Search results for: conservation threats
1372 Active Cyber Defense within the Concept of NATO’s Protection of Critical Infrastructures
Authors: Serkan Yağlı, Selçuk Dal
Abstract:
Cyber-attacks pose a serious threat to all states. Therefore, states constantly seek for various methods to encounter those threats. In addition, recent changes in the nature of cyber-attacks and their more complicated methods have created a new concept: active cyber defence (ACD). This article tries to answer firstly why ACD is important to NATO and find out the viewpoint of NATO towards ACD. Secondly, infrastructure protection is essential to cyber defence. Critical infrastructure protection with ACD means is even more important. It is assumed that by implementing active cyber defence, NATO may not only be able to repel the attacks but also be deterrent. Hence, the use of ACD has a direct positive effect in all international organizations’ future including NATO.Keywords: active cyber defence, advanced persistent treat, critical infrastructure, NATO
Procedia PDF Downloads 2441371 Hidden Critical Risk in the Construction Industry’s Technological Adoption: Cybercrime
Authors: Nuruddeen Usman, Usman Mohammed Gidado, Muhammad Ahmad Ibrahim
Abstract:
Construction industry is one of the sectors that are eyeing adoption of ICT for its development due to the advancement in technology. Though, many manufacturing sectors had been using it, but construction industry was left behind, especially in the developing nation like Nigeria. On account of that, the objective of this study is to conceptually and quantitatively synthesise whether the slow adoption of ICT by the construction industries can be attributable to cybercrime threats. The result of the investigation found that, the risk of cybercrime, and lack of adequate cyber security policies that can enforce and punish defaulters are among the things that hinder ICT adoption of the Nigerian construction industries. Therefore, there is need for the nations to educate their citizens on cybercrime risk, and to establish cybercrime police units that can be monitoring and controlling all online communications.Keywords: construction industry, cybercrime, information and communication technology adoption, risk
Procedia PDF Downloads 5091370 Specification of Requirements to Ensure Proper Implementation of Security Policies in Cloud-Based Multi-Tenant Systems
Authors: Rebecca Zahra, Joseph G. Vella, Ernest Cachia
Abstract:
The notion of cloud computing is rapidly gaining ground in the IT industry and is appealing mostly due to making computing more adaptable and expedient whilst diminishing the total cost of ownership. This paper focuses on the software as a service (SaaS) architecture of cloud computing which is used for the outsourcing of databases with their associated business processes. One approach for offering SaaS is basing the system’s architecture on multi-tenancy. Multi-tenancy allows multiple tenants (users) to make use of the same single application instance. Their requests and configurations might then differ according to specific requirements met through tenant customisation through the software. Despite the known advantages, companies still feel uneasy to opt for the multi-tenancy with data security being a principle concern. The fact that multiple tenants, possibly competitors, would have their data located on the same server process and share the same database tables heighten the fear of unauthorised access. Security is a vital aspect which needs to be considered by application developers, database administrators, data owners and end users. This is further complicated in cloud-based multi-tenant system where boundaries must be established between tenants and additional access control models must be in place to prevent unauthorised cross-tenant access to data. Moreover, when altering the database state, the transactions need to strictly adhere to the tenant’s known business processes. This paper focuses on the fact that security in cloud databases should not be considered as an isolated issue. Rather it should be included in the initial phases of the database design and monitored continuously throughout the whole development process. This paper aims to identify a number of the most common security risks and threats specifically in the area of multi-tenant cloud systems. Issues and bottlenecks relating to security risks in cloud databases are surveyed. Some techniques which might be utilised to overcome them are then listed and evaluated. After a description and evaluation of the main security threats, this paper produces a list of software requirements to ensure that proper security policies are implemented by a software development team when designing and implementing a multi-tenant based SaaS. This would then assist the cloud service providers to define, implement, and manage security policies as per tenant customisation requirements whilst assuring security for the customers’ data.Keywords: cloud computing, data management, multi-tenancy, requirements, security
Procedia PDF Downloads 1561369 Effect of Waste Dumping on Groundwater Quality at Guntun Layi Funtua, Katsina State
Authors: Isiya Aminu Dabai, Adebola Kayode, Adeosun Kayode Daniel
Abstract:
Rural water supply relies mainly on groundwater exploitation, because it is more accessible, reliable, cheaper to develop and maintain, also with good quality compared to the surface water. Despite these advantages, groundwater has come under pollution threats like waste dumps, mineral exploitation, industrialization etc. This study investigates the effects of an open dumping to the surrounding groundwater. Ten hand dug well water samples were collected from the surroundings and tested. The average result shows that temperature, colour and turbidity to be 8.50 c, 6.1 TCU and 3.1 NTU respectively and pH, conductivity, total dissolved solids, chloride content and hardness to be 7.2, 4.78, 1.8, 5.7, and 3.4 respectively while in the bacteriological test well no. 1, 2, 3, and 5 shows the presence of coliforms and E. Coli bacteria.Keywords: groundwater, pollution, waste, dump site, unsafe, quality
Procedia PDF Downloads 6811368 Scientific Forecasting in International Relations
Authors: Djehich Mohamed Yousri
Abstract:
In this research paper, the future of international relations is believed to have an important place on the theoretical and applied levels because policy makers in the world are in dire need of such analyzes that are useful in drawing up the foreign policies of their countries, and protecting their national security from potential future threats, and in this context, The topic raised a lot of scientific controversy and intellectual debate, especially in terms of the extent of the effectiveness, accuracy, and ability of foresight methods to identify potential futures, and this is what attributed the controversy to the scientific foundations for foreseeing international relations. An arena for intellectual discussion between different thinkers in international relations belonging to different theoretical schools, which confirms to us the conceptual and implied development of prediction in order to reach the scientific level.Keywords: foresight, forecasting, international relations, international relations theory, concept of international relations
Procedia PDF Downloads 2141367 Palm Oil Production Sustainability in Delta State Nigeria
