Search results for: coastal defense
566 Proposing a Boundary Coverage Algorithm for Underwater Sensor Network
Authors: Seyed Mohsen Jameii
Abstract:
Wireless underwater sensor networks are a type of sensor networks that are located in underwater environments and linked together by acoustic waves. The application of these kinds of network includes monitoring of pollutants (chemical, biological, and nuclear), oil fields detection, prediction of the likelihood of a tsunami in coastal areas, the use of wireless sensor nodes to monitor the passing submarines, and determination of appropriate locations for anchoring ships. This paper proposes a boundary coverage algorithm for intrusion detection in underwater sensor networks. In the first phase of the proposed algorithm, optimal deployment of nodes is done in the water. In the second phase, after the employment of nodes at the proper depth, clustering is executed to reduce the exchanges of messages between the sensors. In the third phase, the algorithm of "divide and conquer" is used to save energy and increase network efficiency. The simulation results demonstrate the efficiency of the proposed algorithm.Keywords: boundary coverage, clustering, divide and conquer, underwater sensor nodes
Procedia PDF Downloads 341565 Coherent Ku-Band Radar for Monitoring Ocean Waves
Authors: Richard Mitchell, Robert Mitchell, Thai Duong, Kyungbin Bae, Daegon Kim, Youngsub Lee, Inho Kim, Inho Park, Hyungseok Lee
Abstract:
Although X-band radar is commonly used to measure the properties of ocean waves, the use of a higher frequency has several advantages, such as increased backscatter coefficient, better Doppler sensitivity, lower power, and a smaller package. A low-power Ku-band radar system was developed to demonstrate these advantages. It is fully coherent, and it interleaves short and long pulses to achieve a transmit duty ratio of 25%, which makes the best use of solid-state amplifiers. The range scales are 2 km, 4 km, and 8 km. The minimum range is 100 m, 200 m, and 400 m for the three range scales, and the range resolution is 4 m, 8 m, and 16 m for the three range scales. Measurements of the significant wave height, wavelength, wave period, and wave direction have been made using traditional 3D-FFT methods. Radar and ultrasonic sensor results collected over an extended period of time at a coastal site in South Korea are presented.Keywords: measurement of ocean wave parameters, Ku-band radar, coherent radar, compact radar
Procedia PDF Downloads 169564 Cyber Security Enhancement via Software Defined Pseudo-Random Private IP Address Hopping
Authors: Andre Slonopas, Zona Kostic, Warren Thompson
Abstract:
Obfuscation is one of the most useful tools to prevent network compromise. Previous research focused on the obfuscation of the network communications between external-facing edge devices. This work proposes the use of two edge devices, external and internal facing, which communicate via private IPv4 addresses in a software-defined pseudo-random IP hopping. This methodology does not require additional IP addresses and/or resources to implement. Statistical analyses demonstrate that the hopping surface must be at least 1e3 IP addresses in size with a broad standard deviation to minimize the possibility of coincidence of monitored and communication IPs. The probability of breaking the hopping algorithm requires a collection of at least 1e6 samples, which for large hopping surfaces will take years to collect. The probability of dropped packets is controlled via memory buffers and the frequency of hops and can be reduced to levels acceptable for video streaming. This methodology provides an impenetrable layer of security ideal for information and supervisory control and data acquisition systems.Keywords: moving target defense, cybersecurity, network security, hopping randomization, software defined network, network security theory
Procedia PDF Downloads 185563 Investigation of Optimized Mechanical Properties on Friction Stir Welded Al6063 Alloy
Authors: Lingaraju Dumpala, Narasa Raju Gosangi
Abstract:
Friction Stir Welding (FSW) is relatively new, environmentally friendly, versatile, and widely used joining technique for soft materials such as aluminum. FSW has got a lot of attention as a solid-state joining method which avoids many common problems of fusion welding and provides an improved way of producing aluminum joints in a faster way. FSW can be used for various aerospace, defense, automotive and transportation applications. It is necessary to understand the friction stir welded joints and its characteristics to use this new joining technique in critical applications. This study investigated the mechanical properties of friction stir welded aluminum 6063 alloys. FSW is carried out based on the design of experiments using L16 mixed level array by considering tool rotational speeds, tool feed rate and tool tilt angles as process parameters. The optimization of process parameters is carried by Taguchi based regression analysis and the significance of process parameters is analyzed using ANOVA. It is observed that the considered process parameters are high influences the mechanical properties of Al6063.Keywords: FSW, aluminum alloy, mechanical properties, optimization, Taguchi, ANOVA
Procedia PDF Downloads 133562 Floating Building Potential for Adaptation to Rising Sea Levels: Development of a Performance Based Building Design Framework
Authors: Livia Calcagni
Abstract:
Most of the largest cities in the world are located in areas that are vulnerable to coastal erosion and flooding, both linked to climate change and rising sea levels (RSL). Nevertheless, more and more people are moving to these vulnerable areas as cities keep growing. Architects, engineers and policy makers are called to rethink the way we live and to provide timely and adequate responses not only by investigating measures to improve the urban fabric, but also by developing strategies capable of planning change, exploring unusual and resilient frontiers of living, such as floating architecture. Since the beginning of the 21st century we have seen a dynamic growth of water-based architecture. At the same time, the shortage of land available for urban development also led to reclaim the seabed or to build floating structures. In light of these considerations, time is ripe to consider floating architecture not only as a full-fledged building typology but especially as a full-fledged adaptation solution for RSL. Currently, there is no global international legal framework for urban development on water and there is no structured performance based building design (PBBD) approach for floating architecture in most countries, let alone national