Search results for: biodiversity threats
631 User’s Susceptibility Factors to Malware Attacks: A Systematic Literature Review
Authors: Awad A. Younis, Elise Stronberg, Shifa Noor
Abstract:
Malware attacks due to end-user vulnerabilities have been noticeably increased in the past few years. Investigating the factors that make an end-user vulnerable to those attacks is critical because they can be utilized to set up proactive strategies such as awareness and education to mitigate the impacts of those attacks. Some existing studies investigated demographic, behavioral, and cultural factors that make an end-user susceptible to malware attacks. However, it has been challenging to draw more general conclusions from individual studies due to the varieties in the type of end-users and different types of malware. Therefore, we conducted a systematic literature review (SLR) of the existing research for end-user susceptibility factors to malware attacks. The results showed while some demographic factors are mostly associated with malware infection regardless of the end users' type, age, and gender are not consistent among the same and different types of end-users. Besides, the association of culture and personality factors with malware infection are consistent in most of the selected studies and for all type of end-users. Moreover, malware infection varies based on age, geographic location, and host types. We propose that future studies should carefully take into consideration the type of end-users because different end users may be exposed to different threats or be targeted based on their user domains’ characteristics. Additionally, as different types of malware use different tactics to trick end-users, taking the malware types into consideration is important.Keywords: cybersecurity, malware, end-users, demographics, personality, culture, systematic literature review
Procedia PDF Downloads 229630 Macroinvertebrate Variation of Endorheic Depression Wetlands within North West and Mpumalanga Provinces, South Africa
Authors: Lee-Ann Foster, Wynand Malherbe, Martin Ferriera, Johan Van Vuren
Abstract:
Aquatic macroinvertebrates are rarely used in wetland assessments due to their variability. However, in terms of biodiversity, these invertebrates form an important component of wetlands. The objective of this study was to compare the spatial and temporal variation of macroinvertebrate assemblages within endorheic depressions in Mpumalanga and North West Provinces of South Africa. Sampling was conducted over a period of two seasons during 2012 and 2013 at all sampling points to account for a wet and dry season. The identification of macroinvertebrate community samples resulted in 24 taxa for both provinces. Results showed similarities in the structure of communities in perennial endorheic depressions in both provinces with the exception of one or two species. Macroinvertebrates sampled in Mpumalanga depressions (locally called pans) were similar to those reported in previous studies completed in the area and most of the macroinvertebrates sampled in Mpumalanga and the North West are known to be commonly found in temporary habitats. The knowledge acquired can now be utilised to enhance the available literature on these systems. Long-term studies have to be implemented to better understand the ecological functioning of the pans in the North West Province.Keywords: aquatic, macroinvertebrate assemblages, pans, spatial variation
Procedia PDF Downloads 284629 Performance Analysis of Traffic Classification with Machine Learning
Authors: Htay Htay Yi, Zin May Aye
Abstract:
Network security is role of the ICT environment because malicious users are continually growing that realm of education, business, and then related with ICT. The network security contravention is typically described and examined centrally based on a security event management system. The firewalls, Intrusion Detection System (IDS), and Intrusion Prevention System are becoming essential to monitor or prevent of potential violations, incidents attack, and imminent threats. In this system, the firewall rules are set only for where the system policies are needed. Dataset deployed in this system are derived from the testbed environment. The traffic as in DoS and PortScan traffics are applied in the testbed with firewall and IDS implementation. The network traffics are classified as normal or attacks in the existing testbed environment based on six machine learning classification methods applied in the system. It is required to be tested to get datasets and applied for DoS and PortScan. The dataset is based on CICIDS2017 and some features have been added. This system tested 26 features from the applied dataset. The system is to reduce false positive rates and to improve accuracy in the implemented testbed design. The system also proves good performance by selecting important features and comparing existing a dataset by machine learning classifiers.Keywords: false negative rate, intrusion detection system, machine learning methods, performance
Procedia PDF Downloads 116628 Gas Flaring in the Niger Delta Nigeria: An Act of Inhumanity to Man and His Environment
Authors: Okorowo Cyril Agochi
Abstract:
The Niger Delta Region of Nigeria is home to about 20 million people and 40 different ethnic groups. The region has an area of seventy thousand square kilometers (70,000 KM2) of wetlands, formed primarily by sediments deposition and makes up 7.5 percent of Nigeria's total landmass. The notable ecological zones in this region includes: coastal barrier islands; mangrove swamp forests; fresh water swamps; and lowland rainforests. This incredibly naturally-endowed ecosystem region, which contains one of the highest concentrations of biodiversity on the planet, in addition to supporting abundant flora and fauna, is threatened by the inhuman act known as gas flaring. Gas flaring is the combustion of natural gas that is associated with crude oil when it is pumped up from the ground. In petroleum-producing areas such as the Niger Delta region of Nigeria where insufficient investment was made in infrastructure to utilize natural gas, flaring is employed to dispose of this associated gas. This practice has impoverished the communities where it is practiced, with attendant environmental, economic and health challenges. This paper discusses the adverse environmental and health implication associated with the practice, the role of Government, Policy makers, Oil companies and the Local communities aimed at bring this inhuman practice to a prompt end.Keywords: natural combustion, emission, environment, flaring, gas, health, Niger Delta
