Search results for: cache timing attack
223 Musically Yours: Impact of Social Media Advertisement Music per the Circadian Rhythm
Authors: Payal Bose
Abstract:
The impact of music on consumers' attention and emotions at different parts of the day are rarely/never studied. Music has been widely studied in different parameters, such as in-store music and its atmospheric effects, to understand consumer arousal, in-store traffic, perceptions of visual stimuli, and actual time spent in the store. Further other parameters such as tempo, shopper's age, volume, music preference, and its usage as foreground or background music acting as a mediator and impacting consumer behavior is also well researched. However, no study has traversed the influence of music on social media advertisements and its impact on the consumer mind. Most studies have catered to the influence of music on consumers conscious. A recent study found that playing pleasant music is more effective on weekdays in enhancing supermarkets' sales than on weekends. This led to a more pertinent question about the impact of music on different parts of the day and how it impacts the attention and emotion in the consumers’ mind is an interesting question to be asked given the fact that there is a high usage of social media advertisement consumption in the recent past on a day-to-day basis. This study would help brands on social media to structure their advertisements and engage more consumers towards their products. Prior literature has examined the effects or influence of music on consumers largely in retail, brick-and-mortar format. Hence most of the outcomes are favorable for physical retail environments. However, with the rise of Web 3.0 and social media marketing, it would be interesting to see how consumers' attention and emotion can be studied with the effects of music embedded in an advertisement during different parts of the day. A smartphone is considered a personal gadget, and viewing social media advertisements on them is mostly an intimate experience. Hence in a social media advertisement, most of the viewing happens on a one-on-one basis between the consumer and the brand advertisement. To the best of our knowledge, little or no work has explored the influence of music on different parts of the day (per the circadian rhythm) in advertising research. Previous works on social media advertisement have explored the timing of social media posts, deploying Targeted Content Advertising, appropriate content, reallocation of time, and advertising expenditure. Hence, I propose studying advertisements embedded with music during different parts of the day and its influence on consumers' attention and emotions. To address the research objectives and knowledge gap, it is intended to use a neuroscientific approach using fMRI and eye-tracking. The influence of music embedded in social media advertisement during different parts of the day would be assessed.Keywords: music, neuromarketing, circadian rhythm, social media, engagement
Procedia PDF Downloads 65222 Efficacy of Opicapone and Levodopa with Different Levodopa Daily Doses in Parkinson’s Disease Patients with Early Motor Fluctuations: Findings from the Korean ADOPTION Study
Authors: Jee-Young Lee, Joaquim J. Ferreira, Hyeo-il Ma, José-Francisco Rocha, Beomseok Jeon
Abstract:
The effective management of wearing-off is a key driver of medication changes for patients with Parkinson’s disease (PD) treated with levodopa (L-DOPA). While L-DOPA is well tolerated and efficacious, its clinical utility over time is often limited by the development of complications such as dyskinesia. Still, common first-line option includes adjusting the daily L-DOPA dose followed by adjunctive therapies usually counting for the L-DOPA equivalent daily dose (LEDD). The LEDD conversion formulae are a tool used to compare the equivalence of anti-PD medications. The aim of this work is to compare the effects of opicapone (OPC) 50 mg, a catechol-O-methyltransferase (COMT) inhibitor, and an additional 100 mg dose of L-DOPA in reducing the off time in PD patients with early motor fluctuations receiving different daily L-DOPA doses. OPC was found to be well tolerated and efficacious in advanced PD population. This work utilized patients' home diary data from a 4-week Phase 2 pharmacokinetics clinical study. The Korean ADOPTION study randomized (1:1) patients with PD and early motor fluctuations treated with up to 600 mg of L-DOPA given 3–4 times daily. The main endpoint was change from baseline in off time in the subgroup of patients receiving 300–400 mg/day L-DOPA at baseline plus OPC 50 mg and in the subgroup receiving >300 mg/day L-DOPA at baseline plus an additional dose of L-DOPA 100 mg. Of the 86 patients included in this subgroup analysis, 39 received OPC 50 mg and 47 L-DOPA 100 mg. At baseline, both L-DOPA total daily dose and LEDD were lower in the L-DOPA 300–400 mg/day plus OPC 50 mg group than in the L-DOPA >300 mg/day plus L-DOPA 100 mg. However, at Week 4, LEDD was similar between the two groups. The mean (±standard error) reduction in off time was approximately three-fold greater for the OPC 50 mg than for the L-DOPA 100 mg group, being -63.0 (14.6) minutes for patients treated with L-DOPA 300–400 mg/day plus OPC 50 mg, and -22.1 (9.3) minutes for those receiving L-DOPA >300 mg/day plus L-DOPA 100 mg. In conclusion, despite similar LEDD, OPC demonstrated a significantly greater reduction in off time when compared to an additional 100 mg L-DOPA dose. The effect of OPC appears to be LEDD independent, suggesting that caution should be exercised when employing LEDD to guide treatment decisions as this does not take into account the timing of each dose, onset, duration of therapeutic effect and individual responsiveness. Additionally, OPC could be used for keeping the L-DOPA dose as low as possible for as long as possible to avoid the development of motor complications which are a significant source of disability.Keywords: opicapone, levodopa, pharmacokinetics, off-time
Procedia PDF Downloads 62221 The Shrinking Nature of Parliamentary Immunity in Kenya: A Proposal for Judicial Restraint
Authors: Oscar Sang, Shadrack David Rotich
Abstract:
Parliamentary immunity is grounded on the notion that parliaments need certain rights or immunities to ensure they can operate independently make fair and impartial decisions without capitulating to political pressure or intimidation. The 2013 election in Kenya marked an important milestone in the development of the law of parliamentary privilege. Such importance relates to the dramatic increase in the number of legislatures in the country from one unicameral parliament, to a bicameral national parliament and forty-seven other regional legislative assemblies. The increase in legislatures has resulted in a dramatic increase in political contestations which have led to legal wrangles. The judiciary in Kenya, once considered submissive, has been invited to arbitrate on various matters pitting individual rights and parliamentary privilege and have invalidated a number of legislative action. While judicial intervention is indeed necessary to ensure that legislatures in Kenya live true to the constitutional aspirations of the Kenyan people, certain judicial decisions have had an effect on eroding parliamentary immunity. This paper highlights a number of instances in which it could be argued that parliamentary privilege came under attack by the courts in Kenya. The paper aims to make a case that while Kenya’s progressive constitution necessitates the scope and extent of legislature’s immunities and privilege to be determined by the courts, it is important that courts exercise restraint in its review of legislative action. The paper makes the argument that unrestrained judicial action in Kenya on questions within the realm parliamentary privilege may undermine the functioning of Kenya’s legislatures. The paper explores approaches taken by a number of jurisdictions in establishing a proper balance between maintaining a viable parliamentary privilege regime in a rights-based constitutional system.Keywords: Kenya, constitution, judicial restraint, parliamentary privilege
Procedia PDF Downloads 169220 Study of Microbial Diversity Associated with Tarballs and Their Exploitation in Crude Oil Degradation
Authors: Varsha Shinde, Belle Damodara Shenoy
Abstract:
Tarballs are crude oil remnants found in oceans after long term weathering process and are a global concern since several decades as potential marine pollutant. Being complicated in structure microbial remediation of tarballs in natural environment is a slow process. They are rich in high molecular weight alkanes and poly aromatic hydrocarbons which are resistant to microbial attack and other environmental factors, therefore remain in environment for long time. However, it has been found that many bacteria and fungi inhabit on tarballs for nutrients and shelter. Many of them are supposed to be oil degraders, while others are supposed to be getting benefited by byproducts formed during hydrocarbon metabolism. Thus tarballs are forming special interesting ecological niche of microbes. This work aimed to study diversity of bacteria and fungi from tarballs and to see their potential application in crude oil degradation. The samples of tarballs were collected from Betul beach of south Goa (India). Different methods were used to isolate culturable fraction of bacteria and fungi from it. Those were sequenced for 16S rRNA gene and ITS for molecular level identification. The 16S rRNA gene sequence analysis revealed the presence of 13 bacterial genera/clades (Alcanivorax, Brevibacterium, Bacillus, Cellulomonas, Enterobacter, Klebsiella, Marinobacter, Nitratireductor, Pantoea, Pseudomonas, Pseudoxanthomonas, Tistrella and Vibrio), while the ITS sequence analysis placed the fungi in 8 diverse genera/ clades (Aspergillus, Byssochlamys, Monascus, Paecilomyces, Penicillium, Scytalidium/ Xylogone, Talaromyces and Trichoderma). All bacterial isolates were screened for oil degradation capacity. Potential strains were subjected to crude oil degradation experiment for quantification. Results were analyzed by GC-MS-MS.Keywords: bacteria, biodegradation, crude oil, diversity, fungi, tarballs
Procedia PDF Downloads 221219 Neural Networks Underlying the Generation of Neural Sequences in the HVC
Authors: Zeina Bou Diab, Arij Daou
Abstract:
The neural mechanisms of sequential behaviors are intensively studied, with songbirds a focus for learned vocal production. We are studying the premotor nucleus HVC at a nexus of multiple pathways contributing to song learning and production. The HVC consists of multiple classes of neuronal populations, each has its own cellular, electrophysiological and functional properties. During singing, a large subset of motor cortex analog-projecting HVCRA neurons emit a single 6-10 ms burst of spikes at the same time during each rendition of song, a large subset of basal ganglia-projecting HVCX neurons fire 1 to 4 bursts that are similarly time locked to vocalizations, while HVCINT neurons fire tonically at average high frequency throughout song with prominent modulations whose timing in relation to song remains unresolved. This opens the opportunity to define models relating explicit HVC circuitry to how these neurons work cooperatively to control learning and singing. We developed conductance-based Hodgkin-Huxley models for the three classes of HVC neurons (based on the ion channels previously identified from in vitro recordings) and connected them in several physiologically realistic networks (based on the known synaptic connectivity and specific glutaminergic and gabaergic pharmacology) via different architecture patterning scenarios with the aim to replicate the in vivo firing patterning behaviors. We are able, through these networks, to reproduce the in vivo behavior of each class of HVC neurons, as shown by the experimental recordings. The different network architectures developed highlight different mechanisms that might be contributing to the propagation of sequential neural activity (continuous or punctate) in the HVC and to the distinctive firing patterns that each class exhibits during singing. Examples of such possible mechanisms include: 1) post-inhibitory rebound in HVCX and their population patterns during singing, 2) different subclasses of HVCINT interacting via inhibitory-inhibitory loops, 3) mono-synaptic HVCX to HVCRA excitatory connectivity, and 4) structured many-to-one inhibitory synapses from interneurons to projection neurons, and others. Replication is only a preliminary step that must be followed by model prediction and testing.Keywords: computational modeling, neural networks, temporal neural sequences, ionic currents, songbird
Procedia PDF Downloads 70218 Exploring Stakeholders’ Perceptions of the Implementation of the Door-to-Door Vaccination Campaign for the Oral Polio Vaccine (NOPV2) In Uganda: A Qualitative Study
Authors: Elizabeth B. Katana, Brenda N. Simbwa, Josephine Namayanja, Bob O. Amodan, Edirisa J. Nsubuga, Eva A. O. Laker
Abstract:
Background: Understanding stakeholders’ perceptions towards the implementation of a mass vaccination campaign is important to ensure the design of better strategies to address challenges. We explored stakeholders’ perceptions of the implementation of a nationwide door-to-door mass vaccination campaign for the oral polio vaccine (nOPV2) in Uganda for the two rounds that occurred in January and November 2022. Methods: A qualitative study was conducted among stakeholders who participated in the campaign implementation from 8 districts in Uganda using random sampling. We conducted 46 In-depth interviews lasting 30 – 40 minutes with 6 national/central supervisors, 12 district, 14 sub-county, and 14 parish-level supervisors. Stakeholders were asked about their experiences in the campaign implementation, including challenges faced and their opinions of the campaign impact and use of the door-to-door strategy. Data were analyzed thematically in line with the major campaign activities. Results: Most of the stakeholders were primarily concerned about poor planning, inadequate training of vaccination teams, community resistance including schools, challenges with recruitment and teaming of vaccinators, poor and delayed payments, lack of logistics and motivation for vaccination teams, the timing of the activities and implementing amidst COVID-19 and Ebola. The stakeholders believed that the first round was not well planned and implemented, while the second round was leveraged in their previous experiences. On the other hand, some positive experiences were noted with regard to communication, advocacy and mobilization, vaccine delivery and distribution, district readiness assessments, and cold chain management. Conclusion: This study identified many challenges that were faced in the implementation of the door-to-door mass campaign for nOPV2 in Uganda. This study identified that more needs to be done to improve door-to-door mass campaigns with a focus on motivating the implementers. These findings highlight the need for conducting performance reviews, improved planning, especially routine updates and verification of target populations and training in microplanning, and adequate mapping of community resistance to inform the implementation of future mass campaigns.Keywords: mass polio vaccination campaigns, door-to-door strategy, stakeholders' perceptions, implementation challenges
Procedia PDF Downloads 70217 Management of Insect Pests Using Baculovirus Based Biopesticides in India
Authors: Mudasir Gani, Rakesh Kumar Gupta, Kamlesh Bali, Abdul Rouf Wani
Abstract:
The gypsy moth (Lymantria obfuscata) and tent caterpillar (Malacosoma indicum) are serious pests that attack a wide range of fruit and forest trees in Jammu & Kashmir range of North-Western Himalayas in India. Investigations were carried out to isolate and bioprospect naturally occurring nucleopolyhedroviruses (NPVs) as potent biopesticides against these pests. The biological and molecular characterization of NPV isolates from different ecosystems was conducted, and the polh, lef-8 and lef-9 genes were sequenced and subjected to phylogenetic analysis. The L. obfuscata NPV was more closely related to the L. dispar NPV, whereas M. indicum NPV was more closely related to the M. californicum NPV in the NCBI taxonomy database. Among different isolates, Bhaderwah isolates exhibited highest virus activity (LD₅₀ = 250 POBs/larvae) and speed of kill (ST₅₀ = 6.80 days) against L. obfuscata whereas Mahor isolates proved most virulent against M. indicum, with lowest LD₅₀ (257 POBs/larva) and ST₅₀ (6.80 days). The in vivo mass production for highest productivity and quality revealed that the optimum yield was obtained when 3rd instar larvae were inoculated with a viral dose of 1.44 × 105 POBs/larva and allowed to incubate for nine days for L. obfuscata. However, for M. indicum larvae, a viral dose of 2.88 × 10⁶ POBs/larva and incubation period of 10 days were found optimum. It was found that harvesting of moribund larvae yields good quality NPV. The field application of L. obfuscata NPV and M. indicum NPV against the respective host populations on apple and willow with the pre-standardized dosage of 1 × 10¹² POBs/acre reduced the larval population density up to 25-63%.Keywords: baculoviruses, biopesticides, Lymantria obfuscata, Malacosoma indicum
