Search results for: cyber threats
234 Flame Propagation Velocity of Selected Gas Mixtures Depending on the Temperature
Authors: Kaczmarzyk Piotr, Anna Dziechciarz, Wojciech Klapsa
Abstract:
The purpose of this paper is demonstration the test results of research influence of temperature on the velocity of flame propagation using gas and air mixtures for selected gas mixtures. The research was conducted on the test apparatus in the form of duct 2 m long. The test apparatus was funded from the project: “Development of methods to neutralize threats of explosion for determined tanks contained technical gases, including alternative sources of supply in the fire environment, taking into account needs of rescuers” number: DOB-BIO6/02/50/2014. The Project is funded by The National Centre for Research and Development. This paper presents the results of measurement of rate of pressure rise and rate in flame propagation, using test apparatus for mixtures air and methane or air and propane. This paper presents the results performed using the test apparatus in the form of duct measuring the rate of flame and overpressure wave. Studies were performed using three gas mixtures with different concentrations: Methane (3% to 8% vol), Propane (3% to 6% vol). As regard to the above concentrations, tests were carried out at temperatures 20 and 30 ̊C. The gas mixture was supplied to the inside of the duct by the partial pressure molecules. Data acquisition was made using 5 dynamic pressure transducers and 5 ionization probes, arranged along of the duct. Temperature conditions changes were performed using heater which was mounted on the duct’s bottom. During the tests, following parameters were recorded: maximum explosion pressure, maximum pressure recorded by sensors and voltage recorded by ionization probes. Performed tests, for flammable gas and air mixtures, indicate that temperature changes have an influence on overpressure velocity. It should be noted, that temperature changes do not have a major impact on the flame front velocity. In the case of propane and air mixtures (temperature 30 ̊C) was observed DDT (Deflagration to Detonation) phenomena. The velocity increased from 2 to 20 m/s. This kind of explosion could turn into a detonation, but the duct length is too short (2 m).Keywords: flame propagation, flame propagation velocity, explosion, propane, methane
Procedia PDF Downloads 226233 Microbial Phylogenetic Divergence between Surface-Water and Sedimentary Ecosystems Drove the Resistome Profiles
Authors: Okugbe Ebiotubo Ohore, Jingli Zhang, Binessi Edouard Ifon, Mathieu Nsenga Kumwimba, Xiaoying Mu, Dai Kuang, Zhen Wang, Ji-Dong Gu, Guojing Yang
Abstract:
Antibiotic pollution and the evolution of antibiotic resistance genes (ARGs) are increasingly viewed as major threats to both ecosystem security and human health, and has drawn attention. This study investigated the fate of antibiotics in aqueous and sedimentary substrates and the impact of ecosystem shifts between water and sedimentary phases on resistome profiles. The findings indicated notable variations in the concentration and distribution patterns of antibiotics across various environmental phases. Based on the partition coefficient (Kd), the total antibiotic concentration was significantly greater in the surface water (1405.45 ng/L; 49.5%) compared to the suspended particulate matter (Kd =0.64; 892.59 ng/g; 31.4%) and sediment (Kd=0.4; 542.64 ng/g; 19.1%). However, the relative abundance of ARGs in surface water and sediment was disproportionate to the abundance of antibiotics concentration, and sediments were the predominant ARGs reservoirs. Phylogenetic divergence of the microbial communities between the surface water and the sedimentary ecosystems potentially played important roles in driving the ARGs profiles between the two distinctive ecosystems. ARGs of Clinical importance; including blaGES, MCR-7.1, ermB, tet(34), tet36, tetG-01, and sul2 were significantly increased in the surface water, while blaCTX-M-01, blaTEM, blaOXA10-01, blaVIM, tet(W/N/W), tetM02, and ermX were amplified in the sediments. cfxA was an endemic ARG in surface-water ecosystems while the endemic ARGs of the sedimentary ecosystems included aacC4, aadA9-02, blaCTX-M-04, blaIMP-01, blaIMP-02, bla-L1, penA, erm(36), ermC, ermT-01, msrA-01, pikR2, vgb-01, mexA, oprD, ttgB, and aac. These findings offer a valuable information for the identification of ARGs-specific high-risk reservoirs.Keywords: antibiotic resistance genes, microbial diversity, suspended particulate matter, sediment, surface water
Procedia PDF Downloads 28232 Radar Track-based Classification of Birds and UAVs
Authors: Altilio Rosa, Chirico Francesco, Foglia Goffredo
Abstract:
In recent years, the number of Unmanned Aerial Vehicles (UAVs) has significantly increased. The rapid development of commercial and recreational drones makes them an important part of our society. Despite the growing list of their applications, these vehicles pose a huge threat to civil and military installations: detection, classification and neutralization of such flying objects become an urgent need. Radar is an effective remote sensing tool for detecting and tracking flying objects, but scenarios characterized by the presence of a high number of tracks related to flying birds make especially challenging the drone detection task: operator PPI is cluttered with a huge number of potential threats and his reaction time can be severely affected. Flying birds compared to UAVs show similar velocity, RADAR cross-section and, in general, similar characteristics. Building from the absence of a single feature that is able to distinguish UAVs and birds, this paper uses a multiple features approach where an original feature selection technique is developed to feed binary classifiers trained to distinguish birds and UAVs. RADAR tracks acquired on the field and related to different UAVs and birds performing various trajectories were used to extract specifically designed target movement-related features based on velocity, trajectory and signal strength. An optimization strategy based on a genetic algorithm is also introduced to select the optimal subset of features and to estimate the performance of several classification algorithms (Neural network, SVM, Logistic regression…) both in terms of the number of selected features and misclassification error. Results show that the proposed methods are able to reduce the dimension of the data space and to remove almost all non-drone false targets with a suitable classification accuracy (higher than 95%).Keywords: birds, classification, machine learning, UAVs
Procedia PDF Downloads 221231 Managing Company's Reputation during Crisis: An Analysis of Croatia Airlines' Crisis Response Strategy to the Labor Unions' Strike Announcement
Authors: M. Polic, N. Cesarec Salopek
Abstract:
When it comes to crisis, no company, notwithstanding its financial success, power or reputation is immune to the new environment and circumstances emerging from it. The main challenge company faces with during a crisis is to protect its most valuable intangible asset reputation. Crisis has the serious potential to disrupt company’s everyday operations and damage its reputation extremely fast, especially if the company did not anticipate threats that may cause a crisis. Therefore, when a crisis happens, company must directly respond to it, whilst an effective crisis communication can limit consequences arising from the crisis, protect and repair the reputational damage caused to the company. Since every crisis is unique, each one of it requires different crisis response strategy. In July 2018, airline labor unions threatened Croatia Airlines, the state owned flag carrier of Croatia, to hold a strike that would be called into question regular flights and affect more than 7.600 passengers per day. This study explores the differences between crisis response strategies that Croatia Airlines, the state owned flag carrier of Croatia and airline labor unions used during the crisis period within the Situational Crisis Communication Theory (SCCT) by analyzing the content of formal communication tools used by Croatia Airlines and airline labor unions. Moreover, this study shows how Croatia Airlines successfully managed to communicate to the general public the threat that airline labor unions imposed on it and how was it received by the Croatian media. By using the qualitative and quantitative content analysis, the study will reveal the frames that dominated in the media articles during the crisis period. The greatest significance of this study is that it will provide the deeper insight into how transparent and consistent communication, the one that Croatia Airlines used before and during the crisis period, contributed to the decision of the competent court (Zagreb County Court) which prohibited labor unions strike in August 2018.Keywords: crisis communication, crisis response strategy, Croatia Airlines, labor union, reputation management, situational crisis communication theory, strike
