Search results for: protecting birds
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 710

Search results for: protecting birds

440 Efficacy of Ginger (Zingiber officinale) and a Zeolite (Hydrated Sodium Calcium Aluminosilicate) in the Amelioration of Aflatoxicosis in Broilers

Authors: Ryan Stevens, Wayne L. Bryden

Abstract:

This study focused on the effects of ginger and a zeolite (toxin binder) in reducing the toxic effects of aflatoxin B1 (AFB1) in broiler chickens 7 to 49 days of age. The chicks were maintained normally until experimental diets were introduced on day 7 post-hatching. Nine hundred and thirty six, 7-d-old broiler chickens were randomly assigned to 18 treatment groups; each group had four replicates, each with 13 chickens. The experimental groups or diets had factorial combinations of the following; AFB1 0, 1 and 2 mg/kg diet, ginger 0 and 5g/kg diet, and zeolite 0, 15 and 30 g/kg diet. Diets were based on corn and soybean meal and a starter diet was fed from 1 to 14 days, a grower diet from15 to 28 days and a finisher diet was provided from day 29 until the end of the experiment. Both dietary levels of AFB1 decreased (P<0.05) body weight and feed conversion, and increased relative liver weights. Independent dietary inclusion of ginger or zeolite restored chick performance when diets contained 1mg/kg but not at 2mg/kg. Supplementation of zeolite together with ginger improved performance of birds fed contaminated diets. Interestingly, adding ginger to the control diet that was not contaminated with AFB1 improved (P<0.05) performance. Our results suggest that toxin binders and ginger can provide protection against the negative effects of AFB1 on performance of broiler chicks.

Keywords: aflatoxin, broiler, ginger, zeolite

Procedia PDF Downloads 202
439 An Industrial Wastewater Management Using Cloud Based IoT System

Authors: Kaarthik K., Harshini S., Karthika M., Kripanandhini T.

Abstract:

Water is an essential part of living organisms. Major water pollution is caused due to contamination of industrial wastewater in the river. The most important step in bringing wastewater contaminants down to levels that are safe for nature is wastewater treatment. The contamination of river water harms both humans who consume it and the aquatic life that lives there. We introduce a new cloud-based industrial IoT paradigm in this work for real-time control and monitoring of wastewater. The proposed system prevents prohibited entry of industrial wastewater into the plant by monitoring temperature, hydrogen power (pH), CO₂ and turbidity factors from the wastewater input that the wastewater treatment facility will process. Real-time sensor values are collected and uploaded to the cloud by the system using an IoT Wi-Fi Module. By doing so, we can prevent the contamination of industrial wastewater entering the river earlier, and the necessary actions will be taken by the users. The proposed system's results are 90% efficient, preventing water pollution due to industry and protecting human lives.

Keywords: sensors, pH, CO₂, temperature, turbidity

Procedia PDF Downloads 79
438 Ecosystem Response of a Semi-Enclosed Saline Bay to Damming and Sluice-Management: Case of Lake Grevelingen in the Netherlands

Authors: Marijn Tangelder, Ingeborg Mulder, Jeroen Wijsman, John Janssen, Tom Ysebaert

Abstract:

The delta works in the Southwest Netherlands drastically changed the estuarine nature of this area. The Grevelingen estuary was dammed off and became a lake in 1971. Since 1978 a connection with the North Sea exists to keep the lake saline but management of the sluices varied over time. Our research of several decades of monitoring data shows that water management practices lead to drastic changes in water quality and consequent ecological shifts in benthic fauna, fish, and bird species. Benthic biomass, dominated by molluscs, showed major changes with an important role for invasive species. Fish migration and, therefore, fish stock in the lake changed with recently smaller fish species and lower biomass values, with consequences for fish eating birds. Implications are made towards future management to re-introduce micro-tide in connection with the North Sea to improve water quality and the ecological status of the lake, as well as consequences for the bordering Natura 2000 terrestrial habitats, including rare dune vegetations, are discussed.

Keywords: ecosystem study, Grevelingen, Natura 2000, water management, water quality

Procedia PDF Downloads 99
437 Design and Analysis of Shielding Magnetic Field for Active Space Radiation Protection

Authors: Chaoyan Huang, Hongxia Zheng

Abstract:

For deep space exploration and long duration interplanetary manned missions, protection of astronauts from cosmic radiation is an unavoidable problem. However, passive shielding can be little effective for protecting particles which energies are greater than 1GeV/nucleon. In this study, active magnetic protection method is adopted. Taking into account the structure and size of the end-cap, eight shielding magnetic field configurations are designed based on the Hoffman configuration. The shielding effect of shielding magnetic field structure, intensity B and thickness L on H particles with 2GeV energy is compared by test particle simulation. The result shows that the shielding effect is better with the linear type magnetic field structure in the end-cap region. Furthermore, two magnetic field configurations with better shielding effect are investigated through H and He galactic cosmic spectra. And the shielding effect of the linear type configuration adopted in the barrel and end-cap regions is best.

