Search results for: conservation threats
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 1857

Search results for: conservation threats

1017 Perceptions of Cybersecurity in Government Organizations: Case Study of Bhutan

Authors: Pema Choejey, David Murray, Chun Che Fung

Abstract:

Bhutan is becoming increasingly dependent on Information and Communications Technologies (ICTs), especially the Internet for performing the daily activities of governments, businesses, and individuals. Consequently, information systems and networks are becoming more exposed and vulnerable to cybersecurity threats. This paper highlights the findings of the survey study carried out to understand the perceptions of cybersecurity implementation among government organizations in Bhutan. About 280 ICT personnel were surveyed about the effectiveness of cybersecurity implementation in their organizations. A questionnaire based on a 5 point Likert scale was used to assess the perceptions of respondents. The questions were asked on cybersecurity practices such as cybersecurity policies, awareness and training, and risk management. The survey results show that less than 50% of respondents believe that the cybersecurity implementation is effective: cybersecurity policy (40%), risk management (23%), training and awareness (28%), system development life cycle (34%); incident management (26%), and communications and operational management (40%). The findings suggest that many of the cybersecurity practices are inadequately implemented and therefore, there exist a gap in achieving a required cybersecurity posture. This study recommends government organizations to establish a comprehensive cybersecurity program with emphasis on cybersecurity policy, risk management, and awareness and training. In addition, the research study has practical implications to both government and private organizations for implementing and managing cybersecurity.

Keywords: awareness and training, cybersecurity policy, risk management, security risks

Procedia PDF Downloads 320
1016 A Distributed Cryptographically Generated Address Computing Algorithm for Secure Neighbor Discovery Protocol in IPv6

Authors: M. Moslehpour, S. Khorsandi

Abstract:

Due to shortage in IPv4 addresses, transition to IPv6 has gained significant momentum in recent years. Like Address Resolution Protocol (ARP) in IPv4, Neighbor Discovery Protocol (NDP) provides some functions like address resolution in IPv6. Besides functionality of NDP, it is vulnerable to some attacks. To mitigate these attacks, Internet Protocol Security (IPsec) was introduced, but it was not efficient due to its limitation. Therefore, SEND protocol is proposed to automatic protection of auto-configuration process. It is secure neighbor discovery and address resolution process. To defend against threats on NDP’s integrity and identity, Cryptographically Generated Address (CGA) and asymmetric cryptography are used by SEND. Besides advantages of SEND, its disadvantages like the computation process of CGA algorithm and sequentially of CGA generation algorithm are considerable. In this paper, we parallel this process between network resources in order to improve it. In addition, we compare the CGA generation time in self-computing and distributed-computing process. We focus on the impact of the malicious nodes on the CGA generation time in the network. According to the result, although malicious nodes participate in the generation process, CGA generation time is less than when it is computed in a one-way. By Trust Management System, detecting and insulating malicious nodes is easier.

Keywords: NDP, IPsec, SEND, CGA, modifier, malicious node, self-computing, distributed-computing

Procedia PDF Downloads 266
1015 Optimization of the Energy Management for a Solar System of an Agricultural Greenhouse

Authors: Nora Arbaoui, Rachid Tadili, Ilham Ihoume

Abstract:

To improve the climatic conditions and increase production in the greenhouse during the winter season under the Mediterranean climate, this thesis project proposes a design of an integrated and autonomous solar system for heating, cooling, and conservation of production in an agricultural greenhouse. To study the effectiveness of this system, experiments are conducted in two similar agricultural greenhouses oriented north-south. The first greenhouse is equipped with an active solar system integrated into the double glazing of the greenhouse’s roof, while the second greenhouse has no system, it serves as a controlled greenhouse for comparing thermal and agronomic performance The solar system allowed for an average increase in the indoor temperature of the experimental greenhouse of 6°C compared to the outdoor environment and 4°C compared to the control greenhouse. This improvement in temperature has a favorable effect on the plants' climate and subsequently positively affects their development, quality, and production.

Keywords: solar system, agricultural greenhouse, heating, cooling, storage, drying

Procedia PDF Downloads 80
1014 Contribution of Urban Wetlands to Livelihood in Tanzania

Authors: Halima Kilungu, Munishi P. K. T., Happiness Jackson Nko

Abstract:

Wetlands contribute significantly to the national economy. Nevertheless, urban wetlands in Tanzania have been taken for granted; many have been converted into waste disposal areas and settlements despite their substantial role in climate-change flood attenuation and livelihood. This is due to the lacking informing assessments from a socio-economic perspective. This study assesses the contribution of urban wetlands to the livelihood of marginalised communities in Dar es Salaam City, Tanzania. Specifically, the study assesses the an extent and nature of change in wetlands in Dar es Salaam City for the past 30 years using the land-use land-cover change approach and the contribution of wetlands to livelihood using questionnaires. The results show that the loss of wetlands in Dar es Salaam is high to extent that will likely jeopardise their future contributions to livelihood. The results inform decision-makers on the importance of wise use of Urban Wetlands and conservation to improving livelihood for urban dwellers.