Authors: Omuvwie R. Ewien
Abstract:
Palm oil production in Delta State, Nigeria, is a significant economic activity. However, ensuring its sustainability is crucial to mitigate environmental impacts, promote social equity, and maintain long-term economic viability. This abstract provides an overview of palm oil production sustainability in Delta State, focusing on environmental, social, and economic aspects. In terms of environmental sustainability, the impact of palm oil plantations on deforestation and biodiversity loss is explored. The adoption of sustainable land use practices and measures to reduce greenhouse gas emissions, such as conserving high conservation value areas and utilizing methane capture systems, are highlighted. Social sustainability considerations encompass the inclusion and empowerment of smallholders, ensuring fair labor practices and community engagement. Supporting small-scale farmers, promoting fair working conditions, and investing in local infrastructure and services are identified as key strategies. Economic sustainability is emphasized through yield improvement, efficiency, and value addition. Enhancing productivity and profitability for farmers, promoting downstream processing and market diversification, and building economic resilience is crucial for long-term sustainability. Government policies, including regulatory frameworks and public-private collaborations, play a pivotal role in promoting sustainable palm oil production. Enabling policies and partnerships with industry stakeholders and NGOs facilitates the adoption of sustainable practices. Challenges such as illegal activities, the need to balance economic development with environmental conservation, and leveraging technology for sustainability are discussed. The abstract concludes by emphasizing the importance of stakeholders' commitment to prioritize sustainable palm oil production in Delta State, Nigeria, for a sustainable future.Keywords: palm oil production, environmental sustainability, community development, yield improvement, future outlook
Procedia PDF Downloads 971366 Secure Content Centric Network
Authors: Syed Umair Aziz, Muhammad Faheem, Sameer Hussain, Faraz Idris
Abstract:
Content centric network is the network based on the mechanism of sending and receiving the data based on the interest and data request to the specified node (which has cached data). In this network, the security is bind with the content not with the host hence making it host independent and secure. In this network security is applied by taking content’s MAC (message authentication code) and encrypting it with the public key of the receiver. On the receiver end, the message is first verified and after verification message is saved and decrypted using the receiver's private key.Keywords: content centric network, client-server, host security threats, message authentication code, named data network, network caching, peer-to-peer
Procedia PDF Downloads 6441365 Possible Risks for Online Orders in the Furniture Industry - Customer and Entrepreneur Perspective
Authors: Justyna Żywiołek, Marek Matulewski
Abstract:
Data, is information processed by enterprises for primary and secondary purposes as processes. Thanks to processing, the sales process takes place; in the case of the surveyed companies, sales take place online. However, this indirect form of contact with the customer causes many problems for both customers and furniture manufacturers. The article presents solutions that would solve problems related to the analysis of data and information in the order fulfillment process sent to post-warranty service. The article also presents an analysis of threats to the security of this information, both for customers and the enterprise.Keywords: ordering furniture online, information security, furniture industry, enterprise security, risk analysis
Procedia PDF Downloads 481364 Modern Information Security Management and Digital Technologies: A Comprehensive Approach to Data Protection
Authors: Mahshid Arabi
Abstract:
With the rapid expansion of digital technologies and the internet, information security has become a critical priority for organizations and individuals. The widespread use of digital tools such as smartphones and internet networks facilitates the storage of vast amounts of data, but simultaneously, vulnerabilities and security threats have significantly increased. The aim of this study is to examine and analyze modern methods of information security management and to develop a comprehensive model to counteract threats and information misuse. This study employs a mixed-methods approach, including both qualitative and quantitative analyses. Initially, a systematic review of previous articles and research in the field of information security was conducted. Then, using the Delphi method, interviews with 30 information security experts were conducted to gather their insights on security challenges and solutions. Based on the results of these interviews, a comprehensive model for information security management was developed. The proposed model includes advanced encryption techniques, machine learning-based intrusion detection systems, and network security protocols. AES and RSA encryption algorithms were used for data protection, and machine learning models such as Random Forest and Neural Networks were utilized for intrusion detection. Statistical analyses were performed using SPSS software. To evaluate the effectiveness of the proposed model, T-Test and ANOVA statistical tests were employed, and results were measured using accuracy, sensitivity, and specificity indicators of the models. Additionally, multiple regression analysis was conducted to examine the impact of various variables on information security. The findings of this study indicate that the comprehensive proposed model reduced cyber-attacks by an average of 85%. Statistical analysis showed that the combined use of encryption techniques and intrusion detection systems significantly improves information security. Based on the obtained results, it is recommended that organizations continuously update their information security systems and use a combination of multiple security methods to protect their data. Additionally, educating employees and raising public awareness about information security can serve as an effective tool in reducing security risks. This research demonstrates that effective and up-to-date information security management requires a comprehensive and coordinated approach, including the development and implementation of advanced techniques and continuous training of human resources.Keywords: data protection, digital technologies, information security, modern management
Procedia PDF Downloads 291363 The Distribution, Productivity and Conservation of Camphor Tree, Dryobalanops Aromatica in West Coast of Sumatra, Indonesia
Authors: Aswandi Anas Husin, Cut Rizlani Kholibrina
Abstract:
Harvesting camphor resin has been carried out since the beginning of civilization on the west coast of Sumatra. Oil or crystals that containing borneol are harvested from the camphor tree (Dryobalanops aromatica). Non-timber forest products are utilized for the manufacture of fragrances, antiseptics, anti-inflammatory, analgesic as well as effective for the treatment of blocked arteries. Based on exploration on the west coast of Sumatra, these endemic tree species were found remaining growing in groups on small spots in the lowlands to the hills. Some populations are found at an altitude of 700 meters above sea level in Kadabuhan, Jongkong and Sultan Daulat in Subulussalam district, Singkohor and Lake Paris in Aceh Singkil district, and Sirandorung and Manduamas in the north of Barus, Central Tapanuli district. These multi-purpose tree species was also identified as being able to adapt to the Singkil Peat Swamp. The decline in tree population has a direct impact on reducing their productivity. Conventionally, the crystals are harvested by cutting and splitting the stem into wooden blocks. In this way about 1.5-2.5 kg of crystals are obtained with various qualities. Camphor retrieval can also be done by making a notch on a standing tree trunk and collecting liquid resin (ombil) that is removed from the injured resin channel. Twigs and leaves also contain borneol. The aromatic content in this section opens opportunities for the supply of borneol through the distillation process. Vegetative propagation technology is needed to overcome the limitations of available seeds. This breeding strategy for vulnerable species starts with gathering genetic material from various provenances which are then used to support the provision of basic populations, breeding populations, multiplication populations and production populations for extensive development of camphor tree plantationsKeywords: camphor, conservation, natural borneol, productivity, vulnerable species
Procedia PDF Downloads 1251362 Managing Human-Wildlife Conflicts Compensation Claims Data Collection and Payments Using a Scheme Administrator
Authors: Eric Mwenda, Shadrack Ngene
Abstract:
Human-wildlife conflicts (HWCs) are the main threat to conservation in Africa. This is because wildlife needs overlap with those of humans. In Kenya, about 70% of wildlife occurs outside protected areas. As a result, wildlife and human range overlap, causing HWCs. The HWCs in Kenya occur in the drylands adjacent to protected areas. The top five counties with the highest incidences of HWC are Taita Taveta, Narok, Lamu, Kajiado, and Laikipia. The common wildlife species responsible for HWCs are elephants, buffaloes, hyenas, hippos, leopards, baboons, monkeys, snakes, and crocodiles. To ensure individuals affected by the conflicts are compensated, Kenya has developed a model of HWC compensation claims data collection and payment. We collected data on HWC from all eight Kenya Wildlife Service (KWS) Conservation Areas from 2009 to 2019. Additional data was collected from stakeholders' consultative workshops held in the Conservation Areas and a literature review regarding payment of injuries and ongoing insurance schemes being practiced in areas. This was followed by the description of the claims administration process and calculation of the pricing of the compensation claims. We further developed a digital platform for data capture and processing of all reported conflict cases and payments. Our product recognized four categories of HWC (i.e., human death and injury, property damage, crop destruction, and livestock predation). Personal bodily injury and human death were provided based on the Continental Scale of Benefits. We proposed a maximum of Kenya Shillings (KES) 3,000,000 for death. Medical, pharmaceutical, and hospital expenses were capped at a maximum of KES 150,000, as well as funeral costs at KES 50,000. Pain and suffering were proposed to be paid for 12 months at the rate of KES 13,500 per month. Crop damage was to be based on farm input costs at a maximum of KES 150,000 per claim. Livestock predation leading to death was based on Tropical Livestock Unit (TLU), which is equivalent to KES 30,000, whick includes Cattle (1 TLU = KES 30,000), Camel (1.4 TLU = KES 42,000), Goat (0.15 TLU = 4,500), Sheep (0.15 TLU = 4,500), and Donkey (0.5 TLU = KES 15,000). Property destruction (buildings, outside structures and harvested crops) was capped at KES 150,000 per any one claim. We conclude that it is possible to use an administrator to collect data on HWC compensation claims and make payments using technology. The success of the new approach will depend on a piloting program. We recommended that a pilot scheme be initiated for eight months in Taita Taveta, Kajiado, Baringo, Laikipia, Narok, and Meru Counties. This will test the claims administration process as well as harmonize data collection methods. The results of this pilot will be crucial in adjusting the scheme before country-wide roll out.Keywords: human-wildlife conflicts, compensation, human death and injury, crop destruction, predation, property destruction
Procedia PDF Downloads 551361 The Extent of Land Use Externalities in the Fringe of Jakarta Metropolitan: An Application of Spatial Panel Dynamic Land Value Model
Authors: Rahma Fitriani, Eni Sumarminingsih, Suci Astutik
Abstract:
In a fast growing region, conversion of agricultural lands which are surrounded by some new development sites will occur sooner than expected. This phenomenon has been experienced by many regions in Indonesia, especially the fringe of Jakarta (BoDeTaBek). Being Indonesia’s capital city, rapid conversion of land in this area is an unavoidable process. The land conversion expands spatially into the fringe regions, which were initially dominated by agricultural land or conservation sites. Without proper control or growth management, this activity will invite greater costs than benefits. The current land use is the use which maximizes its value. In order to maintain land for agricultural activity or conservation, some efforts are needed to keep the land value of this activity as high as possible. In this case, the knowledge regarding the functional relationship between land value and its driving forces is necessary. In a fast growing region, development externalities are the assumed dominant driving force. Land value is the product of the past decision of its use leading to its value. It is also affected by the local characteristics and the observed surrounded land use (externalities) from the previous period. The effect of each factor on land value has dynamic and spatial virtues; an empirical spatial dynamic land value model will be more useful to capture them. The model will be useful to test and to estimate the extent of land use externalities on land value in the short run as well as in the long run. It serves as a basis to formulate an effective urban growth management’s policy. This study will apply the model to the case of land value in the fringe of Jakarta Metropolitan. The model will be used further to predict the effect of externalities on land value, in the form of prediction map. For the case of Jakarta’s fringe, there is some evidence about the significance of neighborhood urban activity – negative externalities, the previous land value and local accessibility on land value. The effects are accumulated dynamically over years, but they will fully affect the land value after six years.Keywords: growth management, land use externalities, land value, spatial panel dynamic
Procedia PDF Downloads 2561360 Methods and Techniques for Lower Danube Sturgeon Monitoring Used for the Assessment of Anthropic Activities Pressures and the Quantification of Risks on These Species