Procedia PDF Downloads 135230 Structural Vulnerability of Banking Network – Systemic Risk Approach
Authors: Farhad Reyazat, Richard Werner
Abstract:
This paper contributes to the existent literature by developing a framework that explains how to monitor potential threats to banking sector stability. The study explores structural vulnerabilities at the country level, but also look at bilateral exposures within a network context. The study contributes in analysing of the European banking systemic risk at aggregated level, which integrates the characteristics of bank size, and interconnectedness relative to the size of the economy which ultimate risk belong to, taking to account the concentration ratio of the banking industry within the whole economy. The nature of the systemic risk depends on the interplay of the network topology with the nature of financial transactions over the network, assets and buffer stemming from bank size, correlations, and the nature of the shocks to the financial system. The study’s results illustrate the contribution of banks’ size, size of economy and concentration of counterparty exposures to a given country’s banks in explaining its systemic importance, how much the banking network depends on a few traditional hubs activities and the changes of this dependencies over the last 9 years. The role of few of traditional hubs such as Swiss banks and British Banks and also Irish banks- where the financial sector is fairly new and grew strongly between 1990s till 2008- take the fourth position on 2014 reducing the relative size since 2006 where they had the first position. In-degree concentration index analysis in the study shows concentration index of banking network was not changed since financial crisis 2007-8. In-degree concentration index on first quarter of 2014 indicates that US, UK and Germany together, getting over 70% of the network exposures. The result of comparing the in-degree concentration index with 2007-4Q, shows the same group having over 70% of the network exposure, however the UK getting more important role in the hub and the market share of US and Germany are slightly diminished.Keywords: systemic risk, counterparty risk, financial stability, interconnectedness, banking concentration, european banks risk, network effect on systemic risk, concentration risk
Procedia PDF Downloads 490229 Association of Phytomineral Supplementation with the Seasonal Prevalence of Gastrointestinal Parasites of Grazing Sheep in the Scenario of Climate Change
Authors: Muhammad Sohail Sajid, Hafiz Muhammad Rizwan, Ashfaq Ahmad Chatta, Zafar Iqbal, Muhammad Saqib
Abstract:
Changes in the climate are posing threats to the livestock community throughout the globe. Agro-grazing animals and natural vegetation as their forages are the most important components of animal production. Climate and local conditions not only determine the nature and kind of plants, their distribution, composition and nutritive value in different cropping belts and grazing sites but also influence number and kinds of grazing animals. Phytomineral supplementation can act as an indirect tool to boost-up immunological profile of animals leading to the development of resilience against parasitic infections. The present study correlates the trace element (Cu, Co, Mn, Zn) profile of grazing sheep, feedstuffs, respective soils and their GI helminths in a selected district of Sialkot, Punjab, Pakistan. Ten species of GI helminths were found during the survey. A significant (P < 0.05) variation in the concentrations (conc.) of Zn, Cu, Mn and Co was recorded in a total of 16 collected forages. During autumn, mean conc. of Cu, Zn and Co in sera were inversely proportional to the GI helminth burden; while, during spring, only Zn was inversely proportional to the GI helminth burden in grazing sheep. During autumn the highest conc. of Zn, Cu, Mn and Co were recorded in Echinochloa colona, Amaranthus viridis, Cannabis sativa, and Brachiaria ramose and during spring in Cichorium intybus, Cynodon dactylon, Parthenium hysterophorus and Coronopus didymus respectively. The trace element-rich forages, preferably Zn, found effective against helminth infection are advisable supplemental remedies to improve the trace element profile in grazing sheep. This mitigation strategy may ultimately improve the resilience against GI helminth infections especially in the resource poor countries like Pakistan.Keywords: coprological examination, Trace elements, Sheep, Gastro-intestinal parasites, Prevalence, Sialkot, Pakistan
Procedia PDF Downloads 391228 Application of Ground Penetrating Radar and Light Falling Weight Deflectometer in Ballast Quality Assessment
Authors: S. Cafiso, B. Capace, A. Di Graziano, C. D’Agostino
Abstract:
Systematic monitoring of the trackbed is necessary to assure safety and quality of service in the railway system. Moreover, to produce effective management of the maintenance treatments, the assessment of bearing capacity of the railway trackbed must include ballast, sub-ballast and subgrade layers at different depths. Consequently, there is an increasing interest in obtaining a consistent measure of ballast bearing capacity with no destructive tests (NDTs) able to work in the physical and time restrictions of railway tracks in operation. Moreover, in the case of the local railway with reduced gauge, the use of the traditional high-speed track monitoring systems is not feasible. In that framework, this paper presents results from in site investigation carried out on ballast and sleepers with Ground Penetrating Radar (GPR) and Light Falling Weight Deflectometer (LWD). These equipment are currently used in road pavement maintenance where they have shown their reliability and effectiveness. Application of such Non-Destructive Tests in railway maintenance is promising but in the early stage of the investigation. More specifically, LWD was used to estimate the stiffness of ballast and sleeper support, as well. LWD, despite the limited load (6 kN in the trial test) applied directly on the sleeper, was able to detect defects in the bearing capacity at the Sleeper/Ballast interface. A dual frequency GPR was applied to detect the presence of layers’ discontinuities at different depths due to fouling phenomena that are the main causes of changing in the layer dielectric proprieties within the ballast thickness. The frequency of 2000Mhz provided high-resolution data to approximately 0.4m depth, while frequency of 600Mhz showed greater depth penetration up to 1.5 m. In the paper literature review and trial in site experience are used to identify Strengths, Weaknesses, Opportunities, and Threats (SWOT analysis) of the application of GPR and LWD for the assessment of bearing capacity of railway track-bed.Keywords: bearing capacity, GPR, LWD, no destructive test, railway track
Procedia PDF Downloads 128227 Conservation Agriculture and Precision Water Management in Alkaline Soils under Rice-Wheat Cropping System: Effect on Wheat Productivity and Irrigation Water Use-a Case Study from India
Authors: S. K. Kakraliya, H. S. Jat, Manish Kakraliya, P. C. Sharma, M. L. Jat
Abstract:
The biggest challenge in agriculture is to produce more food for the continually increasing world population with in the limited land and water resources. Serious water deficits and reducing natural resources are some of the major threats to the agricultural sustainability in many regions of South Asia. Food and water security may be gained by bringing improvement in the crop water productivity and the amount produced per unit of water consumed. Improvement in the crop water productivity may be achieved by pursuing alternative modern agronomics approaches, which are more friendly and efficient in utilizing natural resources. Therefore, a research trial on conservation agriculture (CA) and precision water management (PWM) was conducted in 2018-19 at Karnal, India to evaluate the effect on crop productivity and irrigation in sodic soils under rice-wheat (RW) systems of Indo-Gangetic Plains (IGP). Eight scenarios were compared varied in the tillage, crop establishment, residue and irrigarion management i.e., {First four scenarios irrigated with flood irrigation method;Sc1-Conventional tillage (CT) without residue, Sc2-CT with residue, Sc3- Zero tillage (ZT) without residue, Sc4-ZT with residue}, and {last four scenarios irrigated with sub-surface drip irrigation method; Sc5-ZT without residue, Sc6- ZT with residue, Sc7-ZT inclusion legume without residue and Sc8- ZT inclusion legume with residue}. Results revealed that CA-flood irrigation (S3, Sc4) and CA-PWM system (Sc5, Sc6, Sc7 and Sc8) recorded about ~5% and ~15% higher wheat yield, respectively compared to Sc1. Similar, CA-PWM saved ~40% irrigation water compared to Sc1. Rice yield was not different under different scenarios in the first year (kharif 2019) but almost half irrigation water saved under CA-PWM system. Therefore, results of our study on modern agronomic practices including CA and precision water management (subsurface drip irrigation) for RW rotation would be addressed the existing and future challenges in the RW system.Keywords: Sub-surface drip, Crop residue, Crop yield , Zero tillage