Procedia PDF Downloads 262627 Legal Regulation of Personal Information Data Transmission Risk Assessment: A Case Study of the EU’s DPIA
Authors: Cai Qianyi
Abstract:
In the midst of global digital revolution, the flow of data poses security threats that call China's existing legislative framework for protecting personal information into question. As a preliminary procedure for risk analysis and prevention, the risk assessment of personal data transmission lacks detailed guidelines for support. Existing provisions reveal unclear responsibilities for network operators and weakened rights for data subjects. Furthermore, the regulatory system's weak operability and a lack of industry self-regulation heighten data transmission hazards. This paper aims to compare the regulatory pathways for data information transmission risks between China and Europe from a legal framework and content perspective. It draws on the “Data Protection Impact Assessment Guidelines” to empower multiple stakeholders, including data processors, controllers, and subjects, while also defining obligations. In conclusion, this paper intends to solve China's digital security shortcomings by developing a more mature regulatory framework and industry self-regulation mechanisms, resulting in a win-win situation for personal data protection and the development of the digital economy.Keywords: personal information data transmission, risk assessment, DPIA, internet service provider, personal information data transimission, risk assessment
Procedia PDF Downloads 58626 Design of a Customized Freshly-Made Fruit Salad and Juices Vending Machine
Authors: María Laura Guevara Campos
Abstract:
The increasing number of vending machines makes it easy for people to find them more frequently in stores, universities, workplaces, and even hospitals. These machines usually offer products with high contents of sugar and fat, which, if consumed regularly, can result in serious health threats, as overweight and obesity. Additionally, the energy consumption of these machines tends to be high, which has an impact on the environment as well. In order to promote the consumption of healthy food, a vending machine was designed to give the customer the opportunity to choose between a customized fruit salad and a customized fruit juice, both of them prepared instantly with the ingredients selected by the customer. The main parameters considered to design the machine were: the storage of the preferred fruits in a salad and/or in a juice according to a survey, the size of the machine, the use of ecologic recipients, and the overall energy consumption. The methodology used for the design was the one proposed by the German Association of Engineers for mechatronics systems, which breaks the design process in several stages, from the elaboration of a list of requirements through the establishment of the working principles and the design concepts to the final design of the machine, which was done in a 3D modelling software. Finally, with the design of this machine, the aim is to contribute to the development and implementation of healthier vending machines that offer freshly-made products, which is not being widely attended at present.Keywords: design, design methodology, mechatronics systems, vending machines
Procedia PDF Downloads 131625 Exploring the Influence of Wind on Wildfire Behavior in China: A Data-Driven Study Using Machine Learning and Remote Sensing
Authors: Rida Kanwal, Wang Yuhui, Song Weiguo
Abstract:
Wildfires are one of the most prominent threats to ecosystems, human health, and economic activities, with wind acting as a critical driving factor. This study combines machine learning (ML) and remote sensing (RS) to assess the effects of wind on wildfires in Chongqing Province from August 16-23, 2022. Landsat 8 satellite images were used to estimate the difference normalized burn ratio (dNBR), representing prefire and postfire vegetation conditions. Wind data was analyzed through geographic information system (GIS) mapping. Correlation analysis between wind speed and fire radiative power (FRP) revealed a significant relationship. An autoregressive integrated moving average (ARIMA) model was developed for wind forecasting, and linear regression was applied to determine the effect of wind speed on FRP. The results identified high wind speed as a key factor contributing to the surge in FRP. Wind-rose plots showed winds blowing to the northwest (NW), aligning with the wildfire spread. This model was further validated with data from other provinces across China. This study integrated ML, RS, and GIS to analyze wildfire behavior, providing effective strategies for prediction and management.Keywords: wildfires, machine learning, remote sensing, wind speed, GIS, wildfire behavior
Procedia PDF Downloads 17624 Three-Stage Anaerobic Co-digestion of High-Solids Food Waste and Horse Manure
Authors: Kai-Chee Loh, Jingxin Zhang, Yen-Wah Tong
Abstract:
Hydrolysis and acidogenesis are the rate-controlling steps in an anaerobic digestion (AD) process. Considering that the optimum conditions for each stage can be diverse diverse, the development of a multi-stage AD system is likely to the AD efficiency through individual optimization. In this research, we developed a highly integrate three-stage anaerobic digester (HM3) to combine the advantages of dry AD and wet AD for anaerobic co-digestion of food waste and horse manure. The digester design comprised mainly of three chambers - high-solids hydrolysis, high-solids acidogenesis and wet methanogensis. Through comparing the treatment performance with other two control digesters, HM3 presented 11.2 ~22.7% higher methane yield. The improved methane yield was mainly attributed to the functionalized partitioning in the integrated digester, which significantly accelerated the solubilization of solid organic matters and the formation of organic acids, as well as ammonia in the high-solids hydrolytic and acidogenic stage respectively. Additionally, HM3 also showed the highest volatile solids reduction rate among the three digesters. Real-time PCR and pyrosequencing analysis indicated that the abundance and biodiversity of microorganisms including bacteria and archaea in HM3 was much higher than that in the control reactors.Keywords: anaerobic digestion, high-solids, food waste and horse manure, microbial community
