Search results for: biodiversity threats
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 1231

Search results for: biodiversity threats

541 Security Design of Root of Trust Based on RISC-V

Authors: Kang Huang, Wanting Zhou, Shiwei Yuan, Lei Li

Abstract:

Since information technology develops rapidly, the security issue has become an increasingly critical for computer system. In particular, as cloud computing and the Internet of Things (IoT) continue to gain widespread adoption, computer systems need to new security threats and attacks. The Root of Trust (RoT) is the foundation for providing basic trusted computing, which is used to verify the security and trustworthiness of other components. Design a reliable Root of Trust and guarantee its own security are essential for improving the overall security and credibility of computer systems. In this paper, we discuss the implementation of self-security technology based on the RISC-V Root of Trust at the hardware level. To effectively safeguard the security of the Root of Trust, researches on security safeguard technology on the Root of Trust have been studied. At first, a lightweight and secure boot framework is proposed as a secure mechanism. Secondly, two kinds of memory protection mechanism are built to against memory attacks. Moreover, hardware implementation of proposed method has been also investigated. A series of experiments and tests have been carried on to verify to effectiveness of the proposed method. The experimental results demonstrated that the proposed approach is effective in verifying the integrity of the Root of Trust’s own boot rom, user instructions, and data, ensuring authenticity and enabling the secure boot of the Root of Trust’s own system. Additionally, our approach provides memory protection against certain types of memory attacks, such as cache leaks and tampering, and ensures the security of root-of-trust sensitive information, including keys.

Keywords: root of trust, secure boot, memory protection, hardware security

Procedia PDF Downloads 212
540 Gradient-Based Reliability Optimization of Integrated Energy Systems Under Extreme Weather Conditions: A Case Study in Ningbo, China

Authors: Da LI, Peng Xu

Abstract:

Recent extreme weather events, such as the 2021 European floods and North American heatwaves, have exposed the vulnerability of energy systems to both extreme demand scenarios and potential physical damage. Current integrated energy system designs often overlook performance under these challenging conditions. This research, focusing on a regional integrated energy system in Ningbo, China, proposes a distinct design method to optimize system reliability during extreme events. A multi-scenario model was developed, encompassing various extreme load conditions and potential system damages caused by severe weather. Based on this model, a comprehensive reliability improvement scheme was designed, incorporating a gradient approach to address different levels of disaster severity through the integration of advanced technologies like distributed energy storage. The scheme's effectiveness was validated through Monte Carlo simulations. Results demonstrate significant enhancements in energy supply reliability and peak load reduction capability under extreme scenarios. The findings provide several insights for improving energy system adaptability in the face of climate-induced challenges, offering valuable references for building reliable energy infrastructure capable of withstanding both extreme demands and physical threats across a spectrum of disaster intensities.

Keywords: extreme weather events, integrated energy systems, reliability improvement, climate change adaptation

Procedia PDF Downloads 22
539 Implementation of Congestion Management Strategies on Arterial Roads: Case Study of Geelong

Authors: A. Das, L. Hitihamillage, S. Moridpour

Abstract:

Natural disasters are inevitable to the biodiversity. Disasters such as flood, tsunami and tornadoes could be brutal, harsh and devastating. In Australia, flooding is a major issue experienced by different parts of the country. In such crisis, delays in evacuation could decide the life and death of the people living in those regions. Congestion management could become a mammoth task if there are no steps taken before such situations. In the past to manage congestion in such circumstances, many strategies were utilised such as converting the road shoulders to extra lanes or changing the road geometry by adding more lanes. However, expansion of road to resolving congestion problems is not considered a viable option nowadays. The authorities avoid this option due to many reasons, such as lack of financial support and land space. They tend to focus their attention on optimising the current resources they possess and use traffic signals to overcome congestion problems. Traffic Signal Management strategy was considered a viable option, to alleviate congestion problems in the City of Geelong, Victoria. Arterial road with signalised intersections considered in this paper and the traffic data required for modelling collected from VicRoads. Traffic signalling software SIDRA used to model the roads, and the information gathered from VicRoads. In this paper, various signal parameters utilised to assess and improve the corridor performance to achieve the best possible Level of Services (LOS) for the arterial road.

Keywords: congestion, constraints, management, LOS

Procedia PDF Downloads 392
538 Islamization of Knowledge with Special Reference to Mohd Kamal Hassan's Perspective

Authors: Abdul Latheef O. Mavukkandy

Abstract:

Islamization of knowledge (IOK) is an intellectual movement emerged in the middle of 1970s to address the threats by modern western civilizational onslaughts. This paper analyzes the discourse of Islamization of knowledge with special reference to the views of Kamal Hassan who prefers an alternative term called 'Islamicization'. First of all the theoretical and practical outlines of IOK movement were presented by Ismail Raji al-Faruqi in his book 'Islamization of Knowledge; General Principles and Work Plan' in 1982. He identified that the educational system in the Muslim world accounted for the decline of Muslim Ummah through de-Islamization and demoralization. So, the need for IOK was an academic challenge to reconstruct the Ummah. Kamal Hassan kept just different view from Ismail Raji al-Faruqi and Muhammed Naquib al-Attas that he coined the terms 'Relevantization and Contextualization'. So, he wanted the 'Islamization of Islamic Revealed Knowledge'. So, he used Islamization of Human Knowledge (IOHK) instead of IOK. As part of this movement, the IOK identified that the textbooks used in Muslim educational institutions systematically keep the students estranged from Islam and its heritage. Furthermore, the modern secular knowledge develops secular attitude devoid of Islamic moral philosophy and the sense of mission in life. Based upon the content analysis of some of the sources, this study found that Islamization of Knowledge is an important movement in Islamic world, but the IOK project is not practicable completely because of the lack of trained teachers and resources. Although, the project resulted in the foundation of some universities and publishing more works, journals and doctoral thesis on different dimensions of Islamization of Knowledge.

