movements has put feminists as well as women, queer, trans, and non-binary folk, immigrants, refugees, the global poor, and people of color in their crosshairs. The U.S. is seeing unprecedented attacks on liberal democratic institutions, escalating “culture wars,” and increased anti-intellectual vitriol specifically targeting feminist and anti-racist educators and scholars. Such vitriol has fueled new legislation curtailing or outright banning of “gender studies” for its ideological commitment to theorizing gender identity as a cultural construct and an inherently political project rather than a “natural” binary that can not be contested or interrogated. At the same time, across the globe—in Afghanistan, Argentina, Brazil, France, Haiti, Hungary, Kenya, Nicaragua, Nigeria, Pakistan, the Philippines, Poland, Russia, South Korea, Sweden, Turkey, Uganda, the United Kingdom, and elsewhere—emergent anti-feminist, nativist, and white-supremacist political parties, as well as established autocratic and authoritarian regimes, have instituted blatantly misogynistic, anti-queer, and anti-trans legislation, often accompanied by governmental and extra-governmental policies explicitly intended to marginalize, erase, suppress, or extinguish gender studies as a legitimate academic discipline, topic of research, and teaching field. This paper considers the origins and effects of such legislation -as well as the strategies exhibited by practitioners of gender studies to counter these effects and resist erasure- from a cross-cultural perspective. The research underpinning this paper’s conclusions includes a survey of nearly 2000 gender studies programs in the U.S. and interviews with dozens of gender studies scholars and administrative leaders of gender-studies programs located worldwide. The goal of this paper is to illuminate distinctions, continuities, and global connections between anti-gender studies legislation that emanates from within national borders but arises from rightwing movements that supercede those borders, and that, ultimately, require globalist responses.

Keywords: anti-feminist, anti-LGBTQ, legislation, criminalization, authoritarianism, globalization

Procedia PDF Downloads 77
70 Mechanisms of Metals Stabilization in the Soil by Biochar Material as Affected by the Low Molecular Weight Organic Acids

Authors: Md. Shoffikul Islam, Hongqing Hu

Abstract:

Immobilizing trace elements by reducing their mobility and bioavailability through amendment application, especially biochar (BC), is a cost-effective and efficient method to address their toxicity in the soil environment. However, the low molecular weight organic acids (LMWOAs) in the rhizosphere could affect BC's efficiency to immobilize trace metals as the LMWOAs could either mobilize or fix metals in the soils. Therefore, understanding the BC's and LMWOAs' interaction mechanisms on metals stabilization in the rhizosphere is crucial. The present study examined the impact of BC derived from rice husk, tartaric acid (TA), and oxalic acid (OA), and the combination of BC and TA/OA on the changes of cadmium (Cd), lead (Pb), and zinc (Zn) among their geochemical forms through incubation experiment. The changes of zeta potential and X-ray diffraction (XRD) pattern of BC and BC-amended soils to investigate the probable mechanisms of trace elements' immobilization by BC under the attacks of TA and OA were also examined. The rice husk BC at 5% (w/w) was mixed with the air-dry soil (an Anthrosols) contaminated with Cd, Pb, and Zn in the plastic pot. The TA and OA each at 2, 5, 10, and 20 mM kg-1 (w/v) were added separately into the pot. All the ingredients were mixed thoroughly with the soil. A control (CK) treatment was also prepared without BC, TA, and OA addition. After 7, 15, and 60 days of incubation with 60% (w/v) moisture level at 25 °C, the incubated soils were determined for pH and EC and were sequentially extracted to assess the metals' transformation in soil. The electronegative charges and XRD peaks of BC and BC-amended soils were also measured. The BC, low level of TA (2 mM kg-1 soil), and BC plus the low concentration of TA (BC-TA2) addition considerably declined the acid-soluble Cd, Pb, and Zn in which BC-TA2 was found to be the most effective treatment. The trends were reversed concerning the high levels of TA (>5-20 mM kg-1 soil), all levels of OA (2-20 mM kg-1 soil), and the BC plus high levels of TA/OA treatments. BC-TA2 changed the highest amounts of acid-soluble and reducible metals to the oxidizable and residual fractions with time. The most increased electronegative charges of BC-TA2 indicate its (BC-TA2) highest metals' immobilizing efficiency, probably through metals adsorption and fixation with the negative charge sites. The XRD study revealed the presence of P, O, CO32-, and Cl1- in BC, which might be responsible for the precipitation of CdCO3, pyromorphite, and hopeite concerning Cd, Pb, and Zn immobilization, respectively. The findings demonstrated that the low level of TA increased metals immobilization, while the high levels of TA and all levels of OA enhanced their mobilization. The BC-TA2 was the best treatment in stabilizing metals in soil.