Keywords: galactic cosmic rays, active protection, shielding magnetic field configuration, shielding effect

Procedia PDF Downloads 107
436 Islam, Tolerance and Anti-Terrorism: A Critical Assessment with Reference to the Royal 'Amman Message'

Authors: Adnan M. Al Assaf

Abstract:

This research project aims to assess the methods of enhancing tolerant thinking and behavior among Muslim societies. This is in addition to spreading the anti-terrorist approach in their communities. The critical assessment for the Islamic major texts in question is the selected way for convincing, as Muslims adopt these sources as the authentic references for their lives and cultures. Moreover, this research devotes a special room to the analysis of the royal ‘Amman Message’ as a contemporary Islamic approach for enhancing tolerance and anti-terrorism from an Islamic perspective. The paper includes the study of the related concepts, texts, practical applications, with some reference to the history of Islam in human interaction, accepting the others, mercy with minorities, protecting human rights. Furthermore, it assesses the methods of enhancing tolerance and minimizing the terrorist thinking and behavior practically, in the view of Amman message, as well.

Keywords: Islam, tolerance, anti-terrorism, coexistence, Amman Message

Procedia PDF Downloads 432
435 Users’ Information Disclosure Determinants in Social Networking Sites: A Systematic Literature Review

Authors: Wajdan Al Malwi, Karen Renaud, Lewis Mackenzie

Abstract:

The privacy paradox describes a phenomenon whereby there is no connection between stated privacy concerns and privacy behaviours. We need to understand the underlying reasons for this paradox if we are to help users to preserve their privacy more effectively. In particular, the Social Networking System (SNS) domain offers a rich area of investigation due to the risks of unwise information disclosure decisions. Our study thus aims to untangle the complicated nature and underlying mechanisms of online privacy-related decisions in SNSs. In this paper, we report on the findings of a Systematic Literature Review (SLR) that revealed a number of factors that are likely to influence online privacy decisions. Our deductive analysis approach was informed by Communicative Privacy Management (CPM) theory. We uncovered a lack of clarity around privacy attitudes and their link to behaviours, which makes it challenging to design privacy-protecting SNS platforms and to craft legislation to ensure that users’ privacy is preserved.

Keywords: privacy paradox, self-disclosure, privacy attitude, privacy behavior, social networking sites

Procedia PDF Downloads 130
434 A Socio-Technical Approach to Cyber-Risk Assessment

Authors: Kitty Kioskli, Nineta Polemi

Abstract:

Evaluating the levels of cyber-security risks within an enterprise is most important in protecting its information system, services and all its digital assets against security incidents (e.g. accidents, malicious acts, massive cyber-attacks). The existing risk assessment methodologies (e.g. eBIOS, OCTAVE, CRAMM, NIST-800) adopt a technical approach considering as attack factors only the capability, intention and target of the attacker, and not paying attention to the attacker’s psychological profile and personality traits. In this paper, a socio-technical approach is proposed in cyber risk assessment, in order to achieve more realistic risk estimates by considering the personality traits of the attackers. In particular, based upon principles from investigative psychology and behavioural science, a multi-dimensional, extended, quantifiable model for an attacker’s profile is developed, which becomes an additional factor in the cyber risk level calculation.

Keywords: attacker, behavioural models, cyber risk assessment, cybersecurity, human factors, investigative psychology, ISO27001, ISO27005

Procedia PDF Downloads 129
433 Capital Punishment: A Paradoxical Wrinkle to the Principles of Ethics and Morality

Authors: Pranav Vaidya

Abstract:

The recent upheaval of a ballot initiative taken place in California & Los Angeles‘s newspapers shows how the concept of giving Death Penalty obliterates the very soul basis of community and society which rests upon the tripod of values, ethics, and morality. This paper goes on with examining how, by giving death penalties we are, on one hand trying to wipe out those heinous offenders committing such unspeakable crimes against the public; while on the other hand it comes with a devastating effect of corroding and eluding the existence of ethics and morality which is in the very nature of “protecting the life of humankind”. As it can be stated that, by giving capital punishment, we are trying to legitimize an irreversible act of violence by the authority of state and target innocent victims because as long as the human justice is fallible, the risk of executing an innocent can never be eliminated. However, scholars in the legalization of Capital Punishment have argued that the courts should impose punishment befitting the crime so that they could reflect public abhorrence of the crime, create deterrent or rehabilitating effects & deliver the truest form of justice.

Keywords: ethics, heinous offenders, morality, unspeakable crimes

Procedia PDF Downloads 257
432 Countering Terrorism and Defending Human Right after 9/11: The European Perspective

Authors: Anita Blagojević

Abstract:

It is well known that the terrorist attacks on the New York City and Washington, D.C. prompted unprecedented international action to enhance international cooperation in the prevention and suppression of terrorism. In the months (and years) after September 11, the world community focused on two main efforts: first, on efforts to bring those responsible for terrorist attacks to justice, and second, on efforts to prevent future terrorist attacks. In that sense, many governments took advantage of these efforts to strengthen their national security. In that process, however, human rights and civil liberties of certain groups of people were alleged. As a consequence, part of the price paid for protecting national security against terrorist attacks was the threat of infringement on people's fundamental rights and freedoms. The aim of this paper is to analyze the role of the European Union and the Council of Europe in finding the answer to the one of the main security dilemma for the present era: how to find the balance between the protection of national security and guarantee of the people's rights and fundamental freedoms?