Keywords: Islamization, Islamicization, releventization, human knowledge

Procedia PDF Downloads 425
537 Formation of an Empire in the 21st Century: Theoretical Approach in International Relations and a Worldview of the New World Order

Authors: Rami Georg Johann

Abstract:

Against the background of the current geopolitical constellations, the author looks at various empire models, which are discussed and compared with each other with regard to their stability and functioning. The focus is on the fifth concept as a possible new world order in the 21st century. These will be discussed and compared to one another according to their stability and functioning. All empires to be designed will be conceptualised based on one, two, three, four, and five worlds. All worlds are made up of a different constellation of states and relating coalitions. All systems will be discussed in detail. The one-world-system, the“Western Empire,” will be presented as a possible solution to a new world order in the 21st century (fifth concept). The term “Western” in “Western Empire” describes the Western concept after World War II. This Western concept was the result of two horrible world wars in the 20th century.” With this in mind, the fifth concept forms a stable empire system, the “Western Empire,” by political measures tied to two issues. Thus, this world order provides a significantly higher long-term stability in contrast to all other empire models (comprising five, four, three, or two worlds). Confrontations and threats of war are reduced to a minimum. The two issues mentioned are “merger” and “competition.” These are the main differences in forming an empire compared to all empires and realms in the history of mankind. The fifth concept of this theory, the “Western Empire,” acts explicitly as a counter model. The Western Empire (fifth concept) is formed by the merger of world powers without war. Thus, a world order without competition is created. This merged entity secures long-term peace, stability, democratic values, freedom, human rights, equality, and justice in the new world order.

Keywords: empire formation, theory of international relations, Western Empire, world order

Procedia PDF Downloads 146
536 Meiobenthic Diversity off Pudimadaka, Bay of Bengal, East Coast of India with Special Reference to Free-Living Marine Nematodes

Authors: C. Annapurna, Rao M. Srinivasa, Bhanu C. H. Vijaya, M. Sivalakshmi, Rao P. V. Surya

Abstract:

A study on the community structure of meiobenthic fauna was undertaken during three cruises (June 2008, October 2008 and March 2009). Ten stations at depth between 10 and 40 m off Pudimadaka in Visakhapatnam (Lat.17º29′12″N and Long. 83º00′09″), East coast of India were investigated. Ninety species representing 3 major (meiofaunal) taxa namely foraminifera (2), copepoda (9), nematoda (58) and polychaeta (21) were encountered. Overall, meiofaunal (mean) abundance ranged from 2 individuals to 63 ind. 10cm-² with an average of 24.3 ind.10cm-2. The meiobenthic biomass varied between 0.135 to 0.48 mg.10cm-2 with an average 0.27 ± 0.12. On the whole, nematodes constituted 73.62% of the meiofauna in terms of numerical abundance. Shannon –Wiener index values were 2.053 ± 0.64 (June, 2008), 2.477 ± 0.177 (October 2008) and 2.2815±0.24 (March 2009). Multivariate analyses were used to define the most important taxon in nematode assemblages. Three nematode associations could be recognized off Pudimadaka coast, namely Laimella longicaudata, Euchromodora vulgaris and Sabatieria elongata assemblage (June, 2008); Catanema sp. and Leptosomatum sp. assemblage (October 2008) assemblage; Sabatieria sp. and Setosabatieria sp. assemblage (March 2009). Canonical correspondence analysis showed that temperature, organic matter, silt and mean particle diameter were important in controlling nematode community structure.

Keywords: meiofauna, marine nematode, biodiversity, community structure, India

Procedia PDF Downloads 303
535 Public Perception of Energy Security in Lithuania: Between Material Interest and Energy Independence

Authors: Dainius Genys, Vylius Leonavicius, Ricardas Krikstolaitis

Abstract:

Energy security problems in Lithuania are analyzed on a regular basis; however, there is no comprehensive research on the very issue of the concept of public energy security. There is a lack of attention not only to social determinants of perception of energy security, but also a lack of a deeper analysis of the public opinion. This article aims to research the Lithuanian public perception of energy security. Complex tasks were set during the sociological study. Survey questionnaire consisted of different sets of questions: view of energy security (risk perception, political orientation, and energy security; comprehensiveness and energy security); view of energy risks and threats (perception of energy safety factors; individual dependence and burden; disobedience and risk); view of the activity of responsible institutions (energy policy assessment; confidence in institutions and energy security), demographic issues. In this article, we will focus on two aspects: a) We will analyze public opinion on the most important aspects of energy security and social factors influencing them; The hypothesis is made that public perception of energy security is related to value orientations: b) We will analyze how public opinion on energy policy executed by the government and confidence in the government are intertwined with the concept of energy security. Data of the survey, conducted on May 10-19 and June 7-17, 2013, when Seimas and the government consisted of the coalition dominated by Social Democrats with Labor, Order and Justice Parties and the Electoral Action of Poles, were used in this article. It is important to note that the survey was conducted prior to Russia’s occupation of the Crimea.

Keywords: energy security, public opinion, risk, energy threat, energy security policy

Procedia PDF Downloads 510
534 The Influence of Immunity on the Behavior and Dignity of Judges

Authors: D. Avnieli

Abstract:

Immunity of judges from liability represents a departure from the principle that all are equal under the law, and that victims may be granted compensation from their offenders. The purpose of the study is to determine if judicial immunity coincides with the need to ensure the existence of highly independent and incorruptible judiciary. Judges are immune from civil and criminal liability for their judicial acts. Judicial immunity is justified by the need to maintain complete independence and discretion of the judiciary. Scholars and judges believe that absolute immunity is needed to shield judges from pressures, threats, or outside interference. It is commonly accepted, that judges should be free to perform their judicial role in accordance with their assessment of the fact and their understanding of the law, without any restrictions, influences, inducements or interferences. In most countries, immunity applies when judges act in excess of jurisdiction. In some countries, it applies even when they act maliciously or corruptly. The only exception to absolute immunity applicable in all judicial systems is when judges act without jurisdiction over the subject matter. The Israeli Supreme Court recently decided to embrace absolute immunity and strike off a lawsuit of a refugee, who was unlawfully incarcerated. The Court ruled that the plaintiff cannot sue the State or the judge for damages. The questions of malice, dignity, and public scrutiny were not discussed. This paper, based on comparative analysis of many cases, aims to determine if immunity affects the dignity and behavior of judges. It demonstrates that most judges maintain their dignity and ethical code of behavior, but sometimes do not hesitate to act consciously in excess of jurisdiction, and in rare cases even corruptly. Therefore, in order to maintain independent and incorruptible judiciary, immunity should not be applied where judges act consciously in excess of jurisdiction or with malicious incentives.