Keywords: wetlands, tanzania, dar es salaam, climate-change, and wetlands, livelihood

Procedia PDF Downloads 153
1013 Compressible Flow Modeling in Pipes and Porous Media during Blowdown Experiment

Authors: Thomas Paris, Vincent Bruyere, Patrick Namy

Abstract:

A numerical model is developed to simulate gas blowdowns through a thin tube and a filter (porous media), separating a high pressure gas filled reservoir to low pressure ones. Based on a previous work, a one-dimensional approach is developed by using the finite element method to solve the transient compressible flow and to predict the pressure and temperature evolution in space and time. Mass, momentum, and energy conservation equations are solved in a fully coupled way in the reservoirs, the pipes and the porous media. Numerical results, such as pressure and temperature evolutions, are firstly compared with experimental data to validate the model for different configurations. Couplings between porous media and pipe flow are then validated by checking mass balance. The influence of the porous media and the nature of the gas is then studied for different initial high pressure values.

Keywords: compressible flow, fluid mechanics, heat transfer, porous media

Procedia PDF Downloads 383
1012 User’s Susceptibility Factors to Malware Attacks: A Systematic Literature Review

Authors: Awad A. Younis, Elise Stronberg, Shifa Noor

Abstract:

Malware attacks due to end-user vulnerabilities have been noticeably increased in the past few years. Investigating the factors that make an end-user vulnerable to those attacks is critical because they can be utilized to set up proactive strategies such as awareness and education to mitigate the impacts of those attacks. Some existing studies investigated demographic, behavioral, and cultural factors that make an end-user susceptible to malware attacks. However, it has been challenging to draw more general conclusions from individual studies due to the varieties in the type of end-users and different types of malware. Therefore, we conducted a systematic literature review (SLR) of the existing research for end-user susceptibility factors to malware attacks. The results showed while some demographic factors are mostly associated with malware infection regardless of the end users' type, age, and gender are not consistent among the same and different types of end-users. Besides, the association of culture and personality factors with malware infection are consistent in most of the selected studies and for all type of end-users. Moreover, malware infection varies based on age, geographic location, and host types. We propose that future studies should carefully take into consideration the type of end-users because different end users may be exposed to different threats or be targeted based on their user domains’ characteristics. Additionally, as different types of malware use different tactics to trick end-users, taking the malware types into consideration is important.

Keywords: cybersecurity, malware, end-users, demographics, personality, culture, systematic literature review

Procedia PDF Downloads 211
1011 Performance Analysis of Traffic Classification with Machine Learning

Authors: Htay Htay Yi, Zin May Aye

Abstract:

Network security is role of the ICT environment because malicious users are continually growing that realm of education, business, and then related with ICT. The network security contravention is typically described and examined centrally based on a security event management system. The firewalls, Intrusion Detection System (IDS), and Intrusion Prevention System are becoming essential to monitor or prevent of potential violations, incidents attack, and imminent threats. In this system, the firewall rules are set only for where the system policies are needed. Dataset deployed in this system are derived from the testbed environment. The traffic as in DoS and PortScan traffics are applied in the testbed with firewall and IDS implementation. The network traffics are classified as normal or attacks in the existing testbed environment based on six machine learning classification methods applied in the system. It is required to be tested to get datasets and applied for DoS and PortScan. The dataset is based on CICIDS2017 and some features have been added. This system tested 26 features from the applied dataset. The system is to reduce false positive rates and to improve accuracy in the implemented testbed design. The system also proves good performance by selecting important features and comparing existing a dataset by machine learning classifiers.

Keywords: false negative rate, intrusion detection system, machine learning methods, performance

Procedia PDF Downloads 105
1010 Legal Regulation of Personal Information Data Transmission Risk Assessment: A Case Study of the EU’s DPIA

Authors: Cai Qianyi

Abstract:

In the midst of global digital revolution, the flow of data poses security threats that call China's existing legislative framework for protecting personal information into question. As a preliminary procedure for risk analysis and prevention, the risk assessment of personal data transmission lacks detailed guidelines for support. Existing provisions reveal unclear responsibilities for network operators and weakened rights for data subjects. Furthermore, the regulatory system's weak operability and a lack of industry self-regulation heighten data transmission hazards. This paper aims to compare the regulatory pathways for data information transmission risks between China and Europe from a legal framework and content perspective. It draws on the “Data Protection Impact Assessment Guidelines” to empower multiple stakeholders, including data processors, controllers, and subjects, while also defining obligations. In conclusion, this paper intends to solve China's digital security shortcomings by developing a more mature regulatory framework and industry self-regulation mechanisms, resulting in a win-win situation for personal data protection and the development of the digital economy.

Keywords: personal information data transmission, risk assessment, DPIA, internet service provider, personal information data transimission, risk assessment

Procedia PDF Downloads 33
1009 Design of a Customized Freshly-Made Fruit Salad and Juices Vending Machine

Authors: María Laura Guevara Campos

Abstract:

The increasing number of vending machines makes it easy for people to find them more frequently in stores, universities, workplaces, and even hospitals. These machines usually offer products with high contents of sugar and fat, which, if consumed regularly, can result in serious health threats, as overweight and obesity. Additionally, the energy consumption of these machines tends to be high, which has an impact on the environment as well. In order to promote the consumption of healthy food, a vending machine was designed to give the customer the opportunity to choose between a customized fruit salad and a customized fruit juice, both of them prepared instantly with the ingredients selected by the customer. The main parameters considered to design the machine were: the storage of the preferred fruits in a salad and/or in a juice according to a survey, the size of the machine, the use of ecologic recipients, and the overall energy consumption. The methodology used for the design was the one proposed by the German Association of Engineers for mechatronics systems, which breaks the design process in several stages, from the elaboration of a list of requirements through the establishment of the working principles and the design concepts to the final design of the machine, which was done in a 3D modelling software. Finally, with the design of this machine, the aim is to contribute to the development and implementation of healthier vending machines that offer freshly-made products, which is not being widely attended at present.