Procedia PDF Downloads 120226 Canada's "Flattened Curve": A Geospatial Temporal Analysis of Canada's Amelioration of the Sars-COV-2 Pandemic Through Coordinated Government Intervention
Authors: John Ahluwalia
Abstract:
As an affluent first-world nation, Canada took swift and comprehensive action during the outbreak of the SARS-CoV-2 (COVID-19) pandemic compared to other countries in the same socio-economic cohort. The United States has stumbled to overcome obstacles most developed nations have faced, which has led to significantly more per capita cases and deaths. The initial outbreaks of COVID-19 occurred in the US and Canada within days of each other and posed similar potentially catastrophic threats to public health, the economy, and governmental stability. On a macro level, events that take place in the US have a direct impact on Canada. For example, both countries tend to enter and exit economic recessions at approximately the same time, they are each other’s largest trading partners, and their currencies are inexorably linked. Why is it that Canada has not shared the same fate as the US (and many other nations) that have realized much worse outcomes relative to the COVID-19 pandemic? Variables intrinsic to Canada’s national infrastructure have been instrumental in the country’s efforts to flatten the curve of COVID-19 cases and deaths. Canada’s coordinated multi-level governmental effort has allowed it to create and enforce policies related to COVID-19 at both the national and provincial levels. Canada’s policy of universal healthcare is another variable. Health care and public health measures are enforced on a provincial level, and it is within each province’s jurisdiction to dictate standards for public safety based on scientific evidence. Rather than introducing confusion and the possibility of competition for resources such as PPE and vaccines, Canada’s multi-level chain of government authority has provided consistent policies supporting national public health and local delivery of medical care. This paper will demonstrate that the coordinated efforts on provincial and federal levels have been the linchpin in Canada’s relative success in containing the deadly spread of the COVID-19 virus.Keywords: COVID-19, Canada, GIS, temporal analysis, ESRI
Procedia PDF Downloads 147225 Integrating Heritage Conservation and Sustainable Development: The Role of Buffer Zones in Safeguarding the Tentative World Heritage Sites and Empowering Local Communities in India
Authors: Shweta Vardia
Abstract:
The 2021 decision by the World Heritage Center to align buffer zones with the 2015 Strategy for Sustainable Development marks a significant advancement in the protection of cultural and natural heritage sites. Buffer zones play a critical role in preserving the outstanding universal value, authenticity, and integrity of heritage sites, shielding them from threats such as urbanization, industrialization, and tourism. The 2015 Strategy emphasizes the integration of culture and heritage into sustainable development policies, highlighting the importance of community participation, traditional knowledge, and effective management in the conservation of heritage sites. This paper examines the implications of this strategic alignment for tentative World Heritage Sites in India. It explores how buffer zones can serve as tools for sustainable tourism, economic growth, and environmental protection while also addressing the socio-economic needs of local communities. By adopting a people-centered approach, the study underscores the need for active community involvement in heritage conservation, recognizing local residents as long-term custodians of cultural heritage. The role of buffer zones in promoting sustainable livelihoods, enhancing resilience to environmental changes, and fostering a sense of belonging among communities is also discussed. The challenges associated with buffer zones, including restrictive boundaries, unclear legislative frameworks, and potential disconnection from sociocultural contexts, are critically analyzed. The paper advocates for a holistic and integrated approach to buffer zone management, ensuring that policies are not only theoretically sound but also practically feasible. It concludes by emphasizing the need for collaborative efforts among conservation professionals, local communities, and policymakers to achieve sustainable development goals that respect both the heritage site's integrity and the well-being of surrounding populations.Keywords: buffer zones, India, local communities, urbanization, world heritage sites
Procedia PDF Downloads 28224 Land Degradation Assessment through Spatial Data Integration in Eastern Chotanagpur Plateau, India
Authors: Avijit Mahala
Abstract:
Present study is primarily concerned with the physical processes and status of land degradation in a tropical plateau fringe. Chotanagpur plateau is one of the most water erosion related degraded areas of India. The granite gneiss geological formation, low to medium developed soil cover, undulating lateritic uplands, high drainage density, low to medium rainfall (100-140cm), dry tropical deciduous forest cover makes the Silabati River basin a truly representative of the tropical environment. The different physical factors have been taken for land degradation study includes- physiographic formations, hydrologic characteristics, and vegetation cover. Water erosion, vegetal degradation, soil quality decline are the major processes of land degradation in study area. Granite-gneiss geological formation is responsible for developing undulating landforms. Less developed soil profile, low organic matter, poor structure of soil causes high soil erosion. High relief and sloppy areas cause unstable environment. The dissected highland causes topographic hindrance in productivity. High drainage density and frequency in rugged upland and intense erosion in sloppy areas causes high soil erosion of the basin. Decreasing rainfall and increasing aridity (low P/PET) threats water stress condition. Green biomass cover area is also continuously declining. Through overlaying the different physical factors (geological formation, soil characteristics, geomorphological characteristics, etc.) of considerable importance in GIS environment the varying intensities of land degradation areas has been identified. Middle reaches of Silabati basin with highly eroded laterite soil cover areas are more prone to land degradation.Keywords: land degradation, tropical environment, lateritic upland, undulating landform, aridity, GIS environment
Procedia PDF Downloads 135223 Building User Behavioral Models by Processing Web Logs and Clustering Mechanisms
Authors: Madhuka G. P. D. Udantha, Gihan V. Dias, Surangika Ranathunga
Abstract:
Today Websites contain very interesting applications. But there are only few methodologies to analyze User navigations through the Websites and formulating if the Website is put to correct use. The web logs are only used if some major attack or malfunctioning occurs. Web Logs contain lot interesting dealings on users in the system. Analyzing web logs has become a challenge due to the huge log volume. Finding interesting patterns is not as easy as it is due to size, distribution and importance of minor details of each log. Web logs contain very important data of user and site which are not been put to good use. Retrieving interesting information from logs gives an idea of what the users need, group users according to their various needs and improve site to build an effective and efficient site. The model we built is able to detect attacks or malfunctioning of the system and anomaly detection. Logs will be more complex as volume of traffic and the size and complexity of web site grows. Unsupervised techniques are used in this solution which is fully automated. Expert knowledge is only used in validation. In our approach first clean and purify the logs to bring them to a common platform with a standard format and structure. After cleaning module web session builder is executed. It outputs two files, Web Sessions file and Indexed URLs file. The Indexed URLs file contains the list of URLs accessed and their indices. Web Sessions file lists down the indices of each web session. Then DBSCAN and EM Algorithms are used iteratively and recursively to get the best clustering results of the web sessions. Using homogeneity, completeness, V-measure, intra and inter cluster distance and silhouette coefficient as parameters these algorithms self-evaluate themselves to input better parametric values to run the algorithms. If a cluster is found to be too large then micro-clustering is used. Using Cluster Signature Module the clusters are annotated with a unique signature called finger-print. In this module each cluster is fed to Associative Rule Learning Module. If it outputs confidence and support as value 1 for an access sequence it would be a potential signature for the cluster. Then the access sequence occurrences are checked in other clusters. If it is found to be unique for the cluster considered then the cluster is annotated with the signature. These signatures are used in anomaly detection, prevent cyber attacks, real-time dashboards that visualize users, accessing web pages, predict actions of users and various other applications in Finance, University Websites, News and Media Websites etc.Keywords: anomaly detection, clustering, pattern recognition, web sessions