regulatory systems. Thus, the research intends to identify the technological, morphological, functional, economic, managerial requirements that must be considered in a the development of the PBBD framework conceived as a meta-design tool. As it is expected that floating urban development is mostly likely to take place as extension of coastal areas, the needs and design criteria are definitely more similar to those of the urban environment than of the offshore industry. Therefor, the identification and categorization of parameters takes the urban-architectural guidelines and regulations as the starting point, taking the missing aspects, such as hydrodynamics, from the offshore and shipping regulatory frameworks. This study is carried out through an evidence-based assessment of performance guidelines and regulatory systems that are effective in different countries around the world addressing on-land and on-water architecture as well as offshore and shipping industries. It involves evidence-based research and logical argumentation methods. Overall, this paper highlights how inhabiting water is not only a viable response to the problem of RSL, thus a resilient frontier for urban development, but also a response to energy insecurity, clean water and food shortages, environmental concerns and urbanization, in line with Blue Economy principles and the Agenda 2030. Moreover, the discipline of architecture is presented as a fertile field for investigating solutions to cope with climate change and its effects on life safety and quality. Future research involves the development of a decision support system as an information tool to guide the user through the decision-making process, emphasizing the logical interaction between the different potential choices, based on the PBBD.Keywords: adaptation measures, floating architecture, performance based building design, resilient architecture, rising sea levels
Procedia PDF Downloads 86561 The Politics of Identity and Retributive Genocidal Massacre against Chena Amhara under International Humanitarian Law
Authors: Gashaw Sisay Zenebe
Abstract:
Northern-Ethiopian conflict that broke out on 04 November 2020 between the central government and TPLF caused destruction beyond imagination in all aspects; millions of people have been killed, including civilians, mainly women, and children. Civilians have been indiscriminately attacked simply because of their ethnic or religious identity. Warrying parties committed serious crimes of international concern opposite to International Humanitarian Law (IHL). A House of People Representatives (HPR) declared that the terrorist Tigrean Defense Force (TDF), encompassing all segments of its people, waged war against North Gondar through human flooding. On Aug 30, 2021, after midnight, TDF launched a surprise attack against Chena People who had been drunk and deep slept due to the annual festivity. Unlike the lowlands, however, ENDF conjoined the local people to fight TDF in these Highland areas. This research examines identity politics and the consequential genocidal massacre of Chena, including its human and physical destructions that occurred as a result of the armed conflict. As such, the study could benefit international entities by helping them develop a better understanding of what happened in Chena and trigger interest in engaging in ensuring the accountability and enforcement of IHL in the future. Preserving fresh evidence will also serve as a starting point on the road to achieving justice either nationally or internationally. To study the Chena case evaluated against IHL rules, a combination of qualitative and doctrinal research methodology has been employed. The study basically follows a unique sampling case study which has used primary data tools such as observation, interview, key-informant interview, FGD, and battle-field notes. To supplement, however, secondary sources, including books, journal articles, domestic laws, international conventions, reports, and media broadcasts, were used to give meaning to what happened on the ground in light of international law. The study proved that the war was taking place to separate Tigray from Ethiopia. While undertaking military operations to achieve this goal, mass killings, genocidal acts, and war crimes were committed over Chena and approximate sites in the Dabat district of North Gondar. Thus, hundreds of people lost their lives to the brutalities of mass killings, hundreds of people were subjected to a forcible disappearance, and tens of thousands of people were forced into displacement. Furthermore, harsh beatings, forced labor, slavery, torture, rape, and gang rape have been reported, and generally, people are subjected to pass cruel, inhuman, and degrading treatment and punishment. Also, what is so unique is that animals were indiscriminately killed completely, making the environment unsafe for human survival because of pollution and bad smells and the consequent diseases such as Cholera, Flu, and Diarrhea. In addition to TDF, ENDF’s shelling has caused destruction to farmers’ houses & claimed lives. According to humanitarian principles, acts that can establish MACs and war crimes were perpetrated. Generally, the war in this direction has shown an absolute disrespect for international law norms.Keywords: genocide, war crimes, Tigray Defense Force, Chena, IHL
Procedia PDF Downloads 71560 Explore the New Urbanization Patterns of the Varied Terrain Inland Areas: The Case of Hubei Province
Authors: Zhan Chen, Yaping Huang, Xiao Shen, Yichun Li
Abstract:
New urbanization is a strategic fulcrum of China's future development, regional urbanization is a hot research field, different from the contiguous urbanization patterns of the eastern coastal plains and the node type urbanization patterns of the southwest mountainous areas, central inland areas has the realistic conditions of complex terrain conditions and kinds of phases, the dominant power of urbanization development, organizational power, coordination of the urbanization development and the natural environment, will be the core issue in the process of urbanization. This article starts from the characteristics of the typical urbanization development in such areas of Hubei Province, analyzing the current outstanding and typical problems in the process of urbanization in Hubei Province, and propose targeted to promote the basic ideas and implementation paths of the development of new urbanization, in order to provide experience and learn from similar cities of the development of urbanization.Keywords: varied terrain, inland area, path explore, Hubei Province
Procedia PDF Downloads 356559 The Role of Named Entity Recognition for Information Extraction