Keywords: design, design methodology, mechatronics systems, vending machines

Procedia PDF Downloads 116
1008 Contemplating Preference Ratings of Corporate Social Responsibility Practices for Supply Chain Performance System Implementation

Authors: Mohit Tyagi, Pradeep Kumar

Abstract:

The objective of this research work is to identify and analyze the significant corporate social responsibility (CSR) practices with an aim to improve the supply chain performance of automobile industry located at National Capital Region (NCR) of India. To achieve the objective, 6 CSR practices have been considered and analyzed using expert’s preference rating (EPR) approach. The considered CSR practices are namely, Top management and employee awareness about CSR (P1), Employee involvement in social and environmental problems (P2), Protection of human rights (P3), Waste reduction, energy saving and water conservation (P4), Proper visibility of CSR guidelines (P5) and Broad perception towards CSR initiatives (P6). The outcomes of this research may help mangers in decision making processes and framing polices for SCP implementation under CSR context.

Keywords: supply chain performance, corporate social responsibility, CSR practices, expert’s preference rating approach

Procedia PDF Downloads 315
1007 A Feasibility Study of Replacing High Pressure Mercury Vapor and Sodium Vapor Lamp Street Lighting Bulbs with LEDs in Turkish Republic of Northern Cyprus

Authors: Olusola Olorunfemi Bamisile, Mustafa Dagbasi, Serkan Abbasoglu

Abstract:

Feasibility of an Energy Audit program is the main aim of this paper. LEDs are used to replace Sodium Vapor lamps and High Pressured Mercury Vapor lamps that are currently used for the street lighting system in Turkish Republic of Northern Cyprus. 44% of the fossil fuels imported into Turkish Republic of Northern Cyprus are used for electricity generation which makes the reduction in the consumption of electricity very important. This project will save as much as 40,206,210 kWh on site annually and 121,837,000 kWh can be saved from source. The economic environmental and fossil fuels saving of this project is also evaluated.

Keywords: energy conservation management, LEDs, sodium vapor, high pressure mercury vapor, life cycle costing

Procedia PDF Downloads 446
1006 Dam Break Model Using Navier-Stokes Equation

Authors: Alireza Lohrasbi, Alireza Lavaei, Mohammadali M. Shahlaei

Abstract:

The liquid flow and the free surface shape during the initial stage of dam breaking are investigated. A numerical scheme is developed to predict the wave of an unsteady, incompressible viscous flow with free surface. The method involves a two dimensional finite element (2D), in a vertical plan. The Naiver-Stokes equations for conservation of momentum and mass for Newtonian fluids, continuity equation, and full nonlinear kinematic free-surface equation were used as the governing equations. The mapping developed to solve highly deformed free surface problems common in waves formed during wave propagation, transforms the run up model from the physical domain to a computational domain with Arbitrary Lagrangian Eulerian (ALE) finite element modeling technique.

Keywords: dam break, Naiver-Stokes equations, free-surface flows, Arbitrary Lagrangian-Eulerian

Procedia PDF Downloads 309
1005 Trends in Conservation and Inheritance of Musical Culture of Ethnic Groups: A Case Study of the Akha Music in Chiang Rai Province, Thailand

Authors: Nutthan Inkhong, Sutthiphong Ruangchante

Abstract:

Chiang Rai province is located at the northern border of Thailand. Most of the geography there is the northern continental highlands, and the population has many types of inhabitants, including Thai people, immigrants and ethnic groups such as Akha, Lahu, Lisu, Yao, etc. Most of these ethnic groups migrated from neighbouring countries such as Myanmar, Laos, China, etc. and settled in the mountains. Each ethnic group has their unique traditions, culture, and ways of life, including the musical culture that the ancestors of each ethnic group brought with them. In the present, the Akha have the largest population in the region and still live together in numerous villages in many districts. Thus, Akha musical culture still appears in the community traditions and cultural events of Chiang Rai province regularly. This article presents the situations of Akha musical culture in the present and the predictions for the future. The study method involves the analysis of music information and the related social contexts, which were collected from the fieldwork of ethnomusicological methodology by in-depth interviews, observations, audio and visual recordings, and related documents. The results found that the important persons who are related with Akha musical culture include (1) a musical instrument maker (lives in Mae Chan district) who produces various Akha musical instruments, including gourd mouth organs, Akha drums, two-way flutes, three-hole flutes, Jew’s harps (the sound of teenage love), buffalo horns (the sound symbol of hunting) and bird call instruments (the imitation of bird sounds), (2) a folk philosopher (lives in Mae Pha Luang district) who can teach music to the new generation of Akha people as well as lecture and demonstrate music to academics and tourists, and (3) a community leader (lives in Mae Chan district) who conserves Akha performances, singing and music through various activities of the students in an informal school. Because of the changes to the social contexts and ways of life of the Akha people, such as the educational system, religion, social media, etc., including the popularity of both Thai and international popular music among the new generation of Akha people, changes to and the fading away of Akha musical culture in the future may likely occur. Therefore, the conservation and inheritance of Akha music is an issue that should be resolved quickly. This primary study leads to the next step of the ethnomusicological work and plays a part in preventing or reducing the problems impacting Akha musical culture survival by the recording of Akha music in all of its dimensions, such as producing musical instruments, playing musical instruments, analysis of tuning systems, recording Akha music as musical notation using symbols, researching related social contexts, etc. and the transcription of this information to create lessons that can be returned to the Akha community.