Procedia PDF Downloads 288222 Antimicrobial Action and Its Underlying Mechanism by Methanolic Seed Extract of Syzygium cumini on Bacillus subtilis
Authors: Alok Kumar Yadav, Saurabh Saraswat, Preeti Sirohi, Manjoo Rani, Sameer Srivastava, Manish Pratap Singh, Nand K. Singh
Abstract:
The development of antibiotic resistance in bacteria is increasing at an alarming rate, and this is considered as one of the most serious threats in the history of medicine, and an alternative solution should be derived so as to tackle this problem. In many countries, people use the medicinal plants for the treatment of various diseases as these are cheaper, easily available and least toxic. Syzygium cumini is used for the treatment of various kinds of diseases but their mechanism of action is not reported. The antimicrobial activity of Syzygium cumini was tested by the well diffusion assay and zone of inhibition was reported to be 20.06 mm as compared to control with MIC of 0.3 mg/ml. Genomic DNA fragmentation of Bacillus subtilis revealed apoptosis and FE-SEM indicate cell wall cracking on several intervals of time. Propidium iodide staining results showed that few bacterial cells were stained in the control and population of stained cells increase after exposing them for various period of time. Flow cytometric kinetic data analysis on the membrane permeabilization in bacterial cell showed the significant contribution of antimicrobial potential of the seed extract on antimicrobial-induced permeabilization. Two components of Syzygium cumini methanolic seed extract was found to be quite active against four enzymes like PDB ID- 1W5D, 4OX3, 3MFD and 5E2F which have a very crucial role in membrane synthesis in Bacillus subtilis by in silico analysis. Through in silico analysis, lupeol showed highest binding energy for macromolecule 1W5D and 4OX3 whereas stigmasterol showed the highest binding energy for macromolecule 3MFD and 5E2F respectively. It showed that methanolic seed extract of Syzygium cumini can be used for the inhibition of foodborne infections caused by Bacillus subtilis and also as an alternative of prevalent antibiotics.Keywords: antibiotics, Bacillus subtilis, inhibition, Syzygium cumini
Procedia PDF Downloads 199221 Post Harvest Losses and Food Security in Northeast Nigeria What Are the Key Challenges and Concrete Solutions
Authors: Adebola Adedugbe
Abstract:
The challenge of post-harvest losses poses serious threats for food security in Nigeria and the north-eastern part with the country losing about $9billion annually due to postharvest losses in the sector. Post-harvest loss (PHL) is the quantitative and qualitative loss of food in various post-harvest operations. In Nigeria, post-harvest losses (PHL) have been a major challenge to food security and improved farmer’s income. In 2022, the Nigerian government had said over 30 percent of food produced by Nigerian farmers perish during post-harvest. For many in northeast Nigeria, agriculture is the predominant source of livelihood and income. The persistent communal conflicts, flood, decade-old attacks by boko haram and insurgency in this region have disrupted farming activities drastically, with farmlands becoming insecure and inaccessible as communities are forced to abandon ancestral homes, The impact of climate change is also affecting agricultural and fishing activities, leading to shortage of food supplies, acute hunger and loss of livelihood. This has continued to impact negatively on the region and country’s food production and availability making it loose billions of US dollars annually in income in this sector. The root cause of postharvest losses among others in crops, livestock and fisheries are lack of modern post-harvest equipment, chemical and lack of technologies used for combating losses. The 2019 Global Hunger Index showed Nigeria’s case was progressing from a ‘serious to alarming level’. As part of measures to address the problem of post-harvest losses experienced by farmers, the federal government of Nigeria concessioned 17 silos with 6000 metric tonne storage space to private sector to enable farmers to have access to storage facilities. This paper discusses the causes, effects and solutions in handling post-harvest losses and optimize returns on food security in northeast Nigeria.Keywords: farmers, food security, northeast Nigeria, postharvest loss
Procedia PDF Downloads 72220 Statecraft: Building a Hindu Nationalist Intellectual Ecosystem in India
Authors: Anuradha Sajjanhar
Abstract:
The rise of authoritarian populist regimes has been accompanied by hardened nationalism and heightened divisions between 'us' and 'them'. Political actors reinforce these sentiments through coercion, but also through inciting fear about imagined threats and by transforming public discourse about policy concerns. Extremist ideas can penetrate national policy, as newly appointed intellectuals and 'experts' in knowledge-producing institutions, such as government committees, universities, and think tanks, succeed in transforming public discourse. While attacking left and liberal academics, universities, and the press, the current Indian government is building new institutions to provide authority to its particularly rigid, nationalist discourse. This paper examines the building of a Hindu-nationalist intellectual ecosystem in India, interrogating the key role of hyper-nationalist think tanks. While some are explicit about their political and ideological leanings, others claim neutrality and pursue their agenda through coded technocratic language and resonant historical narratives. Their key is to change thinking by normalizing it. Six years before winning the election in 2014, India’s Hindu-nationalist party, the BJP, put together its own network of elite policy experts. In a national newspaper, the vice-president of the BJP described this as an intentional shift: from 'being action-oriented to solidifying its ideological underpinnings in a policy framework'. When the BJP came to power in 2014, 'experts' from these think tanks filled key positions in the central government. The BJP has since been circulating dominant ideas of Hindu supremacy through regional parties, grassroots political organisations, and civil society organisations. These think tanks have the authority to articulate and legitimate Hindu nationalism within a credible technocratic policy framework. This paper is based on ethnography and over 50 interviews in New Delhi, before and after the BJP’s staggering election victory in 2019. It outlines the party’s attempt to take over existing institutions while developing its own cadre of nationalist policy-making professionals.Keywords: ideology, politics, South Asia, technocracy
Procedia PDF Downloads 120219 Exploring Emerging Viruses From a Protected Reserve
Authors: Nemat Sokhandan Bashir
Abstract:
Threats from viruses to agricultural crops could be even larger than the losses caused by the other pathogens because, in many cases, the viral infection is latent but crucial from an epidemic point of view. Wild vegetation can be a source of many viruses that eventually find their destiny in crop plants. Although often asymptomatic in wild plants due to adaptation, they can potentially cause serious losses in crops. Therefore, exploring viruses in wild vegetation is very important. Recently, omics have been quite useful for exploring plant viruses from various plant sources, especially wild vegetation. For instance, we have discovered viruses such as Ambrossia asymptomatic virus I (AAV-1) through the application of metagenomics from Oklahoma Prairie Reserve. Accordingly, extracts from randomly-sampled plants are subjected to high speed and ultracentrifugation to separated virus-like particles (VLP), then nucleic acids in the form of DNA or RNA are extracted from such VLPs by treatment with phenol—chloroform and subsequent precipitation by ethanol. The nucleic acid preparations are separately treated with RNAse or DNAse in order to determine the genome component of VLPs. In the case of RNAs, the complementary cDNAs are synthesized before submitting to DNA sequencing. However, for VLPs with DNA contents, the procedure would be relatively straightforward without making cDNA. Because the length of the nucleic acid content of VPLs can be different, various strategies are employed to achieve sequencing. Techniques similar to so-called "chromosome walking" may be used to achieve sequences of long segments. When the nucleotide sequence data were obtained, they were subjected to BLAST analysis to determine the most related previously reported virus sequences. In one case, we determined that the novel virus was AAV-l because the sequence comparison and analysis revealed that the reads were the closest to the Indian citrus ringspot virus (ICRSV). AAV—l had an RNA genome with 7408 nucleotides in length and contained six open reading frames (ORFs). Based on phylogenies inferred from the replicase and coat protein ORFs of the virus, it was placed in the genus Mandarivirus.Keywords: wild, plant, novel, metagenomics