Keywords: incorruptible judiciary, immunity, independent, judicial, judges, jurisdiction

Procedia PDF Downloads 102
533 Environmental and Economic Impact of Mangrove Deforestation: Case Study of Vadamaradchy East, Sri Lanka

Authors: Kumaraamy Sasikumar

Abstract:

The study was conducted in Vadamarachchi-East in Sri Lanka. Data collection was done for a period of two months from June to July 2011. The main focus of this study was to examine factors contributing to mangrove deforestation within the study area, and resultant impacts from deforestation. The study found that, the main factors that have contributed to deforestation include: Long civil wars in the region, poverty which pushed people to clear the forest to earn income through the sale of firewood and timber among others, industrial development, increasing demand for farm and settlement land, limited knowledge within the local community, weak government polices and implementation strategies, and natural disasters especially the 2004 Tsunami destruction. The impacts presented are those that impact both on the environment and the economy including; loss of income sources, loss of biodiversity, climate change, desertification, conflicts in the use of forest products and loss of land productivity due to reduced fertility caused by soil erosion. However, a few strategies have been put in place by the government to ensure the sustainable use of mangrove forest products, though these have not proved successful in reducing deforestation. The recommendations make suggestions to the government and other stakeholders to work together in ensuring sustainable use of natural resources, for example implementing laws and regulations aimed at controlling deforestation among others.

Keywords: deforestation, impacts, actors, environment, economic, sustainable development

Procedia PDF Downloads 350
532 Binderless Naturally-extracted Metal-free Electrocatalyst for Efficient NOₓ Reduction

Authors: Hafiz Muhammad Adeel Sharif, Tian Li, Changping Li

Abstract:

Recently, the emission of nitrogen-sulphur oxides (NOₓ, SO₂) has become a global issue and causing serious threats to health and the environment. Catalytic reduction of NOx and SOₓ gases into friendly gases is considered one of the best approaches. However, regeneration of the catalyst, higher bond-dissociation energy for NOx, i.e., 150.7 kcal/mol, escape of intermediate gas (N₂O, a greenhouse gas) with treated flue-gas, and limited activity of catalyst remains a great challenge. Here, a cheap, binderless naturally-extracted bass-wood thin carbon electrode (TCE) is presented, which shows excellent catalytic activity towards NOx reduction. The bass-wood carbonization at 900 ℃ followed by thermal activation in the presence of CO2 gas at 750 ℃. The thermal activation resulted in an increase in epoxy groups on the surface of the TCE and enhancement in the surface area as well as the degree of graphitization. The TCE unique 3D strongly inter-connected network through hierarchical micro/meso/macro pores that allow large electrode/electrolyte interface. Owing to these characteristics, the TCE exhibited excellent catalytic efficiency towards NOx (~83.3%) under ambient conditions and enhanced catalytic response under pH and sulphite exposure as well as excellent stability up to 168 hours. Moreover, a temperature-dependent activity trend was found where the highest catalytic activity was achieved at 80 ℃, beyond which the electrolyte became evaporative and resulted in a performance decrease. The designed electrocatalyst showed great potential for effective NOx-reduction, which is highly cost-effective, green, and sustainable.

Keywords: electrocatalyst, NOx-reduction, bass-wood electrode, integrated wet-scrubbing, sustainable

Procedia PDF Downloads 75
531 Effects of Fire on Vegetation of the Prairies and Black Oak Sand Savannas of Kankakee, Illinois

Authors: Megan Alkazoff, Charles Ruffner

Abstract:

Tallgrass prairies and sand savannas, once covering northern to central Illinois, are ecosystems in need of restoration and conservation in the Midwestern United States. The Nature Conservancy manages five sites containing fragments of remaining tallgrass prairies and sand savannas within the Kankakee Sands using techniques such as prescribed burning and invasive species removal. The objective of this study was to conduct a ten-year resampling of transects established on these five sites during previous studies to assess whether the management tools applied there are helping maintain the tallgrass prairie and sand savannas. During the summer of 2020, permanent transect lines were sampled using a quadrat to determine the % Cover Class of each species rooted in the quadrat. Data gathered was analyzed using linear regression to illustrate the relationship between fire occurrence and species composition on the landscape. The fire frequency had a highly significant effect (P= 0.0025) on the species richness of all sites. The frequency of fire had a non-significant effect (P>0.05) on the Floristic Quality Index, percent C value 4-10, and bare-ground percentage of a site. These results suggest that fire on the landscape, both wild and prescribed, have increased biodiversity on all five sites but has not affected the Floristic Quality Index, percent C value 4-10, and the percentage of bare-ground on the sites.

Keywords: fire, floristic quality assessment, sand savanna, species richness, tallgrass prairie

Procedia PDF Downloads 178
530 Navigating the Cacophony of Human Rights Claims and Chains of Fraud in Nigeria: The Anti-Corruption War Perspective

Authors: Mike Omilusi

Abstract:

Since the Buhari administration came to power, it has gained the people’s confidence with its anti-corruption efforts. Making culprits account for their past unlawful deeds, in a very determined and aggressive manner ever witnessed in the nation’s political history, generates different reactions among Nigerians. However, some questions remain pertinent to this study: Are Nigerians really advocating persecution or prosecution in respect of the graft suspects? Do they want conviction without being convinced? Is their outburst propelled by emotions and revengeful anticipation of having suspected looters of the nation’s commonwealth behind bars? Can the war be successfully fought without resorting to impunity? Relying extensively on secondary sources with the aid of descriptive and narrative tools, this study seeks to interrogate the claim of fundamental human rights in the face of wanton looting of the nation’s resources. If, as opined by President Buhari, corruption is a crime against humanity, then it is argued that those who commit such crime should be subjected to penalties prescribed by law. Such crime -as corruption in this study- deprives the citizens of welfare, social amenities and good things of life. In this instance, it also poses threats to national security, having misappropriated funds meant for the war against the Boko Haram terrorism as revealed by the anti-corruption agency in the country. A theoretically-driven investigation, this essay raises some expectations within the context of good governance-propelled anti-corruption crusade, making modest recommendations as to how corruption should be prevented and combated within the confine of rule of law.