Keywords: Akha music, Chiang Rai, ethnic music in Thailand, ethnomusicology

Procedia PDF Downloads 139
1004 Vieira Da Silva's Tiles at Universidade Federal Rural Do Rio de Janeiro: A Conservation and Restoration Project

Authors: Adriana Anselmo Oliveira

Abstract:

The present project showcases a tile work from the Franco-Portuguese artist Maria Helena Vieira da Silva (1908-1992). It is a set of 8 panels composed of figurative and geometric tiles, with extra tiles framing nearby doors and windows in a study room in the (UFRRJ, Universidade Federal Rural do Rio de Janeiro). The aforementioned work was created between 1942 and 1943, during the artist's 6 year exile in the Brazilian city. This one-of-a-kind tileset was designed and made by Vieira da Silva between 1942 and 1943. Over the years, several units were lost, which led to their replacement in the nineties. However, these replacements don't do justice to the original work of art. In 2007, a project was initiated to fully repair and maintain the set. Three panels are removed and restored, but the project is halted. To this day, the three fully restored panels remain in boxes. In 2016 a new restoration project is submitted by the (Faculdade de Belas Artes da Universidade de Lisboa) in collaboration with de (Fundacão Árpád Szenes-Vieira da Silva). There are many varied opinions on restoring and conserving older pieces of art, however, we have the moral duty to safeguard the original materials used by the artist along with the artists original vision and also to care for the future generations of students who will use the space in which the tile-work was inserted. Many tiles have been replaced by white tiles, tiles with a divergent colour pallet and technique, and in a few cases, the incorrect place or way around. These many factors make it increasingly difficult to maintain the artists original vision and destroy and chance of coherence within the artwork itself. The conservative technician cannot make new images to fill the empty spaces or mark the remaining images with their own creative input. with reliable photographic documentation that can provide us with the necessary vision to allow us to proceed with an accurate reconstruction, we have the obligation to proceed and return the piece of art to its true form, as in its current state, it is impossible to maintain its original glory. Using the information we have, we must find a way to differentiate the original tiles from the reconstructions in order to recreate and reclaim the original message from the artist. The objective of this project is to understand the significance of tiles in Vieira da Silva's art as well as the influence they had on the artist's pictorial language since the colour definition on tile work is vastly different from the painting process as the materials change during their merger. Another primary goal is to understand what the previous interventions achieved besides increasing the artworks durability. The main objective is to submit a proposal that can salvage the artist's visual intention and supports it for posteriority. In summary, this proposal goes further than the usual conservative interventions as it intends to recreate the original artistic worth, prioritising the aesthetics and keeping its soul alive.

Keywords: Vieira da Silva, tiles, conservation, restoration

Procedia PDF Downloads 136
1003 Reducing Environmental Impact of Olive Oil Production in Sakaka City Using Combined Chemical, Physical, and Biological Treatment

Authors: Abdullah Alhajoj, Bassam Alowaiesh

Abstract:

This work aims to reduce the risks of discharging olive mill waste directly to the environment without treatment in Sakaka City, KSA. The organic loads expressed by chemical oxygen demand (COD) and biological oxygen demand (BOD) of the produced wastewater (OMWW) as well as the solid waste (OMW) were evaluated. The wastes emitted from the three-phase centrifuge decanters was found to be higher than that emitted from the two-phase centrifuge decanters. The olive mill wastewater (OMWW) was treated using advanced oxidation combined with filtration treatment. The results indicated that the concentration of COD, BOD, TSS, oil and grease and phenol was reduced by using complex sand filtration from 72150, 21660 10256, 36430, and 1470 mg/l to 980, 421, 58, 68, and 0.35 mg/l for three-phase OMWW and from 150562, 17955, 15325, 19658 and 2153 mg/l to 1050, 501, 29, 0.75, and 0.29 mg/l, respectively. While, by using modified trickling filter (packed with the neck of waste plastic bottles the concentration of the previously mentioned parameters was reduced to 1190, 570, 55, 0.85, and 0.3 mg/l, respectively. This work supports the application of such treatment technique for reducing the environmental threats of olive mill waste effluents in Saudi Arabia.