Keywords: terrorism, antiterrorism, European Union, Council of Europe, human rights

Procedia PDF Downloads 348
431 Selection of Landscape Plant Species: A Experiment of Noise Reduction by Vibration of Plant Leaves

Authors: Li Mengmeng, Kang Jian

Abstract:

With the rapid development of the city, the noise pollution becomes more and more serious. Noise has seriously affected people's normal life, study and work. In addition, noise has seriously affected the city's ecological environment and the migration of birds. Therefore, it is urgent to control the noise. As one of natural noise-reducing materials, plants have been paid more and more attention. In urban landscape design, it is very important to choose plant species with good noise reduction effect to the sustainable development of urban ecology. The aim of this paper is to find out the characteristics of the plant with good noise reduction effect and apply it in urban landscape design. This study investigated the vibration of leaves of six plant species in a sound field using a Keyence (IG-1000/CCD) Laser Micrometer. The results of the experiments showed that the vibration speed of plant leaves increased obviously after being stimulated by sound source, about 5-10 times. In addition, when driven by the same sound, the speed of all leaves varied with the difference of leaf thickness, leaf size and leaf mass. The speed of all leaves would increase with the increase of leaf size and leaf mass, while those would decrease with the increase of leaf thickness.

Keywords: landscape design, leaf vibration , noise attenuation, plants configuration

Procedia PDF Downloads 196
430 Improved Processing Speed for Text Watermarking Algorithm in Color Images

Authors: Hamza A. Al-Sewadi, Akram N. A. Aldakari

Abstract:

Copyright protection and ownership proof of digital multimedia are achieved nowadays by digital watermarking techniques. A text watermarking algorithm for protecting the property rights and ownership judgment of color images is proposed in this paper. Embedding is achieved by inserting texts elements randomly into the color image as noise. The YIQ image processing model is found to be faster than other image processing methods, and hence, it is adopted for the embedding process. An optional choice of encrypting the text watermark before embedding is also suggested (in case required by some applications), where, the text can is encrypted using any enciphering technique adding more difficulty to hackers. Experiments resulted in embedding speed improvement of more than double the speed of other considered systems (such as least significant bit method, and separate color code methods), and a fairly acceptable level of peak signal to noise ratio (PSNR) with low mean square error values for watermarking purposes.

Keywords: steganography, watermarking, time complexity measurements, private keys

Procedia PDF Downloads 119
429 Planning and Implementing Large-Scale Ecological Connectivity: A Review of Past and Ongoing Practices in Turkey

Authors: Tutku Ak, A. Esra Cengiz, Çiğdem Ayhan Kaptan

Abstract:

The conservation community has been increasingly promoting the concept of ecological connectivity towards the prevention and mitigation of landscape fragmentation. Many tools have been proposed for this purpose in not only Europe, but also around the world. Spatial planning for building connectivity, however, has many problems associated with the complexity of ecological processes at spatial and temporal scales. Furthermore, on the ground implementation could be very difficult potentially leading to ecologically disastrous results and waste of resources. These problems, on the other hand, can be avoided or rectified as more experience is gained with implementation. Therefore, it is the objective of this study to document the experiences gained with connectivity planning in Turkish landscapes. This paper is a preliminary review of the conservation initiatives and projects aimed at protecting and building ecological connectivity in and around Turkey. The objective is to scope existing conservation plans, tools and implementation approaches in Turkey and the ultimate goal is to understand to what degree they have been implemented and what are the constraints and opportunities that are being faced.

Keywords: ecological connectivity, large-scale landscapes, planning and implementation, Turkey

Procedia PDF Downloads 469
428 A Multi Agent Based Protection Scheme for Smart Distribution Network in Presence of Distributed Energy Resources

Authors: M. R. Ebrahimi, B. Mahdaviani

Abstract:

Conventional electric distribution systems are radial in nature, supplied at one end through a main source. These networks generally have a simple protection system usually implemented using fuses, re-closers, and over-current relays. Recently, great attention has been paid to applying Distributed energy resources (DERs) throughout electric distribution systems. Presence of such generation in a network leads to losing coordination of protection devices. Therefore, it is desired to develop an algorithm which is capable of protecting distribution systems that include DER. On the other hand smart grid brings opportunities to the power system. Fast advancement in communication and measurement techniques accelerates the development of multi agent system (MAS). So in this paper, a new approach for the protection of distribution networks in the presence of DERs is presented base on MAS. The proposed scheme has been implemented on a sample 27-bus distribution network.

Keywords: distributed energy resource, distribution network, protection, smart grid, multi agent system

Procedia PDF Downloads 573
427 Survey of Intrusion Detection Systems and Their Assessment of the Internet of Things

Authors: James Kaweesa

Abstract:

The Internet of Things (IoT) has become a critical component of modern technology, enabling the connection of numerous devices to the internet. The interconnected nature of IoT devices, along with their heterogeneous and resource-constrained nature, makes them vulnerable to various types of attacks, such as malware, denial-of-service attacks, and network scanning. Intrusion Detection Systems (IDSs) are a key mechanism for protecting IoT networks and from attacks by identifying and alerting administrators to suspicious activities. In this review, the paper will discuss the different types of IDSs available for IoT systems and evaluate their effectiveness in detecting and preventing attacks. Also, examine the various evaluation methods used to assess the performance of IDSs and the challenges associated with evaluating them in IoT environments. The review will highlight the need for effective and efficient IDSs that can cope with the unique characteristics of IoT networks, including their heterogeneity, dynamic topology, and resource constraints. The paper will conclude by indicating where further research is needed to develop IDSs that can address these challenges and effectively protect IoT systems from cyber threats.