Keywords: corruption, rule of law, human rights, prosecution, commonwealth

Procedia PDF Downloads 202
529 Species Distribution Modelling for Assessing the Effect of Land Use Changes on the Habitat of Endangered Proboscis Monkey (Nasalis larvatus) in Kalimantan, Indonesia

Authors: Wardatutthoyyibah, Satyawan Pudyatmoko, Sena Adi Subrata, Muhammad Ali Imron

Abstract:

The proboscis monkey is an endemic species to the island of Borneo with conservation status IUCN (The International Union for Conservation of Nature) of endangered. The population of the monkey has a specific habitat and sensitive to habitat disturbances. As a consequence of increasing rates of land-use change in the last four decades, its population was reported significantly decreased. We quantified the effect of land use change on the proboscis monkey’s habitat through the species distribution modeling (SDM) approach with Maxent Software. We collected presence data and environmental variables, i.e., land cover, topography, bioclimate, distance to the river, distance to the road, and distance to the anthropogenic disturbance to generate predictive distribution maps of the monkeys. We compared two prediction maps for 2000 and 2015 data to represent the current habitat of the monkey. We overlaid the monkey’s predictive distribution map with the existing protected areas to investigate whether the habitat of the monkey is protected under the protected areas networks. The results showed that almost 50% of the monkey’s habitat reduced as the effect of land use change. And only 9% of the current proboscis monkey’s habitat within protected areas. These results are important for the master plan of conservation of the endangered proboscis monkey and provide scientific guidance for the future development incorporating biodiversity issue.

Keywords: endemic species, land use change, maximum entropy, spatial distribution

Procedia PDF Downloads 153
528 Utilization of Developed Single Sequence Repeats Markers for Dalmatian Pyrethrum (Tanacetum cinerariifolium) in Preliminary Genetic Diversity Study on Natural Populations

Authors: F. Varga, Z. Liber, J. Jakše, A. Turudić, Z. Šatović, I. Radosavljević, N. Jeran, M. Grdiša

Abstract:

Dalmatian pyrethrum (Tanacetum cinerariifolium (Trevir.) Sch. Bip.; Asteraceae), a source of the commercially dominant plant insecticide pyrethrin, is a species endemic to the eastern Adriatic. Genetic diversity of T. cinerariifolium was previously studied using amplified fragment length polymorphism (AFLP) markers. However, microsatellite markers (single sequence repeats - SSRs) are more informative because they are codominant, highly polymorphic, locus-specific, and more reproducible, and thus are most often used to assess the genetic diversity of plant species. Dalmatian pyrethrum is an outcrossing diploid (2n = 18) whose large genome size and high repeatability have prevented the success of the traditional approach to SSR markers development. The advent of next-generation sequencing combined with the specifically developed method recently enabled the development of, to the author's best knowledge, the first set of SSRs for genomic characterization of Dalmatian pyrethrum, which is essential from the perspective of plant genetic resources conservation. To evaluate the effectiveness of the developed SSR markers in genetic differentiation of Dalmatian pyrethrum populations, a preliminary genetic diversity study was conducted on 30 individuals from three geographically distinct natural populations in Croatia (northern Adriatic island of Mali Lošinj, southern Adriatic island of Čiovo, and Mount Biokovo) based on 12 SSR loci. Analysis of molecular variance (AMOVA) by randomization test with 10,000 permutations was performed in Arlequin 3.5. The average number of alleles per locus, observed and expected heterozygosity, probability of deviations from Hardy-Weinberg equilibrium, and inbreeding coefficient was calculated using GENEPOP 4.4. Genetic distance based on the proportion of common alleles (DPSA) was calculated using MICROSAT. Cluster analysis using the neighbor-joining method with 1,000 bootstraps was performed with PHYLIP to generate a dendrogram. The results of the AMOVA analysis showed that the total SSR diversity was 23% within and 77% between the three populations. A slight deviation from Hardy-Weinberg equilibrium was observed in the Mali Lošinj population. Allele richness ranged from 2.92 to 3.92, with the highest number of private alleles observed in the Mali Lošinj population (17). The average observed DPSA between 30 individuals was 0.557. The highest DPSA (0.875) was observed between several pairs of Dalmatian pyrethrum individuals from the Mali Lošinj and Mt. Biokovo populations, and the lowest between two individuals from the Čiovo population. Neighbor-joining trees, based on DPSA, grouped individuals into clusters according to their population affiliation. The separation of Mt. Biokovo clade was supported (bootstrap value 58%), which is consistent with the previous study on AFLP markers, where isolated populations from Mt. Biokovo differed from the rest of the populations. The developed SSR markers are an effective tool for assessing the genetic diversity and structure of natural Dalmatian pyrethrum populations. These preliminary results are encouraging for a future comprehensive study with a larger sample size across the species' range. Combined with the biochemical data, these highly informative markers could help identify potential genotypes of interest for future development of breeding lines and cultivars that are both resistant to environmental stress and high in pyrethrins. Acknowledgment: This work has been supported by the Croatian Science Foundation under the project ‘Genetic background of Dalmatian pyrethrum (Tanacetum cinerariifolium /Trevir./ Sch. Bip.) insecticidal potential’- (PyrDiv) (IP-06-2016-9034) and by project KK.01.1.1.01.0005, Biodiversity and Molecular Plant Breeding, at the Centre of Excellence for Biodiversity and Molecular Plant Breeding (CoE CroP-BioDiv), Zagreb, Croatia.