Procedia PDF Downloads 112216 Machine Learning-Based Techniques for Detecting and Mitigating Cyber-attacks on Automatic Generation Control in Smart Grids
Authors: Sami M. Alshareef
Abstract:
The rapid growth of smart grid technology has brought significant advancements to the power industry. However, with the increasing interconnectivity and reliance on information and communication technologies, smart grids have become vulnerable to cyber-attacks, posing significant threats to the reliable operation of power systems. Among the critical components of smart grids, the Automatic Generation Control (AGC) system plays a vital role in maintaining the balance between generation and load demand. Therefore, protecting the AGC system from cyber threats is of paramount importance to maintain grid stability and prevent disruptions. Traditional security measures often fall short in addressing sophisticated and evolving cyber threats, necessitating the exploration of innovative approaches. Machine learning, with its ability to analyze vast amounts of data and learn patterns, has emerged as a promising solution to enhance AGC system security. Therefore, this research proposal aims to address the challenges associated with detecting and mitigating cyber-attacks on AGC in smart grids by leveraging machine learning techniques on automatic generation control of two-area power systems. By utilizing historical data, the proposed system will learn the normal behavior patterns of AGC and identify deviations caused by cyber-attacks. Once an attack is detected, appropriate mitigation strategies will be employed to safeguard the AGC system. The outcomes of this research will provide power system operators and administrators with valuable insights into the vulnerabilities of AGC systems in smart grids and offer practical solutions to enhance their cyber resilience.Keywords: machine learning, cyber-attacks, automatic generation control, smart grid
Procedia PDF Downloads 85215 Affordable Aerodynamic Balance for Instrumentation in a Wind Tunnel Using Arduino
Authors: Pedro Ferreira, Alexandre Frugoli, Pedro Frugoli, Lucio Leonardo, Thais Cavalheri
Abstract:
The teaching of fluid mechanics in engineering courses is, in general, a source of great difficulties for learning. The possibility of the use of experiments with didactic wind tunnels can facilitate the education of future professionals. The objective of this proposal is the development of a low-cost aerodynamic balance to be used in a didactic wind tunnel. The set is comprised of an Arduino microcontroller, programmed by an open source software, linked to load cells built by students from another project. The didactic wind tunnel is 5,0m long and the test area is 90,0 cm x 90,0 cm x 150,0 cm. The Weq® electric motor, model W-22 of 9,2 HP, moves a fan with nine blades, each blade 32,0 cm long. The Weq® frequency inverter, model WEGCFW 08 (Vector Inverter) is responsible for wind speed control and also for the motor inversion of the rotational direction. A flat-convex profile prototype of airfoil was tested by measuring the drag and lift forces for certain attack angles; the air flux conditions remained constant, monitored by a Pitot tube connected to a EXTECH® Instruments digital pressure differential manometer Model HD755. The results indicate a good agreement with the theory. The choice of all of the components of this proposal resulted in a low-cost product providing a high level of specific knowledge of mechanics of fluids, which may be a good alternative to teaching in countries with scarce educational resources. The system also allows the expansion to measure other parameters like fluid velocity, temperature, pressure as well as the possibility of automation of other functions.Keywords: aerodynamic balance, wind tunnel, strain gauge, load cell, Arduino, low-cost education
Procedia PDF Downloads 444214 Combining Transcriptomics, Bioinformatics, Biosynthesis Networks and Chromatographic Analyses for Cotton Gossypium hirsutum L. Defense Volatiles Study
Authors: Ronald Villamar-Torres, Michael Staudt, Christopher Viot
Abstract:
Cotton Gossypium hirsutum L. is one of the most important industrial crops, producing the world leading natural textile fiber, but is very prone to arthropod attacks that reduce crop yield and quality. Cotton cultivation, therefore, makes an outstanding use of chemical pesticides. In reaction to herbivorous arthropods, cotton plants nevertheless show natural defense reactions, in particular through volatile organic compounds (VOCs) emissions. These natural defense mechanisms are nowadays underutilized but have a very high potential for cotton cultivation, and elucidating their genetic bases will help to improve their use. Simulating herbivory attacks by mechanical wounding of cotton plants in greenhouse, we studied by qPCR the changes in gene expression for genes of the terpenoids biosynthesis pathway. Differentially expressed genes corresponded to higher levels of the terpenoids biosynthesis pathway and not to enzymes synthesizing particular terpenoids. The genes were mapped on the G. hirsutum L. reference genome; their global relationships inside the general metabolic pathways and the biosynthesis of secondary metabolites were visualized with iPath2. The chromatographic profiles of VOCs emissions indicated first monoterpenes and sesquiterpenes emissions, dominantly four molecules known to be involved in plant reactions to arthropod attacks. As a result, the study permitted to identify potential key genes for the emission of volatile terpenoids by cotton plants in reaction to an arthropod attack, opening possibilities for molecular-assisted cotton breeding in benefit of smallholder cotton growers.Keywords: biosynthesis pathways, cotton, mechanisms of plant defense, terpenoids, volatile organic compounds
Procedia PDF Downloads 374213 Obesity and Physical Inactivity: Contributing Factors to Hypertension in Early Adults
Authors: Sadaf Ambreen, Ayesha Bibi, Sara Rafiq
Abstract:
Hypertension is a medical condition in which blood pressure in the arteries is elevated than the normal, having systolic blood pressure more than 120mmHg and diastolic blood pressure more than 80 mmHg. It leads to health complications and increase the risk of diseases such as stroke, heart failure, heart attack, and even death. The aim of the current study was to evaluate nutritional status and activity level among hypertensive early adults in District Mardan Data was collected from the subjects of Public Hospital, Mardan Medical Complex, through questionnaire. A complete information about individual sociodemographic, anthropometry and health status were collected, and physical activity was assessed by using IPAQ questionnaire. A total of 150 individuals were included in the study, in which 90% were females, and 10% were males. Data was analyzed through SPSS Version 22. Majority of the study subjects, 88%, were married, 70% having nuclear living system, 43% were having elementary education, and 43% were working as laborer. Body mass index and waist circumference in female counterpart were found to be positively associated with hypertension and was found statistically significant P=<0.01. Results showed that majority of females were fall in hypertension crisis category with mild activity, and males were having hypertension stage 1 with moderate activity. Our study concluded that non-optimal nutritional status and physical inactivity resulted in elevated blood pressure in females, therefore, lifestyle change such as optimal nutritional status and physical activity may play key role in reducing risk of hypertension.Keywords: obesity/overwight, body mass index, waist circumference, early adulthood
Procedia PDF Downloads 148212 Violence in the School Environment: When the Teenager Encounters the Threat of Depression
Authors: Ndje Ndje Mireille
Abstract:
For some years in Cameroon, there has been an increase in violence in schools. This violence has gone from verbal to physical, sometimes going as far as murder. At the centre of this violence, we find the student who is a teenager in the midst of both physical and psychological changes. The unpredictable transformations of his body, the unexpected emotions arrouse when he encouters someonelse, intrusion, shortcomings, boredom, loneliness and self-deception are the threats to which the teenager faces daily. From the psychopathological point of view, the greatest threat in adolesence is probably the depresive threat. During adolescence and for several resons, the subject is confronted with the self image. He displays certantity which sometimes hides great uncertaintity about what leads him to manifest some particular behaviours or undertake certain actions. Faced with aggressiveness twards those he confronts, he feels more or less guilt. This can lead a certain number of adolescents to feel heplessness faced to their vis-à-vis, faced to life. This helplessness is sometimes reinforced by the social, cultural and economic context in which they are. The teeneger then feels threatens by this depression which, when it reaches its extreme, it is manifested by the feeling that he can no longer do anything. Generally, the depressive threats manifest itself in defensive forms vis-à-vis with the depression itself. Reason why, it is indeed a threat and not a threshold already crossed. This threat often manifests itself in inappropriate forms of attack on one’s own body as seen in a number of repetitive risky behaviours. We also see teenegers confront peers and even adults through physical attacks and often go as far as murder. All these behaviours appears as an absurd way of attacking and at the same time confronting the feeling of remaining alive. This depressive threats can also be expressed in forms of attacks on an individual’s thinking abilities or more explicitely in the form of accademic downfall. The depressive threats does not sum up all the problems of adolescence, but, undoubtly represents currently, one of the deepest form of unease adolescents face.Keywords: violence, school, depression threats, adolescent, behavior
Procedia PDF Downloads 82211 Cinematic Liberty vs. Offending Social, Religious Beliefs: With Special Reference to the Controversial Contents in Cinema and Print Media
Authors: Govind Ji Pandey
Abstract:
The divergent opinions in the society are important for its development but with reasonable restrictions. The world recently witnessed one of the most violent protests by a group against the editor and publisher of the magazine ‘Charlie Hebdo’ for publishing cartoon of their religious leader. The supporter of freedom of speech and expression around the world were in shock and termed it the strongest attack against the free speech. People all around the world condemned the killing of the journalists but many soft voices from several corners were also coming for reasonable restrictions on the freedom of speech and expression. Of late, Indian society has witnessed many protests and supports of films with controversial content. It is the beauty of the Indian democracy which gives an opportunity to all for discussion and debate on any issue that challenges established social norms. However, many organizations as well as individuals misuse it for their personal benefits. There have been many film directors who faced protest from several quarters for their controversial themes. This research aims at analyzing the controversial contents published in print media and shown in films. To understand the nature and frequency of such media reports, content analysis technique is used. The research also highlights the perception of the public regarding the controversies. For getting the popular opinion on the coverage of controversial content in cinema and print media, five hundred people from Lucknow, UP, India were randomly selected. The findings of this research are important to understand the response of media and society towards the controversial content presented in cinema and print media. The research highlights that how a handful of people curb free speech in a democratic country like India.Keywords: cinema, censor board, free speech, liberty, social-religious beliefs
Procedia PDF Downloads 264210 Renewable Energy Storage Capacity Rating: A Forecast of Selected Load and Resource Scenario in Nigeria
Authors: Yakubu Adamu, Baba Alfa, Salahudeen Adamu Gene
Abstract:
As the drive towards clean, renewable and sustainable energy generation is gradually been reshaped by renewable penetration over time, energy storage has thus, become an optimal solution for utilities looking to reduce transmission and capacity cost, therefore the need for capacity resources to be adjusted accordingly such that renewable energy storage may have the opportunity to substitute for retiring conventional energy systems with higher capacity factors. Considering the Nigeria scenario, where Over 80% of the current Nigerian primary energy consumption is met by petroleum, electricity demand is set to more than double by mid-century, relative to 2025 levels. With renewable energy penetration rapidly increasing, in particular biomass, hydro power, solar and wind energy, it is expected to account for the largest share of power output in the coming decades. Despite this rapid growth, the imbalance between load and resources has created a hindrance to the development of energy storage capacity, load and resources, hence forecasting energy storage capacity will therefore play an important role in maintaining the balance between load and resources including supply and demand. Therefore, the degree to which this might occur, its timing and more importantly its sustainability, is the subject matter of the current research. Here, we forecast the future energy storage capacity rating and thus, evaluate the load and resource scenario in Nigeria. In doing so, We used the scenario-based International Energy Agency models, the projected energy demand and supply structure of the country through 2030 are presented and analysed. Overall, this shows that in high renewable (solar) penetration scenarios in Nigeria, energy storage with 4-6h duration can obtain over 86% capacity rating with storage comprising about 24% of peak load capacity. Therefore, the general takeaway from the current study is that most power systems currently used has the potential to support fairly large penetrations of 4-6 hour storage as capacity resources prior to a substantial reduction in capacity ratings. The data presented in this paper is a crucial eye-opener for relevant government agencies towards developing these energy resources in tackling the present energy crisis in Nigeria. However, if the transformation of the Nigeria. power system continues primarily through expansion of renewable generation, then longer duration energy storage will be needed to qualify as capacity resources. Hence, the analytical task from the current survey will help to determine whether and when long-duration storage becomes an integral component of the capacity mix that is expected in Nigeria by 2030.Keywords: capacity, energy, power system, storage
Procedia PDF Downloads 34209 Quantification of Factors Contributing to Wave-In-Deck on Fixed Jacket Platforms
Authors: C. Y. Ng, A. M. Johan, A. E. Kajuputra
Abstract:
Wave-in-deck phenomenon for fixed jacket platforms at shallow water condition has been reported as a notable risk to the workability and reliability of the platform. Reduction in reservoir pressure, due to the extraction of hydrocarbon for an extended period of time, has caused the occurrence of seabed subsidence. Platform experiencing subsidence promotes reduction of air gaps, which eventually allows the waves to attack the bottom decks. The impact of the wave-in-deck generates additional loads to the structure and therefore increases the values of the moment arms. Higher moment arms trigger instability in terms of overturning, eventually decreases the reserve strength ratio (RSR) values of the structure. The mechanics of wave-in-decks, however, is still not well understood and have not been fully incorporated into the design codes and standards. Hence, it is necessary to revisit the current design codes and standards for platform design optimization. The aim of this study is to evaluate the effects of RSR due to wave-in-deck on four-legged jacket platforms in Malaysia. Base shear values with regards to calibration and modifications of wave characteristics were obtained using SESAM GeniE. Correspondingly, pushover analysis is conducted using USFOS to retrieve the RSR. The effects of the contributing factors i.e. the wave height, wave period and water depth with regards to the RSR and base shear values were analyzed and discussed. This research proposal is important in optimizing the design life of the existing and aging offshore structures. Outcomes of this research are expected to provide a proper evaluation of the wave-in-deck mechanics and in return contribute to the current mitigation strategies in managing the issue.Keywords: wave-in-deck loads, wave effects, water depth, fixed jacket platforms