Keywords: cyber-threats, iot, intrusion detection system, networks

Procedia PDF Downloads 52
426 The Proactive Approach of Digital Forensics Methodology against Targeted Attack Malware

Authors: Mohamed Fadzlee Sulaiman, Mohd Zabri Adil Talib, Aswami Fadillah Mohd Ariffin

Abstract:

Each individual organization has their own mechanism to build up cyber defense capability in protecting their information infrastructures from data breaches and cyber espionage. But, we can not deny the possibility of failing to detect and stop cyber attacks especially for those targeting credential information and intellectual property (IP). In this paper, we would like to share the modern approach of effective digital forensic methodology in order to identify the artifacts in tracing the trails of evidence while mitigating the infection from the target machine/s. This proposed approach will suit the digital forensic investigation to be conducted while resuming the business critical operation after mitigating the infection and minimizing the risk from the identified attack to transpire. Therefore, traditional digital forensics methodology has to be improvised to be proactive which not only focusing to discover the root caused and the threat actor but to develop the relevant mitigation plan in order to prevent from the same attack.

Keywords: digital forensic, detection, eradication, targeted attack, malware

Procedia PDF Downloads 243
425 Linear Semi Active Controller of Magneto-Rheological Damper for Seismic Vibration Attenuation

Authors: Zizouni Khaled, Fali Leyla, Sadek Younes, Bousserhane Ismail Khalil

Abstract:

In structural vibration caused principally by an earthquake excitation, the most vibration’s attenuation system used recently is the semi active control with a Magneto Rheological Damper device. This control was a subject of many researches and works in the last years. The big challenges of searchers in this case is to propose an adequate controller with a robust algorithm of current or tension adjustment. In this present paper, a linear controller is proposed to control the MR damper using to reduce a vibrations of three story structure exposed to El Centro’s 1940 and Boumerdès 2003 earthquakes. In this example, the MR damper is installed in the first floor of the structure. The numerical simulations results of the proposed linear control with a feedback law based on clipped optimal algorithm showed the feasibility of the semi active control to protecting civil structures. The comparison of the controlled structure and uncontrolled structures responses illustrate clearly the performance and the effectiveness of the simple proposed approach.

Keywords: MR damper, seismic vibration, semi-active control

Procedia PDF Downloads 257
424 Use of Remote Sensing for Seasonal and Temporal Monitoring in Wetlands: A Case Study of Akyatan Lagoon

Authors: A. Cilek, S. Berberoglu, A. Akin Tanriover, C. Donmez

Abstract:

Wetlands are the areas which have important effects and functions on protecting human life, adjust to nature, and biological variety, besides being potential exploitation sources. Observing the changes in these sensitive areas is important to study for data collecting and correct planning for the future. Remote sensing and Geographic Information System are being increasingly used for environmental studies such as biotope mapping and habitat monitoring. Akyatan Lagoon, one of the most important wetlands in Turkey, has been facing serious threats from agricultural applications in recent years. In this study, seasonal and temporal monitoring in wetlands system are determined by using remotely sensed data and Geographic Information Systems (GIS) between 1985 and 2015. The research method is based on classifying and mapping biotopes in the study area. The natural biotope types were determined as coastal sand dunes, salt marshes, river beds, coastal woods, lakes, lagoons.

Keywords: biotope mapping, GIS, remote sensing, wetlands

Procedia PDF Downloads 361
423 Analysis and Evaluation of the Water Catch Basins of the Erosive-Mudflow Rivers of Georgia on the Example of the River Vere

Authors: Natia Gavardashvili

Abstract:

On June 13-14 of 2015, a landslide in village Akhaldaba was formed as a result of the intense rains in the water catch basin of the river Vere. As a result of the landslide movement, freshets and mudflows originated, and unfortunately, there were victims: zoo animals and birds were drawn in the flood and 12 people died due to the flooded motor road. The goal of the study is to give the analysis of the results of the field and scientific research held in 2015-2017 and to generalize them to the water catch basins of the erosive-mudflow rivers of other mountain landscapes of Georgia. By considering the field and scientific works, the main geographic, geological, climatic, hydrological and hydraulic properties of the erosive-mudflow tributaries of the water catch basin of the river Vere were evaluated and the probabilities of mudflow formation by considering relevant risk-factors were identified. The typology of the water catch basins of erosive-mudflow rivers of Georgia was identified on the example of the river Vere based on the field and scientific study, and their genesis, frequency of mudflow formation and volume of the drift material was identified. By using the empirical and theoretical dependencies, the amount of solid admixtures in the mudflow formed in the gorge of the river Jokhona, the right tributary of the river Vere was identified by considering the shape of the stones.

