Search results for: Mujahid Abbass
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 33

Search results for: Mujahid Abbass

3 Olfactometer Response of Red Palm Weevil (Rhynchophorus ferrugineus) (Coleoptera: Curculionidae) and Its Biology for the Evaluation of Resistance in the Commercially Grown Date Palm (Phoenix dactylifera L.) Cultivars in Pakistan

Authors: Mujahid Manzoor, Muhammad Shafique, Jam Nazeer Ahmad, Farman Ahmad, Muhammad Ali, Muhammad Rizwan Tariq, Shahbaz Ahmad, Muhammad Saleem Haider

Abstract:

Date palms (P. dactylifera L.) are prominent in the Kingdom of Saudi Arabia (KSA), Iran, UAE, and Iraq, as well as Algeria, Egypt, and Pakistan. Insect pests' attacks on different palm cultivars adversely affected their production in the last few decades. Pakistan ranked sixth for date production around the world. The most commercially grown cultivars are Aseel, Dhaki, Falsi, Karbalai, Mozawati, Jan Swore, Kohra, Hillawi, Kohra, and Begum Jhangi. Red palm weevils are considered as hazardous insect pests responsible for economic loss in palm orchards. This research work depicts the infestation of red palm weevils in eleven different palm cultivars (Hillawi, Mozawati, Kechanr, Aseel, Shamrani, Khudravi, Dhaki, Zeri, Kobra, Zaidi, Denda), which frequently grow in different regions of Pakistan through Y-shaped olfactometer analysis. In addition, the level of both antixenosis and antibiosis was spotted by examining the various parameters such as %age lure of weevils of mature females, general count of laid eggs in addition to their activeness. Furthermore, obtained results depicted that a positive contact was established with minimum antixenotic consequence revealed by a cultivar, “Hillawi” among most hold of RPW adults (22.32%), number of eggs laid (16.66%) and egg hatching (84.66%), while other cultivars, including Mozawati, Aseel, Kechanr, Shamrani, Khudravi, Dhaki, Zeri, and Zaidi, exhibited a greater level of antixenosis. Moreover, “Hillawi” documented the maximum number of eggs, while Kechanr, Mozawati, Aseel Kobra, and Denda showed minimum attraction by red palm weevils. Maximum red palm weevils were attracted in an olfactometer assay of sugarcane varieties.

Keywords: P. dactylifera, R. ferrugineus, olfactometer, antixenosis

Procedia PDF Downloads 83
2 Morphological Transformation of Traditional Cities: The Case Study of the Historic Center of the City of Najaf

Authors: Sabeeh Lafta Farhan, Ihsan Abbass Jasim, Sohaib Kareem Al-Mamoori

Abstract:

This study addresses the subject of transformation of urban structures and how does this transformation affect the character of traditional cities, which represents the research issue. Hence, the research has aimed at studying and learning about the urban structure characteristics and morphological transformation features in the traditional cities centers, and to look for means and methods to preserve the character of those cities. Cities are not merely locations inhabited by a large number of people, they are political and legal entities, in addition to economic activities that distinguish these cities, thus, they are a complex set of institutions, and the transformation in urban environment cannot be recognized without understanding these relationships. The research presumes an existing impact of urbanization on the properties of traditional structure of the Holy City of Najaf. The research has defined urbanization as restructuring and re-planning of urban areas that have lost their functions and bringing them into social and cultural life in the city, to be able to serve economy in order to better respond to the needs of users. Sacred Cities provide the organic connection between acts of worship and dealings and reveal the mechanisms and reasons behind the regulatory nature of the sacred shrine and their role in achieving organizational assimilation of urban morphology. The research has reached a theoretical framework of the particulars of urbanization. This framework has been applied to the historic center of the old city of Najaf, where the most important findings of the research were that the visual and structural dominant presence of holy shrine of Imam Ali (peace be upon him) remains to emphasize the visual particularity, and the main role of the city, which hosts one of the most important Muslim shrines in the world, in addition to the visible golden dome rising above the skyline, and the Imam Ali Mosque the hub and the center for religious activities. Thus, in view of being a place of main importance and a symbol of religious and Islamic culture, it is very important to have the shrine of Imam Ali (AS) prevailing on all zones of re-development in the old city. Consequently, the research underlined that the distinctive and unique character of the city of Najaf did not proceed from nothing, but was achieved through the unrivaled characteristics and features possessed by the city of Najaf alone, which allowed it and enabled it to occupy this status among the Arab and Muslim cities. That is why the activities arising from the development have to enhance the historical role of the city in order to have this development as clear support, strength and further addition to the city assets and its cultural heritage, and not seeing the developmental activities crushing the city urban traditional fabric, cultural heritage and its historical specificity.

Keywords: Iraq, the city of Najaf, heritage, traditional cities, morphological transformation

Procedia PDF Downloads 289
1 Security Issues in Long Term Evolution-Based Vehicle-To-Everything Communication Networks

Authors: Mujahid Muhammad, Paul Kearney, Adel Aneiba

Abstract:

The ability for vehicles to communicate with other vehicles (V2V), the physical (V2I) and network (V2N) infrastructures, pedestrians (V2P), etc. – collectively known as V2X (Vehicle to Everything) – will enable a broad and growing set of applications and services within the intelligent transport domain for improving road safety, alleviate traffic congestion and support autonomous driving. The telecommunication research and industry communities and standardization bodies (notably 3GPP) has finally approved in Release 14, cellular communications connectivity to support V2X communication (known as LTE – V2X). LTE – V2X system will combine simultaneous connectivity across existing LTE network infrastructures via LTE-Uu interface and direct device-to-device (D2D) communications. In order for V2X services to function effectively, a robust security mechanism is needed to ensure legal and safe interaction among authenticated V2X entities in the LTE-based V2X architecture. The characteristics of vehicular networks, and the nature of most V2X applications, which involve human safety makes it significant to protect V2X messages from attacks that can result in catastrophically wrong decisions/actions include ones affecting road safety. Attack vectors include impersonation attacks, modification, masquerading, replay, MiM attacks, and Sybil attacks. In this paper, we focus our attention on LTE-based V2X security and access control mechanisms. The current LTE-A security framework provides its own access authentication scheme, the AKA protocol for mutual authentication and other essential cryptographic operations between UEs and the network. V2N systems can leverage this protocol to achieve mutual authentication between vehicles and the mobile core network. However, this protocol experiences technical challenges, such as high signaling overhead, lack of synchronization, handover delay and potential control plane signaling overloads, as well as privacy preservation issues, which cannot satisfy the adequate security requirements for majority of LTE-based V2X services. This paper examines these challenges and points to possible ways by which they can be addressed. One possible solution, is the implementation of the distributed peer-to-peer LTE security mechanism based on the Bitcoin/Namecoin framework, to allow for security operations with minimal overhead cost, which is desirable for V2X services. The proposed architecture can ensure fast, secure and robust V2X services under LTE network while meeting V2X security requirements.

Keywords: authentication, long term evolution, security, vehicle-to-everything

Procedia PDF Downloads 146