Procedia PDF Downloads 427208 Cyberstalking as an Online Sexual Harassment: Evidence from Experience from Female University Students in Tanzanian Institutions of Higher Learning
Authors: Angela Mathias Kavishe
Abstract:
Sexual harassment directed at women is reported in many societies, including in Tanzania. The advent of ICT technology, especially in universities, seems to aggravate the situation by extending harassment to cyberspace in various forms, including cyberstalking. Evidence shows that online violence is more dangerous than physical one due to the ability to access multiple private information, attack many victims, mask the perpetrator's identity, suspend the threat for a long time and spread over time and space. The study aimed to measure the magnitude of cyber harassment in Tanzanian higher learning institutions and to assess institutional sensitivity to ICT-mediated gender-based violence. It was carried out in 4 higher learning institutions in Tanzania: Mwalimu Nyerere Memorial Academy and Institute of Finance Management in Dar es Salaam and SAUT, and the University of Dodoma, where a survey questionnaire was distributed to 400 students and 40 key informants were interviewed. It was found that in each institution, the majority of female students experienced online harassment on social media perpetrated by ex-partners, male students, and university male teaching staff. The perpetrators compelled the female students to post nude pictures, have sexual relations with them, or utilize the posted private photographs to force female students to practice online or offline sexual relations. These threats seem to emanate from social-cultural beliefs about the subordinate position of women in society and that women's bodies are perceived as sex objects. It is therefore concluded that cyberspace provides an alternative space for perpetrators to exercise violence towards women.Keywords: cyberstalking, embodiment, gender-based violence, internet
Procedia PDF Downloads 50207 Software-Defined Networking: A New Approach to Fifth Generation Networks: Security Issues and Challenges Ahead
Authors: Behrooz Daneshmand
Abstract:
Software Defined Networking (SDN) is designed to meet the future needs of 5G mobile networks. The SDN architecture offers a new solution that involves separating the control plane from the data plane, which is usually paired together. Network functions traditionally performed on specific hardware can now be abstracted and virtualized on any device, and a centralized software-based administration approach is based on a central controller, facilitating the development of modern applications and services. These plan standards clear the way for a more adaptable, speedier, and more energetic network beneath computer program control compared with a conventional network. We accept SDN gives modern inquire about openings to security, and it can significantly affect network security research in numerous diverse ways. Subsequently, the SDN architecture engages systems to effectively screen activity and analyze threats to facilitate security approach modification and security benefit insertion. The segregation of the data planes and control and, be that as it may, opens security challenges, such as man-in-the-middle attacks (MIMA), denial of service (DoS) attacks, and immersion attacks. In this paper, we analyze security threats to each layer of SDN - application layer - southbound interfaces/northbound interfaces - controller layer and data layer. From a security point of see, the components that make up the SDN architecture have a few vulnerabilities, which may be abused by aggressors to perform noxious activities and hence influence the network and its administrations. Software-defined network assaults are shockingly a reality these days. In a nutshell, this paper highlights architectural weaknesses and develops attack vectors at each layer, which leads to conclusions about further progress in identifying the consequences of attacks and proposing mitigation strategies.Keywords: software-defined networking, security, SDN, 5G/IMT-2020
Procedia PDF Downloads 99206 Utilization of Long Acting Reversible Contraceptive Methods, and Associated Factors among Female College Students in Gondar Town, Northwest Ethiopia, 2018
Authors: Woledegebrieal Aregay
Abstract:
Introduction: Family planning is defined as the ability of individuals and couples to anticipate and attain their desired number of children and the spacing and timing of their births. It is part of a strategy to reduce poverty, maternal, infant and child mortality; empowers women by lightening the burden of excessive childbearing. Family planning is achieved through the use of different contraceptive methods among which the most effective method is modern family planning methods like Long-Acting Reversible Contraceptive (LARCs) which are IUCD and Implant and these methods have multiple advantages over other reversible methods. Most importantly, once in place, they do not require maintenance and their duration of action is long, ranging from 3 to10 years. Methods: An institutional-based cross-sectional study was conducted in Gondar town among female college students from April-May. A simple random sampling technique was employed to recruit a total of 1166 study subjects. Descriptive variables were computed for all predictors & dependent variables. The presence of an association between covariates & LARC use was observed by two tables’ findings using the chi-square test. Bivariate logistic regression was conducted to identify all possible factors affecting LARC utilization & its crude Odds Ratio, 95% Confidence Interval (CI) & P-value was observed. A multivariable logistic regression model was developed to control possible confounding variables. Adjusted Odds Ratio (AOR) with 95% Confidence Interval (CI) &P-values will be computed to identify significantly associated factors (P < 0.05) with LARC utilization. Result: Utilization of LARCs was 20.4%, the most common is Implant 86(96.5%), and followed by Intra-Uterine Contraceptive Device (IUCD) 3(3.5%). The result of the multivariate analysis revealed that the significant association of marital status of the respondent on utilization of LARC [AOR 3.965(2.051-7.665)], discussion of the respondent about LARC utilization with the husband/boyfriend [AOR 2.198(1.191-4.058)], and attitude of the respondent on implant was found to be associated [AOR 0.365(0.143-0.933)].Conclusion: The level of knowledge and attitude in this study was not satisfactory, the utilization of long-acting reversible contraceptives among college students was relatively satisfactory but if the knowledge and attitude of the participant has improved the prevalence of LARC were increased.Keywords: utilization, long-acting reversible contraceptive, Ethiopia, Gondar
Procedia PDF Downloads 224205 Lightweight and Seamless Distributed Scheme for the Smart Home
Authors: Muhammad Mehran Arshad Khan, Chengliang Wang, Zou Minhui, Danyal Badar Soomro
Abstract:
Security of the smart home in terms of behavior activity pattern recognition is a totally dissimilar and unique issue as compared to the security issues of other scenarios. Sensor devices (low capacity and high capacity) interact and negotiate each other by detecting the daily behavior activity of individuals to execute common tasks. Once a device (e.g., surveillance camera, smart phone and light detection sensor etc.) is compromised, an adversary can then get access to a specific device and can damage daily behavior activity by altering the data and commands. In this scenario, a group of common instruction processes may get involved to generate deadlock. Therefore, an effective suitable security solution is required for smart home architecture. This paper proposes seamless distributed Scheme which fortifies low computational wireless devices for secure communication. Proposed scheme is based on lightweight key-session process to upheld cryptic-link for trajectory by recognizing of individual’s behavior activities pattern. Every device and service provider unit (low capacity sensors (LCS) and high capacity sensors (HCS)) uses an authentication token and originates a secure trajectory connection in network. Analysis of experiments is revealed that proposed scheme strengthens the devices against device seizure attack by recognizing daily behavior activities, minimum utilization memory space of LCS and avoids network from deadlock. Additionally, the results of a comparison with other schemes indicate that scheme manages efficiency in term of computation and communication.Keywords: authentication, key-session, security, wireless sensors