Procedia PDF Downloads 412623 Influence of Chemical Pollution on Thermal Habitats of the Ciliate Tetrahymena thermophila
Authors: Doufoungognon C. Kone
Abstract:
Global change, in particular pollution and global warming, threatens ecosystems and the biodiversity they harbor. Due to pollutants exposure, organisms might modify their thermal niches in order to track the thermal conditions limiting the negative impacts of chemical stressors depending on their mode of action. This study tests the influence of different pollutants, copper, salt, and chloramphenicol, on the thermal preferences of the ciliate Tetrahymena thermophila. Six genotypes were exposed to a gradient of concentrations ranging from 0 to 500mg/L for copper, 0 to 300 mg/l for chloramphenicol, and 0 to 12g/l for salt in synthetic media at eight temperatures ranging from 11 to 39° C. The measured fitness proxies are the maximum growth rate and the 50% growth inhibitory concentration (IC50). The results show that the majority of genotypes are more resistant to chloramphenicol in temperatures below their thermal optimum without pollutants, while they better tolerate other salt and copper in temperatures above their thermal optimum. In addition, generalists reduce their niche width while specialists widen it in chloramphenicol. Overall, results suggest that global warming would have a particularly deleterious effect in the case of chemical pollution. This pollution would induce the full disruption of the thermal habitats.Keywords: ciliate, thermal niche, growth rate, toxicity, multiple stressors
Procedia PDF Downloads 89622 Prevelance of Green Peach Aphid (Myzus persicae) in District Jacobabad, Sindh, Pakistran
Authors: Kamal Khan Abro, Nasreen Memon, Attaullah Ansari, Mahpara Pirzada, Saima Pathan
Abstract:
Jacobabad district has a hot desert climate with very hot summers and insignificant winters. The highest recorded temperature is 53.8 °C (127.0 °F), and the lowest recorded temperature is −4.9 °C (25.0 °F). Rainfall is short and mostly occurs in the monsoon season (July–September). Agriculture point of view Jacobabad district is very important district of Sindh Pakistan in which many types of crop and vegetables are cultivated annually such as Wheat, Rice, and Brassica, Cabbage, Spinach, Chili etc. which are badly attacked by many crops pest. Insects are very tiny, sensitive and most attractive mortal and most important collection of animal wildlife they play important role in biological control agent, biodiversity & agroecosystem. The brassica crop extremely infested by many different types of pest such as Aphids, Whitefly, Jassids, Thrips, Mealybug, scale insect pink worm, bollworm and borers Mealy bug, scale insect etc. These pests destroy many crops. The present study was carried out from Jacobabad district from January 2017 to April 2017.Keywords: prevelance, green peach aphid, Jacobabad, Sindh Pakistan
Procedia PDF Downloads 289621 Environmental Quality On-Line Monitoring Based on Enterprises Resource Planning on Implementation ISO 14001:2004
Authors: Ahmad Badawi Saluy
Abstract:
This study aims to develop strategies for the prevention or elimination of environmental pollution as well as changes in external variables of the environment in order to implement the environmental management system ISO 14001:2004 by integrating analysis of environmental issues data, RKL-RPL transactional data and regulation as part of ERP on the management dashboard. This research uses a quantitative descriptive approach with analysis method comparing with air quality standard (PP 42/1999, LH 21/2008), water quality standard (permenkes RI 416/1990, KepmenLH 51/2004, kepmenLH 55/2013 ), and biodiversity indicators. Based on the research, the parameters of RPL monitoring have been identified, among others, the quality of emission air (SO₂, NO₂, dust, particulate) due to the influence of fuel quality, combustion performance in a combustor and the effect of development change around the generating area. While in water quality (TSS, TDS) there was an increase due to the flow of water in the cooling intake carrying sedimentation from the flow of Banjir Kanal Timur. Including compliance with the ISO 14001:2004 clause on application design significantly contributes to the improvement of the quality of power plant management.Keywords: environmental management systems, power plant management, regulatory compliance , enterprises resource planning
Procedia PDF Downloads 176620 Riparian Buffer Strips’ Capability of E. coli Removal in New York Streams
Authors: Helen Sanders, Joshua Cousins
Abstract:
The purpose of this study is to ascertain whether riparian buffer strips could be used to reduce Escherichia Coli (E. coli) runoff into streams in Central New York. Mainstream methods currently utilized to reduce E. coli runoff include fencing and staggered fertilizing plans for agriculture. These methods still do not significantly limit E. coli and thus, pose a serious health risk to individuals who swim in contaminated waters or consume contaminated produce. One additional method still in research development involves the planting of vegetated riparian buffers along waterways. Currently, riparian buffer strips are primarily used for filtration of nitrate and phosphate runoff to slow erosion, regulate pH and, improve biodiversity within waterways. For my research, four different stream sites were selected for the study, in which rainwater runoff was collected at both the riparian buffer and the E. coli sourced runoff upstream. Preliminary results indicate that there is an average 70% decrease in E. coli content in streams at the riparian buffer strips compared to upstream runoff. This research could be utilized to include vegetated buffer planting as a method to decrease manure runoff into essential waterways.Keywords: Escherichia coli, riparian buffer strips, vegetated riparian buffers, runoff, filtration