Keywords: Asteraceae, genetic diversity, genomic SSRs, NGS, pyrethrum, Tanacetum cinerariifolium

Procedia PDF Downloads 113
527 Deposition of Size Segregated Particulate Matter in Human Respiratory Tract and Their Health Effects in Glass City Residents

Authors: Kalpana Rajouriya, Ajay Taneja

Abstract:

Particulates are ubiquitous in the air environment and cause serious threats to human beings, such as lung cancer, COPD, and Asthma. Particulates mainly arise from industrial effluent, vehicular emission, and other anthropogenic activities. In the glass industrial city Firozabad, real-time monitoring of size segregated Particulate Matter (PM) and black carbon was done by Aerosol Black Carbon Detector (ABCD) and GRIMM portable aerosol Spectrometer at two different sites in which one site is urban and another is rural. The average mass concentration of size segregated PM during the study period (March & April 2022) was recorded as PM10 (223.73 g/m⁻³), PM5.0 (44.955 g/m⁻³), PM2.5 (59.275 g/m⁻³), PM1.0 (33.02 g/m⁻³), PM0.5 (2.05 g/m⁻³), and PM0.25 (2.99 g/m⁻³). The highest concentration of BC was found in Urban due to the emissions from diesel engines and wood burning, while NO2 was highest at the rural sites. The average concentrations of PM10 (6.08 and 2.73 times) PM2.5 exceeded the NAAQS and WHO guidelines. Particulate Matter deposition and health risk assessment was done by MPPD and USEPA model to know about the particulate matter toxicity in industrial residents. Health risk assessment results showed that Children are most likely to be affected by exposure of PM10 and PM2.5 and may have various non-carcinogenic and carcinogenic diseases. Deposition results inferred that the sensitive exposed population, especially 9 years old children, have high PM deposition as well as visualization and may be at risk of developing health-related problems from exposure to size-segregated PM. They will be discussed during presentation.

Keywords: particulate matter, black carbon, NO2, deposition of PM, health risk

Procedia PDF Downloads 64
526 Secure and Privacy-Enhanced Blockchain-Based Authentication System for University User Management

Authors: Ali El Ksimi

Abstract:

In today's digital academic environment, secure authentication methods are essential for managing sensitive user data, including that of students and faculty. The rise in cyber threats and data breaches has exposed the vulnerabilities of traditional authentication systems used in universities. Passwords, often the first line of defense, are particularly susceptible to hacking, phishing, and brute-force attacks. While multi-factor authentication (MFA) provides an additional layer of security, it can still be compromised and often adds complexity and inconvenience for users. As universities seek more robust security measures, blockchain technology emerges as a promising solution. Renowned for its decentralization, immutability, and transparency, blockchain has the potential to transform how user management is conducted in academic institutions. In this article, we explore a system that leverages blockchain technology specifically for managing user accounts within a university setting. The system enables the secure creation and management of accounts for different roles, such as administrators, teachers, and students. Each user is authenticated through a decentralized application (DApp) that ensures their data is securely stored and managed on the blockchain. By eliminating single points of failure and utilizing cryptographic techniques, the system enhances the security and integrity of user management processes. We will delve into the technical architecture, security benefits, and implementation considerations of this approach. By integrating blockchain into user management, we aim to address the limitations of traditional systems and pave the way for the future of digital security in education.

Keywords: blockchain, university, authentication, decentralization, cybersecurity, user management, privacy

Procedia PDF Downloads 22
525 From Protection of Sacrificial Self, to Critical Turning Points and Growth: Nurses’ Experiences of Caring for Patients on the Frontline in Ireland during the COVID-19 Pandemic

Authors: Sinead Creedon, Anna Trace

Abstract:

Nurses were the most exposed of all frontline healthcare workers during the COVID-19 pandemic. Mainly female nurses working in the acute hospital sector formed the frontline defence in the Irish health service. They faced it with resilience and courage despite exposure to risk of burnout and threats to their mental health and wellbeing. Gaining an understanding of the nurses’ journey in adapting to this harsh climate could inform positive psychology interventions and / or support staff such as senior hospital managers in an adverse work situation. Furthermore, it would strengthen our insight and theoretical understanding on the use of positive psychology interventions in adverse work conditions. An interpretative phenomenological analysis was carried out to gain insight into how nurses adapted to the changing work environment during the pandemic. Online semi-structured interviews were done with six experienced female nurses who were all redeployed to the frontline from their own roles. The three themes representing the nurses’ journey were the Protection of Sacrificial Self, The Fortifying Effect of Us, and Critical Turning Points & Growth. Nurses revitalised themselves by creating a sense of ‘us’ to help them face a harsh climate against others, which enabled additional critical turning points. This study further enriches our understanding of personal growth and trauma in adverse work conditions by including an exploration of what sacrificial commitment adds to our understanding of physical and moral courage.

Keywords: COVID-19, nurses, positive psychology, resilience, sacrificial commitment, supports

Procedia PDF Downloads 147
524 Mitigating Acid Mine Drainage Pollution: A Case Study In the Witwatersrand Area of South Africa

Authors: Elkington Sibusiso Mnguni

Abstract:

In South Africa, mining has been a key economic sector since the discovery of gold in 1886 in the Witwatersrand region, where the city of Johannesburg is located. However, some mines have since been decommissioned, and the continuous pumping of acid mine drainage (AMD) also stopped causing the AMD to rise towards the ground surface. This posed a serious environmental risk to the groundwater resources and river systems in the region. This paper documents the development and extent of the environmental damage as well as the measures implemented by the government to alleviate such damage. The study will add to the body of knowledge on the subject of AMD treatment to prevent environmental degradation. The method used to gather and collate relevant data and information was the desktop study. The key findings include the social and environmental impact of the AMD, which include the pollution of water sources for domestic use leading to skin and other health problems and the loss of biodiversity in some areas. It was also found that the technical intervention of constructing a plant to pump and treat the AMD using the high-density sludge technology was the most effective short-term solution available while a long-term solution was being explored. Some successes and challenges experienced during the implementation of the project are also highlighted. The study will be a useful record of the current status of the AMD treatment interventions in the region.