Keywords: two-phase, three-phase, olive mill, olive oil, waste treatment, filtration, advanced oxidation, waste plastic bottles

Procedia PDF Downloads 137
1002 Community-based Mapping as a Planning Tool; Examples from Pakistan

Authors: Noman Ahmed, Fariha Tahseen

Abstract:

Since several decades, unplanned urbanization and rapid growth of informal settlements have evolved and increased in size and number. Large cities such as Karachi have been impacted with sprawl and rising share of unplanned settlements where poor communities reside. Threats of eviction, deteriorating law and order situation, lack of essential amenities and infrastructure, extortion and bullying from local and non-local musclemen and feeble response of government agencies towards their development needs are some predicaments. Non-governmental organizations (NGOs) have caused important interventions in such locations. Appraisal of the community-based mapping as a tool in supporting the development work in less privileged areas in Karachi has been the objective of this research. The Orangi Pilot Project (OPP), under the leadership of its slain director Perween Rahman had a significant role to play in developing and extending this approach in low income locations in Karachi and beyond. The paper investigates the application of mapping in the process of peri urban land invasion causing rapid transformation of traditional settlements in Karachi. Mixed methodology components comprising literature review, archival research, and unstructured interviews with key informants and case studies have been used.

Keywords: squatters (katchi abadis), land grabbing, community empowerment, housing rights, mapping, infrastructure development

Procedia PDF Downloads 303
1001 On the Use of Machine Learning for Tamper Detection

Authors: Basel Halak, Christian Hall, Syed Abdul Father, Nelson Chow Wai Kit, Ruwaydah Widaad Raymode

Abstract:

The attack surface on computing devices is becoming very sophisticated, driven by the sheer increase of interconnected devices, reaching 50B in 2025, which makes it easier for adversaries to have direct access and perform well-known physical attacks. The impact of increased security vulnerability of electronic systems is exacerbated for devices that are part of the critical infrastructure or those used in military applications, where the likelihood of being targeted is very high. This continuously evolving landscape of security threats calls for a new generation of defense methods that are equally effective and adaptive. This paper proposes an intelligent defense mechanism to protect from physical tampering, it consists of a tamper detection system enhanced with machine learning capabilities, which allows it to recognize normal operating conditions, classify known physical attacks and identify new types of malicious behaviors. A prototype of the proposed system has been implemented, and its functionality has been successfully verified for two types of normal operating conditions and further four forms of physical attacks. In addition, a systematic threat modeling analysis and security validation was carried out, which indicated the proposed solution provides better protection against including information leakage, loss of data, and disruption of operation.

Keywords: anti-tamper, hardware, machine learning, physical security, embedded devices, ioT

Procedia PDF Downloads 133
1000 Medicinal Plant Resources and Conservation of Nallamalais, Forest Range, Eastern Ghats, India

Authors: S. K. M. Basha

Abstract:

Nallamalas one of the centres of Plant Diversity (CPD) (WWF&IUCN,1995) is located in the central eastern Ghats between latitudes 15.20’-16.30’N and Longitude 78.30-80.10E in Andhra Pradesh, extended to an area of 7640 Sq.Km. No Comprehensive work available for RET Plants in the study area, therefore the objective of the present paper is to document the RET Medicinal Plants of Nallamalias and their uses by the local people of the area. In India, one of the major resources to know about the number of plant species and their medicinal values is the groups who are habituated in near and deep forests. The most common groups in south Indian forests are Yanadis and Yerukulas. These two groups of people are residing in the forest, which is located very far from the modern society, towns and cities. They are following traditional methods obtained from their forefathers in all respects, including medication. They are the only source to know many medicinal plants in the areas where they reside and are also important to record the medicinal properties of various plant species which are not reported. The new reports may help in drug industry in order to develop pharmaceutical herbal medicine for human health. In the present study, nearly 150 rare species have been found to be used for various ailments. Out of these 23 species are critically endangered, over 25 are vulnerable and around 22 comes under the category of near threatened. Some important species like Christella dentate, Careya arborea are used for curing cough and cold. Piper attnuatum, piper nigrum are used for curing skin disease. Ipomoea mauritiana is used against male impotency.Glycosmis cochinensis, Entada perseatha are used as contraceptives. The roots of Andrographis nallamalayana and Acrocephalus indicus are used for leucorrhoea. While the stem barks of Gyrocarpus americanus is given orally for spider bite. Piper hymenophyllum leaves mixed with turmeric and gingerly oil is used externally for mouth ulcers in cattle. Piper nigrum fruits are used for skin diseases. Vernonia anthelmentica seeds are used for indigestion. It was widely distributed in this hills. Due to over exploitation this species was in declined condition. Sterculia urens which is a sorce of gum for tribal, due to over exploitation this species declaimed in these hills. Hence, there is an urgent need to conserve the medicinal plants and prevent their exploitation and extinction with the help of tribals. There is a need to adopt sustainable utilization, cultivation and micro propagation techniques. Medicinal plants are as potent and effective today as they were thousands of years ago. They are natures wonderful gift to mankind and are involved in India as a very rich ancient heritage of traditional systems medicine i.e., ayurveda, siddha and unani. Unfortunately, these traditions have been largely eroded because of lack of support and recognition as well as rapid destruction of natural habitats which has led to shrinkage of medicinal plants therefore the conservation of medicinal plants and the revitalization of local health traditions has been taken up on priority basis.