Procedia PDF Downloads 177619 Reducing Environmental Impact of Olive Oil Production in Sakaka City Using Combined Chemical, Physical, and Biological Treatment
Authors: Abdullah Alhajoj, Bassam Alowaiesh
Abstract:
This work aims to reduce the risks of discharging olive mill waste directly to the environment without treatment in Sakaka City, KSA. The organic loads expressed by chemical oxygen demand (COD) and biological oxygen demand (BOD) of the produced wastewater (OMWW) as well as the solid waste (OMW) were evaluated. The wastes emitted from the three-phase centrifuge decanters was found to be higher than that emitted from the two-phase centrifuge decanters. The olive mill wastewater (OMWW) was treated using advanced oxidation combined with filtration treatment. The results indicated that the concentration of COD, BOD, TSS, oil and grease and phenol was reduced by using complex sand filtration from 72150, 21660 10256, 36430, and 1470 mg/l to 980, 421, 58, 68, and 0.35 mg/l for three-phase OMWW and from 150562, 17955, 15325, 19658 and 2153 mg/l to 1050, 501, 29, 0.75, and 0.29 mg/l, respectively. While, by using modified trickling filter (packed with the neck of waste plastic bottles the concentration of the previously mentioned parameters was reduced to 1190, 570, 55, 0.85, and 0.3 mg/l, respectively. This work supports the application of such treatment technique for reducing the environmental threats of olive mill waste effluents in Saudi Arabia.Keywords: two-phase, three-phase, olive mill, olive oil, waste treatment, filtration, advanced oxidation, waste plastic bottles
Procedia PDF Downloads 152618 Community-based Mapping as a Planning Tool; Examples from Pakistan
Authors: Noman Ahmed, Fariha Tahseen
Abstract:
Since several decades, unplanned urbanization and rapid growth of informal settlements have evolved and increased in size and number. Large cities such as Karachi have been impacted with sprawl and rising share of unplanned settlements where poor communities reside. Threats of eviction, deteriorating law and order situation, lack of essential amenities and infrastructure, extortion and bullying from local and non-local musclemen and feeble response of government agencies towards their development needs are some predicaments. Non-governmental organizations (NGOs) have caused important interventions in such locations. Appraisal of the community-based mapping as a tool in supporting the development work in less privileged areas in Karachi has been the objective of this research. The Orangi Pilot Project (OPP), under the leadership of its slain director Perween Rahman had a significant role to play in developing and extending this approach in low income locations in Karachi and beyond. The paper investigates the application of mapping in the process of peri urban land invasion causing rapid transformation of traditional settlements in Karachi. Mixed methodology components comprising literature review, archival research, and unstructured interviews with key informants and case studies have been used.Keywords: squatters (katchi abadis), land grabbing, community empowerment, housing rights, mapping, infrastructure development
Procedia PDF Downloads 314617 On the Use of Machine Learning for Tamper Detection
Authors: Basel Halak, Christian Hall, Syed Abdul Father, Nelson Chow Wai Kit, Ruwaydah Widaad Raymode
Abstract:
The attack surface on computing devices is becoming very sophisticated, driven by the sheer increase of interconnected devices, reaching 50B in 2025, which makes it easier for adversaries to have direct access and perform well-known physical attacks. The impact of increased security vulnerability of electronic systems is exacerbated for devices that are part of the critical infrastructure or those used in military applications, where the likelihood of being targeted is very high. This continuously evolving landscape of security threats calls for a new generation of defense methods that are equally effective and adaptive. This paper proposes an intelligent defense mechanism to protect from physical tampering, it consists of a tamper detection system enhanced with machine learning capabilities, which allows it to recognize normal operating conditions, classify known physical attacks and identify new types of malicious behaviors. A prototype of the proposed system has been implemented, and its functionality has been successfully verified for two types of normal operating conditions and further four forms of physical attacks. In addition, a systematic threat modeling analysis and security validation was carried out, which indicated the proposed solution provides better protection against including information leakage, loss of data, and disruption of operation.Keywords: anti-tamper, hardware, machine learning, physical security, embedded devices, ioT
Procedia PDF Downloads 151616 Strategic Mine Planning: A SWOT Analysis Applied to KOV Open Pit Mine in the Democratic Republic of Congo
Authors: Patrick May Mukonki
Abstract:
KOV pit (Kamoto Oliveira Virgule) is located 10 km from Kolwezi town, one of the mineral rich town in the Lualaba province of the Democratic Republic of Congo. The KOV pit is currently operating under the Katanga Mining Limited (KML), a Glencore-Gecamines (a State Owned Company) join venture. Recently, the mine optimization process provided a life of mine of approximately 10 years withnice pushbacks using the Datamine NPV Scheduler software. In previous KOV pit studies, we recently outlined the impact of the accuracy of the geological information on a long-term mine plan for a big copper mine such as KOV pit. The approach taken, discussed three main scenarios and outlined some weaknesses on the geological information side, and now, in this paper that we are going to develop here, we are going to highlight, as an overview, those weaknesses, strengths and opportunities, in a global SWOT analysis. The approach we are taking here is essentially descriptive in terms of steps taken to optimize KOV pit and, at every step, we categorized the challenges we faced to have a better tradeoff between what we called strengths and what we called weaknesses. The same logic is applied in terms of the opportunities and threats. The SWOT analysis conducted in this paper demonstrates that, despite a general poor ore body definition, and very rude ground water conditions, there is room for improvement for such high grade ore body.Keywords: mine planning, mine optimization, mine scheduling, SWOT analysis