Authors: Gyorgy Deak, Marius C. Raischi, Lucian P. Georgescu, Tiberius M. Danalache, Elena Holban, Madalina G. Boboc, Monica Matei, Catalina Iticescu, Marius V. Olteanu, Stefan Zamfir, Gabriel Cornateanu
Abstract:
At present, on the Lower Danube, different types of pressures have been identified that affect the anadromous sturgeons stocks with an impact that leads to their decline. This paper presents techniques and procedures used by Romanian experts in the tagging and monitoring of anadromous sturgeons, as well as unique results at international level obtained on the basis of an informational volume collected in over 7 years of monitoring on these species behavior (both for adults as well as for ultrasonically tagged juveniles) on the Lower Danube. The local impact of hydrotechnical constructions (bottom sill, maritime navigation channel), the global impact of the poaching phenomenon and the impact of the restocking programs with sturgeon juveniles were assessed. Thus, the bottom sill impact on the Bala branch, the Bastroe Channel (cross-border impact) and the poaching phenomenon at the level of the Lower Danube was analyzed on the basis of a unique informational volume obtained through the use of patented monitoring systems by the Romanian experts (DKTB respectively, DKMR-01T). At the same time, the results from the monitoring of ultrasonically tagged sturgeon juveniles from the 2015 repopulation program are presented. Conclusions resulting from research can ensure favorable premises for finding some conservation solutions for CITES-protected sturgeon species that have survived for millions of years, currently being 1 species on the brink of extinction - Russian sturgeon, 2 species in danger of extinction - Beluga sturgeon and Stellate sturgeon and 2 species already extinct from the Lower Danube, namely common sturgeon and ship sturgeon.Keywords: Lower Danube, sturgeons monitoring (adults and juveniles), tagging, impact on conservation
Procedia PDF Downloads 2401359 Information Technology in Assessing Risks and Threats in the Transition of the Brand to the Digital Environment
Authors: Spanova Yerkezhan, Amantay Ayan, Alimzhanova Laura
Abstract:
This article discusses the concept of rebranding and its relationship to cybersecurity. Rebranding is the process of changing the appearance and image of a company or organization in order to appeal to new customers or change the perception of a company. It can be a powerful tool for businesses looking to renew their reputation or expand into new markets. In today's digital age, companies increasingly rely on technology and the internet to conduct business; rebranding can also present significant cybersecurity risks. This is because a rebranding effort can create new vulnerabilities for companies, particularly in terms of their online presence. This article explores the potential hazards associated with rebranding and provides recommendations for mitigating those risks. It also highlights the importance of considering cybersecurity in the rebranding process and how it can be integrated into the overall strategy for a successful and secure rebranding.Keywords: rebranding, cybersecurity, cyberattack, logo, vulnerability
Procedia PDF Downloads 1661358 Modeling of Leaks Effects on Transient Dispersed Bubbly Flow
Authors: Mohand Kessal, Rachid Boucetta, Mourad Tikobaini, Mohammed Zamoum
Abstract:
Leakage problem of two-component fluids flow is modeled for a transient one-dimensional homogeneous bubbly flow and developed by taking into account the effect of a leak located at the middle point of the pipeline. The corresponding three conservation equations are numerically resolved by an improved characteristic method. The obtained results are explained and commented in terms of physical impact on the flow parameters.Keywords: fluid transients, pipelines leaks, method of characteristics, leakage problem
Procedia PDF Downloads 4791357 A Review Paper for Detecting Zero-Day Vulnerabilities
Authors: Tshegofatso Rambau, Tonderai Muchenje
Abstract:
Zero-day attacks (ZDA) are increasing day by day; there are many vulnerabilities in systems and software that date back decades. Companies keep discovering vulnerabilities in their systems and software and work to release patches and updates. A zero-day vulnerability is a software fault that is not widely known and is unknown to the vendor; attackers work very quickly to exploit these vulnerabilities. These are major security threats with a high success rate because businesses lack the essential safeguards to detect and prevent them. This study focuses on the factors and techniques that can help us detect zero-day attacks. There are various methods and techniques for detecting vulnerabilities. Various companies like edges can offer penetration testing and smart vulnerability management solutions. We will undertake literature studies on zero-day attacks and detection methods, as well as modeling approaches and simulations, as part of the study process.Keywords: zero-day attacks, exploitation, vulnerabilities
Procedia PDF Downloads 1021356 Enhancing Human Security Through Conmprehensive Counter-terrorism Measures
Authors: Alhaji Khuzaima Mohammed Osman, Zaeem Sheikh Abdul Wadudi Haruna
Abstract:
This article aims to explore the crucial link between counter-terrorism efforts and the preservation of human security. As acts of terrorism continue to pose significant threats to societies worldwide, it is imperative to develop effective strategies that mitigate risks while safeguarding the rights and well-being of individuals. This paper discusses key aspects of counter-terrorism and human security, emphasizing the need for a comprehensive approach that integrates intelligence, prevention, response, and resilience-building measures. By highlighting successful case studies and lessons learned, this article provides valuable insights for policymakers, law enforcement agencies, and practitioners in their quest to address terrorism and foster human security.Keywords: human security, risk mitigation, terrorist activities, civil liberties
Procedia PDF Downloads 881355 Phoenix dactylifera Ecosystem in Morocco: Ecology, Socio Economic Role and Constraints to Its Development
Authors: Mohammed Sghir Taleb
Abstract:
Introduction The date palm (Phoenix dactylifera L.) represents an essential element of the oasis ecosystem for Saharan and pre-Saharan regions of Morocco. It plays an important role, not only due to its economic importance, but also its ecological adaptation to, firstly, to ensure necessary protection for crops against underlying warm and dry sales, and secondly to contribute to the fight against desertification. This is one of the oldest cultivated plant species best adapted to difficult climatic conditions of the Saharan and pre-Saharan regions, because of its ecological requirements and economically most suitable for investing in oasis agriculture. Methodology The methodology is mainly based on a literature review of principal theses and projects for the conservation of flora and vegetation. Results The date palm has multiple uses. Indeed, it produces fruits rich in nutrients, provides a multitude of secondary products and generates needed revenue for the survival of oasis populations. In Morocco, the development and modernization of the date palm sector face, both upstream and downstream of the industry, several major constraints. In addition to climate constraints (prolonged drought), in its environment (lack of water resources), to the incessant invasion of disease Bayoud, Moroccan palm ecosystem suffers from a low level of technical and traditional practices prevail and traditional, from the choice of variety and site preparation up to harvesting and recycling of products. Conclusion The date palm plays an important role in the socioeconomic development of local and national level. However, this ecosystem however, is subject to numerous degradation factors caused by anthropogenic action and climate change. to reverse the trends, several programs have been developed by Morocco for the restoration of degraded areas and the development of the Phoenix dactylifera ecosystem to meet the needs of local populations and the development of the national economy.Keywords: efforts, flora, ecosystem, forest, conservation, Morocco