Keywords: acid mine drainage, groundwater resources, pollution, river systems, technical intervention, high density sludge

Procedia PDF Downloads 184
523 Root Cause Analysis of Surveillance Quality in Tanjung Priok Port to Prevent Epidemic Potential Disease as a Form of Bioterrorism Threat

Authors: Dina A. Amu, Fifi N. Afifah, Catur Rosidati, Tirton Nefianto

Abstract:

Indonesia was shaken up by the avian influenza cases that had caused the country suffered losses of millions of dollars. The avian influenza case had even been suspected as a bioterrorism attack since it was an uncommon case in epidemiology. Furthermore, this avian influenza virus is a high pathogenic one and Indonesia has the highest case of fatality rate in the world. Bioterrorism threats or epidemic potential disease outbreaks currently does not exist in Tanjung Priok port yet. However, the surveillance system enhancement on epidemic potential diseases should be taken as a prevention, especially because Indonesia is currently facing the ASEAN Economic Society (AES). Therefore, this research evaluates the health surveillance system which is organized by Control, Quarantine and Surveillance Department, Health Office of Tanjung Priok Port. This study uses qualitative-evaluative method which utilizes Urgency Seriousness Growth (USG) method to determine priority issues and Root Cause analysis to determine the cause of prior problem. The result of this research shows that the implementation of epidemic potential disease surveillance in Tanjung Priok port has not done in the best possible way. It is because the lack of time allocation and the succinctness of the check list of ship's environmental health inspection. Therefore, Health Ministry of Indonesia should recruit more employees at the health office of Tanjung Priok port, hold a simulation of ship's inspection and simplify the list for ship's environmental health inspection.

Keywords: surveillance, epidemic potential disease, port health, bioterrorism

Procedia PDF Downloads 362
522 Influence of Low and Extreme Heat Fluxes on Thermal Degradation of Carbon Fibre-Reinforced Polymers

Authors: Johannes Bibinger, Sebastian Eibl, Hans-Joachim Gudladt

Abstract:

This study considers the influence of different irradiation scenarios on the thermal degradation of carbon fiber-reinforced polymers (CFRP). Real threats are simulated, such as fires with long-lasting low heat fluxes and nuclear heat flashes with short-lasting high heat fluxes. For this purpose, coated and uncoated quasi-isotropic samples of the commercially available CFRP HexPly® 8552/IM7 are thermally irradiated from one side by a cone calorimeter and a xenon short-arc lamp with heat fluxes between 5 and 175 W/cm² at varying time intervals. The specimen temperature is recorded on the front and backside as well as at different laminate depths. The CFRP is non-destructively tested with ultrasonic testing, infrared spectroscopy (ATR-FTIR), scanning electron microscopy (SEM), and micro-focused computed X-Ray tomography (μCT). Destructive tests are performed to evaluate the mechanical properties in terms of interlaminar shear strength (ILSS), compressive and tensile strength. The irradiation scenarios vary significantly in heat flux and exposure time. Thus, different heating rates, radiation effects, and temperature distributions occur. This leads to unequal decomposition processes, which affect the sensitivity of the strength type and damage behaviour of the specimens. However, with the use of surface coatings, thermal degradation of composite materials can be delayed.

Keywords: CFRP, one-sided thermal damage, high heat flux, heating rate, non-destructive and destructive testing

Procedia PDF Downloads 110
521 Choosing the Lesser Evil: Tribal Alignment Formation in Civil Wars

Authors: Busra Nur Ozguler Aktel

Abstract:

This research aims to understand the factors that affect the ways in which tribes perceive and respond to violent conflicts in fragile states, given that tribes are essential stakeholders in many conflict-ridden fragile states, whether Afghanistan, Iraq, Syria, Libya, Somalia, Nigeria, or Yemen. It explores the primary questions of why some tribes align with extremist groups while others align with states during civil wars and why some tribes switch alignments. It argues that tribes form and switch alignments based on their perception of threats to their traditional tribal structure (internal dynamics) and clientelist relationships (external dynamics). Put differently; threat perceptions lead them to choose either the state or extremist groups that will more likely secure their traditional structure and patronage networks. This study focuses on Iraqi tribes as a case study. It builds a theory of tribal alignment formation based on ethnographic fieldwork in the Middle East, with a particular focus on Iraqi Sunni tribes living in the Kurdish region of Iraq and Jordan. As a result of the interviews with tribal leaders and members, local journalists, researchers, and politicians, it concludes that complex (re)alignments of tribes can determine the course and outcome of the conflicts, either mitigating or escalating violence. This study contributes to the larger body of conflict management and peacebuilding literature by introducing tribes as non-state actors and exploring their interactions with other actors in civil wars.

Keywords: civil wars, tribes, alignment formation, side-switching, Iraq

Procedia PDF Downloads 86
520 Key Challenges Facing the Management of Archaeological and Tourism Sites in Jordan

Authors: Muna Slehat

Abstract:

Jordan is endowed with over 14,500 productive archaeological sites and also a wealth of heritage sites that need to be protected from the pressing threat of destruction and damage. Archaeological sites in Jordan face significant threats, including insensitive development, urbanization, pollution, tourism, and vandalism, therefore an effective management plan is a key element, not only for the conservation of this heritage, but also to address issues such as tourism and sustainable development. This study highlights the obstacles that confront the management of the archaeological and tourism sites in Jordan, prior to and after the launch of the Strategies for Management of Jordan’s Archaeological Heritage by the Department of Antiquities (DoA) 2007-2010 and 2014-2018, as well as the establishment of the Directorate of the Management of Archaeological Sites in 2010, and instructions for the proper use of tourism sites, 2014, by the Ministry of Tourism and Antiquities (MoTA). The study has revealed that the management of the archaeological and tourism sites under the pretext of improvement of services for tourists and visitors to Jordan would allow access to so-called polarization tourism and facilitate tourism development that would be sustainable economically and provide attractive returns. The data required have been collected through conducting interviews with 18 specialists. The main findings of the study are that management is new in Jordan, and has become a vital and dynamic force in Jordan after 2000 but that there have also been many mistakes, with sustainability of the sites being ignored and a lack of awareness among local communities surrounding these sites. Management of the sites has also suffered from a lack of organizational vision, with no instructions for practical application and no legislative provisions which cater for the efficient management of the sites. All of this needs to be amended to remove gaps, overlaps and ambiguities, so that the authorities responsible for the rehabilitation and promotion, development and management of these sites can overcome the problems, such as lack of human resources (specialists) and financial resources.