Keywords: biochar, immobilization, low molecular weight organic acids, trace elements contaminated soil

Procedia PDF Downloads 80
69 Mechanical, Thermal and Biodegradable Properties of Bioplast-Spruce Green Wood Polymer Composites

Authors: A. Atli, K. Candelier, J. Alteyrac

Abstract:

Environmental and sustainability concerns push the industries to manufacture alternative materials having less environmental impact. The Wood Plastic Composites (WPCs) produced by blending the biopolymers and natural fillers permit not only to tailor the desired properties of materials but also are the solution to meet the environmental and sustainability requirements. This work presents the elaboration and characterization of the fully green WPCs prepared by blending a biopolymer, BIOPLAST® GS 2189 and spruce sawdust used as filler with different amounts. Since both components are bio-based, the resulting material is entirely environmentally friendly. The mechanical, thermal, structural properties of these WPCs were characterized by different analytical methods like tensile, flexural and impact tests, Thermogravimetric Analysis (TGA), Differential Scanning Calorimetry (DSC) and X-ray Diffraction (XRD). Their water absorption properties and resistance to the termite and fungal attacks were determined in relation with different wood filler content. The tensile and flexural moduli of WPCs increased with increasing amount of wood fillers into the biopolymer, but WPCs became more brittle compared to the neat polymer. Incorporation of spruce sawdust modified the thermal properties of polymer: The degradation, cold crystallization, and melting temperatures shifted to higher temperatures when spruce sawdust was added into polymer. The termite, fungal and water absorption resistance of WPCs decreased with increasing wood amount in WPCs, but remained in durability class 1 (durable) concerning fungal resistance and quoted 1 (attempted attack) in visual rating regarding to the termites resistance except that the WPC with the highest wood content (30 wt%) rated 2 (slight attack) indicating a long term durability. All the results showed the possibility to elaborate the easy injectable composite materials with adjustable properties by incorporation of BIOPLAST® GS 2189 and spruce sawdust. Therefore, lightweight WPCs allow both to recycle wood industry byproducts and to produce a full ecologic material.

Keywords: biodegradability, color measurements, durability, mechanical properties, melt flow index, MFI, structural properties, thermal properties, wood-plastic composites, WPCs

Procedia PDF Downloads 136
68 Real-World Vehicle to Grid: Case Study on School Buses in New England

Authors: Aaron Huber, Manoj Karwa

Abstract:

Floods, heat waves, drought, wildfires, tornadoes and other environmental disasters are a snapshot of looming national problems that can create increasing demands on the national grid. With nearly 500,000 school buses on the road and the environmental protection agency (EPA) providing nearly $1B for electric school buses, there is a solution for this national issue. Bidirectional batteries in electric school buses enable a future proof solution to sustain the power grid during adverse environmental conditions and other periods of high demand. School buses have larger batteries than standard electric vehicles. When they are not transporting students, these buses can spend peak solar hours parked and plugged into bi-directional direct current fast chargers (DCFC). A partnership with Highland Electric, Proterra and Rhombus enabled over 7 MWh of energy servicing Massachusetts and Vermont grids. The buses were part of a vehicle to grid (V2G) program with National Grid and Green Mountain Power that can charge an average American home for one month with a single bus. V2G infrastructure enables school systems to future proof their charging strategies, strengthen their local grids and can create additional revenue streams with their EV fleets. A bidirectional ecosystem with Highland, Proterra and Rhombus can enable grid resiliency or the ability to withstand power outages caused by excessive demands, natural disasters or rogue nation's attacks with no loss of service. A fleet of school buses is a standalone resilient asset that can be accessed across a city to keep its citizens safe without having any toxic fumes. Nearly 95% of all school buses across USA are powered by diesel internal combustion engines. Diesel exhaust has been classified as a human carcinogen, and it can lead to and exacerbate respiratory conditions. Bidirectional school buses and chargers enable energy justice by providing backup power in case of emergencies or high demand for marginalized communities and aim to make energy more accessible, affordable, clean, and democratically managed.