Procedia PDF Downloads 224615 Genome-Wide Identification of Genes Resistance to Nitric Oxide in Vibrio parahaemolyticus
Abstract:
Food poison caused by consumption of contaminated food, especially seafood, is one of most serious public health threats worldwide. Vibrio parahaemolyticus is emerging bacterial pathogen and the leading cause of human gastroenteritis associated with food poison, especially in the southern coastal region of China. To successfully cause disease in host, bacterial pathogens need to overcome the host-derived stresses encountered during infection. One of the toxic chemical species elaborated by the host is nitric oxide (NO). NO is generated by acidified nitrite in the stomach and by enzymes of the inducible NO synthase (iNOS) in the host cell, and is toxic to bacteria. Bacterial pathogens have evolved some mechanisms to battle with this toxic stress. Such mechanisms include genes to sense NO produced from immune system and activate others to detoxify NO toxicity, and genes to repair the damage caused by toxic reactive nitrogen species (RNS) generated during NO toxic stress. However, little is known about the NO resistance in V. parahaemolyticus. In this study, a transposon coupled with next generation sequencing (Tn-seq) technology will be utilized to identify genes for NO resistance in V. parahaemolyticus. Our strategy will include construction the saturating transposon insertion library, transposon library challenging with NO, next generation sequencing (NGS), bioinformatics analysis and verification of the identified genes in vitro and in vivo.Keywords: vibrio parahaemolyticus, nitric oxide, tn-seq, virulence
Procedia PDF Downloads 263614 American Criminal Justice Responses to Terrorism in the Post 9/11 Era
Authors: Summer Jackson
Abstract:
September 11, 2001 terrorist attacks exposed weaknesses in federal law enforcement’s ability to proactively counter threats to American homeland security. Following the attacks, legislative reforms and policy changes cleared both bureaucratic and legal obstacles to anti-terrorism efforts. The Federal Bureau of Investigation (FBI) transformed into a domestic intelligence agency responsible for preventing future terrorist attacks. Likewise, the passage of the 2001 USA Patriot Act gave federal agents new discretionary powers to more easily collect intelligence on those suspected of supporting terrorism. Despite these changes, there has been only limited scholarly attention paid to terrorism responses by the federal criminal justice system. This study sought to examine the investigative and prosecutorial changes made in the Post-9/11 era. The methodology employed bivariate and multivariate statistics using data from the American Terrorism Study (ATS). This analysis examined how policy changes are reflected in the nature of terrorism investigations, the handling of terrorist defendants by federal prosecutors, and the outcomes of terrorism cases since 2001. The findings indicate significant investigative and prosecutorial changes in the Post-9/11 era. Specifically, this study found terrorism cases involved younger defendants, fewer indictees per case, less use of human intelligence, less complicated attacks, less serious charges, and more plea bargains. Overall, this study highlights the important shifts in responses to terrorism following the 9/11 attacks.Keywords: terrorism, law enforcement, post-9/11, federal policy
Procedia PDF Downloads 115613 A Framework for Security Risk Level Measures Using CVSS for Vulnerability Categories
Authors: Umesh Kumar Singh, Chanchala Joshi
Abstract:
With increasing dependency on IT infrastructure, the main objective of a system administrator is to maintain a stable and secure network, with ensuring that the network is robust enough against malicious network users like attackers and intruders. Security risk management provides a way to manage the growing threats to infrastructures or system. This paper proposes a framework for risk level estimation which uses vulnerability database National Institute of Standards and Technology (NIST) National Vulnerability Database (NVD) and the Common Vulnerability Scoring System (CVSS). The proposed framework measures the frequency of vulnerability exploitation; converges this measured frequency with standard CVSS score and estimates the security risk level which helps in automated and reasonable security management. In this paper equation for the Temporal score calculation with respect to availability of remediation plan is derived and further, frequency of exploitation is calculated with determined temporal score. The frequency of exploitation along with CVSS score is used to calculate the security risk level of the system. The proposed framework uses the CVSS vectors for risk level estimation and measures the security level of specific network environment, which assists system administrator for assessment of security risks and making decision related to mitigation of security risks.Keywords: CVSS score, risk level, security measurement, vulnerability category
Procedia PDF Downloads 319612 Evaluation of Nutritional Potential of Five Unexplored Wild Edible Food Plants from Eastern Himalayan Biodiversity Hotspot Region (India)
Authors: Pallabi Kalita, Hui Tag, Loxmi Jamoh, H. N. Sarma, A. K. Das
Abstract:
Wild edible food plants contain a number of organic phytochemical that have been linked to the promotion of good health. These plants used by the local people of Arunachal Pradesh (Northeast India) are found to have high nutritional potential to maintain general balance diet. A study was conducted to evaluate the nutritional potential of five commonly found, unexplored wild food plants namely, Piper pedicellatum C. DC (leaves), Gonostegia hirta (Blume ex Hassk.) Miq. (leaves), Mussaenda roxburghii Hook. f. (leaves), Solanum spirale Roxb. (leaves and fruits) and Cyathea spinulosa Wall. ex Hook. (pith portion and tender rachis) from East Siang District of Arunachal Pradesh Northeast (India) for ascertaining their suitability for utilization as supplementary food. Results of study revealed that P. pedicellatum, C. spinulosa, and S. spirale (leaves) are the most promising species which have high nutritional content out of the five wild food plants investigated which is required for the normal growth and development of human.Keywords: wild edible plants, gross energy, Gonostegia hirta, Cyathea spinulosa
Procedia PDF Downloads 329611 Measurement of Natural Radioactivity and Health Hazard Index Evaluation in Major Soils of Tin Mining Areas of Perak
Authors: Habila Nuhu
Abstract:
Natural radionuclides in the environment can significantly contribute to human exposure to ionizing radiation. The knowledge of their levels in an environment can help the radiological protection agencies in policymaking. Measurement of natural radioactivity in major soils in the tin mining state of Perak Malaysia has been conducted using an HPGe detector. Seventy (70) soil samples were collected at widely distributed locations in the state. Six major soil types were sampled, and thirteen districts around the state were covered. The following were the results of the 226Ra (238U), 228Ra (232Th), and 40K activity in the soil samples: 226Ra (238U) has a mean activity concentration of 191.83 Bq kg⁻¹, more than five times the UNSCEAR reference limits of 35 Bq kg⁻¹. The mean activity concentration of 228Ra (232Th) with a value of 232.41 Bq kg⁻¹ is over seven times the UNSCEAR reference values of 30 Bq kg⁻¹. The average concentration of 40K activity was 275.24 Bq kg⁻¹, which was less than the UNSCEAR reference limit of 400 Bq Kg⁻¹. The range of external hazards index (Hₑₓ) values was from 1.03 to 2.05, while the internal hazards index (Hin) was from 1.48 to 3.08. The Hex and Hin should be less than one for minimal external and internal radiation threats as well as secure use of soil material for building construction. The Hₑₓ and Hin results generally indicate that while using the soil types and their derivatives as building materials in the study area, care must be taken.Keywords: activity concentration, hazard index, soil samples, tin mining
Procedia PDF Downloads 110610 Juniperus thurefera Multiplication Tests by Cauttigs in Aures, Algeria
Authors: N. Khater, S. A. Menina, H. Benbouza
Abstract:
Juniperus thurefera is an endemic cupressacée constitutes a forest cover in the mountains of Aures (Algeria). It is a heritage and important ecological richness but continues to decline, highly endangered species in danger of extinction, these populations show significant originality due to climatic conditions of the environment, because of its strength and extraordinary vitality, made a powerful but fragile and unique ecosystem in which natural regeneration by seed is almost absent in Algeria. Because of the quality of seeds that are either dormant or affected at the tree and the ground level by a large number of pests and parasites, which will lead to the total disappearance of this species and consequently leading to the biodiversity. View the ecological and socio- economic interest presented by this case, it deserves to be preserved and produced in large quantities in this respect. The present work aims to try to regenerate the Juniperus thurefera via vegetative propagation. We studied the potential of cuttings to form adventitious roots and buds. Cuttings were taken from young subjects from 5 to 20 years treated with indole butyric acid (AIB) and planted out-inside perlite under atomizer whose temperature and light are controlled. Results indicated that the percentage of developing buds on cuttings is better than the rooting ones.Keywords: Juniperus thurefera, indole butyric acid, cutting, buds, rooting
Procedia PDF Downloads 270609 Exploring the Challenges and Opportunities in Clinical Waste Management: The Case of Private Clinics, Selangor, Malaysia
Authors: Golyasamin Khanehzaei, Mohd. Bakri Ishak, Ahmad Makmom Hj Abdullah, Latifah Abd Manaf
Abstract:
Abstract—Management of clinical waste is a critical problem worldwide. Immediate attention is required to manage the clinical waste in an appropriate way in newly developing economy country such as Malaysia. The increasing amount of clinical waste generated is resulted from rapid urbanization and growing number of private health care facilities in developing countries such as Malaysia. In order to develop a sensible clinical waste management system and improvement of the management, information on factors affecting clinical waste generation has the crucial role. This paper is the study of management characteristics of clinical waste and the level of efficiency of clinical waste management systems operating in private clinics located in Selangor, Malaysia. Are they following the proper international standards? By taking all of this in consideration the aim of this paper is to identify and discuss the current trend, current challenges and also the present opportunities among the challenges of clinical waste management in private clinics of Selangor, Malaysia. The SWOT analysis was characterized for the evaluation of strengths, weaknesses, opportunities and threats. The methodology for this study was constituted of direct observation, Informal interviews, Conducting SWOT analysis, conduction of one sustainability dimensions analysis and application. The results show that clinical waste management in private clinics is far from an ideal model.Keywords: clinical waste, SWOT analysis, Selangor, Malaysia
Procedia PDF Downloads 347608 Impact of Agricultural Waste Utilization and Management on the Environment
Authors: Ravi Kumar
Abstract:
Agricultural wastes are the non-product outcomes of agricultural processing whose monetary value is less as compared to its collection cost, transportation, and processing. When such agricultural waste is not properly disposed of, it may damage the natural environment and cause detrimental pollution in the atmosphere. Agricultural development and intensive farming methods usually result in wastes that remarkably affect the rural environments in particular and the global environment in general. Agricultural waste has toxicity latent to human beings, animals, and plants through various indirect and direct outlets. The present paper explores the various activities that result in agricultural waste and the routes that can utilize the agricultural waste in a manageable manner to reduce its adverse impact on the environment. Presently, the agricultural waste management system for ecological agriculture and sustainable development has emerged as a crucial issue for policymakers. There is an urgent need to consider agricultural wastes as prospective resources rather than undesirable in order to avoid the transmission and contamination of water, land, and air resources. Waste management includes the disposal and treatment of waste with a view to eliminate threats of waste by modifying the waste to condense the microbial load. The study concludes that proper waste utilization and management will facilitate the purification and development of the ecosystem and provide feasible biofuel resources. This proper utilization and management of these wastes for agricultural production may reduce their accumulation and further reduce environmental pollution by improving environmental health.Keywords: agricultural waste, utilization, management, environment, health
Procedia PDF Downloads 93607 Detection of Cytotoxicity of Green Synthesized Silver, Gold, and Silver/Gold Bimetallic on Baby Hamster Kidney-21 Cells Using MTT Assay
Authors: Naila Sher, Mushtaq Ahmed, Nadia Mushtaq, Rahmat Ali Khan
Abstract:
In cancer therapy, nanoparticles (NPs) shall be applied possibly by inoculation in the veins of humans. This action will connect them with white (WBCs) and red blood cells (RBCs) in the bloodstream before they reach their main targeted cancer cells. However, possible effects of silver, gold, and silver/gold bimetallic NPs (Ag, Au, and Ag/Au BNPs) on baby hamster kidney-21 (BHK-21) cells were studied by MTT assay. Here, Ag, Au, and their Ag/Au BNPs (bimetallic nanoparticles) were synthesized by using Hippeastrum hybridum (HH) extract. These NPs were characterized by UV-visible spectroscopy, FT-IR, XRD, and EDX, and SEM analysis. XRD analysis conferring the crystal structure with an average size of 13.3, 10.72, and 8.34nm of Ag, Au, and Ag/Au BNPs, respectively. SEM showed that Ag, Au, and Ag/Au BNPs had irregular morphologies, with nano measures calculated sizes of 40, 30, and 20 nm respectively. EDX spectrometers confirmed the presence of elemental Ag signal of the AgNPs with 22.75%, Au signal of the AuNPs with 48.08%, Ag signal with 12%, and Au signal with 38.26% of the Ag/Au BNPs. The BHK-21cells were incubated in the existence of doxorubicin, plant extract, Ag, Au, and Ag/Au BNPs. The cytotoxic effects could be observed in a dose-dependent mode; doxorubicin and Ag/Au BNPs were more toxic than plant extract, Ag, and Au NPs. It is demonstrated that NPs interact with BHK-21cells and significantly reduce cell viability in a concentration-dependent manner. However, to reduce the potential threats of NPs further studies are recommended.Keywords: hippeastrum hybridum, nanoparticle, BHK-21cells
Procedia PDF Downloads 127606 Multi-Scale Control Model for Network Group Behavior
Authors: Fuyuan Ma, Ying Wang, Xin Wang
Abstract:
Social networks have become breeding grounds for the rapid spread of rumors and malicious information, posing threats to societal stability and causing significant public harm. Existing research focuses on simulating the spread of information and its impact on users through propagation dynamics and applies methods such as greedy approximation strategies to approximate the optimal control solution at the global scale. However, the greedy strategy at the global scale may fall into locally optimal solutions, and the approximate simulation of information spread may accumulate more errors. Therefore, we propose a multi-scale control model for network group behavior, introducing individual and group scales on top of the greedy strategy’s global scale. At the individual scale, we calculate the propagation influence of nodes based on their structural attributes to alleviate the issue of local optimality. At the group scale, we conduct precise propagation simulations to avoid introducing cumulative errors from approximate calculations without increasing computational costs. Experimental results on three real-world datasets demonstrate the effectiveness of our proposed multi-scale model in controlling network group behavior.Keywords: influence blocking maximization, competitive linear threshold model, social networks, network group behavior
Procedia PDF Downloads 17605 Bitcoin, Blockchain and Smart Contract: Attacks and Mitigations
Authors: Mohamed Rasslan, Doaa Abdelrahman, Mahmoud M. Nasreldin, Ghada Farouk, Heba K. Aslan
Abstract:
Blockchain is a distributed database that endorses transparency while bitcoin is a decentralized cryptocurrency (electronic cash) that endorses anonymity and is powered by blockchain technology. Smart contracts are programs that are stored on a blockchain. Smart contracts are executed when predetermined conditions are fulfilled. Smart contracts automate the agreement execution in order to make sure that all participants immediate-synchronism of the outcome-certainty, without any intermediary's involvement or time loss. Currently, the Bitcoin market worth billions of dollars. Bitcoin could be transferred from one purchaser to another without the need for an intermediary bank. Network nodes through cryptography verify bitcoin transactions, which are registered in a public-book called “blockchain”. Bitcoin could be replaced by other coins, merchandise, and services. Rapid growing of the bitcoin market-value, encourages its counterparts to make use of its weaknesses and exploit vulnerabilities for profit. Moreover, it motivates scientists to define known vulnerabilities, offer countermeasures, and predict future threats. In his paper, we study blockchain technology and bitcoin from the attacker’s point of view. Furthermore, mitigations for the attacks are suggested, and contemporary security solutions are discussed. Finally, research methods that achieve strict security and privacy protocol are elaborated.Keywords: Cryptocurrencies, Blockchain, Bitcoin, Smart Contracts, Peer-to-Peer Network, Security Issues, Privacy Techniques