Procedia PDF Downloads 871354 Long-Term Conservation Tillage Impact on Soil Properties and Crop Productivity
Authors: Danute Karcauskiene, Dalia Ambrazaitiene, Regina Skuodiene, Monika Vilkiene, Regina Repsiene, Ieva Jokubauskaite
Abstract:
The main ambition for nowadays agriculture is to get the economically effective yield and to secure the soil ecological sustainability. According to the effect on the main soil quality indexes, tillage systems may be separated into two types, conventional and conservation tillage. The goal of this study was to determine the impact of conservation and conventional primary soil tillage methods and soil fertility improvement measures on soil properties and crop productivity. Methods: The soil of the experimental site is Dystric Glossic Retisol (WRB 2014) with texture of sandy loam. The trial was established in 2003 in the experimental field of crop rotation of Vėžaičiai Branch of Lithuanian Research Centre for Agriculture and Forestry. Trial factors and treatments: factor A- primary soil tillage in (autumn): deep ploughing (20-25cm), shallow ploughing (10-12cm), shallow ploughless tillage (8-10cm); factor B – soil fertility improvement measures: plant residues, plant residues + straw, green manure 1st cut + straw, farmyard manure 40tha-1 + straw. The four - course crop rotation consisted of red clover, winter wheat, spring rape and spring barley with undersown. Results: The tillage had no statistically significant effect on topsoil (0-10 cm) pHKCl level, it was 5.5 - 5.7. During all experiment period, the highest soil pHKCl level (5.65) was in the shallow ploughless tillage. The organic fertilizers particularly the biomass of grass and farmyard manure had tendency to increase the soil pHKCl. The content of plant - available phosphorus and potassium significantly increase in the shallow ploughing compared with others tillage systems. The farmyard manure increases those elements in whole arable layer. The dissolved organic carbon concentration was significantly higher in the 0 - 10 cm soil layer in the shallow ploughless tillage compared with deep ploughing. After the incorporation of clover biomass and farmyard manure the concentration of dissolved organic carbon increased in the top soil layer. During all experiment period the largest amount of water stable aggregates was determined in the soil where the shallow ploughless tillage was applied. It was by 12% higher compared with deep ploughing. During all experiment time, the soil moisture was higher in the shallow ploughing and shallow ploughless tillage (9-27%) compared to deep ploughing. The lowest emission of CO2 was determined in the deep ploughing soil. The highest rate of CO2 emission was in shallow ploughless tillage. The addition of organic fertilisers had a tendency to increase the CO2 emission, but there was no statistically significant effect between the different types of organic fertilisers. The crop yield was larger in the deep ploughing soil compared to the shallow and shallow ploughless tillage.Keywords: reduced tillage, soil structure, soil pH, biological activity, crop productivity
Procedia PDF Downloads 2671353 The Community Structure of Fish and its Correlation with Mangrove Forest Litter Production in Panjang Island, Banten Bay, Indonesia
Authors: Meilisha Putri Pertiwi, Mufti Petala Patria
Abstract:
Mangrove forest often categorized as a productive ecosystem in trophic water and the highest carbon storage among all the forest types. Mangrove-derived organic matter determines the food web of fish and invertebrates. In Indonesia trophic water ecosystem, 80% commersial fish caught in coastal area are high related to food web in mangrove forest ecosystem. Based on the previous research in Panjang Island, Bojonegara, Banten, Indonesia, removed mangrove litterfall to the sea water were 9,023 g/m³/s for two stations (west station–5,169 g/m³/s and north station-3,854 g/m³/s). The vegetation were dominated from Rhizophora apiculata and Rhizopora stylosa. C element is the highest content (27,303% and 30,373%) than N element (0,427% and 0,35%) and P element (0,19% and 0,143%). The aim of research also to know the diversity of fish inhabit in mangrove forest. Fish sampling is by push net. Fish caught are collected into plastics, total length measured, weigh measured, and individual and total counted. Meanwhile, the 3 modified pipes (1 m long, 5 inches diameter, and a closed one hole part facing the river by using a nylon cloth) set in the water channel connecting mangrove forest and sea water for each stasiun. They placed for 1 hour at low tide. Then calculate the speed of water flow and volume of modified pipes. The fish and mangrove litter will be weigh for wet weight, dry weight, and analyze the C, N, and P element content. The sampling data will be conduct 3 times of month in full moon. The salinity, temperature, turbidity, pH, DO, and the sediment of mangrove forest will be measure too. This research will give information about the fish diversity in mangrove forest, the removed mangrove litterfall to the sea water, the composition of sediment, the total element content (C, N, P) of fish and mangrove litter, and the correlation of element content absorption between fish and mangrove litter. The data will be use for the fish and mangrove ecosystem conservation.Keywords: fish diversity, mangrove forest, mangrove litter, carbon element, nitrogen element, P element, conservation
Procedia PDF Downloads 4851352 Role of Community Based Forest Management to Address Climate Change Problem: A Case of Nepalese Community Forestry
Authors: Bikram Jung Kunwar
Abstract:
Forests have central roles in climate change. The conservation of forests sequestrates the carbon from the atmosphere and also regulates the carbon cycle. However, knowingly and unknowingly the world’s forests were deforested and degraded annually at the rate of 0.18% and emitted the carbon to the atmosphere. The IPCC reports claimed that the deforestation and forest degradation accounts 1/5th of total carbon emission, which is second position after fossil fuels. Since 1.6 billion people depend on varying degree on forests for their daily livelihood, not all deforestation are undesirable. Therefore, to conserve the forests and find the livelihood opportunities for forest surrounding people is prerequisites to address the climate change problems especially in developing countries, and also a growing concern to the forestry sector researchers, planners and policy makers. The study examines the role of community based forest management in carbon mitigation and adaptation taking the examples of Nepal’s community forestry program. In the program, the government hands over a part of national forests to the local communities with sole forest management authorities. However, the government itself retained the ownership rights of forestland. Local communities organized through a local institution called Community Forest User Group (CFUG) managed the forests. They also formed an operational plan with technical prescriptions and a constitution with forest management rules and regulations. The implementation results showed that the CFUGs are not only found effective to organize the local people and construct a local institution to forest conservation and management activities, but also they are able to collect a community fund from the sale of forest products and carried out various community development activities. These development activities have decisive roles to improve the livelihood of forest surrounding people and eventually to address the climate change problems.Keywords: climate change, community forestry, local institution, Nepal
Procedia PDF Downloads 3011351 Ecolodging as an Answer for Sustainable Development and Successful Resource Management: The Case of North West Coast in Alexandria
Authors: I. Elrouby
Abstract:
The continued growth of tourism in the future relies on maintaining a clean environment by achieving sustainable development. The erosion and degradation of beaches, the deterioration of coastal water quality, visual pollution of coastlines by massive developments, all this has contributed heavily to the loss of the natural attractiveness for tourism. In light of this, promoting the concept of sustainable coastal development is becoming a central goal for governments and private sector. An ecolodge is a small hotel or guesthouse that incorporates local architectural, cultural and natural characteristics, promotes environmental conservation through minimizing the use of waste and energy and produces social and economic benefits for local communities. Egypt has some scattered attempts in some areas like Sinai in the field of ecolodging. This research tends to investigate the potentials of the North West Coast (NWC) in Alexandria as a new candidate for ecolodging investments. The area is full of primitive natural and man-made resources. These, if used in an environmental-friendly way could achieve cost reductions as a result of successful resource management for investors on the one hand, and coastal preservation on the other hand. In-depth interviews will be conducted with stakeholders in the tourism sector to examine their opinion about the potentials of the research area for ecolodging developments. The candidates will be also asked to rate the importance of the availability of certain environmental aspects in such establishments such as the uses of resources that originate from local communities, uses of natural power sources, uses of an environmental-friendly sewage disposal, forbidding the use of materials of endangered species and enhancing cultural heritage conservation. The results show that the area is full of potentials that could be effectively used for ecolodging investments. This if efficiently used could attract ecotourism as a supplementary type of tourism that could be promoted in Alexandria aside cultural, recreational and religious tourism.Keywords: Alexandria, ecolodging, ecotourism, sustainability
Procedia PDF Downloads 2001350 A Prospective Review of Axillary Drainage in Axillary Lymph Node Dissection in Breast Conservation Cancer Surgery
Authors: Ruqayya Naheed Khan, Romaisa Shamim, Awais Amjad Malik, Awais Naeem, Amina Iqbal Khan, Asad Parvaiz
Abstract:
Objective: Patients undergoing axillary lymph node dissection (ALND) for metastatic lymph nodes in our hospital usually have drains placed in their axilla for a period of 6-10 days. We evaluated the post-op course of patients who underwent breast conservation surgery (BCS) along with ALND. Methods: A prospective cohort study was conducted at Shaukat Khanam Memorial Cancer Hospital from April 2017 to August 2017 including all lymph node positive breast cancer patients undergoing BCS with ALND. Patients were divided into two groups. Group A had no axillary drain while in Group B a drain was placed in axilla. Results: A total of 76 patients were included. 41 patients were included in group A and 35 patients in Group B. Median number of LNs dissected in group A was 17 and in group B was 15 (p value 0.443). Median operative time in group A was 84 min and in group B was 79 min (p value 0.223). Median hospital stay in both groups was 1 day (p value 0.78). At 2 weeks all patients in group A developed seroma as compared to none in group B (p value < 0.001). 3 of these patients in group A required aspiration of seroma due to pressure effects. Rest were managed conservatively. At 6 weeks only 50% patients had a seroma radiologically in Group A as compared to 33% in group B (p value 0.023). No intervention was required in any patients at week 6. QOL at 2 weeks was much better in Group A (7/41 patients had unsatisfactory response) as compared to group B (10/31 had unsatisfactory response). Results were statistically significant (p value 0.045). However, there wasn’t much difference in QOL at 6 weeks. Only 1 patient in group A had an unsatisfactory response. Average pain score at 2 weeks was similar in both groups (4.2 v/s 4.1 p value 0.73). Infection was seen in 1 patient in each group at 2 weeks (p value 0.668) and in only 1 patient in group A at 6 weeks (p value 0.067). Conclusion: We conclude from our study that there isn’t much difference in drain and no drain group in terms of wound infection and pain scores. No drain group is however associated with a better QOL in early post-op period.Keywords: axillary drainage, axillary lymph node dissection, breast cancer, no drain in axilla
Procedia PDF Downloads 1901349 Experiences and Perspectives of Jewish Heritage Conservation and Promotion in Oradea and Timişoara, Western Romania
Authors: Andrea Corsale
Abstract:
The historical and geographical regions of Banat and Crişana in Western Romania have long been characterized by a high degree of ethnic diversity. However, this traditionally complex cultural, linguistic, and religious mosaic has undergone a progressive simplification during the past century due to deportations, emigration, and assimilation, and both regions now have a large Romanian-speaking majority population. This contribution focuses on Jewish heritage in the two largest cities of these two regions, Timişoara (Banat) and Oradea (Crişana). The two cities shared some historical events but also went through different experiences, despite their relative geographic proximity. The Jewish community of Timişoara survived the Holocaust basically intact, an almost unique case in Central-Eastern Europe, but largely left the city after the war. Instead, the Jewish community of Oradea was almost completely deported and killed in Auschwitz, and a renewed post-war community gradually emigrated abroad in the following decades. The two Jewish communities are now very small in size but inherited a vast tangible and intangible heritage (synagogues, cemeteries, community buildings, characteristic architecture, memories, local traditions, and histories), partially restored and recovered in recent years. The author’s fieldwork shows that local Jewish stakeholders are aware of the potential of this heritage in terms of cultural and economic benefits, but significant weaknesses and concerns exist, as the small dimension of these communities, and their financial constraints, challenge their future role in the eventual promotion and management of this heritage, which is now basically in the hands of the non-Jewish public and private stakeholders. Projects, experiences, and views related to Jewish heritage conservation and promotion in these two contexts will be portrayed and analysed in order to contribute to a broader discussion on representations and narratives of minority heritage within cultural tourism development dynamics.Keywords: Jewish heritage, ethnic minorities, heritage tourism, Romania