Authors: Girma Yohannis Bade, Olga Kolesnikova, Grigori Sidorov
Abstract:
Named entity recognition (NER) is a building block for information extraction. Though the information extraction process has been automated using a variety of techniques to find and extract a piece of relevant information from unstructured documents, the discovery of targeted knowledge still poses a number of research difficulties because of the variability and lack of structure in Web data. NER, a subtask of information extraction (IE), came to exist to smooth such difficulty. It deals with finding the proper names (named entities), such as the name of the person, country, location, organization, dates, and event in a document, and categorizing them as predetermined labels, which is an initial step in IE tasks. This survey paper presents the roles and importance of NER to IE from the perspective of different algorithms and application area domains. Thus, this paper well summarizes how researchers implemented NER in particular application areas like finance, medicine, defense, business, food science, archeology, and so on. It also outlines the three types of sequence labeling algorithms for NER such as feature-based, neural network-based, and rule-based. Finally, the state-of-the-art and evaluation metrics of NER were presented.Keywords: the role of NER, named entity recognition, information extraction, sequence labeling algorithms, named entity application area
Procedia PDF Downloads 80558 System Survivability in Networks
Authors: Asma Ben Yaghlane, Mohamed Naceur Azaiez
Abstract:
We consider the problem of attacks on networks. We define the concept of system survivability in networks in the presence of intelligent threats. Our setting of the problem assumes a flow to be sent from one source node to a destination node. The attacker attempts to disable the network by preventing the flow to reach its destination while the defender attempts to identify the best path-set to use to maximize the chance of arrival of the flow to the destination node. Our concept is shown to be different from the classical concept of network reliability. We distinguish two types of network survivability related to the defender and to the attacker of the network, respectively. We prove that the defender-based-network survivability plays the role of a lower bound while the attacker-based-network survivability plays the role of an upper bound of network reliability. We also prove that both concepts almost never agree nor coincide with network reliability. Moreover, we use the shortest-path problem to determine the defender-based-network survivability and the min-cut problem to determine the attacker-based-network survivability. We extend the problem to a variety of models including the minimum-spanning-tree problem and the multiple source-/destination-network problems.Keywords: defense/attack strategies, information, networks, reliability, survivability
Procedia PDF Downloads 392557 Improving Cryptographically Generated Address Algorithm in IPv6 Secure Neighbor Discovery Protocol through Trust Management
Authors: M. Moslehpour, S. Khorsandi
Abstract:
As transition to widespread use of IPv6 addresses has gained momentum, it has been shown to be vulnerable to certain security attacks such as those targeting Neighbor Discovery Protocol (NDP) which provides the address resolution functionality in IPv6. To protect this protocol, Secure Neighbor Discovery (SEND) is introduced. This protocol uses Cryptographically Generated Address (CGA) and asymmetric cryptography as a defense against threats on integrity and identity of NDP. Although SEND protects NDP against attacks, it is computationally intensive due to Hash2 condition in CGA. To improve the CGA computation speed, we parallelized CGA generation process and used the available resources in a trusted network. Furthermore, we focused on the influence of the existence of malicious nodes on the overall load of un-malicious ones in the network. According to the evaluation results, malicious nodes have adverse impacts on the average CGA generation time and on the average number of tries. We utilized a Trust Management that is capable of detecting and isolating the malicious node to remove possible incentives for malicious behavior. We have demonstrated the effectiveness of the Trust Management System in detecting the malicious nodes and hence improving the overall system performance.Keywords: CGA, ICMPv6, IPv6, malicious node, modifier, NDP, overall load, SEND, trust management
Procedia PDF Downloads 184556 Characterization and Predictors of Paranoid Ideation in Youths
Authors: Marina Sousa, Célia Barreto Carvalho, Carolina da Motta, Joana Cabral, Vera Pereira, Suzana Nunes Caldeira, Ermelindo Peixoto
Abstract:
Paranoid ideation is a common thought process that constitutes a defense against perceived social threats. The current study aimed at the characterization of paranoid ideation in youths and to explore the possible predictors involved in the development of paranoid ideations. Paranoid ideation, shame, submission, early childhood memories and current depressive, anxious and stress symptomatology was assessed in a sample of 1516 Portuguese youths. Higher frequencies of paranoid ideation were observed, particularly in females and youths from lower socio-economic status. The main predictors identified relates to submissive behaviors and adverse childhood experiences, and especially to shame feelings. The current study emphasizes that the these predictors are similar to findings in adults and clinical populations, and future implications to research and clinical practice aiming at paranoid ideations are discussed, as well as the pertinence of the study of mediating factors that allow a wider understanding of this thought process in younger populations and the prevention of psychopathology in adulthood.Keywords: adolescence, early memories, paranoid ideation, parenting styles, shame, submissiveness
Procedia PDF Downloads 500555 Co-management Organizations: A Way to Facilitate Sustainable Management of the Sundarbans Mangrove Forests of Bangladesh
Authors: Md. Wasiul Islam, Md. Jamius Shams Sowrov
Abstract:
The Sundarbans is the largest single tract of mangrove forest in the world. This is located in the southwest corner of Bangladesh. This is a unique ecosystem which is a great breeding and nursing ground for a great biodiversity. It supports the livelihood of about 3.5 million coastal dwellers and also protects the coastal belt and inland areas from various natural calamities. Historically, the management of the Sundarbans was controlled by the Bangladesh Forest Department following top-down approach without the involvement of local communities. Such fence and fining-based blue-print approach was not effective to protect the forest which caused Sundarbans to degrade severely in the recent past. Fifty percent of the total tree cover has been lost in the last 30 years. Therefore, local multi-stakeholder based bottom-up co-management approach was introduced at some of the parts of the Sundarbans in 2006 to improve the biodiversity status by enhancing the protection level of the forest. Various co-management organizations were introduced under co-management approach where the local community people could actively involve in various activities related to the management and welfare of the Sundarbans including the decision-making process to achieve the goal. From this backdrop, the objective of the study was to assess the performance of co-management organizations to facilitate sustainable management of the Sundarbans mangrove forests. The qualitative study followed face-to-face interview to collect data using two sets of semi-structured questionnaires. A total of 40 respondents participated in the research that was from eight villagers under two forest ranges. 32 representatives from the local communities as well as 8 official representatives involved in co-management approach were interviewed using snowball sampling technique. The study shows that the co-management approach improved governance system of the Sundarbans through active participation of the local community people and their interactions with the officials via the platform of co-management organizations. It facilitated accountability and transparency system to some extent through following some formal and informal rules and regulations. It also improved the power structure of the management process by fostering local empowerment process particularly the women. Moreover, people were able to learn from their interactions with and within the co-management organizations as well as interventions improved environmental awareness and promoted social learning. The respondents considered good governance as the most important factor for achieving the goal of sustainable management and biodiversity conservation of the Sundarbans. The success of co-management planning process also depends on the active and functional participation of different stakeholders including the local communities where co-management organizations were considered as the most functional platform. However, the governance system was also facing various challenges which resulted in barriers to the sustainable management of the Sundarbans mangrove forest. But still there were some members involved in illegal forest operations and created obstacles against sustainable management of the Sundarbans. Respondents recommended greater patronization from the government, financial and logistic incentives for alternative income generation opportunities with effective participatory monitoring and evaluation system to improve sustainable management of the Sundarbans.Keywords: Bangladesh, co-management approach, co-management organizations, governance, Sundarbans, sustainable management
Procedia PDF Downloads 176554 The Reconstruction of Paleoenvironment Aptian Sediments of the Massive Serdj, North Central Tunisia
Authors: H. Khaled, F. Chaabani, F. Boulvain
Abstract:
This paper focuses on the studied of Aptian series that crops out at the Jebel Serdj in the north central Tunisia. The study series is about 590 meters thick and it is consisting of limestones, marly limestones associated with some levels of siltstones and marls. Two sections are studied in detail regarding lithology, microfacies, magnetic susceptibility and mineralogical composition to provide new insights into the paleoenvironmental evolution and paleoclimatological implications during this period. The following facies associations representing different ramp palaeoenvironments have been identified: mudstone–wackestone outer ramp facies; skeletal grainstone- packstone mid-ramp facies, packstone-grainstone inner-ramp facies which include a variety of organisms such as rudists and ooids and mudstone–wackestone coastal facies rich with miliolidea and orbitolines. The magnetic susceptibility (Xᵢₙ) of all samples was compared with the lithological and microfacies variation. We show that high values of magnetic susceptibility are correlated with the distal facies.Keywords: Aptian, Serdj Formation, geochemical, mineralogy
Procedia PDF Downloads 148553 An Approach for Multilayered Ecological Networks
Authors: N. F. F. Ebecken, G. C. Pereira
Abstract:
Although networks provide a powerful approach to the study of a wide variety of ecological systems, their formulation usually does not include various types of interactions, interactions that vary in space and time, and interconnected systems such as networks. The emerging field of 'multilayer networks' provides a natural framework for extending ecological systems analysis to include these multiple layers of complexity as it specifically allows for differentiation and modeling of intralayer and interlayer connectivity. The structure provides a set of concepts and tools that can be adapted and applied to the ecology, facilitating research in high dimensionality, heterogeneous systems in nature. Here, ecological multilayer networks are formally defined based on a review of prior and related approaches, illustrates their application and potential with existing data analyzes, and discusses limitations, challenges, and future applications. The integration of multilayer network theory into ecology offers a largely untapped potential to further address ecological complexity, to finally provide new theoretical and empirical insights into the architecture and dynamics of ecological systems.Keywords: ecological networks, multilayered networks, sea ecology, Brazilian Coastal Area
Procedia PDF Downloads 155552 Deep Learning and Accurate Performance Measure Processes for Cyber Attack Detection among Web Logs
Authors: Noureddine Mohtaram, Jeremy Patrix, Jerome Verny
Abstract:
As an enormous number of online services have been developed into web applications, security problems based on web applications are becoming more serious now. Most intrusion detection systems rely on each request to find the cyber-attack rather than on user behavior, and these systems can only protect web applications against known vulnerabilities rather than certain zero-day attacks. In order to detect new attacks, we analyze the HTTP protocols of web servers to divide them into two categories: normal attacks and malicious attacks. On the other hand, the quality of the results obtained by deep learning (DL) in various areas of big data has given an important motivation to apply it to cybersecurity. Deep learning for attack detection in cybersecurity has the potential to be a robust tool from small transformations to new attacks due to its capability to extract more high-level features. This research aims to take a new approach, deep learning to cybersecurity, to classify these two categories to eliminate attacks and protect web servers of the defense sector which encounters different web traffic compared to other sectors (such as e-commerce, web app, etc.). The result shows that by using a machine learning method, a higher accuracy rate, and a lower false alarm detection rate can be achieved.Keywords: anomaly detection, HTTP protocol, logs, cyber attack, deep learning
