Search results for: Mutibvu Tonderai
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 6

Search results for: Mutibvu Tonderai

6 Growth Performance and Meat Quality of Cobb 500 Broilers Fed Phytase and Tannase Treated Sorghum-Based Diets

Authors: Magaya Rutendo P., Mutibvu Tonderai, Nyahangare emmanuel T., Ncube Sharai

Abstract:

This study aimed to evaluate the effects of phytase and tannase addition in broiler diets on growth performance and meat quality of broilers fed sorghum-based diets. Twelve experimental diets were formulated at three sorghum levels, which include 0, 50, and 100%, and 4 enzyme levels: No enzyme, 5000FTU phytase, 25TU tannase, and a combination of 5000FTU phytase plus 25TU tannase. Data on voluntary feed intake, average weekly weight gain and feed conversion ratio were recorded and used to assess growth performance. Meat technical and nutritional parameters were used to determine meat quality. Broilers fed total sorghum diets with phytase and tannase enzyme combination had the highest feed intake in the first (24.4 ± 0.04g/bird/day) and second weeks of life (23.0 ± 1.06g/bird/day), respectively. Complete sorghum diets with phytase (83.0 ± 0.88g/bird/day) and tannase (122.0 ± 0.88g/bird/day) showed the highest feed intake in the third and fourth weeks, respectively. Broilers fed 50% sorghum diets with tannase (135.3 ± 0.05g/bird/day) and complete maize diets with phytase (158.1 ± 0.88g/bird/day) had the highest feed intake during weeks five and six, respectively. Broilers fed a 50% sorghum diet without enzymes had the highest weight gain in the final week (606.5 ± 32.39g). Comparable feed conversion was observed in birds fed complete maize and 50% sorghum diets. Dietary treatment significantly influences the live body, carcass, liver, kidneys, abdominal fat pad weight, and intestinal length. However, it did not affect Pectoralis major meat nutritional and technical parameters.

Keywords: feed efficiency, sorghum, carcass, exogenous enzymes

Procedia PDF Downloads 55
5 Human-Wildlife Conflicts in Urban Areas of Zimbabwe

Authors: Davie G. Dave, Prisca H. Mugabe, Tonderai Mutibvu

Abstract:

Globally, HWCs are on the rise. Such is the case with urban areas in Zimbabwe, yet little has been documented about it. This study was done to provide insights into the occurrence of human-wildlife conflicts in urban areas. The study was carried out in Harare, Bindura, Masvingo, Beitbridge, and Chiredzi to determine the cause, nature, extent, and frequency of occurrence of HWC, to determine the key wildlife species involved in conflicts and management practices done to combat wildlife conflicts in these areas. Several sampling techniques encompassing multi-stage sampling, stratified random, purposive, and simple random sampling were employed for placing residential areas into three strata according to population density, selecting residential areas, and selecting actual participants. Data were collected through a semi-structured questionnaire and key informant interviews. The results revealed that property destruction and crop damage were the most prevalent conflicts. Of the 15 animals that were cited, snakes, baboons, and monkeys were associated with the most conflicts. The occurrence of HWCs was mainly attributed to the increase in both animal and human populations. To curtail these HWCs, the local people mainly used non-lethal methods, whilst lethal methods were used by authorities for some of the reported cases. The majority of the conflicts were seasonal and less severe. There were growing concerns by respondents on the issues of wildlife conflicts, especially in those areas that had primates, such as Warren Park in Harare and Limpopo View in Beitbridge. There are HWCs hotspots in urban areas, and to ameliorate this, suggestions are that there is a need for a multi-action approach that includes general awareness campaigns on HWCs and land use planning that involves the creation of green spaces to ease wildlife management.