Procedia PDF Downloads 1091348 CSR Practices in Bali: An Exploratory Study on the Environmental Aspect
Authors: Trianasari, Gede Adi Yuniarta
Abstract:
The tourism industry has been widely recognized as one of the world’s largest industries and is expected to have continuous growth. While it has positive impacts especially on the job markets and economic aspect, this industry also brings serious environmental impacts that may not be neglected. As such, the tourism industry is faced with increasing demands and challenges to deal with the environmental issues. Corporate Social Responsibility (CSR) is a way to show the firms’ concern on the societal and environmental aspects. In line with the increasing pressure on such responsibilities, a growing number of firms have involved in CSR activities. In Bali, the majority of both chained and locally owned hotels have shown their efforts on CSR practices. However, little is known about what and how they perform or implement such program especially within the environmental aspect. The importance of understanding what they focus on lays in the identification of areas that have received sufficient treatment and those that require more attention. Furthermore, also, it is especially essential considering that Bali is one of the worldly known destinations that have been facing numerous crucial issues on environment that may threaten the sustainability of the island and its people. This paper reports on the results of a study exploring the practices of CSR in hotels in Bali. Data were collected from 49 hotel managers and human resource managers in Bali across four major tourist areas, using semi structured interview method. The analysis was conducted qualitatively. The results showed that all hotels under study have implemented CSR activities in which environment was found to be the second key aspect, following the activities directly related to community aspect. Moreover, there were five major types of environmental action identified: beach cleaning, replantation, marine conservation, turtle conservation, mangrove, and garbage management. These findings suggest that hotels in Bali under study have shown their concern on the environment, however, less attention was given on attempt to reduce the environmental impacts of their operations. Mapping the types of environmental related CSR activities enhances the knowledge of and gives lights into the CSR literature especially from the perspective of Eastern practice.Keywords: CSR, exploratory study, sustainable tourism, tourist object
Procedia PDF Downloads 1681347 Pattern in Splitting Sequence in Okike’s Merged Irregular Transposition Cipher for Encrypting Cyberspace Messages
Authors: Okike Benjamin, E. J. D. Garba
Abstract:
The protection of sensitive information against unauthorized access or fraudulent changes has been of prime concern throughout the centuries. Modern communication techniques, using computers connected through networks, make all data even more vulnerable to these threats. The researchers in this work propose a new encryption technique to be known as Merged Irregular Transposition Cipher. In this proposed encryption technique, a message to be encrypted will first of all be split into multiple parts depending on the length of the message. After the split, different keywords are chosen to encrypt different parts of the message. After encrypting all parts of the message, the positions of the encrypted message could be swapped to other position thereby making it very difficult to decrypt by any unauthorized user.Keywords: information security, message splitting, pattern, sequence
Procedia PDF Downloads 2881346 Assessing Lithium Recovery from Secondary Sources
Authors: Carolina A. Santos, Alexandra B. Ribeiro
Abstract:
Climate change and environmental degradation are threats to humanity. Europe has been addressing these problems, namely through the Green Deal, with the use of batteries in mobility and energy fields. However, these require the use of critical raw materials, like lithium, which demand is estimated to grow 60 times in the next 30 years. Thus, it is fundamental to promote a circular economy with lithium recovery from secondary resources. These are nowadays key topics, which will be even more relevant in the future, so a new way to approach them is needed and must be encouraged. Therefore, one of our main goals is to analyse two methods of lithium retrieval from secondary sources, bioleaching, and electrodialysis, and assess them regarding their sustainability. The latest results show good efficiency of removal with both methods, even though there are some matrix interferences. Hence, further investment and research are needed in order to make this process sustainable and our society more circular.Keywords: lithium, sustainable mining, social license to operate, bioleaching, electrodialysis
Procedia PDF Downloads 1301345 An Integrated Approach to Cultural Heritage Management in the Indian Context
Authors: T. Lakshmi Priya
Abstract:
With the widening definition of heritage, the challenges of heritage management has become more complex . Today heritage not only includes significant monuments but comprises historic areas / sites, historic cities, cultural landscapes, and living heritage sites. There is a need for a comprehensive understanding of the values associated with these heritage resources, which will enable their protection and management. These diverse cultural resources are managed by multiple agencies having their own way of operating in the heritage sites. An Integrated approach to management of these cultural resources ensures its sustainability for the future generation. This paper outlines the importance of an integrated approach for the management and protection of complex heritage sites in India by examining four case studies. The methodology for this study is based on secondary research and primary surveys conducted during the preparation of the conservation management plansfor the various sites. The primary survey included basic documentation, inventorying, and community surveys. Red Fort located in the city of Delhi is one of the most significant forts built in 1639 by the Mughal Emperor Shahjahan. This fort is a national icon and stands testimony to the various historical events . It is on the ramparts of Red Fort that the national flag was unfurled on 15th August 1947, when India became independent, which continues even today. Management of this