Keywords: Jordan, management, archaeological sites, tourism, challenges

Procedia PDF Downloads 308
519 Cryptographic Resource Allocation Algorithm Based on Deep Reinforcement Learning

Authors: Xu Jie

Abstract:

As a key network security method, cryptographic services must fully cope with problems such as the wide variety of cryptographic algorithms, high concurrency requirements, random job crossovers, and instantaneous surges in workloads. Its complexity and dynamics also make it difficult for traditional static security policies to cope with the ever-changing situation. Cyber Threats and Environment. Traditional resource scheduling algorithms are inadequate when facing complex decision-making problems in dynamic environments. A network cryptographic resource allocation algorithm based on reinforcement learning is proposed, aiming to optimize task energy consumption, migration cost, and fitness of differentiated services (including user, data, and task security) by modeling the multi-job collaborative cryptographic service scheduling problem as a multi-objective optimized job flow scheduling problem and using a multi-agent reinforcement learning method, efficient scheduling and optimal configuration of cryptographic service resources are achieved. By introducing reinforcement learning, resource allocation strategies can be adjusted in real-time in a dynamic environment, improving resource utilization and achieving load balancing. Experimental results show that this algorithm has significant advantages in path planning length, system delay and network load balancing and effectively solves the problem of complex resource scheduling in cryptographic services.

Keywords: cloud computing, cryptography on-demand service, reinforcement learning, workflow scheduling

Procedia PDF Downloads 9
518 Resilient Security System with Toll Free Call Services: Case Study of Adama City

Authors: Shanko Chura Aredo, Hailu Jeldie Wodajo, Muktar Jeylan, Kedir Ilka, Abdulnasir Husein

Abstract:

Toll-free numbers are calling numbers that have unique three or four digit numbers and that don’t require payment from phone lines in order to be called. With the help of these numbers, callers can connect with nearby organizations and/or people without incurring far-reaching fees. Calls to assistance centers are especially popular from toll-free phones. In the past, toll-free services have offered prospective clients and other parties a simple and cost-free means of getting in touch with enterprises. Nevertheless, unless they have an ”unlimited calling” plan, wireless subscribers will be billed for the airtime minutes used during a toll-free call. In Adama, the second largest city in Ethiopia, a call center has been installed as part of smart security system and serving since January 2023 for collection of complaints from different community levels. The call center is situated at the mayor office and has 11 active workers, 4 of these working the night time and the remaining during day time. The information reported in the form of complaints from individuals and groups are illegal constructions, illegal trade, income concealment or hiding, giving and receiving bribe, informing new faces of suspected enemies and exposing individual or group conflicts. This technology has been found to bring a significant outcome in minimizing illegal acts, public safety threats and service delivery problems.

Keywords: smart, safety, crime, call center, security

Procedia PDF Downloads 54
517 Massive Deployments of Insurgent Intelligence by Violent Non-state Actors (VNSAs) in the 21st Century and Threats to Global Security

Authors: Temitope Francis Abiodun

Abstract:

The practice of intelligence is not limited to the machinery of a nation state alone, yet not much research or analysis has been directed towards the spy-crafts and tradecrafts engaged in by violent non-state actors (VNSAs) in the international community. The rise of 'private sector intelligence' in more recent years has only just begun to be interrogated by practitioners and academics. However, the use of intelligence by insurgents and other groups assembled to achieve varied forms of politico-military outcomes has often been overlooked. This paper examined the factors and conditions that gave rise to an increase in violent non-state actors (VNSAs), strategies aiding their deployment of insurgent intelligence, and as well the implications of their activities on global security. The failed state theory was adopted, while a descriptive research design served as the framework for the study. Data were collected from primary and secondary sources. The paper, however, revealed there were massive deployments of insurgent intelligence by violent non-state actors in contrast to a faulty pre-conception that insurgents were not as highly trained in deployment of intelligence as state actors, having assumed that the VNSAs lacked the sophistication to produce intelligence. However, the strategic objectives of insurgents (VNSAs) were revealed to depend on well-organized information gathering operations that feed into the tactical executions of their insurgency. The paper recommends, therefore, there is a need for adequate training on the part of security personnel in the states to be alive to their responsibilities; and there is also a need to ensure adequate border control and management to checkmate the influx of the various violent or deadly movements across global frontiers.

Keywords: terrorism, non-violent state actors, private sector intelligence, security

Procedia PDF Downloads 137
516 Influence of Pseudomonas japonica on Growth and Metal Tolerance of Celosia cristata L.

Authors: Muhammad Umair Mushtaq, Ameena Iqbal, Muhammad Aqib Hassan Ali Khan, Ismat Nawaz, Sohail Yousaf, Mazhar Iqbal

Abstract:

Heavy metals are one of the priority pollutants as they pose serious health and environmental threats. They can be removed by various physiochemical methods but are costly and responsible for additional environmental problems. Bioremediation that exploits plants and their associated microbes have been referred as cost effective and environmental friendly technique. In this study, a pot experiment was conducted in a greenhouse to evaluate the potential of Celosia cristata and effects of bacteria, Pseudomonas japonica, and organic amendment moss/compost on tolerating/accumulating heavy metals. Two weeks old seedlings were transferred to soil in pots, and after four weeks they were inoculated with bacterial strain, while after growth of six weeks they were watered with a metal containing synthetic wastewater and were harvested after a growth period of nine weeks. After harvesting, morphological and physiological parameters and metal content of plants were measured. The results showed highest plant growth and biomass production in case of organic amendments while highest metal uptake has been found in non-amended pots. Positive controls have shown highest Pb uptake of 2900 mg/kg DW, while P. japonica amended pots have shown highest Cd, Cr, Ni and Cu uptake of 963.53, 1481.17, 1022.01 and 602.17 mg/kg DW, respectively. In conclusion organic amendments have strong impacts on growth enhancement while P. japonica enhances metal translocation and accumulation to aerial parts with little significant involvement in plant growth.