Keywords: human-wildlife conflicts, mitigation measures, residential areas, types of conflicts, urban areas

Procedia PDF Downloads 67
4 A Review Paper for Detecting Zero-Day Vulnerabilities

Authors: Tshegofatso Rambau, Tonderai Muchenje

Abstract:

Zero-day attacks (ZDA) are increasing day by day; there are many vulnerabilities in systems and software that date back decades. Companies keep discovering vulnerabilities in their systems and software and work to release patches and updates. A zero-day vulnerability is a software fault that is not widely known and is unknown to the vendor; attackers work very quickly to exploit these vulnerabilities. These are major security threats with a high success rate because businesses lack the essential safeguards to detect and prevent them. This study focuses on the factors and techniques that can help us detect zero-day attacks. There are various methods and techniques for detecting vulnerabilities. Various companies like edges can offer penetration testing and smart vulnerability management solutions. We will undertake literature studies on zero-day attacks and detection methods, as well as modeling approaches and simulations, as part of the study process.

Keywords: zero-day attacks, exploitation, vulnerabilities

Procedia PDF Downloads 102
3 Review Paper on an Algorithm Enhancing Privacy and Security in Online Meeting Platforms Using a Secured Encryption

Authors: Tonderai Muchenje, Mkhatshwa Phethile

Abstract:

Humans living in this current situation know that communication with one another is necessary for themselves. There are many ways to communicate with each other; during unexpected natural disasters and outbreak of epidemics and pandemics, the need for online meeting platforms are considered most important. Apparently, the development in the telecommunication sector also played an important role. Therefore, the epidemic of the Covid-19 Pandemic and the new normal situation resulted in the overwhelming production of online meeting platforms to prevent the situation. This software is commonly used in business communications in the beginning. Rapidly the COVID-19 pandemic changed the situation. At present-day, these virtual meeting applications are not only used to have informal meetings with friends and relatives but also to be used to have formal meetings in the business and education (universities) sector. In this article, an attempt has been made to list out the useful secured ways for using online meeting platforms.

Keywords: virtual background, zoom, secure online algorithm, RingCentral, Pexip Pexip, TeamViewer, microsoft teams

Procedia PDF Downloads 115
2 A Review Paper on Data Security in Precision Agriculture Using Internet of Things

Authors: Tonderai Muchenje, Xolani Mkhwanazi

Abstract:

Precision agriculture uses a number of technologies, devices, protocols, and computing paradigms to optimize agricultural processes. Big data, artificial intelligence, cloud computing, and edge computing are all used to handle the huge amounts of data generated by precision agriculture. However, precision agriculture is still emerging and has a low level of security features. Furthermore, future solutions will demand data availability and accuracy as key points to help farmers, and security is important to build robust and efficient systems. Since precision agriculture comprises a wide variety and quantity of resources, security addresses issues such as compatibility, constrained resources, and massive data. Moreover, conventional protection schemes used in the traditional internet may not be useful for agricultural systems, creating extra demands and opportunities. Therefore, this paper aims at reviewing state of the art of precision agriculture security, particularly in open field agriculture, discussing its architecture, describing security issues, and presenting the major challenges and future directions.

Keywords: precision agriculture, security, IoT, EIDE

Procedia PDF Downloads 90
1 Data Security: An Enhancement of E-mail Security Algorithm to Secure Data Across State Owned Agencies

Authors: Lindelwa Mngomezulu, Tonderai Muchenje

Abstract:

Over the decades, E-mails provide easy, fast and timely communication enabling businesses and state owned agencies to communicate with their stakeholders and with their own employees in real-time. Moreover, since the launch of Microsoft office 365 and many other clouds based E-mail services, many businesses have been migrating from the on premises E-mail services to the cloud and more precisely since the beginning of the Covid-19 pandemic, there has been a significant increase of E-mails utilization, which then leads to the increase of cyber-attacks. In that regard, E-mail security has become very important in the E-mail transportation to ensure that the E-mail gets to the recipient without the data integrity being compromised. The classification of the features to enhance E-mail security for further from the enhanced cyber-attacks as we are aware that since the technology is advancing so at the cyber-attacks. Therefore, in order to maximize the data integrity we need to also maximize security of the E-mails such as enhanced E-mail authentication. The successful enhancement of E-mail security in the future may lessen the frequency of information thefts via E-mails, resulting in the data of South African State-owned agencies not being compromised.

Keywords: e-mail security, cyber-attacks, data integrity, authentication

Procedia PDF Downloads 136