Keywords: RET plants CPD, IUCN, nallamalas, yanadis, yerukulas

Procedia PDF Downloads 228
999 National Strategy for Swedish Wildlife Management

Authors: Maria Hornell, Marcus Ohman

Abstract:

Nature, and the society it is a part of, is under constant change. The landscape, climate and game populations vary over time, as well as society's priorities and the way it uses the land where wildlife may proliferate. Sweden currently has historically large wildlife populations which are a resource for the benefit and joy of many people. Wildlife may also be seen as a problem as it may cause damage in contradiction to other human interests. The Swedish Environmental Protection Agency introduces a new long-term strategy for national wildlife management. The strategy envisions a wildlife management in balance. It focuses on wildlife values in a broad sense including outdoor recreation and tourism as well as conservation of biodiversity. It is fundamental that these values should be open and accessible for the major part of the population. For that to be possible new ways to manage, mitigate and prevent damages and other problems that wildlife causes need to be developed. The strategy describes a roadmap for the development and strengthening of Sweden's wildlife management until 2020. It aims at being applicable for those authorities and stakeholders with interest in wildlife management being a guide for their own strategies, goals, and activities.

Keywords: wildlife management, strategy, Sweden, SEPA

Procedia PDF Downloads 198
998 A Topological Study of an Urban Street Network and Its Use in Heritage Areas

Authors: Jose L. Oliver, Taras Agryzkov, Leandro Tortosa, Jose F. Vicent, Javier Santacruz

Abstract:

This paper aims to demonstrate how a topological study of an urban street network can be used as a tool to be applied to some heritage conservation areas in a city. In the last decades, we find different kinds of approaches in the discipline of Architecture and Urbanism based in the so-called Sciences of Complexity. In this context, this paper uses mathematics from the Network Theory. Hence, it proposes a methodology based in obtaining information from a graph, which is created from a network of urban streets. Then, it is used an algorithm that establishes a ranking of importance of the nodes of that network, from its topological point of view. The results are applied to a heritage area in a particular city, confronting the data obtained from the mathematical model, with the ones from the field work in the case study. As a result of this process, we may conclude the necessity of implementing some actions in the area, and where those actions would be more effective for the whole heritage site.

Keywords: graphs, heritage cities, spatial analysis, urban networks

Procedia PDF Downloads 373
997 Strategic Mine Planning: A SWOT Analysis Applied to KOV Open Pit Mine in the Democratic Republic of Congo

Authors: Patrick May Mukonki

Abstract:

KOV pit (Kamoto Oliveira Virgule) is located 10 km from Kolwezi town, one of the mineral rich town in the Lualaba province of the Democratic Republic of Congo. The KOV pit is currently operating under the Katanga Mining Limited (KML), a Glencore-Gecamines (a State Owned Company) join venture. Recently, the mine optimization process provided a life of mine of approximately 10 years withnice pushbacks using the Datamine NPV Scheduler software. In previous KOV pit studies, we recently outlined the impact of the accuracy of the geological information on a long-term mine plan for a big copper mine such as KOV pit. The approach taken, discussed three main scenarios and outlined some weaknesses on the geological information side, and now, in this paper that we are going to develop here, we are going to highlight, as an overview, those weaknesses, strengths and opportunities, in a global SWOT analysis. The approach we are taking here is essentially descriptive in terms of steps taken to optimize KOV pit and, at every step, we categorized the challenges we faced to have a better tradeoff between what we called strengths and what we called weaknesses. The same logic is applied in terms of the opportunities and threats. The SWOT analysis conducted in this paper demonstrates that, despite a general poor ore body definition, and very rude ground water conditions, there is room for improvement for such high grade ore body.

Keywords: mine planning, mine optimization, mine scheduling, SWOT analysis

Procedia PDF Downloads 207
996 Genome-Wide Identification of Genes Resistance to Nitric Oxide in Vibrio parahaemolyticus

Authors: Yantao Li, Jun Zheng

Abstract:

Food poison caused by consumption of contaminated food, especially seafood, is one of most serious public health threats worldwide. Vibrio parahaemolyticus is emerging bacterial pathogen and the leading cause of human gastroenteritis associated with food poison, especially in the southern coastal region of China. To successfully cause disease in host, bacterial pathogens need to overcome the host-derived stresses encountered during infection. One of the toxic chemical species elaborated by the host is nitric oxide (NO). NO is generated by acidified nitrite in the stomach and by enzymes of the inducible NO synthase (iNOS) in the host cell, and is toxic to bacteria. Bacterial pathogens have evolved some mechanisms to battle with this toxic stress. Such mechanisms include genes to sense NO produced from immune system and activate others to detoxify NO toxicity, and genes to repair the damage caused by toxic reactive nitrogen species (RNS) generated during NO toxic stress. However, little is known about the NO resistance in V. parahaemolyticus. In this study, a transposon coupled with next generation sequencing (Tn-seq) technology will be utilized to identify genes for NO resistance in V. parahaemolyticus. Our strategy will include construction the saturating transposon insertion library, transposon library challenging with NO, next generation sequencing (NGS), bioinformatics analysis and verification of the identified genes in vitro and in vivo.