Procedia PDF Downloads 80604 Integrated Risk Management as a Framework for Organisational Success
Authors: Olakunle Felix Adekunle
Abstract:
Risk management is recognised as an essential tool to tackle the inevitable uncertainty associated with business and projects at all levels. But it frequently fails to meet expectations, with projects continuing to run late, over budget or under performing, and business is not gaining the expected benefits. The evident disconnect which often occurs between strategic vision and tactical project delivery typically arises from poorly defined project objectives and inadequate attention to the proactive management of risks that could affect those objectives. One of the main failings in the traditional approach to risk management arises from a narrow focus on the downside, restricted to the technical or operational field, addressing tactical threats to processes, performance or people. This shortcoming can be overcome by widening the scope of risk management to encompass both strategic risks and upside opportunities, creating an integrated approach which can bridge the gap between strategy and tactics. Integrated risk management addresses risk across a variety of levels in the organisation, including strategy and tactics, and covering both opportunity and threat. Effective implementation of integrated risk management can produce a number of benefits to the organisation which are not available from the typical limited-scope risk process. This paper explores how to expand risk management to deliver strategic advantage while retaining its use as a tactical tool.Keywords: risk management, success, organization, strategy, project, tactis, vision
Procedia PDF Downloads 395603 A Review on Factors Influencing Implementation of Secure Software Development Practices
Authors: Sri Lakshmi Kanniah, Mohd Naz’ri Mahrin
Abstract:
More and more businesses and services are depending on software to run their daily operations and business services. At the same time, cyber-attacks are becoming more covert and sophisticated, posing threats to software. Vulnerabilities exist in the software due to the lack of security practices during the phases of software development. Implementation of secure software development practices can improve the resistance to attacks. Many methods, models and standards for secure software development have been developed. However, despite the efforts, they still come up against difficulties in their deployment and the processes are not institutionalized. There is a set of factors that influence the successful deployment of secure software development processes. In this study, the methodology and results from a systematic literature review of factors influencing the implementation of secure software development practices is described. A total of 44 primary studies were analysed as a result of the systematic review. As a result of the study, a list of twenty factors has been identified. Some of factors that affect implementation of secure software development practices are: Involvement of the security expert, integration between security and development team, developer’s skill and expertise, development time and communication between stakeholders. The factors were further classified into four categories which are institutional context, people and action, project content and system development process. The results obtained show that it is important to take into account organizational, technical and people issues in order to implement secure software development initiatives.Keywords: secure software development, software development, software security, systematic literature review
Procedia PDF Downloads 376602 The Evaluation of Transformational Leadership Characteristics and Behaviors in Air Forces
Authors: Cuma Şimşek
Abstract:
Nowadays our globalized world is in a very rapid and sophisticated change. In the information age, notion of ‘information’ has begun to spread faster than ever also in this age, changes and transformation has gained tremendous momentum with technology boom. This continuous change and transformation, increased the competition between existing organizations and corporations. Besides, the organizations which show resistance to change has been put out of action in this competitive environment. It is not possible to sustain the existence of organizations without adapting to change and transformation by isolating itself from developments. As a consequence of improved communication and dialog possibilities by means of increasing knowledge level, there has been made a change of scene in administrative mentality, style and activation, especially in 21th century. Leaders emerge as the most important factor in this process of perception and success. At the same time it is not enough to adapt the alteration with conventional leadership abilities and behaviors. In parallel with alteration, new types of leadership are coming up. The optimal leadership type for our era and a trending topic "Transformational Leadership" is in great demand now. In this research, current situation of the Air Forces which use high-technology weapons efficiently, operates in an environment full of threats and is analyzed. It is evaluated that in order to be ready for war continuously and adjusting itself to changing terms of warfare atmosphere , Air Forces need ‘transformational leaders’ who are innovative, foreseeing and having a vision so that they can develop new methods and strategies for complex problems. Because it is the Air Force which is responsible for being the deterrent force of its country.Keywords: transformational, change, air force, leadership
Procedia PDF Downloads 440