complex fort necessitated the need for an integrated approach, where in the needs of the official and non official stakeholders were addressed. The understanding of the inherent values and significance of this site was arrived through a systematic methodology of inventorying and mapping of information. Hampi, located in southern part of India, is a living heritage site inscribed in the World Heritage list in 1986. The site comprises of settlements, built heritage structures, traditional water systems, forest, agricultural fields and the remains of the metropolis of the 16th century Vijayanagar empire. As Hampi is a living heritage site having traditional systems of management and practices, the aim has been to include these practices in the current management so that there is continuity in belief, thought and practice. The existing national, regional and local planning instruments have been examined and the local concerns have been addressed.A comprehensive understanding of the site, achieved through an integrated model, is being translated to an action plan which safeguards the inherent values of the site. This paper also examines the case of the 20th century heritage building of National Archives of India, Delhi and protection of a 12th century Tomb of Sultan Ghari located in south Delhi. A comprehensive understanding of the site, lead to the delineation of the Archaeological Park of Sultan Ghari, in the current Master Plan for Delhi, for the protection of the tomb and the settlement around it. Through this study it is concluded that the approach of Integrated Conservation has enabled decision making that sustains the values of these complex heritage sites in Indian context.Keywords: conservation, integrated, management, approach
Procedia PDF Downloads 881344 The International Fight against the Financing of Terrorism: Analysis of the Anti-Money Laundering and Combating Financing of Terrorism Regime
Authors: Loukou Amoin Marie Djedri
Abstract:
Financing is important for all terrorists – from the largest organizations in control of territories, to the smallest groups – not only for spreading fear through attacks, but also to finance the expansion of terrorist dogmas. These organizations pose serious threats to the international community. The disruption of terrorist financing aims to create a hostile environment for the growth of terrorism and to limit considerably the terrorist groups capacities. The World Bank (WB), together with the International Monetary Fund (IMF), decided to include in their scope the Fight against the money laundering and the financing of terrorism, in order to assist Member States in protecting their internal financial system from terrorism use and abuse and reinforcing their legal system. To do so, they have adopted the Anti-Money Laundering /Combating Financing of Terrorism (AML/CFT) standards that have been set up by the Financial Action Task Force. This set of standards, recognized as the international standards for anti-money laundering and combating the financing of terrorism, has to be implemented by States Members in order to strengthen their judicial system and relevant national institutions. However, we noted that, to date, some States Members still have significant AML/CFT deficiencies, which can constitute serious threats not only to the country’s economic stability but also for the global financial system. In addition, studies stressed out that repressive measures are more implemented by countries than preventive measures, which could be an important weakness in a state security system. Furthermore, we noticed that the AML/CFT standards evolve slowly, while techniques used by terrorist networks keep developing. The goal of the study is to show how to enhance the AML/CFT global compliance through the work of the IMF and the WB, to help member states to consolidate their financial system. To encourage and ensure the effectiveness of these standards, a methodology for assessing the compliance with the AML/CFT standards has been created to follow up the concrete implementation of these standards and to provide accurate technical assistance to countries in need. A risk-based approach has also been adopted as a key component of the implementation of the AML/CFT Standards, with the aim of strengthening the efficiency of the standards. Instead, we noted that the assessment is not efficient in the process of enhancing AML/CFT measures because it seems to lack of adaptation to the country situation. In other words, internal and external factors are not enough taken into account in a country assessment program. The purpose of this paper is to analyze the AML/CFT regime in the fight against the financing of terrorism and to find lasting solutions to achieve the global AML/CFT compliance. The work of all the organizations involved in this combat is imperative to protect the financial network and to lead to the disintegration of terrorist groups in the future.Keywords: AML/CFT standards, financing of terrorism, international financial institutions, risk-based approach
Procedia PDF Downloads 2751343 Carbon Sequestration Modeling in the Implementation of REDD+ Programmes in Nigeria
Authors: Oluwafemi Samuel Oyamakin
Abstract:
The forest in Nigeria is currently estimated to extend to around 9.6 million hectares, but used to expand over central and southern Nigeria decades ago. The forest estate is shrinking due to long-term human exploitation for agricultural development, fuel wood demand, uncontrolled forest harvesting and urbanization, amongst other factors, compounded by population growth in rural areas. Nigeria has lost more than 50% of its forest cover since 1990 and currently less than 10% of the country is forested. The current deforestation rate is estimated at 3.7%, which is one of the highest in the world. Reducing Emissions from Deforestation and forest Degradation plus conservation, sustainable management of forests and enhancement of forest carbon stocks constituted what is referred to as REDD+. This study evaluated some of the existing way of computing carbon stocks using eight indigenous tree species like Mansonia, Shorea, Bombax, Terminalia superba, Khaya grandifolia, Khaya senegalenses, Pines and Gmelina arborea. While these components are the essential elements of REDD+ programme, they can be brought under a broader framework of systems analysis designed to arrive at optimal solutions for future predictions through statistical distribution pattern of carbon sequestrated by various species of tree. Available data on height and diameter of trees in Ibadan were studied and their respective potentials of carbon sequestration level were assessed and subjected to tests so as to determine the best statistical distribution that would describe the carbon sequestration pattern of trees. The result of this study suggests a reasonable statistical distribution for carbons sequestered in simulation studies and hence, allow planners and government in determining resources forecast for sustainable development especially where experiments with real-life systems are infeasible. Sustainable management of forest can then be achieved by projecting future condition of forests under different management regimes thereby supporting conservation and REDD+ programmes in Nigeria.Keywords: REDD+, carbon, climate change, height and diameter
Procedia PDF Downloads 167