Procedia PDF Downloads 80218 BFDD-S: Big Data Framework to Detect and Mitigate DDoS Attack in SDN Network
Authors: Amirreza Fazely Hamedani, Muzzamil Aziz, Philipp Wieder, Ramin Yahyapour
Abstract:
Software-defined networking in recent years came into the sight of so many network designers as a successor to the traditional networking. Unlike traditional networks where control and data planes engage together within a single device in the network infrastructure such as switches and routers, the two planes are kept separated in software-defined networks (SDNs). All critical decisions about packet routing are made on the network controller, and the data level devices forward the packets based on these decisions. This type of network is vulnerable to DDoS attacks, degrading the overall functioning and performance of the network by continuously injecting the fake flows into it. This increases substantial burden on the controller side, and the result ultimately leads to the inaccessibility of the controller and the lack of network service to the legitimate users. Thus, the protection of this novel network architecture against denial of service attacks is essential. In the world of cybersecurity, attacks and new threats emerge every day. It is essential to have tools capable of managing and analyzing all this new information to detect possible attacks in real-time. These tools should provide a comprehensive solution to automatically detect, predict and prevent abnormalities in the network. Big data encompasses a wide range of studies, but it mainly refers to the massive amounts of structured and unstructured data that organizations deal with on a regular basis. On the other hand, it regards not only the volume of the data; but also that how data-driven information can be used to enhance decision-making processes, security, and the overall efficiency of a business. This paper presents an intelligent big data framework as a solution to handle illegitimate traffic burden on the SDN network created by the numerous DDoS attacks. The framework entails an efficient defence and monitoring mechanism against DDoS attacks by employing the state of the art machine learning techniques.Keywords: apache spark, apache kafka, big data, DDoS attack, machine learning, SDN network
Procedia PDF Downloads 169217 Towards a Reinvented Cash Management Function: Mobilising Innovative Advances for Enhanced Performance and Optimised Cost Management: Insights from Large Moroccan Companies in the Casablanca-Settat Region
Authors: Badrane Nohayla, Bamousse Zineb
Abstract:
Financial crises, exchange rate volatility, fluctuations in commodity prices, increased competitive pressures, and environmental issues are all threats that businesses face. In light of these diverse challenges, proactive, agile, and innovative cash management becomes an indispensable financial shield, allowing companies to thrive despite the adverse conditions of the global environment. In the same spirit, uncertainty, turbulence, volatility, and competitiveness continue to disrupt economic environments, compelling companies to swiftly master innovative breakthroughs that provide added value. In such a context, innovation emerges as a catalytic vector for performance, aiming to reduce costs, strengthen growth, and ultimately ensure the sustainability of Moroccan companies in the national arena. Moreover, innovation in treasury management promises to be one of the key pillars of financial stability, enabling companies to navigate the tumultuous waters of a globalized environment. Therefore, the objective of this study is to better understand the impact of innovative treasury management on cost optimization and, by extension, performance improvement. To elucidate this relationship, we conducted an exploratory qualitative study with 20 large Moroccan companies operating in the Casablanca-Settat region. The results highlight that innovation at the heart of treasury management is a guarantee of sustainability against the risks of failure and stands as a true pivot of the performance of Moroccan companies, an important parameter of their financial balance and a catalytic vector of their growth in the national economic landscape. In this regard, the present study aims to explore the extent to which innovation at the core of the treasury function serves as an indispensable tool for boosting performance while optimising costs in large Moroccan companies.Keywords: innovative cash management, artificial intelligence, financial performance, risk management, cost savings
Procedia PDF Downloads 29216 Climate Change Adaptation: Methodologies and Tools to Define Resilience Scenarios for Existing Buildings in Mediterranean Urban Areas
Authors: Francesca Nicolosi, Teresa Cosola
Abstract:
Climate changes in Mediterranean areas, such as the increase of average seasonal temperatures, the urban heat island phenomenon, the intensification of solar radiation and the extreme weather threats, cause disruption events, so that climate adaptation has become a pressing issue. Due to the strategic role that the built heritage holds in terms of environmental impact and energy waste and its potentiality, it is necessary to assess the vulnerability and the adaptive capacity of the existing building to climate change, in order to define different mitigation scenarios. The aim of this research work is to define an optimized and integrated methodology for the assessment of resilience levels and adaptation scenarios for existing buildings in Mediterranean urban areas. Moreover, the study of resilience indicators allows us to define building environmental and energy performance in order to identify the design and technological solutions for the improvement of the building and its urban area potentialities. The methodology identifies step-by-step different phases, starting from the detailed study of characteristic elements of urban system: climatic, natural, human, typological and functional components are analyzed in their critical factors and their potential. Through the individuation of the main perturbing factors and the vulnerability degree of the system to the risks linked to climate change, it is possible to define mitigation and adaptation scenarios. They can be different, according to the typological, functional and constructive features of the analyzed system, divided into categories of intervention, and characterized by different analysis levels (from the single building to the urban area). The use of software simulations allows obtaining information on the overall behavior of the building and the urban system, to generate predictive models in the medium and long-term environmental and energy retrofit and to make a comparative study of the mitigation scenarios identified. The studied methodology is validated on a case study.Keywords: climate impact mitigation, energy efficiency, existing building heritage, resilience
Procedia PDF Downloads 240215 The Application of Dynamic Network Process to Environment Planning Support Systems
Authors: Wann-Ming Wey
Abstract:
In recent years, in addition to face the external threats such as energy shortages and climate change, traffic congestion and environmental pollution have become anxious problems for many cities. Considering private automobile-oriented urban development had produced many negative environmental and social impacts, the transit-oriented development (TOD) has been considered as a sustainable urban model. TOD encourages public transport combined with friendly walking and cycling environment designs, however, non-motorized modes help improving human health, energy saving, and reducing carbon emissions. Due to environmental changes often affect the planners’ decision-making; this research applies dynamic network process (DNP) which includes the time dependent concept to promoting friendly walking and cycling environmental designs as an advanced planning support system for environment improvements. This research aims to discuss what kinds of design strategies can improve a friendly walking and cycling environment under TOD. First of all, we collate and analyze environment designing factors by reviewing the relevant literatures as well as divide into three aspects of “safety”, “convenience”, and “amenity” from fifteen environment designing factors. Furthermore, we utilize fuzzy Delphi Technique (FDT) expert questionnaire to filter out the more important designing criteria for the study case. Finally, we utilized DNP expert questionnaire to obtain the weights changes at different time points for each design criterion. Based on the changing trends of each criterion weight, we are able to develop appropriate designing strategies as the reference for planners to allocate resources in a dynamic environment. In order to illustrate the approach we propose in this research, Taipei city as one example has been used as an empirical study, and the results are in depth analyzed to explain the application of our proposed approach.Keywords: environment planning support systems, walking and cycling, transit-oriented development (TOD), dynamic network process (DNP)
Procedia PDF Downloads 344214 Dietary Exposure of Heavy Metals through Cereals Commonly Consumed by Dhaka City Residents
Authors: A. Md. Bayejid Hosen, B. M Zakir Hossain Howlader, C. Yearul Kabir
Abstract:
Contamination of soil and agricultural products by heavy metals resulting from rapid industrial development has caused major concern. Dietary exposure to heavy metals has been associated with toxic and adverse health effects. The main threats to human health from heavy metals are associated with exposure to Pb, Cd and Hg. The aim of this study was to monitor the presence of heavy metals in cereals collected from different wholesale markets of Dhaka City. One hundred and sixty cereal samples were collected and analyzed for determination of heavy metals. Heavy metals were analyzed by inductively coupled plasma mass spectrometry (ICP-MS). A total of six heavy metals– lead, chromium, cadmium, mercury, arsenic and antimony were estimated. The average concentrations of heavy metals in cereals fall within the safe limit established by regulatory organizations except for Pb (152.4 μg/100g) and Hg (15.13 μg/100g) which exceeded the safe limits. BARI gom-26 was the highest source of Pb (304.1 μg/100g) whereas Haski-29 rice variety contained the highest amount of Hg (60.85 μg/100g). Though all the cereal varieties contained approximately same amount of Cr the naizer sail varieties contained huge amount of Cr (171.8 μg/100g). Among all the cereal samples miniket rice varieties contained the least amount of heavy metals. The concentration of Cr (63.24 μg/100g), Cd (5.54 μg/100g) and As (3.26 μg/100g) in all cereals were below the safe limits. The daily intake of heavy metals was determined using the total weight of cereals consumed each day multiplied by the concentrations of heavy metals in cereals. The daily intake was compared with provisional maximum tolerable daily intake set by different regulatory organizations. The daily intake of Cd (23.0 μg), Hg (63.0 μg) and as (13.6 μg) through cereals were below the risk level except for Pb (634.0 μg) and Cr (263.1 μg). As the main meal of average Bangladeshi people is boiled rice served with some sorts of vegetables, our findings indicate that the residents of Dhaka City are at risk from Pb and Cr contamination. Potential health risks from exposure to heavy metals in self-planted cereals need more attention.Keywords: contamination, dietary exposure, heavy metals, human health, ICP-MS
Procedia PDF Downloads 450213 A Model of Human Security: A Comparison of Vulnerabilities and Timespace
Authors: Anders Troedsson
Abstract:
For us humans, risks are intimately linked to human vulnerabilities - where there is vulnerability, there is potentially insecurity, and risk. Reducing vulnerability through compensatory measures means increasing security and decreasing risk. The paper suggests that a meaningful way to approach the study of risks (including threats, assaults, crisis etc.), is to understand the vulnerabilities these external phenomena evoke in humans. As is argued, the basis of risk evaluation, as well as responses, is the more or less subjective perception by the individual person, or a group of persons, exposed to the external event or phenomena in question. This will be determined primarily by the vulnerability or vulnerabilities that the external factor are perceived to evoke. In this way, risk perception is primarily an inward dynamic, rather than an outward one. Therefore, a route towards an understanding of the perception of risks, is a closer scrutiny of the vulnerabilities which they can evoke, thereby approaching an understanding of what in the paper is called the essence of risk (including threat, assault etc.), or that which a certain perceived risk means to an individual or group of individuals. As a necessary basis for gauging the wide spectrum of potential risks and their meaning, the paper proposes a model of human vulnerabilities, drawing from i.a. a long tradition of needs theory. In order to account for the subjectivity factor, which mediates between the innate vulnerabilities on the one hand, and the event or phenomenon out there on the other hand, an ensuing ontological discussion about the timespace characteristics of risk/threat/assault as perceived by humans leads to the positing of two dimensions. These two dimensions are applied on the vulnerabilities, resulting in a modelling effort featuring four realms of vulnerabilities which are related to each other and together represent a dynamic whole. In approaching the problem of risk perception, the paper thus defines the relevant realms of vulnerabilities, depicting them as a dynamic whole. With reference to a substantial body of literature and a growing international policy trend since the 1990s, this model is put in the language of human security - a concept relevant not only for international security studies and policy, but also for other academic disciplines and spheres of human endeavor.Keywords: human security, timespace, vulnerabilities, risk perception
Procedia PDF Downloads 335212 How Virtualization, Decentralization, and Network-Building Change the Manufacturing Landscape: An Industry 4.0 Perspective
Authors: Malte Brettel, Niklas Friederichsen, Michael Keller, Marius Rosenberg
Abstract:
The German manufacturing industry has to withstand an increasing global competition on product quality and production costs. As labor costs are high, several industries have suffered severely under the relocation of production facilities towards aspiring countries, which have managed to close the productivity and quality gap substantially. Established manufacturing companies have recognized that customers are not willing to pay large price premiums for incremental quality improvements. As a consequence, many companies from the German manufacturing industry adjust their production focusing on customized products and fast time to market. Leveraging the advantages of novel production strategies such as Agile Manufacturing and Mass Customization, manufacturing companies transform into integrated networks, in which companies unite their core competencies. Hereby, virtualization of the process- and supply-chain ensures smooth inter-company operations providing real-time access to relevant product and production information for all participating entities. Boundaries of companies deteriorate, as autonomous systems exchange data, gained by embedded systems throughout the entire value chain. By including Cyber-Physical-Systems, advanced communication between machines is tantamount to their dialogue with humans. The increasing utilization of information and communication technology allows digital engineering of products and production processes alike. Modular simulation and modeling techniques allow decentralized units to flexibly alter products and thereby enable rapid product innovation. The present article describes the developments of Industry 4.0 within the literature and reviews the associated research streams. Hereby, we analyze eight scientific journals with regards to the following research fields: Individualized production, end-to-end engineering in a virtual process chain and production networks. We employ cluster analysis to assign sub-topics into the respective research field. To assess the practical implications, we conducted face-to-face interviews with managers from the industry as well as from the consulting business using a structured interview guideline. The results reveal reasons for the adaption and refusal of Industry 4.0 practices from a managerial point of view. Our findings contribute to the upcoming research stream of Industry 4.0 and support decision-makers to assess their need for transformation towards Industry 4.0 practices.Keywords: Industry 4.0., mass customization, production networks, virtual process-chain