Keywords: V2G, vehicle to grid, electric buses, eBuses, DC fast chargers, DCFC

Procedia PDF Downloads 76
67 Revolution and Political Opposition in Contemporary Arabic Poetry: A Thematic Study of Two Poems by Muzaffar Al-Nawwab

Authors: Nasser Y. Athamneh

Abstract:

Muzaffar al-Nawwab (1934--) is a modern Iraqi poet, critic, and painter, well-known to Arab youth of the second half of the 20th century for his revolutionary spirit and political activism. For the greater part of his relatively long life, al-Nawwab was wanted 'dead or alive,' so to speak, by most of the Arab regimes and authorities due to his scathing, and at times unsparingly obscene attacks on them. Hence it is that the Arab masses found in his poetry the rebellious expression of their own anger and frustration, stifled by fear for their physical safety. Thus, al-Nawwab’s contemporary Arab audience loved and embraced him both as an Arab exile and as a poet. They memorized and celebrated his poems and transmitted them secretly by word of mouth and on compact cassette tapes. He himself recited his own poetry and had it recorded on compact cassette tapes for fans to smuggle from one Arab country to the other. The themes of al-Nawwab’s poems are varied, but the most predominant among them is political opposition. In most of his poems, al-Nawwab takes up politics as the major theme. Yet, he often represents it coupled with the leitmotifs of women and wine. Indeed he oscillates almost systematically between political commitment to the revolutionary cause of the masses of his nation and homeland on the one hand and love for women and wine on the other. For the persona in al-Nawwab’s poetry, love-longing for the woman and devotion to the cause of revolution and Pan-Arabism are interrelated; each of them readily evokes the other. In this paper, an attempt is made at investigating the treatment and representation of the theme of revolution and political opposition in some of al-Nawwab’s poems. This investigation will be conducted through close reading and textual analysis of representative sections of the poetic texts under consideration in the paper. The primary texts for the study are selected passages from two representative poems, namely, 'The Night Song of the Bow Strings' (Watariyyaat Layliyyah) and 'In Wine and Sorrow My Heart [Is Immersed]' (bil-khamri wa bil-huzni fu’aady). Other poems and extracts from al-Nawwab’s poetic works will be drawn upon as secondary texts to clarify the arguments in the paper and support its thesis. The discussions and textual analysis of the texts under consideration are meant to show that revolution and undaunted political opposition is a predominant theme in al-Nawwab’s poetry, often represented through the use of the leitmotifs of women and wine.

Keywords: Arabic poetry, Muzaffar al-Nawwab, politics, revolution

Procedia PDF Downloads 137
66 Efficacy of Different Soil-Applied Fungicides to Manage Phytophthora Root Rot of Chili (Solanum annum) in Pakistan

Authors: Kiran Nawaz, Ahmad Ali Shahid, Sehrish Iftikhar, Waheed Anwar, Muhammad Nasir Subhani

Abstract:

Chili (Solanum annum L.) attacks by many fungal pathogens, including members of Oomycetes which are responsible for root rot in different chili growing areas of the world. Oomycetes pathogens cause economic losses in different regions of the Pakistan. Most of the plant tissues, including roots, crowns, fruit, and leaves, are vulnerable to Phytophthora capsici. It is very difficult to manage the Phytophthora root rot of chili as many commercial varieties are tremendously vulnerable to P. capsici. The causal agent of the disease was isolated on corn meal agar (CMA) and identified on a morphological basis by using available taxonomic keys. The pathogen was also confirmed on the molecular basis through internal transcribed spacer region and with other molecular markers.The Blastn results showed 100% homology with already reported sequences of P. capsici in NCBI database. Most of the farmers have conventionally relied on foliar fungicide applications to control Phytophthora root rot in spite of their incomplete effectiveness. In this study, in vitro plate assay, seed soaking and foliar applications of 6 fungicides were evaluated against root rot of chili. In vitro assay revealed that significant inhibition of linear growth was obtained with Triflumizole at 7.0%, followed by Thiophanate methyl (8.9%), Etridiazole (6.0%), Propamocarb (5.9%) and 7.5% with Mefenoxam and Iprodione for P. capsici. The promising treatments of in vitro plate bioassay were evaluated in pot experiments under controlled conditions in the greenhouse. All fungicides were applied after at 6-day intervals. Results of pot experiment showed that all treatments considerably inhibited the percentage of P. capsici root rot incidence. In addition, application of seed soaking with all six fungicides combined with the foliar spray of the same components showed the significant reduction in root rot incidence. The combine treatments of all fungicides as in vitro bioassay, seed soaking followed by foliar spray is considered non-harmful control methods which have advantages and limitation. Hence, these applications proved effective and harmless for the management of soil-borne plant pathogens.

Keywords: blastn, bioassay, corn meal agar(CMA), oomycetes

Procedia PDF Downloads 241
65 Human Trafficking and Terrorism: A Study on the Security Challenges Imposed upon Countries in Conflict

Authors: Christopher Holroyd

Abstract:

With the various terrorist organizations and drug cartels that are currently active, there is a myriad of security concerns facing countries around the world. Organizations that focus their attacks on others through terror, such as what is seen with the Islamic State of Iraq and the Levant (ISIS), have no boundaries when it comes to doing what is needed to fulfill their desired intent. For countries such as Iraq, who have been trying to rebuild their country since the fall of the Saddam Hussein Regime, organizations such as Al-Qaeda and ISIS have been impeding the country’s efforts toward peace and stability. One method utilized by terrorist organizations around the world is human trafficking. This method is one that is seen around the world; modern slavery is still exploited by those who have no concern for human decency and morality, their only concern is to achieve their goals by any means. It is understandable that some people may not have even heard of 'modern slavery', or they just might not believe that it is even an issue in today’s world. Organizations such as ISIS are not the only ones in the world that seek to benefit from the immoral trading of humans. Various drug cartels in the world, such as those seen in Mexico and Central America, have recently begun to take part in the trade – moving humans from state to state, or country to country, to better fuel their overall operations. This now makes the possibility of human trafficking more real for those in the United States because of the proximity of the cartels to the southern border of the country. An issue that, at one time, might have only seen as a distant threat, is now close to home for those in the United States. Looking at these two examples is how we begin to understand why human trafficking is utilized by various organizations around the world. This trade of human beings and the violation of basic human rights is a plague that effects the entire world and not just those that are in a country other than your own. One of the security issues that stem from the trade includes the movement and recruitment of members of the organizations. With individuals being smuggled from one location to another in secrecy, this only puts those trying to combat this trade at a disadvantage. This creates concern over the accurate number of potential recruits, combatants, and other individuals who are working against the host nation, and for the mission of the cartel or terrorist organization they are a part of. An uphill battle is created, and the goals of peace and stability are now harder to reach. Aside from security aspects, it cannot be forgotten that those being traded and forced into slavery, are being done so against their will. Families are separated, children trained to be fighters or worse. This makes the goal of eradicating human trafficking even more dire and important.

Keywords: human trafficking, reconstruction, security, terrorism

Procedia PDF Downloads 132
64 The ‘Accompanying Spouse Dependent Visa Status’: Challenges and Constraints Faced by Zimbabwean Immigrant Women in Integration into South Africa’s Formal Labour Market

Authors: Rujeko Samanthia Chimukuche

Abstract:

Introduction: Transboundary migration at both regional and continental levels has become the defining feature of the 21st century. The recent global migration crisis due to economic strife and war brings back to the fore an old age problem, but with fresh challenges. Migration and forced displacement are issues that require long-term solutions. In South Africa, for example, whilst much attention has been placed on xenophobic attacks and other issues at the nexus of immigrant and indigenous communities, the limited focus has been placed on the integration, specifically formal labour integration of immigrant communities and the gender inequalities that are prevalent. Despite noble efforts by South Africa, hosting several immigrants, several challenges arise in integrating the migrants into society as it is often difficult to harmonize the interests of indigenous communities and those of foreign nationals. This research study has aimed to fill in the gaps by analyzing how stringent immigration and visa regulations prevent skilled migrant women spouses from employment, which often results in several societal vices, including domestic abuse, minimum or no access to important services such as healthcare, education, social welfare among others. Methods: Using a qualitative approach, the study analyzed South Africa migration and labour policies in terms of mainstreaming the gender needs of skilled migrant women. Secondly, the study highlighted the migratory experiences and constraints of skilled Zimbabwean women migrant spouses in South Africa labour integration. The experiences of these women have shown the gender inequalities of the migratory policies. Thirdly, Zimbabwean women's opportunities and/or challenges in integration into the South African formal labour market were explored. Lastly, practical interventions to support the integration of skilled migrant women spouses into South Africa’s formal labour market were suggested. Findings: Key findings show that gender dynamics are pivotal in migration patterns and the mainstreaming of gender in migration policies. This study, therefore, contributed to the fields of gender and migration by examining ways in which gender rights of skilled migrant women spouses can be incorporated in labour integration policy making.

Keywords: accompanying spouse visa, gender-migration, labour-integration, Zimbabwean women

Procedia PDF Downloads 119
63 Characterization of the Blood Microbiome in Rheumatoid Arthritis Patients Compared to Healthy Control Subjects Using V4 Region 16S rRNA Sequencing

Authors: D. Hammad, D. P. Tonge

Abstract:

Rheumatoid arthritis (RA) is a disabling and common autoimmune disease during which the body's immune system attacks healthy tissues. This results in complicated and long-lasting actions being carried out by the immune system, which typically only occurs when the immune system encounters a foreign object. In the case of RA, the disease affects millions of people and causes joint inflammation, ultimately leading to the destruction of cartilage and bone. Interestingly, the disease mechanism still remains unclear. It is likely that RA occurs as a result of a complex interplay of genetic and environmental factors including an imbalance in the microorganism population inside our body. The human microbiome or microbiota is an extensive community of microorganisms in and on the bodies of animals, which comprises bacteria, fungi, viruses, and protozoa. Recently, the development of molecular techniques to characterize entire bacterial communities has renewed interest in the involvement of the microbiome in the development and progression of RA. We believe that an imbalance in some of the specific bacterial species in the gut, mouth and other sites may lead to atopobiosis; the translocation of these organisms into the blood, and that this may lead to changes in immune system status. The aim of this study was, therefore, to characterize the microbiome of RA serum samples in comparison to healthy control subjects using 16S rRNA gene amplification and sequencing. Serum samples were obtained from healthy control volunteers and from patients with RA both prior to, and following treatment. The bacterial community present in each sample was identified utilizing V4 region 16S rRNA amplification and sequencing. Bacterial identification, to the lowest taxonomic rank, was performed using a range of bioinformatics tools. Significantly, the proportions of the Lachnospiraceae, Ruminococcaceae, and Halmonadaceae families were significantly increased in the serum of RA patients compared with healthy control serum. Furthermore, the abundance of Bacteroides and Lachnospiraceae nk4a136_group, Lachnospiraceae_UGC-001, RuminococcaceaeUCG-014, Rumnococcus-1, and Shewanella was also raised in the serum of RA patients relative to healthy control serum. These data support the notion of a blood microbiome and reveal RA-associated changes that may have significant implications for biomarker development and may present much-needed opportunities for novel therapeutic development.