Keywords: vibrio parahaemolyticus, nitric oxide, tn-seq, virulence

Procedia PDF Downloads 247
995 American Criminal Justice Responses to Terrorism in the Post 9/11 Era

Authors: Summer Jackson

Abstract:

September 11, 2001 terrorist attacks exposed weaknesses in federal law enforcement’s ability to proactively counter threats to American homeland security. Following the attacks, legislative reforms and policy changes cleared both bureaucratic and legal obstacles to anti-terrorism efforts. The Federal Bureau of Investigation (FBI) transformed into a domestic intelligence agency responsible for preventing future terrorist attacks. Likewise, the passage of the 2001 USA Patriot Act gave federal agents new discretionary powers to more easily collect intelligence on those suspected of supporting terrorism. Despite these changes, there has been only limited scholarly attention paid to terrorism responses by the federal criminal justice system. This study sought to examine the investigative and prosecutorial changes made in the Post-9/11 era. The methodology employed bivariate and multivariate statistics using data from the American Terrorism Study (ATS). This analysis examined how policy changes are reflected in the nature of terrorism investigations, the handling of terrorist defendants by federal prosecutors, and the outcomes of terrorism cases since 2001. The findings indicate significant investigative and prosecutorial changes in the Post-9/11 era. Specifically, this study found terrorism cases involved younger defendants, fewer indictees per case, less use of human intelligence, less complicated attacks, less serious charges, and more plea bargains. Overall, this study highlights the important shifts in responses to terrorism following the 9/11 attacks.

Keywords: terrorism, law enforcement, post-9/11, federal policy

Procedia PDF Downloads 101
994 A Framework for Security Risk Level Measures Using CVSS for Vulnerability Categories

Authors: Umesh Kumar Singh, Chanchala Joshi

Abstract:

With increasing dependency on IT infrastructure, the main objective of a system administrator is to maintain a stable and secure network, with ensuring that the network is robust enough against malicious network users like attackers and intruders. Security risk management provides a way to manage the growing threats to infrastructures or system. This paper proposes a framework for risk level estimation which uses vulnerability database National Institute of Standards and Technology (NIST) National Vulnerability Database (NVD) and the Common Vulnerability Scoring System (CVSS). The proposed framework measures the frequency of vulnerability exploitation; converges this measured frequency with standard CVSS score and estimates the security risk level which helps in automated and reasonable security management. In this paper equation for the Temporal score calculation with respect to availability of remediation plan is derived and further, frequency of exploitation is calculated with determined temporal score. The frequency of exploitation along with CVSS score is used to calculate the security risk level of the system. The proposed framework uses the CVSS vectors for risk level estimation and measures the security level of specific network environment, which assists system administrator for assessment of security risks and making decision related to mitigation of security risks.

Keywords: CVSS score, risk level, security measurement, vulnerability category

Procedia PDF Downloads 304
993 Measurement of Natural Radioactivity and Health Hazard Index Evaluation in Major Soils of Tin Mining Areas of Perak

Authors: Habila Nuhu

Abstract:

Natural radionuclides in the environment can significantly contribute to human exposure to ionizing radiation. The knowledge of their levels in an environment can help the radiological protection agencies in policymaking. Measurement of natural radioactivity in major soils in the tin mining state of Perak Malaysia has been conducted using an HPGe detector. Seventy (70) soil samples were collected at widely distributed locations in the state. Six major soil types were sampled, and thirteen districts around the state were covered. The following were the results of the 226Ra (238U), 228Ra (232Th), and 40K activity in the soil samples: 226Ra (238U) has a mean activity concentration of 191.83 Bq kg⁻¹, more than five times the UNSCEAR reference limits of 35 Bq kg⁻¹. The mean activity concentration of 228Ra (232Th) with a value of 232.41 Bq kg⁻¹ is over seven times the UNSCEAR reference values of 30 Bq kg⁻¹. The average concentration of 40K activity was 275.24 Bq kg⁻¹, which was less than the UNSCEAR reference limit of 400 Bq Kg⁻¹. The range of external hazards index (Hₑₓ) values was from 1.03 to 2.05, while the internal hazards index (Hin) was from 1.48 to 3.08. The Hex and Hin should be less than one for minimal external and internal radiation threats as well as secure use of soil material for building construction. The Hₑₓ and Hin results generally indicate that while using the soil types and their derivatives as building materials in the study area, care must be taken.

Keywords: activity concentration, hazard index, soil samples, tin mining

Procedia PDF Downloads 93
992 The Impact of Job Meaningfulness on the Relationships between Job Autonomy, Supportive Organizational Climate, and Job Satisfaction

Authors: Sashank Nyapati, Laura Lorente-Prieto, Maria Peiro

Abstract:

The general objective of this study is to analyse the mediating role of meaningfulness in the relationships between job autonomy and job satisfaction and supportive organizational climate and job satisfaction. Theories such as the Job Characteristics Model, Conservation of Resources theory, as well as the Job Demands-Resources theory were used as theoretical framework. Data was obtained from the 5th European Working Conditions Survey (EWCS), and sample was composed of 1005 and 1000 workers from Spain and Portugal respectively. The analysis was conducted using the SOBEL Macro for SPSS (A multiple regression mediation model) developed by Preacher and Hayes in 2003. Results indicated that Meaningfulness partially mediates both the Job Autonomy-Job Satisfaction as well as the Supportive Organizational Climate-Job Satisfaction relationships. However, the percentages are large enough to draw substantial conclusions, especially that Job Meaningfulness plays an essential – if indirect – role in the amount of Satisfaction that one experiences at work. Some theoretical and practical implications are discussed.