Procedia PDF Downloads 277211 Climate Change and Health in Policies
Authors: Corinne Kowalski, Lea de Jong, Rainer Sauerborn, Niamh Herlihy, Anneliese Depoux, Jale Tosun
Abstract:
Climate change is considered one of the biggest threats to human health of the 21st century. The link between climate change and health has received relatively little attention in the media, in research and in policy-making. A long term and broad overview of how health is represented in the legislation on climate change is missing in the legislative literature. It is unknown if or how the argument for health is referred in legal clauses addressing climate change, in national and European legislation. Integrating scientific based evidence into policies regarding the impacts of climate change on health could be a key step to inciting the political and societal changes necessary to decelerate global warming. This may also drive the implementation of new strategies to mitigate the consequences on health systems. To provide an overview of this issue, we are analyzing the Global Climate Legislation Database provided by the Grantham Research Institute on Climate Change and the Environment. This institution was established in 2008 at the London School of Economics and Political Science. The database consists of (updated as of 1st January 2015) legislations on climate change in 99 countries around the world. This tool offers relevant information about the state of climate related policies. We will use the database to systematically analyze the 829 identified legislations to identify how health is represented as a relevant aspect of climate change legislation. We are conducting explorative research of national and supranational legislations and anticipate health to be addressed in various forms. The goal is to highlight how often, in what specific terms, which aspects of health or health risks of climate change are mentioned in various legislations. The position and recurrence of the mention of health is also of importance. Data will be extracted with complete quotation of the sentence which mentions health, which will allow for second qualitative stage to analyze which aspects of health are represented and in what context. This study is part of an interdisciplinary project called 4CHealth that confronts results of the research done on scientific, political and press literature to better understand how the knowledge on climate change and health circulates within those different fields and whether and how it is translated to real world change.Keywords: climate change, explorative research, health, policies
Procedia PDF Downloads 365210 Everyday Interactions among Imprisoned Sex Offenders: A Qualitative Study within the 'Due Palazzi' Prison in Padua
Authors: Matteo Mazzucato, Elena Faccio, Antonio Iudici
Abstract:
Prison is a social reality constructed by everyday interactions between an inmate, other social actors (cellmates, prison officers, educationalists and psychologists or other detainees) and the external world which participates in this complex construction through the social discourses on prison reality and its problems. Being a detainee means performing a self dealing with processes of stereotypization, attribution of a social role and prejudices assigned by various interlocutors and depending on what kind of crime one has been convicted of. Among all inmates, sex offenders are the ones who risk more to be socially condemned beyond a legal sentence since they have committed one of the most hated and disapproved crime. Regarding this, prison has to be considered as a critical context in which all community expectations and beliefs are converged: for common sense, rapists and child molesters are dangerous people who have to be stigmatized, punished and isolated. Furthermore, other detainees share a code of conduct by which the ‘sex offender’ is collocated at the lowest level of the social hierarchy of the prison. The penitentiary administration too defines this kind of detainee as a ‘vulnerable person to protect’ while prison staff considers him as a particular inmate who has to be treated and definitely changed. Considering all the complexities connected with being imprisoned as a sex offender, our research aimed at exploring how people convicted of sex crimes are called upon to manage all these hetero-narrations about their selves. Set this goal, textual data retrieved from this qualitative research show that sex offenders tend to not face the stigma assigned to them. They are rather used to minimize the story telling about their selves and costruct alternative biographies to be shared with other inmates. Managing narrations about their selves in this way permits to distance them from all the threats perceived living together with other detainees but it blocks sex offenders’ ri-signification of their offences during prison treatment. Given these results, prison administration should develop activities in order to create fields of interaction between detainees where experiencing new versions of their selves spendable even in external social situations. Regarding this it’s important to re-consider prison as part of the community and the sex offenders as a member of it.Keywords: interactions, qualitative research, prison reality, sex offender
Procedia PDF Downloads 220209 Exploring Sexual Behavior among Unmarried Male Youth in Bangladesh: A Cross-Sectional Study
Authors: Subas Chandra Biswas, Kazi Sameen Naser, Farzana Misha
Abstract:
Little is known about the sexual behavior of male youth, particularly unmarried young men in Bangladesh as most of the sexual and reproductive health and rights-related research and intervention are mainly focused on females and married couples. To understand the unmarried youth’s sexual behavior, data from a nationwide survey conducted in all 64 districts of Bangladesh were analyzed. Using multistage systematic random sampling, a survey was conducted among 11,113 male youth aged 15-24 years from May-August, 2019. This article analyzed and presented findings of the sexual behavior of unmarried respondents based on the data collected from 10,026 unmarried male youth. Findings showed that 18% had ever experience of sexual relationship, and the reported mean age of first sexual intercourse was 16.5years. For unmarried male youth, those who had a sexual experience, their first sexual partners were female friends/classmate (57%), female neighbors (16%), and female sex workers (12%), relatives (6%) and girlfriends with whom they had love relationship (4%). However, about 36% reported that they had a love relationship with girlfriends, and among them, 23% reported that they had sexual intercourse with their girlfriend. Those who had sexual relations with their girlfriend, 47% reported that they did not use the condom in their last sex with their girlfriend. Furthermore, 29% reported that they had sexual relationships with others besides their girlfriends. Other reported partners were female sex workers (32%), neighbors (29%), female friends (19%), relatives (12%), and cousins (5%). Also, 46% reported that they did not even use the condom during sex with other partners. About 9% used some sort of sexual stimulant to increase their libido. Among the respondents, 376 reported that they bought sex in the last six months, and the mean expenditure of buying sex for the respondent was 1,140 Taka (13.46 US Dollar). Though premarital sexual relations are not socially accepted, findings showed a large portion of male youth are engaged in these relationships and risky sexual behavior. Lack of awareness of sexual and reproductive health, unprotected sexual intercourse, use of the drug during sexual intercourse also increase the threats to health. Thus these findings are important to understand the sexual behavior of male youth in policy and programmatic implications. Therefore, to ensure a healthy sexual life and wellbeing, an immediate and culturally sensitive sexual health promotion intervention is needed for male youth in Bangladesh.Keywords: Bangladesh, male youth, sexual and reproductive health, sexual behavior
Procedia PDF Downloads 141208 Evidence of Microplastics Ingestion in Two Commercial Cephalopod Species: Octopus Vulgaris and Sepia Officinalis
Authors: Federica Laface, Cristina Pedà, Francesco Longo, Francesca de Domenico, Riccardo Minichino, Pierpaolo Consoli, Pietro Battaglia, Silvestro Greco, Teresa Romeo
Abstract:
Plastics pollution represents one of the most important threats to marine biodiversity. In the last decades, different species are investigated to evaluate the extent of the plastic ingestion phenomenon. Even if the cephalopods play an important role in the food chain, they are still poorly studied. The aim of this research was to investigate the plastic ingestion in two commercial cephalopod species from the southern Tyrrhenian Sea: the common octopus, Octopus vulgaris (n=6; mean mantle length ML 10.7 ± 1.8) and the common cuttlefish, Sepia officinalis (n=13; mean ML 13.2 ± 1.7). Plastics were extracted from the filters obtained by the chemical digestion of cephalopods gastrointestinal tracts (GITs), using 10% potassium hydroxide (KOH) solution in a 1:5 (w/v) ratio. Once isolated, particles were photographed, measured, and their size class, shape and color were recorded. A total of 81 items was isolated from 16 of the 19 examined GITs, representing a total occurrence (%O) of 84.2% with a mean value of 4.3 ± 8.6 particles per individual. In particular, 62 plastics were found in 6 specimens of O. vulgaris (%O=100) and 19 particles in 10 S. officinalis (%O=94.7). In both species, the microplastics size class was the most abundant (93.8%). Plastic items found in O. vulgaris were mainly fibers (61%) while fragments were the most frequent in S. officinalis (53%). Transparent was the most common color in both species. The analysis will be completed by Fourier transform infrared (FT-IR) spectroscopy technique in order to identify polymers nature. This study reports preliminary data on plastic ingestion events in two cephalopods species and represents the first record of plastic ingestion by the common octopus. Microplastic items detected in both common octopus and common cuttlefish could derive from secondary and/or accidental ingestion events, probably due to their behavior, feeding habits and anatomical features. Further studies will be required to assess the effect of marine litter pollution in these ecologically and commercially important species.Keywords: cephalopods, GIT analysis, marine pollution, Mediterranean sea, microplastics
Procedia PDF Downloads 253207 Nanotechnology in Construction as a Building Security
Authors: Hanan Fayez Hussein
Abstract:
‘Due to increasing environmental challenges and security problems in the world such as global warming, storms, and terrorism’, humans have discovered new technologies and new materials in order to program daily life. As providing physical and psychological security is one of the primary functions of architecture, so in order to provide security, building must prevents unauthorized entry and harm to occupant and reduce the threat of attack by making building less attractive targets by new technologies such as; Nanotechnology, which has emerged as a major science and technology focus of the 21st century and will be the next industrial revolution. Nanotechnology is control of the properties of matter, and it deals with structures of the size 100 nanometers or smaller in at least one dimension and has wide application in various fields. The construction and architecture sectors were among the first to be identified as a promising application area for nanotechnology. The advantages of using nanomaterials in construction are enormous, and promises heighten building security by utilizing the strength of building materials to make our buildings more secure and get smart home. Access barriers such as wall and windows could incorporate stronger materials benefiting from nano-reinforcement utilizing nanotubes and nano composites to act as protective cover. Carbon nanotubes, as one of nanotechnology application, can be designed up to 250 times stronger than steel. Nano-enabled devices and materials offer both enhanced and, in some cases, completely new defence systems. In the addition, the small amount of carbon nanoparticles to the construction materials such as; cement, concrete, wood, glass, gypson, and steel can make these materials act as defence elements. This paper highlights the fact that nanotechnology can impact the future global security and how building’s envelop can act as a defensive cover for the building and can be resistance to any threats can attack it. Then focus on its effect on construction materials such as; Concrete can obtain by nanoadditives excellent mechanical, chemical, and physical properties with less material, which can acts as a precautionary shield to the building.Keywords: nanomaterial, global warming, building security, smart homes
Procedia PDF Downloads 82206 Sustainability through Resilience: How Emergency Responders Cope with Stressors
Authors: Sophie Kroeling, Agnetha Schuchardt
Abstract:
Striving for sustainability brings a lot of challenges for different fields of interest, e. g. security or health concerns. In Germany, civil protection is predominantly carried out by emergency responders who perform essential tasks of civil protection. Based on theoretical concepts of different psychological stress theories this contribution focuses on the question, how the resilience of emergency responders can be improved. The goal is to identify resources and successful coping strategies that help to prevent and reduce negative outcomes during or after stressful events. The paper will present results from a qualitative analysis of semi-structured qualitative interviews with 20 emergency responders. These results provide insights into the complexity of coping processes (e. g. controlling the situation, downplaying perceived personal threats through humor) and show the diversity of stressors (like complexity of the disastrous situation, intrusive press and media, or lack of social support within the organization). Self-efficacy expectation was a very important resource for coping with stressful situations. The results served as a starting point for a quantitative survey (that was conducted in March 2017), the development of education and training tools for emergency responders and the improvement of critical incident stress management processes. First results from the quantitative study with more than 700 participants show that, e. g., the emergency responders use social coping within their private social network and also within their aid organization and that both are correlated to resilience. Moreover, missing information, bureaucratic problems and social conflicts within the organization are events that the majority of the participants considered very onerous. Further results from regression analysis will be presented. The proposed paper will combine findings from the qualitative study with the quantitative results, illustrating figures and correlations with respective statements from the interviews. At the end, suggestions for the improvement of the emergency responder’s resilience are given and it is discussed how this can make a contribution to strive for civil security and furthermore a sustainable development.Keywords: civil security, emergency responders, stress, resilience, resources
Procedia PDF Downloads 144205 Enhancing Robustness in Federated Learning through Decentralized Oracle Consensus and Adaptive Evaluation
Authors: Peiming Li
Abstract:
This paper presents an innovative blockchain-based approach to enhance the reliability and efficiency of federated learning systems. By integrating a decentralized oracle consensus mechanism into the federated learning framework, we address key challenges of data and model integrity. Our approach utilizes a network of redundant oracles, functioning as independent validators within an epoch-based training system in the federated learning model. In federated learning, data is decentralized, residing on various participants' devices. This scenario often leads to concerns about data integrity and model quality. Our solution employs blockchain technology to establish a transparent and tamper-proof environment, ensuring secure data sharing and aggregation. The decentralized oracles, a concept borrowed from blockchain systems, act as unbiased validators. They assess the contributions of each participant using a Hidden Markov Model (HMM), which is crucial for evaluating the consistency of participant inputs and safeguarding against model poisoning and malicious activities. Our methodology's distinct feature is its epoch-based training. An epoch here refers to a specific training phase where data is updated and assessed for quality and relevance. The redundant oracles work in concert to validate data updates during these epochs, enhancing the system's resilience to security threats and data corruption. The effectiveness of this system was tested using the Mnist dataset, a standard in machine learning for benchmarking. Results demonstrate that our blockchain-oriented federated learning approach significantly boosts system resilience, addressing the common challenges of federated environments. This paper aims to make these advanced concepts accessible, even to those with a limited background in blockchain or federated learning. We provide a foundational understanding of how blockchain technology can revolutionize data integrity in decentralized systems and explain the role of oracles in maintaining model accuracy and reliability.Keywords: federated learning system, block chain, decentralized oracles, hidden markov model
Procedia PDF Downloads 63