Keywords: water catchment basin, erosion, mudflow, typology

Procedia PDF Downloads 253
422 Lessons Learnt from Industry: Achieving Net Gain Outcomes for Biodiversity

Authors: Julia Baker

Abstract:

Development plays a major role in stopping biodiversity loss. But the ‘silo species’ protection of legislation (where certain species are protected while many are not) means that development can be ‘legally compliant’ and result in biodiversity loss. ‘Net Gain’ (NG) policies can help overcome this by making it an absolute requirement that development causes no overall loss of biodiversity and brings a benefit. However, offsetting biodiversity losses in one location with gains elsewhere is controversial because people suspect ‘offsetting’ to be an easy way for developers to buy their way out of conservation requirements. Yet the good practice principles (GPP) of offsetting provide several advantages over existing legislation for protecting biodiversity from development. This presentation describes the learning from implementing NG approaches based on GPP. It regards major upgrades of the UK’s transport networks, which involved removing vegetation in order to construct and safely operate new infrastructure. While low-lying habitats were retained, trees and other habitats disrupting the running or safety of transport networks could not. Consequently, achieving NG within the transport corridor was not possible and offsetting was required. The first ‘lessons learnt’ were on obtaining a commitment from business leaders to go beyond legislative requirements and deliver NG, and on the institutional change necessary to embed GPP within daily operations. These issues can only be addressed when the challenges that biodiversity poses for business are overcome. These challenges included: biodiversity cannot be measured easily unlike other sustainability factors like carbon and water that have metrics for target-setting and measuring progress; and, the mindset that biodiversity costs money and does not generate cash in return, which is the opposite of carbon or waste for example, where people can see how ‘sustainability’ actions save money. The challenges were overcome by presenting the GPP of NG as a cost-efficient solution to specific, critical risks facing the business that also boost industry recognition, and by using government-issued NG metrics to develop business-specific toolkits charting their NG progress whilst ensuring that NG decision-making was based on rich ecological data. An institutional change was best achieved by supporting, mentoring and training sustainability/environmental managers for these ‘frontline’ staff to embed GPP within the business. The second learning was from implementing the GPP where business partnered with local governments, wildlife groups and land owners to support their priorities for nature conservation, and where these partners had a say in decisions about where and how best to achieve NG. From this inclusive approach, offsetting contributed towards conservation priorities when all collaborated to manage trade-offs between: -Delivering ecologically equivalent offsets or compensating for losses of one type of biodiversity by providing another. -Achieving NG locally to the development whilst contributing towards national conservation priorities through landscape-level planning. -Not just protecting the extent and condition of existing biodiversity but ‘doing more’. -The multi-sector collaborations identified practical, workable solutions to ‘in perpetuity’. But key was strengthening linkages between biodiversity measures implemented for development and conservation work undertaken by local organizations so that developers support NG initiatives that really count.

Keywords: biodiversity offsetting, development, nature conservation planning, net gain

Procedia PDF Downloads 168
421 Phylogenetic Analyses of Newcastle Disease Virus Isolated from Unvaccinated Chicken Flocks in Kyrgyzstan from 2015 to 2016

Authors: Giang Tran Thi Huong, Hieu Dong Van, Tung Dao Duy, Saadanov Iskender, Isakeev Mairambek, Tsutomu Omatsu, Yukie Katayama, Tetsuya Mizutani, Yuki Ozeki, Yohei Takeda, Haruko Ogawa, Kunitoshi Imai

Abstract:

Newcastle disease virus (NDV) is a contagious viral disease of the poultry industry and other birds throughout the world. At present, very little is known about molecular epidemiological data regarding the causes of ND outbreak in commercial poultry farms in Kyrgyzstan. In the current study, the NDV isolated from the one out of three samples from the unvaccinated flock was confirmed as NDV. Phylogenetic analysis indicated that this NDV strain is clustered in the Class II subgenotype VIId, and closely related to the Chinese NDV isolate. Phylogenetic analyses revealed that the isolated NDV strain has an origin different from the 4 NDV strains previously identified in Kyrgyzstan. According to the mean death time (MDT: 61.1 h) and a multibasic amino acid (aa) sequence at the F0 proteolytic cleavage site (¹¹²R-R-Q-K-R-F¹¹⁷), the NDV isolate was determined as mesogenic strain. Several mutations in the neutralizing epitopes (notably, ³⁴⁷E→K) and the global head were observed in the hemagglutinin-neuraminidase (HN) protein of the current isolate. The present study represents the molecular characterization of the coding gene region of NDV in Kyrgyzstan. Additionally, further study will be investigated on the antigenic characterization using monoclonal antibody.

Keywords: Kyrgyzstan, Newcastle disease, genotype, genome characterization

Procedia PDF Downloads 114
420 Urban Heritage and Its Role in the Tourism Development in Yemen: Case Study of Historic Town of Zabid

Authors: Yasser Alhiagi, Moshalleh Almoraekhi, Sameh Refaat

Abstract:

Urban heritage has an important status in the process of developing the Yemeni tourism sector. Urban heritage in Yemen differs depending on the regions and historical cities such as City of Old Sana'a, Historic Town of Zabid, Shibam Hadhramout, Taiz, and others. Zabid is an old town with a long history, founded in the 9th century. It has been the capital of Yemen from the 13th to the 15th century and played, because of its Islamic university, an important role in the Arab and Muslim world for many centuries. The aim of this research is to promote the built heritage of Historic Town of Zabid and explore the possibilities of visiting the rehabilitated buildings and other heritage attractions through tourism. It examines the nature of the relationship exists between tourism and built heritage. The research is intended to contribute to the strategy development of national tourism for the purpose of protecting, developing, and utilizing cultural heritage. Also, the research depended chiefly on the results of a field work proposed to be carried out at Historic Town of Zabid.