Procedia PDF Downloads 210551 Prison Pipeline or College Pathways: Transforming the Urban Classroom
Authors: Marcia J. Watson
Abstract:
The “school-to-prison pipeline” is a widely known phenomenon within education. Although data surrounding this epidemic is daunting, we coin the term “school-to-postsecondary pipeline” to explore proactive strategies that are currently working in K-12 education for African American students. The assumption that high school graduation, postsecondary matriculation, and social success are not the assumed norms for African American youth, positions the term “school-to-postsecondary pipeline” as the newly casted advocacy term for African American educational success. Using secondary data from the Children’s Defense Fund and the U.S. Department of Education’s Office of Civil Rights, we examine current conditions of educational accessibility and attainment for African American students, and provide effective strategies for classroom teachers, administrators, and parents to use for the immediate implementation in schools. These strategies include: (a) engaging instruction, (b) relevant curriculum, and (c) utilizing useful enrichment and community resources. By providing proactive steps towards the school-to-postsecondary pipeline, we hope to counter the docility of the school-to-prison pipeline as the assumed reality for African American youth.Keywords: college access, higher education, school-to-prison pipeline, urban education reform
Procedia PDF Downloads 537550 Study of Mechanical Properties of Aluminium Alloys on Normal Friction Stir Welding and Underwater Friction Stir Welding for Structural Applications
Authors: Lingaraju Dumpala, Laxmi Mohan Kumar Chintada, Devadas Deepu, Pravin Kumar Yadav
Abstract:
Friction stir welding is the new-fangled and cutting-edge technique in welding applications; it is widely used in the fields of transportation, aerospace, defense, etc. For thriving significant welding joints and properties of friction stir welded components, it is essential to carry out this advanced process in a prescribed systematic procedure. At this moment, Underwater Friction Stir Welding (UFSW) Process is the field of interest to do research work. In the continuous assessment, the study of UFSW process is to comprehend problems occurred in the past and the structure through which the mechanical properties of the welded joints can be value-added and contributes to conclude results an acceptable and resourceful joint. A meticulous criticism is given on how to modify the experimental setup from NFSW to UFSW. It can discern the influence of tool materials, feeds, spindle angle, load, rotational speeds and mechanical properties. By expending the DEFORM-3D simulation software, the achieved outcomes are validated.Keywords: Underwater Friction Stir Welding(UFSW), Al alloys, mechanical properties, Normal Friction Stir Welding(NFSW)
Procedia PDF Downloads 288549 Tunisian Dung Beetles Fauna: Composition and Biogeographic Affinities
Authors: Imen Labidi, Said Nouira
Abstract:
Dung beetles Scarabaeides of Tunisia constitute a major component of soil fauna, especially in the Mediterranean region. In the first phase of the present study, an intensive investigation of this group following the gathering of all the bibliographic, museological data and based on a recent collection of 17020 specimens in 106 localities in Tunisia, allowed to confirm with certainty the presence of 94 species distributed in 43 genera, 4 families and 3 sub-families. Only 81 species distributed in 38 genres, 4 families, and 3 sub-families, have been found during our prospections. The population of dung beetles Scarabaeides is composed of 58% of Aphodiidae, 39.51% of Scarabaeidae, and 8.64% of Geotrupidae. Biogeographic affinities of the species were determined and showed that 42% of the identified species have a wide Palaearctic distribution, the endemism is very low, only 3 species are endemic to Tunisia Mecynodes demoflysi, Neobodilus marani, and Thorectes demoflysi, 29 species have a wide distribution, 35 are northern and 17 are southern species. Moreover, others are dependent on very specific Biotopes like Sisyphus schaefferi linked to the northwest of Tunisia and Scarabaeus semipunctatus related to the coastal area north of Tunisia.Keywords: dung beetles, Tunisia, composition, biogeography
Procedia PDF Downloads 249548 Transformations of Land Uses and Attitudes in Manavgat Region at South Turkey
Authors: Emrah Yildirim, Veli Ortacesme
Abstract:
Manavgat region, located in Antalya province at South Turkey, has hosted many civilizations throughout the centuries. All of these civilizations cultivated the land in their surroundings by engaging in agriculture, livestock production and hunting. In the last 50 years, there have been dramatic changes in the region. The economy of the region switched from the agriculture to tourism. Due to the increase in the irrigable agricultural lands, several dams were built on Manavgat River. Developments in the agricultural mechanization and new product needs have changed the pattern of agriculture and regional landscape. Coastal zone of the region has transformed to tourism areas, Manavgat Town Center has grown up and the urbanization in general has increased. The population and urbanization have increased by 257 % and 276 %, respectively. The tourism and commercial areas cover 561,8 hectares today. All these developments had some negative effects on the environment. In this study, land use/land cover transformations were studied in Manavgat region by using aerial photos. The reasons and consequences of the land use transformations were discussed, and some recommendations regarding the sustainable use of this region’s landscape will be shared.Keywords: land use, Manavgat region, south Turkey, transformation
Procedia PDF Downloads 399547 Phytoplankton Community Composition in Laguna de Terminos, Mexico, and Its Relationship to Environmental Variables
Authors: Enrique Nunez L., Maria Cortes L., Sandra Laffon L., Ana M. Cupul V.