Procedia PDF Downloads 318204 Effect of Palm Bunch Ash and Neem (Azardirachta indica A. Juss) Leaf Powder on Termite Infestation in Groundnut Field
Authors: K. O. Ogbedeh, C. P. Ekwe, G. O. Ihejirika, S. A. Dialoke, O. P. Onyewuchi, C. P. Anyanwu, I. E. Kalu
Abstract:
As one of the major pests of field crops, termites attack groundnut at all stages of its development, especially during prolonged dry spell. Effect of palm bunch ash and neem(Azardirachta indica A. Juss) leaf powder on termite infestation in groundnut field in Owerri, Nigeria was investigated in this study. The field trial was carried out in 2016 at the Teaching and Research Farm of the Federal University of Technology, Owerri, Nigeria. The experiment was laid out in a 3x3 Factorial fitted into a Randomized Complete Block Design (RCBD) with three replications. The treatments include three rates of palm bunch ash at 0.0 (control), 1.0 and 2.0tons/ha and three rates of neem leaf powder at 0.0(control), 1.0, 2.0 tons/ha respectively. Data were collected on percentage emergence, termite incidence and termite severity. These were subjected to analysis of variance (ANOVA), and means were separated using least significant difference at 5% level of probability. The result shows that there were no significant (P= 0.05) differences in percentage emergence amongst treatment means due to palm bunch ash and neem leaf powder applications. Contrarily, palm bunch ash at 2.0 tons/ha recorded the least termite incidence especially at twelve weeks after planting (12WAP) with a value of 22.20% while control plot maintained highest values at 6WAP (48.70%) and 12WAP (48.30%) respectively. Also palm bunch ash at 2.0tons/ha depressed termite severity more than other treatments especially at 2 and 4 WAP (0.56) respectively. Control plots on the other hand consistently maintained highest termite severity throughout the trial with the highest value at 2 and 12WAP (1.56). Conclusively, palm bunch ash exhibited highest depressive action against termite on groundnut especially at higher application value (2.0tons/ha).Keywords: groundnut, incidence, neem, palm, severity, termites
Procedia PDF Downloads 229203 Screening of Different Exotic Varieties of Potato through Adaptability Trial for Local Cultivation
Authors: Arslan Shehroz, Muhammad Amjad Ali, Amjad Abbas, Imran Ramzan, Muhammad Zunair Latif
Abstract:
Potato (Solanum tuberosum L.) is the 4th most important food crop of the world after wheat, rice and maize. It is the staple food in many European countries. Being rich in starch (one of the main three food ingredients) and having the highest productivity per unit area, has great potential to address the challenge of the food security. Processed potato is also used as chips and crisps etc as ‘fast food’. There are many biotic and abiotic factors which check the production of potato and become hurdle in achievement production potential of potato. 20 new varieties along with two checks were evaluated. Plant to plant and row to row distances were maintained as 20 cm and 75 cm, respectively. The trial was conducted according to the randomized complete block design with three replications. Normal agronomic and plant protection measures were carried out in the crop. It is revealed from the experiment that exotic variety 171 gave the highest yield of 35.5 t/ha followed by Masai with 31.0 t/ha tuber yield. The check variety Simply Red 24.2 t/ha yield, while the lowest tuber yield (1.5 t/ha) was produced by the exotic variety KWS-06-125. The maximum emergence was shown by the Variety Red Sun (89.7 %). The lowest emergence was shown by the variety Camel (71.7%). Regarding tuber grades, it was noted that the maximum Ration size tubers were produced by the exotic variety Compass (3.7%), whereas 11 varieties did not produce ration size tubers at all. The variety Red Sun produced lowest percentage of small size tubers (12.7%) whereas maximum small size tubers (93.0%) were produced by the variety Jitka. Regarding disease infestation, it was noted that the maximum scab incidence (4.0%) was recorded on the variety Masai, maximum rhizoctonia attack (60.0%) was recorded on the variety Camel and maximum tuber cracking (0.7%) was noted on the variety Vendulla.Keywords: check variety, potato, potential and yield, trial
Procedia PDF Downloads 378202 Numerical Aeroacoustics Investigation of Eroded and Coated Leading Edge of NACA 64- 618 Airfoil
Authors: Zeinab Gharibi, B. Stoevesandt, J. Peinke
Abstract:
Long term surface erosion of wind turbine blades, especially at the leading edge, impairs aerodynamic performance; therefore, lowers efficiency of the blades mostly in the high-speed rotor tip regions. Blade protection provides significant improvements in annual energy production, reduces costly downtime, and protects the integrity of the blades. However, this protection still influences the aerodynamic behavior, and broadband noise caused by interaction between the impinging turbulence and blade’s leading edge. This paper presents an extensive numerical aeroacoustics approach by investigating the sound power spectra of the eroded and coated NACA 64-618 wind turbine airfoil and evaluates aeroacoustics improvements after the protection procedure. Using computational fluid dynamics (CFD), different quasi 2D numerical grids were implemented and special attention was paid to the refinement of the boundary layers. The noise sources were captured and decoupled with acoustic propagation via the derived formulation of Curle’s analogy implemented in OpenFOAM. Therefore, the noise spectra were compared for clean, coated and eroded profiles in the range of chord-based Reynolds number (1.6e6 ≤ Re ≤ 11.5e6). Angle of attack was zero in all cases. Verifications were conducted for the clean profile using available experimental data. Sensitivity studies for the far-field were done on different observational positions. Furthermore, beamforming studies were done simulating an Archimedean spiral microphone array for far-field noise directivity patterns. Comparing the noise spectra of the coated and eroded geometries, results show that, coating clearly improves aerodynamic and acoustic performance of the eroded airfoil.Keywords: computational fluid dynamics, computational aeroacoustics, leading edge, OpenFOAM
Procedia PDF Downloads 223201 Modelling Insider Attacks in Public Cloud
Authors: Roman Kulikov, Svetlana Kolesnikova
Abstract:
Last decade Cloud Computing technologies have been rapidly becoming ubiquitous. Each year more and more organizations, corporations, internet services and social networks trust their business sensitive information to Public Cloud. The data storage in Public Cloud is protected by security mechanisms such as firewalls, cryptography algorithms, backups, etc.. In this way, however, only outsider attacks can be prevented, whereas virtualization tools can be easily compromised by insider. The protection of Public Cloud’s critical elements from internal intruder remains extremely challenging. A hypervisor, also called a virtual machine manager, is a program that allows multiple operating systems (OS) to share a single hardware processor in Cloud Computing. One of the hypervisor's functions is to enforce access control policies. Furthermore, it prevents guest OS from disrupting each other and from accessing each other's memory or disk space. Hypervisor is the one of the most critical and vulnerable elements in Cloud Computing infrastructure. Nevertheless, it has been poorly protected from being compromised by insider. By exploiting certain vulnerabilities, privilege escalation can be easily achieved in insider attacks on hypervisor. In this way, an internal intruder, who has compromised one process, is able to gain control of the entire virtual machine. Thereafter, the consequences of insider attacks in Public Cloud might be more catastrophic and significant to virtual tools and sensitive data than of outsider attacks. So far, almost no preventive security countermeasures have been developed. There has been little attention paid for developing models to assist risks mitigation strategies. In this paper formal model of insider attacks on hypervisor is designed. Our analysis identifies critical hypervisor`s vulnerabilities that can be easily compromised by internal intruder. Consequently, possible conditions for successful attacks implementation are uncovered. Hence, development of preventive security countermeasures can be improved on the basis of the proposed model.Keywords: insider attack, public cloud, cloud computing, hypervisor