Keywords: historic town of Zabid, strategy, tourism development, urban heritage

Procedia PDF Downloads 291
419 Female Frontline Health Workers in High-Risk Workplaces: Legal Protection in Bangladesh amid the Covid-19 Pandemic

Authors: Nabila Farhin, Israt Jahan

Abstract:

Despite the feminisation of the global health force, women mostly engage in nursing, midwifery and community health workers (HWs), and the posts like surgeons, doctors, and specialists are generally male-dominated. It is also prominent in Bangladesh, where female HWs witness systematic workplace inequalities, discrimination, and underpayment. The Covid-19 pandemic put unsurmountable pressure on HWs as they had to serve in high-risk workplaces as frontliners. The already disadvantaged female HWs shouldered the same burden, were overworked without adequate occupational health and safety measures (OSH) and risked their lives. Acknowledging their vulnerable workplace conditions, the World Health Organization (WHO) and International Labour Organization (ILO) circulated a few specialised guidelines amid the peril. Bangladesh tried to adhere to international guidelines while formulating pandemic management strategies. In reality, the already weak and understaffed health sector collapsed with the patient influx and many HWs got infected and died in the line of duty, exposing the high-risk nature of the work. Unfortunately, the gender-segregated data of infected HWs are absent. This qualitative research investigates whether the existing laws of Bangladesh are adequate in protecting female HWs as frontliners in high-risk workplaces during the Covid-19 pandemic. The paper first examines international labour laws safeguarding female frontline HWs. It also analyses the specialised Covid-19 pandemic guidelines protecting their interests. Finally, the research investigates the compliance of Bangladesh as per international legal guidance during the pandemic. In doing so, it explores the domestic laws, professional guidelines for HWs and pandemic response strategies. The paper critically examines the primary sources like international and national statutes, rules, regulations and guidelines. Secondary sources like authoritative journal articles, books and newspaper reports are contextually analysed in line with the objective of the paper. The definition of HW is ambiguous in the labour laws of Bangladesh. It leads to confusion regarding the extent of legal protection rendered to female HWs at private hospitals in high-risk situations. The labour laws are not applicable in Public hospitals, as the employees follow the public service rules. Unfortunately, the country has no specialised law to protect HWs in high-risk workplaces, and the professional guidelines for HWs also remain inadequate in this regard. Even though the pandemic management strategies highlight some protective measures in high-risk situations, they only deal with HWs who are pregnant or have underlying health issues. No specialised protective guidelines can be found for female HWs as frontliners. Therefore, the laws are insufficient and failed to render adequate legal protection to female frontline HWs during the pandemic. The country also lacks comprehensive health legislation and uniform institutional and professional guidelines, preventing them from accessing grievance mechanisms. Hence, the female HWs felt victimised while duty-bound to serve in high-risk workplaces without adequate safeguards. Bangladesh should clarify the definition of HWs and standardise the service rules for providing medical care in high-risk workplaces. The research also recommends adequate health legislation and specialised legal protection to safeguard female HWs in future emergencies.

Keywords: female health workers (HWs), high-risk workplaces, Covid-19 pandemic, Bangladesh

Procedia PDF Downloads 52
418 Realistic Testing Procedure of Power Swing Blocking Function in Distance Relay

Authors: Farzad Razavi, Behrooz Taheri, Mohammad Parpaei, Mehdi Mohammadi Ghalesefidi, Siamak Zarei

Abstract:

As one of the major problems in protecting large-dimension power systems, power swing and its effect on distance have caused a lot of damages to energy transfer systems in many parts of the world. Therefore, power swing has gained attentions of many researchers, which has led to invention of different methods for power swing detection. Power swing detection algorithm is highly important in distance relay, but protection relays should have general requirements such as correct fault detection, response rate, and minimization of disturbances in a power system. To ensure meeting the requirements, protection relays need different tests during development, setup, maintenance, configuration, and troubleshooting steps. This paper covers power swing scheme of the modern numerical relay protection, 7sa522 to address the effect of the different fault types on the function of the power swing blocking. In this study, it was shown that the different fault types during power swing cause different time for unblocking distance relay.

Keywords: power swing, distance relay, power system protection, relay test, transient in power system

Procedia PDF Downloads 343
417 Lessons Learned from Ransomware-as-a-Service (RaaS) Organized Campaigns

Authors: Vitali Kremez

Abstract:

The researcher monitored an organized ransomware campaign in order to gain significant visibility into the tactics, techniques, and procedures employed by a campaign boss operating a ransomware scheme out of Russia. As the Russian hacking community lowered the access requirements for unsophisticated Russian cybercriminals to engage in ransomware campaigns, corporations and individuals face a commensurately greater challenge of effectively protecting their data and operations from being held ransom. This report discusses two notorious ransomware campaigns. Though the loss of data can be devastating, the findings demonstrate that sending ransom payments does not always help obtain data. Key learnings: 1. From the ransomware affiliate perspective, such campaigns have significantly lowered the barriers for entry for low-tier cybercriminals. 2. Ransomware revenue amounts are not as glamorous and fruitful as they are often publicly reported. Average ransomware crime bosses make only $90K per year on average. 3. Data gathered indicates that sending ransom payments does not always help obtain data. 4. The talk provides the complete payout structure and Bitcoin laundering operation related to the ransomware-as-a-service campaign.