Abstract:
The phytoplankton community composition was studied in a tropical coastal lagoon of Mexico and relationships with environmental variables were evaluated. Six sites inside the tropical Terminos Lagoon were sampled in order to determine abundances and ecological indexes for phytoplankton from May to December 2017. Water samples were also collected to determine the values of pigments, nutrients, and water solids. Results showed that the composition and abundance of the phytoplankton community were influenced by physicochemical factors, nutrients, water solids, and climate seasons. Sixty-six species were identified as potential HAB producers (44.29% from total). However, abundances were not related to the occurrence of HAB during the study. Multidimensional ANOVA indicated no significant differences between sites while some months revealed significant differences. The canonical analysis suggested that environmental variables explained 49% of community variation of potential phytoplankton species producers of HAB.Keywords: phytoplankton, environment, lagoon, biodiversity
Procedia PDF Downloads 138546 Catch Composition and Amount of Illegal and Unreported Fishing in Iranian Coastal Waters - Hormozgan Province
Authors: Yasemi Mehran, Parsa Mehran, Farzingohar Mehrnaz
Abstract:
Illegal, unreported, and unregulated (IUU) fishing has been identified as one of the most serious threats to the sustainability of the world’s fisheries. In the present study, illegal and unreported fishing of different species in waters of Persian Gulf and Oman Sea (Hormozgan province) were evaluated. Among 47 species of 33 families identified in this study, with 39 species belong to teleosts, 4 species belong to elasmobranchs and 4 species belong to invertebrate. The total weight of illegal and unreported catch were 78525.22 tonnes. Maximum and minimum values were found for Dussumiera acuta (20640.74 tonnes) and Tenualosa ilisha (0.733 tonnes), respectively. The most commercial species group was scombridae, carangidae and clupeidae, respectively. Teleosts with 91.15%, elasmobranchs with 4.82 and invertebrates with 4.03% constituted total weight of illegal and unreported fishing. Results of this study provide valuable information in order to access a sustainable management on fish resources.Keywords: catch composition, illegal, unreported fishing, Hormozgan province
Procedia PDF Downloads 297545 Coastal Hydraulic Modelling to Ascertain Stability of Rubble Mound Breakwater
Authors: Safari Mat Desa, Othman A. Karim, Mohd Kamarulhuda Samion, Saiful Bahri Hamzah
Abstract:
Rubble mound breakwater was one of the most popular designs in Malaysia, constructed at the river mouth to dissipate the incoming wave energy from the seaward. Geometrically characteristics in trapezoid, crest width, and bottom width will determine the hypotonus stability, whilst structural height was designed for wave overtopping consideration. Physical hydraulic modelling in two-dimensional facilities was instigated in the flume to test the stability as well as the overtopping rate complied with the method of similarity, namely kinematic, dynamic, and geometric. Scaling effects of wave characteristics were carried out in order to acquire significant interaction of wave height, wave period, and water depth. Results showed two-dimensional physical modelling has proven reliable capability to ascertain breakwater stability significantly.Keywords: breakwater, geometrical characteristic, wave overtopping, physical hydraulic modelling, method of similarity, wave characteristic
Procedia PDF Downloads 116544 Homology Modelling of Beta Defensin 3 of Bos taurus and Its Docking Studies with Molecules Responsible for Formation of Biofilm
Authors: Ravinder Singh, Ankita Gurao, Saroj Bandhan, Sudhir Kumar Kashyap
Abstract:
The Bos taurus Beta defensin 3 is a defensin peptide secreted by neutrophils and epithelial that exhibits anti-microbial activity. It is one of the crucial components forming an innate defense against intra mammary infections in livestock. The beta defensin 3 by virtue of its anti-microbial activity inhibits major mastitis pathogens including Staphylococcus aureus and Pseudomonas aeruginosa etc, which are also responsible for biofilm formation leading to antibiotic resistance phenomenon. Therefore, the defensin may prove as a non-conventional option to treat mastitis. In this study, computational analysis has been performed including sequence comparison among species and homology modeling of Bos taurus beta defensin 3 protein. The assessments of protein structure were done using the protein structure and model assessment tools integrated in Swiss Model server, which employs various local and global quality evaluation parameters. Further, molecular docking was also carried out between the defensin peptide and the components of biofilm to gain insight into various interactions and structural differences crucial for functionality of this protein.Keywords: beta defensin 3, bos taurus, docking, homology modeling
Procedia PDF Downloads 290543 Microplastics in Different Coastal Zone Compartments at the South-Eastern Baltic Sea
Authors: Viktorija Sabaliauskaitė, Arūnas Balčiūnas, Renata Rubavičiūtė
Abstract:
Research on microplastic pollution in aquatic environments is being conducted worldwide. This presented research focused on the South-Eastern Baltic Sea, where, due to the natural conditions, algae accumulation on beaches is common. The present conditions enabled to apply and integrate of various microplastic extraction techniques: filtration, density separation, and sample aeration in order to investigate the microplastic concentrations within different beach compartments (nearshore water reference zone, nearshore algal scum zone, beach surface sand reference zone, beach wrack zone). This study demonstrates results from a total of 496 collected samples. The comparison of microplastic mean concentrations in water-based (0,016 item/cm³) and land-based (0,29 item/cm³) samples gave a clear insight into the microplastic accumulation hot spots, which pose pollution hazards to marine ecosystems and humans.Keywords: beach wrack, marine litter, microplastics, pollution
Procedia PDF Downloads 64542 Characterization of Shorebird Populations in the Algerian Coast
Authors: Imad Eddine Rezouani, Khalil Draidi, Badis bakhouche, Selman Anes Chabani
Abstract:
The Algerian coast is an important site for wintering and migratory birds. Four species of shorebirds were surveyed, including Kentish plover Charadrius alexandrinus, Little ringed plover Charadrius dubius, Common ringed plover Charadrius hiaticula, and black-winged stilt Himantopus hilarious in three different sites, two important wetlands: Reghaia lake and Macta and a small area Sublette promenade to provide a new data about time activity budget. The study found a higher frequency of abundance in April during the study period (February to May), with a mean of 49. Estimating the temporal activity budget of these coastal birds, it was found that there were three main activities in different proportions between males and females: Pecking (29.51 %) for males, (26.59%) for females, Looking above (28.01%) for males, (19.54 %) for females And Away (9.95%) for males, (11.75%), contrarily the two previous one. Differences between study areas revealed differences in species behavior and distribution.Keywords: wetland, behavioral, algerian coast, shorebirds, time budget activity
Procedia PDF Downloads 61541 The Role of Txnrd2 Deficiency in Epithelial-to-Mesenchymal-Transition (EMT) and Tumor Formation in Pancreatic Cancer
Authors: Chao Wu
Abstract:
Thioredoxin reductase 2 is a mitochondrial enzyme that belongs to the cellular defense against oxidative stress. We deleted mitochondrial Txnrd2 in a KrasG12D-driven pancreatic tumor model. Despite an initial increase in precursor lesions, tumor incidence decreased significantly. We isolated cancer cell lines from these genetically engineered mice and observed an impaired proliferation and colony formation. Reactive Oxygen Species, as determined by DCF fluorescence, were increased. We detected a higher mitochondrial copy number in Txnrd2-deficient cells (KTP). However, measurement of mitochondrial bioenergetics showed no impairment of mitochondrial function and comparable O₂-consumption and extracellular acidification rates. In addition, the mitochondrial complex composition was affected in Txnrd2 deleted cell lines. To gain better insight into the role of Txnrd2, we deleted Txnrd2 in clones from parental KrasG12D cell lines using Crispr/Cas9 technology. The deletion was confirmed by western blot and activity assay. Interestingly, and in line with previous RNA expression analysis, we saw changes in EMT markers in Txnrd2 deleted cell lines and control cell lines. This might help us explain the reduced tumor incidence in KrasG12D; Txnrd2∆panc mice.Keywords: PDAC, TXNRD2, epithelial-to-mesenchymal-transition, ROS
Procedia PDF Downloads 122540 A Priori, Transcendental and Naturalistic Argument: Three Defense Strategies for Realism
Authors: SanXi Wu
Abstract:
A priori argument is a kind of reductio ad absurdum provided by Colin McGinn on the premise of accepting the basic rules of Dummett. The core part of the theory is to analyze the three joint positions besides realism and make them invalid, thus proving the rationality of the stance of realism. However, this argument strategy is vulnerable to skepticism because it delays the skeptical problem. In addition to McGinn, John Searle offers a linguistic transcendental argument strategy, which regards realism as the comprehensible condition that all normal activities of understanding must assume, while skepticism does not enjoy the same status. However, Searle's transcendental argument does not solve the problem of the relationship between realist presupposition and representational presupposition. Strawson, Hume, Reid, Wittgenstein, and others provide a naturalistic argument for realism. In this argument, realism is either a priori commitment from nature, or our second nature, or even a background belief that is fundamentally immovable. The key to this argument is to provide a quietistic treatment that ultimately invalidates our anti-realist myths. In comparison, the naturalistic argument is a more promising one. In this paper, methods of theoretical analysis and comparative research are used in order to demonstrate that in the face of skepticism, McGinn's a priori strategy and Searle's transcendental strategy are untenable, while Strawson and others' naturalistic strategy may resist the pressure of skepticism and make realism possible.Keywords: a priori argument, transcendental argument, naturalism, realism, skepticism
Procedia PDF Downloads 50539 The Role of Organizational Identity in Disaster Response, Recovery and Prevention: A Case Study of an Italian Multi-Utility Company
Authors: Shanshan Zhou, Massimo Battaglia
Abstract:
Identity plays a critical role when an organization faces disasters. Individuals reflect on their working identities and identify themselves with the group and the organization, which facilitate collective sensemaking under crisis situations and enable coordinated actions to respond to and recover from disasters. In addition, an organization’s identity links it to its regional community, which fosters the mobilization of resources and contributes to rapid recovery. However, identity is also problematic for disaster prevention because of its persistence. An organization’s ego-defenses system prohibits the rethink of its identity and a rigid identity obstructs disaster prevention. This research aims to tackle the ‘problem’ of identity by study in-depth a case of an Italian multi–utility which experienced the 2012 Northern Italy earthquakes. Collecting data from 11 interviews with top managers and key players in the local community and archived materials, we find that the earthquakes triggered the rethink of the organization’s identity, which got reinforced afterward. This research highlighted the importance of identity in disaster response and recovery. More importantly, it explored the solution of overcoming the barrier of ego-defense that is to transform the organization into a learning organization which constantly rethinks its identity.Keywords: community identity, disaster, identity, organizational learning
Procedia PDF Downloads 731538 Assessment of Social Vulnerability of Urban Population to Floods – a Case Study of Mumbai
Authors: Sherly M. A., Varsha Vijaykumar, Subhankar Karmakar, Terence Chan, Christian Rau
Abstract:
This study aims at proposing an indicator-based framework for assessing social vulnerability of any coastal megacity to floods. The final set of indicators of social vulnerability are chosen from a set of feasible and available indicators which are prepared using a Geographic Information System (GIS) framework on a smaller scale considering 1-km grid cell to provide an insight into the spatial variability of vulnerability. The optimal weight for each individual indicator is assigned using data envelopment analysis (DEA) as it avoids subjective weights and improves the confidence on the results obtained. In order to de-correlate and reduce the dimension of multivariate data, principal component analysis (PCA) has been applied. The proposed methodology is demonstrated on twenty four wards of Mumbai under the jurisdiction of Municipal Corporation of Greater Mumbai (MCGM). This framework of vulnerability assessment is not limited to the present study area, and may be applied to other urban damage centers.Keywords: urban floods, vulnerability, data envelopment analysis, principal component analysis
Procedia PDF Downloads 361537 Mangroves in the Douala Area, Cameroon: The Challenges of Open Access Resources for Forest Governance
Authors: Bissonnette Jean-François, Dossa Fabrice
Abstract:
The project focuses on analyzing the spatial and temporal evolution of mangrove forest ecosystems near the city of Douala, Cameroon, in response to increasing human and environmental pressures. The selected study area, located in the Wouri River estuary, has a unique combination of economic importance, and ecological prominence. The study included valuable insights by conducting semi-structured interviews with resource operators and local officials. The thorough analysis of socio-economic data, farmer surveys, and satellite-derived information was carried out utilizing quantitative approaches in Excel and SPSS. Simultaneously, qualitative data was subjected to rigorous classification and correlation with other sources. The use of ArcGIS and CorelDraw facilitated the visual representation of the gradual changes seen in various land cover classifications. The research reveals complex processes that characterize mangrove ecosystems on Manoka and Cape Cameroon Islands. The lack of regulations in urbanization and the continuous growth of infrastructure have led to a significant increase in land conversion, causing negative impacts on natural landscapes and forests. The repeated instances of flooding and coastal erosion have further shaped landscape alterations, fostering the proliferation of water and mudflat areas. The unregulated use of mangrove resources is a significant factor in the degradation of these ecosystems. Activities including the use of wood for smoking and fishing, together with the coastal pollution resulting from the absence of waste collection, have had a significant influence. In addition, forest operators contribute to the degradation of vegetation, hence exacerbating the harmful impact of invasive species on the ecosystem. Strategic interventions are necessary to guarantee the sustainable management of these ecosystems. The proposals include advocating for sustainable wood exploitation techniques, using appropriate techniques, along with regeneration, and enforcing rules to prevent wood overexploitation. By implementing these measures, the ecological balance can be preserved, safeguarding the long-term viability of these precious ecosystems. On a conceptual level, this paper uses the framework developed by Elinor Ostrom and her colleagues to investigate the consequences of open access resources, where local actors have not been able to enforce measures to prevent overexploitation of mangrove wood resources. Governmental authorities have demonstrated limited capacity to enforce sustainable management of wood resources and have not been able to establish effective relationships with local fishing communities and with communities involved in the purchase of wood. As a result, wood resources in the mangrove areas remain largely accessible, while authorities do not monitor wood volumes extracted nor methods of exploitation. There have only been limited and punctual attempts at forest restoration with no significant consequence on mangrove forests dynamics.Keywords: Mangroves, forest management, governance, open access resources, Cameroon
Procedia PDF Downloads 62