Keywords: blood microbiome, gut and oral bacteria, Rheumatoid arthritis, 16S rRNA gene sequencing

Procedia PDF Downloads 130
62 Records of Lepidopteron Borers (Lepidoptera) on Stored Seeds of Indian Himalayan Conifers

Authors: Pawan Kumar, Pitamber Singh Negi

Abstract:

Many of the regeneration failures in conifers are often being attributed to heavy insect attack and pathogens during the period of seed formation and under storage conditions. Conifer berries and seed insects occur throughout the known range of the hosts and also limit the production of seed for nursery stock. On occasion, even entire seed crops are lost due to insect attacks. The berry and seeds of both the species have been found to be infected with insects. Recently, heavy damage to the berry and seeds of Juniper and Chilgoza Pine was observed in the field as well as in stored conditions, leading to reduction in the viability of seeds to germinate. Both the species are under great threat and regeneration of the species is very low. Due to lack of adequate literature, the study on the damage potential of seed insects was urgently required to know the exact status of the insect-pests attacking seeds/berries of both the pine species so as to develop pest management practices against the insect pests attack. As both the species are also under threat and are fighting for survival, so the study is important to develop management practices for the insect-pests of seeds/berries of Juniper and Chilgoza pine so as to evaluate in the nursery, as these species form major vegetation of their distribution zones. A six-year study on the management of insect pests of seeds of Chilgoza revealed that seeds of this species are prone to insect pests mainly borers. During present investigations, it was recorded that cones of are heavily attacked only by Dioryctria abietella (Lepidoptera: Pyralidae) in natural conditions, but seeds which are economically important are heavily infected, (sometimes up to 100% damage was also recorded) by insect borer, Plodia interpunctella (Lepidoptera: Pyralidae) and is recorded for the first time ‘to author’s best knowledge’ infesting the stored Chilgoza seeds. Similarly, Juniper berries and seeds were heavily attacked only by a single borer, Homaloxestis cholopis (Lepidoptera: Lecithoceridae) recorded as a new report in natural habitat as well as in stored conditions. During the present investigation details of insect pest attack on Juniper and Chilgoza pine seeds and berries was observed and suitable management practices were also developed to contain the insect-pests attack.

Keywords: borer, chilgozapine, cones, conifer, Lepidoptera, juniper, management, seed

Procedia PDF Downloads 146
61 The Efficacy of Salicylic Acid and Puccinia Triticina Isolates Priming Wheat Plant to Diuraphis Noxia Damage

Authors: Huzaifa Bilal

Abstract:

Russian wheat aphid (Diuraphis noxia, Kurdjumov) is considered an economically important wheat (Triticum aestivum L.) pest worldwide and in South Africa. The RWA damages wheat plants and reduces annual yields by more than 10%. Even though pest management by pesticides and resistance breeding is an attractive option, chemicals can cause harm to the environment. Furthermore, the evolution of resistance-breaking aphid biotypes has out-paced the release of resistant cultivars. An alternative strategy to reduce the impact of aphid damage on plants, such as priming, which sensitizes plants to respond effectively to subsequent attacks, is necessary. In this study, wheat plants at the seedling and flag leaf stages were primed by salicylic acid and isolate representative of two races of the leaf rust pathogen Puccinia triticina Eriks. (Pt), before RWA (South African RWA biotypes 1 and 4) infestation. Randomized complete block design experiments were conducted in the greenhouse to study plant-pest interaction in primed and non-primed plants. Analysis of induced aphid damage indicated salicylic acid differentially primed wheat cultivars for increased resistance to the RWASA biotypes. At the seedling stage, all cultivars were primed for enhanced resistance to RWASA1, while at the flag leaf stage, only PAN 3111, SST 356 and Makalote were primed for increased resistance. The Puccinia triticina efficaciously primed wheat cultivars for excellent resistance to RWASA1 at the seedling and flag leaf stages. However, Pt failed to enhance the four Lesotho cultivars' resistance to RWASA4 at the seedling stage and PAN 3118 at the flag leaf stage. The induced responses at the seedling and flag leaf stages were positively correlated in all the treatments. Primed plants induced high activity of antioxidant enzymes like peroxidase, ascorbate peroxidase and superoxide dismutase. High antioxidant activity indicates activation of resistant responses in primed plants (primed by salicylic acid and Puccina triticina). Isolates of avirulent Pt races can be a worthy priming agent for improved resistance to RWA infestation. Further confirmation of the priming effects needs to be evaluated at the field trials to investigate its application efficiency.

Keywords: Russian wheat aphis, salicylic acid, puccina triticina, priming

Procedia PDF Downloads 206