Keywords: bitcoin, cybercrime, ransomware, Russia

Procedia PDF Downloads 166
416 Effect of Different Levels of Vitamin E and L-Carnitine on Performance of Broiler Chickens Under Heat Stress

Authors: S. Salari, M. A. Shirali, S. Tabatabaei, M. Sari, R. Jahanian

Abstract:

This study was conducted to investigate the effect of different levels of vitamin E and L-carnitine on performance, blood parameters and immune responses of broilers under heat stress. For this purpose 396 one- day- old Ross 308 broiler chicks were randomly distributed between 9 treatments with 4 replicates (11 birds in each replicate). Dietary treatments consisted of three levels of vitamin E (0, 100 and 200 mg/ kg) and three levels of L-carnitine (0, 50 and 100 mg/ kg) that was done in completely randomized design with 3X3 factorial arrangement for 42 days. During the first three weeks, chickens were reared at normal temperature. From the beginning of the fourth week, all chickens were maintenance in a temperature range from 24-38 ° C for heat stress. Performance parameters including average feed intake, weight gain and feed conversion ratio were recorded weekly. The results showed that the levels of vitamin E had no significant effect on feed intake, weight gain and feed conversion ratio during the experiment. The use of L-carnitine decreased feed intake during the experiment (P < 0/05). But did not affect average daily gain and feed conversion ratio. Also, there was not significant interaction between vitamin E and L-carnitine for performance parameters except average daily gain during the starter period. The results of this study indicate that the use of different levels of vitamin E and L-carnitine under heat stress did not affected performance parameters of broiler chickens.

Keywords: broiler, heat stress, l-carnitine, performance

Procedia PDF Downloads 449
415 A Literature Review on Sexual Abuse Prevention for People with Intellectual Disability

Authors: Hanh Thi My Nguyen, Phuong Thu Dinh

Abstract:

People with intellectual disability are at high risk for sexual abuse. The reasons may originate from their communication skills deficits, lack of skills and knowledge to protect themselves from sexual abuse, or limited access to sexual abuse prevention programs. This article aims to present a systematic review about strategies for preventing sexual abuse for young people with intellectual disability. A range of articles in 10 years from 2009 to 2018 are searched by using online database. 5 papers are included for the final review. The results of this comprehensive literature review showed that there are two main strategies used: programs designed for people with intellectual, including evaluation on sex education programs; and sexual education program for parents of children with intellectual disability. However, none of the papers were conducted in low-and middle-income countries. Therefore, cautions should be taken when it comes to interpret these findings. The findings of studies showed that participants increased their awareness and skills for protecting themselves from sexual abuse after participating in the programs. It is also recommended that more effective evidence-based programs should be developed.

Keywords: intellectual disability, prevention, sexual abuse, sexual education program

Procedia PDF Downloads 182
414 Effect of Sweet Potato (Ipomoea batatas) Leaves on Wheat Offal Replacement for Chicks Feed Production

Authors: C. C. Okafor, T. M. Ezeh

Abstract:

The effect of addition of sweet potato leaves in replacement of wheat offal in the production of broiler chicks feed was studied. 72 day-old marshal strain chicks were used and brooded for two weeks with a normal commercial feed in Nigeria called top feed and weighed separately at the end of the two weeks, complete randomized design (CRD) was used. The weighed broiler chicks were randomly allocated to four dietary treatments. Each treatment was replicated to twice with eighteen birds per replicate. The four dietary treatment identified as T1, T2, T3 and T4. T1 served as control diet with 21% crude protein content, while T2 was prepared with Enzyme and in T3 and T4, wheat offal was replaced with sweet potato leaves and in T4 with inclusion of enzyme. Growth performance was studied using the following daily feed intake, daily weight gain and feed efficiency. The result in daily weight gain showed that chicks fed with T2 feed had the highest weight gain (93.75) while chicks fed with T3 had the least weight gain of (34.5 gm). In daily feed intake chicks fed with T4 fed more (53.06 gm) than chicks fed with T2 (51.08 gm). In feed efficiency T3 had the highest value of 30% while the T2 had the least efficiency of 22%. There was no significant difference (P≥ 0.05) in all the three parameter tested. Sweet potato leaves can replace wheat offal in broiler feed production without any adverse effect on the growth performance.