Keywords: meaningfulness, job autonomy, supportive organizational climate, job satisfaction

Procedia PDF Downloads 516
991 Exploring the Challenges and Opportunities in Clinical Waste Management: The Case of Private Clinics, Selangor, Malaysia

Authors: Golyasamin Khanehzaei, Mohd. Bakri Ishak, Ahmad Makmom Hj Abdullah, Latifah Abd Manaf

Abstract:

Abstract—Management of clinical waste is a critical problem worldwide. Immediate attention is required to manage the clinical waste in an appropriate way in newly developing economy country such as Malaysia. The increasing amount of clinical waste generated is resulted from rapid urbanization and growing number of private health care facilities in developing countries such as Malaysia. In order to develop a sensible clinical waste management system and improvement of the management, information on factors affecting clinical waste generation has the crucial role. This paper is the study of management characteristics of clinical waste and the level of efficiency of clinical waste management systems operating in private clinics located in Selangor, Malaysia. Are they following the proper international standards? By taking all of this in consideration the aim of this paper is to identify and discuss the current trend, current challenges and also the present opportunities among the challenges of clinical waste management in private clinics of Selangor, Malaysia. The SWOT analysis was characterized for the evaluation of strengths, weaknesses, opportunities and threats. The methodology for this study was constituted of direct observation, Informal interviews, Conducting SWOT analysis, conduction of one sustainability dimensions analysis and application. The results show that clinical waste management in private clinics is far from an ideal model.

Keywords: clinical waste, SWOT analysis, Selangor, Malaysia

Procedia PDF Downloads 333
990 Challenge of Net-Zero Carbon Construction and Measurement of Energy Consumption and Carbon Emission Reduction to Climate Change, Economy and Job Growths in Hong Kong and Australia

Authors: Kwok Tak Kit

Abstract:

Under the Paris Agreement 2015, the countries committed to address and combat the climate change and its negative impacts and agree to the target of reducing the global greenhouse gas (GHG) emission substantially by limiting the global temperature to 20C above the pre-industrial level in this century. A internationally Submit named “ 26th United Nations Climate Conference” (COP26) was held in Glasgow in 2021 with all committed countries agreed to the finalize the outstanding element in Paris Agreement and Glasgow Climate Pact to keep 1.50C. In this paper, we will focus on the basic approach of waste strategy, recycling policy, circular economy strategy, net-zero strategy and sustainability strategy and the importance of the elements which affect the carbon emission, waste generation and energy conservation will be further reviewed with recommendation for future study.

Keywords: net-zero carbon, climate change, carbon emission, energy consumption

Procedia PDF Downloads 163
989 Impact of Agricultural Waste Utilization and Management on the Environment

Authors: Ravi Kumar

Abstract:

Agricultural wastes are the non-product outcomes of agricultural processing whose monetary value is less as compared to its collection cost, transportation, and processing. When such agricultural waste is not properly disposed of, it may damage the natural environment and cause detrimental pollution in the atmosphere. Agricultural development and intensive farming methods usually result in wastes that remarkably affect the rural environments in particular and the global environment in general. Agricultural waste has toxicity latent to human beings, animals, and plants through various indirect and direct outlets. The present paper explores the various activities that result in agricultural waste and the routes that can utilize the agricultural waste in a manageable manner to reduce its adverse impact on the environment. Presently, the agricultural waste management system for ecological agriculture and sustainable development has emerged as a crucial issue for policymakers. There is an urgent need to consider agricultural wastes as prospective resources rather than undesirable in order to avoid the transmission and contamination of water, land, and air resources. Waste management includes the disposal and treatment of waste with a view to eliminate threats of waste by modifying the waste to condense the microbial load. The study concludes that proper waste utilization and management will facilitate the purification and development of the ecosystem and provide feasible biofuel resources. This proper utilization and management of these wastes for agricultural production may reduce their accumulation and further reduce environmental pollution by improving environmental health.

Keywords: agricultural waste, utilization, management, environment, health

Procedia PDF Downloads 71
988 Ensuring Uniform Energy Consumption in Non-Deterministic Wireless Sensor Network to Protract Networks Lifetime

Authors: Vrince Vimal, Madhav J. Nigam

Abstract:

Wireless sensor networks have enticed much of the spotlight from researchers all around the world, owing to its extensive applicability in agricultural, industrial and military fields. Energy conservation node deployment stratagems play a notable role for active implementation of Wireless Sensor Networks. Clustering is the approach in wireless sensor networks which improves energy efficiency in the network. The clustering algorithm needs to have an optimum size and number of clusters, as clustering, if not implemented properly, cannot effectively increase the life of the network. In this paper, an algorithm has been proposed to address connectivity issues with the aim of ensuring the uniform energy consumption of nodes in every part of the network. The results obtained after simulation showed that the proposed algorithm has an edge over existing algorithms in terms of throughput and networks lifetime.

Keywords: Wireless Sensor network (WSN), Random Deployment, Clustering, Isolated Nodes, Networks Lifetime

Procedia PDF Downloads 318