Keywords: ornamental plants, plant microbe interaction, amendments, bacteria

Procedia PDF Downloads 289
515 The Estimation of Bird Diversity Loss and Gain as an Impact of Oil Palm Plantation: Study Case in KJNP Estate Riau Province

Authors: Yanto Santosa, Catharina Yudea

Abstract:

The rapid growth of oil palm industry in Indonesia raised many negative accusations from various parties, who said that oil palm plantation is damaging the environment and biodiversity, including birds. Since research on oil palm plantation impacts on bird diversity is still limited, this study needs to be developed in order to gain further learning and understanding. Data on bird diversity were collected in March 2018 in KJNP Estate, Riau Province using strip transect method on five different land cover types (young, intermediate, and old growth of oil palm plantation, high conservation value area, and crops field or the baseline). The observations were conducted simultaneously, with three repetitions. The result shows that the baseline has 19 species of birds and land cover after the oil palm plantation has 39 species. HCV (high conservation value) area has the highest increase in diversity value. Oil palm plantation has changed the composition of bird species. The highest similarity index is shown by young growth oil palm land cover with total score 0.65, meanwhile the lowest similarity index with total score 0.43 is shown by HCV area. Overall, the existence of oil palm plantation made a positive impact by increasing bird species diversity, with total 23 species gained and 3 species lost.

Keywords: bird diversity, crops field, impact of oil palm plantation, KJNP estate

Procedia PDF Downloads 123
514 Cycas beddomei Dyer: An Endemic and Endangered Indian Medicinal Plant

Authors: Ayyavu Brama Dhayala Selvam

Abstract:

Herbal medicines are gaining importance due to holistic nature and lesser side effects. Cycas beddomei Dyer is one of the highly exploited medicinal plants in India. Due to over-exploitation of male and female cones, young leaves and starch-bearing pithy stems for edible, medicinal and socio-cultural practices by the locals, tribals and traders, the plant population has drastically declined in its natural habitats. Cycas beddomei is an endemic to India. The current IUCN status of this plant species in the wild is endangered. Perhaps, it is the only species of Cycas enlisted in Appendix I of CITES (Convention on International Trade in Endangered Species of wild fauna and flora). Endorsing the CITES decisions, the Government of India has placed C. beddomei in the “Negative List of Exports” during 1998. Though this plant has been banned legally, but illegally, it is highly exploited by different means. Therefore, conservation of this species is an urgent need of the hour. The present paper highlights unique morphological and anatomical characters of C. beddomei, along with its present status, major threats and conservation measures. Cycas beddomei can easily be identified by some of the distinguishing morphological and anatomical characters, viz., 2–4 mm wide leaflets with revolute margins; the apices of microsporophylls from the middle to apex of the pollen cones turn downwards on maturity; mucilage canal cells are seen in the midrib region of the leaflets; stomatal frequency is about 18 numbers at 250x; pollen grains are monocolpate and their diameter ranging from 22.5 to 30 µm.

Keywords: CITES, Cycas beddomei, endangered, endemic

Procedia PDF Downloads 292
513 Reconceptualizing Bioeconomy: From the Hegemonic Vision to Diverse Economies and Economies-others for Life – Advocating for a Resilient and Just Future in Colombia

Authors: Alexander Rincón Ruiz

Abstract:

This article is based on an exhaustive review and interdisciplinary effort spanning three years. It involved interviews, dialogues, discussion panels, and collective work on various visions of bio-economy in Colombia. The dialogue included government institutions, universities, local communities, activist groups, research institutes, the productive sector, and politicians, integrating perspectives such as Latin American environmental thought, complexity theory, modern visions, local worldviews (Afro-Colombian, indigenous, peasant), decoloniality, political ecology, ecological economics, and environmental economies. This work highlighted the need to redefine the traditional bio-economy concept, typically focused on markets and biotechnology, and to revisit the original idea of a bio-economy as an ‘economy for life’. In a country as diverse as Colombia—both biophysically and in its varied relationships with the territory—this redefinition is crucial. It emphasizes alternative logics of well-being related to resilience, care, and cooperation, reflecting Indigenous, Afro-Colombian, and peasant worldviews. This article is significant for proposing, for the first time, a viable approach to diverse and alternative economies for life tailored to the Colombian context. It represents not only academic work but also a political commitment to inclusion and plurality, aligning with the Colombian context and potentially extendable to other regions.

Keywords: ecological economics, decoloniality, complexity, Biodiversity

Procedia PDF Downloads 34
512 Methods and Algorithms of Ensuring Data Privacy in AI-Based Healthcare Systems and Technologies

Authors: Omar Farshad Jeelani, Makaire Njie, Viktoriia M. Korzhuk

Abstract:

Recently, the application of AI-powered algorithms in healthcare continues to flourish. Particularly, access to healthcare information, including patient health history, diagnostic data, and PII (Personally Identifiable Information) is paramount in the delivery of efficient patient outcomes. However, as the exchange of healthcare information between patients and healthcare providers through AI-powered solutions increases, protecting a person’s information and their privacy has become even more important. Arguably, the increased adoption of healthcare AI has resulted in a significant concentration on the security risks and protection measures to the security and privacy of healthcare data, leading to escalated analyses and enforcement. Since these challenges are brought by the use of AI-based healthcare solutions to manage healthcare data, AI-based data protection measures are used to resolve the underlying problems. Consequently, this project proposes AI-powered safeguards and policies/laws to protect the privacy of healthcare data. The project presents the best-in-school techniques used to preserve the data privacy of AI-powered healthcare applications. Popular privacy-protecting methods like Federated learning, cryptographic techniques, differential privacy methods, and hybrid methods are discussed together with potential cyber threats, data security concerns, and prospects. Also, the project discusses some of the relevant data security acts/laws that govern the collection, storage, and processing of healthcare data to guarantee owners’ privacy is preserved. This inquiry discusses various gaps and uncertainties associated with healthcare AI data collection procedures and identifies potential correction/mitigation measures.

Keywords: data privacy, artificial intelligence (AI), healthcare AI, data sharing, healthcare organizations (HCOs)

Procedia PDF Downloads 92