Keywords: broiler, diet, dietary, potato leaves, wheat offal

Procedia PDF Downloads 477
413 Identifying the Conservation Gaps in Poorly Studied Protected Area in the Philippines: A Study Case of Sibuyan Island

Authors: Roven Tumaneng, Angelica Kristina Monzon, Ralph Sedricke Lapuz, Jose Don De Alban, Jennica Paula Masigan, Joanne Rae Pales, Laila Monera Pornel, Dennis Tablazon, Rizza Karen Veridiano, Jackie Lou Wenceslao, Edmund Leo Rico, Neil Aldrin Mallari

Abstract:

Most protected area management plans in the Philippines, particularly the smaller and more remote islands suffer from insufficient baseline data, which should provide the bases for formulating measureable conservation targets and appropriate management interventions for these protected areas. Attempts to synthesize available data particularly on cultural and socio-economic characteristic of local peoples within and outside protected areas also suffer from the lack of comprehensive and detailed inventories, which should be considered in designing adaptive management interventions to be used for those protected areas. Mt Guiting-guiting Natural Park (MGGNP) located in Sibuyan Island is one of the poorly studied protected areas in the Philippines. In this study, we determined the highly biologically important areas of the protected area using Maximum Entropy approach (MaxEnt) from environmental predictors (i.e., topographic, bioclimatic,land cover, and soil image layers) derived from global remotely sensed data and point occurrence data of species of birds and trees recorded during field surveys on the island. A total of 23 trigger species of birds and trees was modeled and stacked to generate species richness maps for biological high conservation value areas (HCVAs). Forest habitat change was delineated using dual-polarised L-band ALOS-PALSAR mosaic data at 25 meter spatial resolution, taken at two acquisition years 2007 and 2009 to provide information on forest cover ad habitat change in the island between year 2007 and 2009. Determining the livelihood guilds were also conducted using the data gathered from171 household interviews, from which demographic and livelihood variables were extracted (i.e., age, gender, number of household members, educational attainment, years of residency, distance from forest edge, main occupation, alternative sources of food and resources during scarcity months, and sources of these alternative resources).Using Principal Component Analysis (PCA) and Kruskal-Wallis test, the diversity and patterns of forest resource use by people in the island were determined with particular focus on the economic activities that directly and indirectly affect the population of key species as well as to identify levels of forest resource use by people in different areas of the park.Results showed that there are gaps in the area occupied by the natural park, as evidenced by the mismatch of the proposed HCVAs and the existing perimeters of the park. We found out that subsistence forest gathering was the possible main driver for forest degradation out of the eight livelihood guilds that were identified in the park. Determining the high conservation areas and identifyingthe anthropogenic factors that influence the species richness and abundance of key species in the different management zone of MGGNP would provide guidance for the design of a protected area management plan and future monitoring programs. However, through intensive communication and consultation with government stakeholders and local communities our results led to setting conservation targets in local development plans and serve as a basis for the reposition of the boundaries and reconfiguration of the management zones of MGGNP.

Keywords: conservation gaps, livelihood guilds, MaxEnt, protected area

Procedia PDF Downloads 380
412 Enhance Security in XML Databases: XLog File for Severity-Aware Trust-Based Access Control

Authors: A: Asmawi, L. S. Affendey, N. I. Udzir, R. Mahmod

Abstract:

The topic of enhancing security in XML databases is important as it includes protecting sensitive data and providing a secure environment to users. In order to improve security and provide dynamic access control for XML databases, we presented XLog file to calculate user trust values by recording users’ bad transaction, errors and query severities. Severity-aware trust-based access control for XML databases manages the access policy depending on users' trust values and prevents unauthorized processes, malicious transactions and insider threats. Privileges are automatically modified and adjusted over time depending on user behaviour and query severity. Logging in database is an important process and is used for recovery and security purposes. In this paper, the Xlog file is presented as a dynamic and temporary log file for XML databases to enhance the level of security.

Keywords: XML database, trust-based access control, severity-aware, trust values, log file

Procedia PDF Downloads 272
411 Effect of Provitamin a Biofortified Maize Inclusion Diet on Consumers' Acceptability of Ovambo Chicken Meat

Authors: Feyisayo Odunitan-Wayas, Unathi Kolanisi, Micheal Chimonyo, Muthulisi Siwela

Abstract:

Consumers’ surveys have indicated low acceptability of provitamin A biofortified maize (PABM), a high vitamin A (HVA) maize in Southern Africa to curb vitamin A deficiency (VAD). Indigenous chickens are reared and consumed by almost all rural households which are the major VAD prone areas in southern Africa. The objective of this study was to determine if HVA diet fed to the Ovambo indigenous chicken breed will influence consumers’ acceptability of the meat. The leg (thigh and drumstick) of the male birds (21 weeks old) were used for the sensory characteristics. 52 consumer panellists evaluated the sensory characteristics on based on a 5-point hedonic scale and preference test. There was no significant difference (P<0.05) in the preference test between the two diets. There were no significant differences (P<0.05) between the diets based on all sensory characteristics. Age and gender of the consumers and their interactions had no effect (P<0.05) on the acceptability and sensory characteristic ratings. It was concluded that indigenous chickens fed provitamin A biofortified maize can be a possible tool for curbing VAD in southern Africa regions where there is low acceptability of the human consumption of provitamin A biofortified maize. It was concluded that PABM diet fed to indigenous chickens will not influence the acceptability of the chicken meat by VAD vulnerable consumers.

Keywords: biofortified pro-vitamin a maize, ovambo, chicken meat, sensory characteristics, gender, age

Procedia PDF Downloads 325