Procedia PDF Downloads 361200 Sympatric Calanus Species: A High Temporal Resolution of Reproductive Timing and Stage Composition
Authors: Mads Schultz, Galice Hoarau, Marvin Choquet
Abstract:
Members of the genus Calanus are key species in the North Atlantic and Arctic marine ecosystems due to their vast abundance and their ability to accumulate high amounts of lipid. As a link between primary producers and higher trophic levels, the temporal presence of each Calanus species is important in a time of changing communities and northward distribution shifts. This study focused on the temporal niches of the sympatric species Calanus helgolandicus, Calanus finmarchicus, Calanus glacialis, and Calanus hyperboreus in Skjerstad fjord, a Norwegian fjord (67˚14’N, 14 ˚44’E). Three depth intervals were sampled monthly over a year, targeting copepodite stages of the genus Calanus. Species determination was carried out genetically using insertion/deletion markers. In addition, during the reproductive season (Jan-May), weekly samples of the upper 50 meters of the water column targeting nauplii and 5 depth intervals targeting copepodites were collected. Nauplii samples were sorted into two groups (NI-NIII and NIV-NVI), and species were genetically identified. Specimens from stage CIV to adults from each depth interval of copepodite sampling were photographed in order to generate a supporting timeline of visual traits, including gonad maturation stage, presence of stomach content, and total lipid content. The most abundant species were Calanus finmarchicus and Calanus glacialis, followed by Calanus hyperboreus. These species were present in the water column throughout the year, whereas Calanus helgolandicus, the least abundant species, was only present during the summer and autumn period. Each species showed distinct temporal niches, with Calanus finmarchicus occupying the upper 50 meters longer than any of the other species. Calanus hyperboreus dominates in abundance early in the spring but are outnumbered by Calanus glacialis and Calanus finmarchicus after spring bloom sets in. In Skjerstad fjord, Calanus hyperboreus is a clear capital breeder with a long period of nauplii presence before the spring bloom. Calanus glacialis and Calanus finmarchicus both utilize income breeding, with Calanus glacialis developing to the larger nauplii stages quicker than Calanus finmarchicus, but also having a shorter reproduction period. Indeed, the “traditional Arctic” species Calanus hyperboreus and Calanus glacialis appear to end their reproduction period earlier than the North Atlantic Calanus finmarchicus.Keywords: calanus, depth distribution, reproduction, stage composition, temporal niches
Procedia PDF Downloads 150199 Impacts of Public Insurance on Health Access and Outcomes: Evidence from India
Authors: Titir Bhattacharya, Tanika Chakraborty, Prabal K. De
Abstract:
Maternal and child health continue to be a significant policy focus in developing countries, including India. An emerging model in health care is the creation of public and private partnerships. Since the construction of physical infrastructure is costly, governments at various levels have tried to implement social health insurance schemes where a trust calculates insurance premiums and medical payments. Typically, qualifying families get full subsidization of the premium and get access to private hospitals, in addition to low cost public hospitals, for their tertiary care needs. We analyze one such pioneering social insurance scheme in the Indian state of Andhra Pradesh (AP). The Rajiv Aarogyasri program (RA) was introduced by the Government of AP on a pilot basis in 2007 and implemented in 2008. In this paper, we first examine the extent to which access to reproductive health care changed. For example, the RA scheme reimburses hospital deliveries leading us to expect an increase in institutional deliveries, particularly in private hospitals. Second, we expect an increase in institutional deliveries to also improve child health outcomes. Hence, we estimate if the program improved infant and child mortality. We use District Level Health Survey data to create annual birth cohorts from 2000-2015. Since AP was the only state in which such a state insurance program was implemented, the neighboring states constituted a plausible control group. Combined with the policy timing, and the year of birth, we employ a difference-indifference strategy to identify the effects of RA on the residents of AP. We perform several checks against threats to identification, including testing for pre-treatment trends between the treatment and control states. We find that the policy significantly lowered infant and child mortality in AP. We also find that deliveries in private hospitals increased, and government hospitals decreased, showing a substitution effect of the relative price change. Finally, as expected, out-of-pocket costs declined for the treatment group. However, we do not find any significant effects for usual preventive care such as vaccination, showing that benefits of insurance schemes targeted at the tertiary level may not trickle down to the primary care level.Keywords: public health insurance, maternal and child health, public-private choice
Procedia PDF Downloads 96198 Effect of Doping on Band Gap of Zinc Oxide and Degradation of Methylene Blue and Industrial Effluent
Authors: V. P. Borker, K. S. Rane, A. J. Bhobe, R. S. Karmali
Abstract:
Effluent of dye industries contains chemicals and organic dyes. Sometimes they are thrown in the water bodies without any treatment. This leads to environmental pollution and is detrimental to flora and fauna. Semiconducting oxide zinc oxide with wide bandgap 3.37 eV is used as a photocatalyst in degrading organic dyes using UV radiations. It generates electron-hole pair on exposure to UV light. If degradation is aimed at solar radiations, bandgap of zinc oxide is to be reduced so as to utilize visible radiation. Thus, in present study, zinc oxide, ZnO is synthesized from zinc oxalate, N doped zinc oxide, ZnO₁₋ₓNₓ from hydrazinated zinc oxalate, cadmium doped zinc oxide Zn₀.₉Cd₀.₁₀ and magnesium-doped zinc oxide Zn₀.₉Mg₀.₁₀ from mixed metal oxalate and hydrazinated mixed metal oxalate. The precursors were characterized by FTIR. They were decomposed to form oxides and XRD were recorded. The compounds were monophasic. Bandgap was calculated using Diffuse Reflectance Spectrum. The bandgap of ZnO was reduced to 3.24 because of precursor method of synthesis leading large surface area. The bandgap of Zn₀.₉Cd₀.₁₀ was 3.11 eV and that of Zn₀.₉Mg₀.₁₀ 3.41 eV. The lowest value was of ZnO₁₋ₓNₓ 3.09 eV. These oxides were used to degrade methylene blue, a model dye in sunlight. ZnO₁₋ₓNₓ was also used to degrade effluent of industry manufacturing colours, crayons and markers. It was observed that ZnO₁₋ₓNₓ acts as a good photocatalyst for degradation of methylene blue. It can degrade the solution within 120 minutes. Similarly, diluted effluent was decolourised using this oxide. Some colours were degraded using ZnO. Thus, the use of these two oxides could mineralize effluent. Lesser bandgap leads to more electro hole pair thus helps in the formation of hydroxyl ion radicals. These radicals attack the dye molecule, fragmentation takes place and it is mineralised.Keywords: cadmium doped zinc oxide, dye degradation, dye effluent degradation, N doped zinc oxide, zinc oxide
Procedia PDF Downloads 168197 The Interaction of Climate Change and Human Health in Italy
Authors: Vito Telesca, Giuseppina A. Giorgio, M. Ragosta
Abstract:
The effects of extreme heat events are increasing in recent years. Humans are forced to adjust themselves to adverse climatic conditions. The impact of weather on human health has become public health significance, especially in light of climate change and rising frequency of devasting weather events (e.g., heat waves and floods). The interest of scientific community is widely known. In particular, the associations between temperature and mortality are well studied. Weather conditions are natural factors that affect the human organism. Recent works show that the temperature threshold at which an impact is seen varies by geographic area and season. These results suggest heat warning criteria should consider local thresholds to account for acclimation to local climatology as well as the seasonal timing of a forecasted heat wave. Therefore, it is very important the problem called ‘local warming’. This is preventable with adequate warning tools and effective emergency planning. Since climate change has the potential to increase the frequency of these types of events, improved heat warning systems are urgently needed. This would require a better knowledge of the full impact of extreme heat on morbidity and mortality. The majority of researchers who analyze the associations between human health and weather variables, investigate the effect of air temperature and bioclimatic indices. These indices combine air temperature, relative humidity, and wind speed and are very important to determine the human thermal comfort. Health impact studies of weather events showed that the prevention is an essential element to dramatically reduce the impact of heat waves. The summer Italian of 2012 was characterized with high average temperatures (con un +2.3°C in reference to the period 1971-2000), enough to be considered as the second hottest summer since 1800. Italy was the first among countries in Europe which adopted tools for to predict these phenomena with 72 hours in advance (Heat Health Watch Warning System - HHWWS). Furthermore, in Italy heat alert criteria relies on the different Indexes, for example Apparent temperature, Scharlau index, Thermohygrometric Index, etc. This study examines the importance of developing public health policies that protect the most vulnerable people (such as the elderly) to extreme temperatures, highlighting the factors that confer susceptibility.Keywords: heat waves, Italy, local warming, temperature
Procedia PDF Downloads 243196 Biotic Potential of Different Densities of Aphid Parasitoids, Diaeretiella rapae (Hymenoptera: Braconidae: Aphidiinae) Feeding on Brevicoryne brassicae
Authors: Muhammad Anjum Aqueel, Muhammad Jaffar Hussain, Abu Bakar Muhammad Raza
Abstract:
Diaeretiella rapae (M’Intosh) attack most of the aphid species. However, it is specialized in feeding on crucifer aphid, Brevicoryne brassicae. Biological potential of parasitoid is its density-dependency due to sharing of limited resources in few cases. The present study was carried out to check the biotic potential of D. rapae at its different densities (1, 2, 4, 8 and 10 pairs) on fixed number of B. brassicae (100 in number) as a host. The present study was performed under laboratory conditions (25 ± 2 ºC temperature and 65-70 % R.H.). Different biological parameters for parasitoid (e.g. percent parasitism, adult emergence, adult longevity and per pair parasitism) were evaluated to check its biotic potential. The present findings showed that maximum parasitism (43.09 % ± 0.63) was observed in highest density (10 pairs) and minimum parasitism (16.59 % ± 1.28) in lowest density (1 pair) of the parasitoid. Maximum adult emergence (80.31 % ± 1.33) was observed in highest density (10 pairs) and minimum parasitism (45.99 % ± 1.27) in lowest density (1 pair) of the parasitoid. In the case of adult longevity, highest (8.2 days ± 0.38) and lowest (6 days ± 0.32) longevity were observed in lowest (1 pair) and highest (10 pairs) densities of parasitoids respectively. However, per pair parasitism rate decreased with the increase in parasitoid densities due to intra-specific competition, developed between the parasitoids for parasitism. The positive but close relationship was observed between percent parasitism and adult emergence. The increase in parasitoid densities increased the percent parasitism and adult emergence of the parasitoid. So, we conclude that an inter-specific competition negatively affected the efficacy of parasitoids and may reduce the fitness of the emerging parasitoid.Keywords: Diaeretiella rapae, Parasitoid densities, Percent parasitism, adult emergence
Procedia PDF Downloads 234195 Multiple Version of Roman Domination in Graphs
Authors: J. C. Valenzuela-Tripodoro, P. Álvarez-Ruíz, M. A. Mateos-Camacho, M. Cera
Abstract:
In 2004, it was introduced the concept of Roman domination in graphs. This concept was initially inspired and related to the defensive strategy of the Roman Empire. An undefended place is a city so that no legions are established on it, whereas a strong place is a city in which two legions are deployed. This situation may be modeled by labeling the vertices of a finite simple graph with labels {0, 1, 2}, satisfying the condition that any 0-vertex must be adjacent to, at least, a 2-vertex. Roman domination in graphs is a variant of classic domination. Clearly, the main aim is to obtain such labeling of the vertices of the graph with minimum cost, that is to say, having minimum weight (sum of all vertex labels). Formally, a function f: V (G) → {0, 1, 2} is a Roman dominating function (RDF) in the graph G = (V, E) if f(u) = 0 implies that f(v) = 2 for, at least, a vertex v which is adjacent to u. The weight of an RDF is the positive integer w(f)= ∑_(v∈V)▒〖f(v)〗. The Roman domination number, γ_R (G), is the minimum weight among all the Roman dominating functions? Obviously, the set of vertices with a positive label under an RDF f is a dominating set in the graph, and hence γ(G)≤γ_R (G). In this work, we start the study of a generalization of RDF in which we consider that any undefended place should be defended from a sudden attack by, at least, k legions. These legions can be deployed in the city or in any of its neighbours. A function f: V → {0, 1, . . . , k + 1} such that f(N[u]) ≥ k + |AN(u)| for all vertex u with f(u) < k, where AN(u) represents the set of active neighbours (i.e., with a positive label) of vertex u, is called a [k]-multiple Roman dominating functions and it is denoted by [k]-MRDF. The minimum weight of a [k]-MRDF in the graph G is the [k]-multiple Roman domination number ([k]-MRDN) of G, denoted by γ_[kR] (G). First, we prove that the [k]-multiple Roman domination decision problem is NP-complete even when restricted to bipartite and chordal graphs. A problem that had been resolved for other variants and wanted to be generalized. We know the difficulty of calculating the exact value of the [k]-MRD number, even for families of particular graphs. Here, we present several upper and lower bounds for the [k]-MRD number that permits us to estimate it with as much precision as possible. Finally, some graphs with the exact value of this parameter are characterized.Keywords: multiple roman domination function, decision problem np-complete, bounds, exact values
Procedia PDF Downloads 108194 Seed Dressing and Foliar Spray of Green Bean (Phaseolus vulgaris L.) with Essential Oils and Disinfectants for Suppressing Root Rot and Wilt Incidence under Field Conditions
Authors: N. S. El-Mougy, M. M. Abdel-Kader, H. M. Abouelnasr
Abstract:
The efficacy of two essential oils applied as a bean seed dressing followed by seedlings foliar spray with four commercial disinfectants against root rot and wilt incidence was evaluated under field conditions. The essential oils, grape seed and peppermint oils and the disinfectants, Gold, Revarest, Klenva, Malva were applied. Chitosan and the fungicide Topsin-M were used as comparison treatment. Essential oils individually or combined with disinfectants were applied as a bean seed dressing. Furthermore, emerged bean plants were sprayed with the same treatments. Under laboratory conditions, growth inhibition effect was observed for the isolated, tested fungi R. solani and F. oxysporum when exposed to essential oils individually or combined with disinfectants. A high inhibitor effect was recorded for peppermint followed by grape seed oils. Concentrations of 1% and 2% of chitosan as well as Topsin M at 400 ppm showed complete reduction (100%) in the two fungal growths. Under field conditions, the obtained results showed that the applied treatments of chitosan had a superior effect on root rot and wilt disease incidence compared with other tested treatments. It was found that seed coating treatment provides good protection of emerged green bean seeds against the root pathogens attack compared with the fungicide and control treatments. Also, the application of seed dressing with essential oils accompanied by seedling spray demonstrated similar results. It was observed that essential oils had an enhancing effect against disease incidence when combined with disinfectants compared with their application. The obvious yield increase was significantly higher in all applied treatments than in fungicide and control.Keywords: bean, disinfectants, essential oils, root rot, wilt
Procedia PDF Downloads 160