1,267 research outputs found

    Feasibility of fisheries co-management in Africa

    Get PDF
    The current, highly centralized approach to fisheries management seems to be incapable of coping with escalating resource depletion and environmental degradation. Co-management has been identified as an alternative. This paper compares various approaches to fisheries management and discusses their performance in relation to the nature of the fishery. It is concluded that in African fisheries, stringent institutional arrangements, poor human, technical and financial resources, and a limited time frame often thwart co-management approaches. However, with the right conditions and prerequisites, comanagement can be successful in improving compliance with regulations and maintaining or enhancing the quality of the resource. The paper brings out the issues that require further research

    Feasibility of fisheries co-management in Africa

    Get PDF
    The current, highly centralized approach to fisheries management seems to be incapable of coping with escalating resource depletion and environmental degradation. Co-management has been identified as an alternative. This paper compares various approaches to fisheries management and discusses their performance in relation to the nature of the fishery. It is concluded that in African fisheries, stringent institutional arrangements, poor human, technical and financial resources, and a limited time frame often thwart co-management approaches. However, with the right conditions and prerequisites, comanagement can be successful in improving compliance with regulations and maintaining or enhancing the quality of the resource. The paper brings out the issues that require further research.Fishery management, Community involvement, Fishery regulations, Sociological aspects, Africa,

    Design of an Efficient Viterbi Decoder using Xilinx

    Get PDF
    The vision of wireless communication is to provide high-speed and high-quality exchange of information between two portable devices located anywhere in the world. In this hectic and unsecure world you need to be sure your data is not only safe and secure but that you are working with it at the highest possible speed. Convolutional encoding is a forward error correction technique that is used for correction of errors at the receiver end. The two decoding algorithms used for decoding the convolutional codes are Viterbi algorithm and Sequential algorithm. Sequential decoding has advantage that it can perform very well with long constraint length convolutional codes, but it has a variable decoding time. Viterbi decoding technique is used for decoding the convolutional codes but with the limitation to constraint length. It requires smaller constraint length. The Viterbi algorithm is the most extensively employed decoding algorithm for convolution codes. In digital communication and signal processing the estimation and detection of problems is done by using viterbi algorithm. The Viterbi decoding algorithm is widely used in radio communication, radio relay and satellite communication. This thesis represents the implementation of hard decision Viterbi decoding with constraint length 7 and code rate ½ and its algorithm. The decoder architecture is defined in VHDL and the circuit is simulated and synthesized on Xilinx 14.7

    Prevalence and association of obesity with self-reported comorbidity: a cross-sectional study of 1321 adult participants in Lasbela, Balochistan

    Get PDF
    Association of fatness with chronic metabolic diseases is a well-established fact, and a high prevalence of risk factors for these disorders has increasingly been reported in the third world. In order to incorporate any preventive strategies for such risk factors into clinical practice, decision-makers require objective evidence about the associated burden of disease. A cross-sectional study of 1321 adults from one of the districts of Balochistan, among the most economically challenged areas of Pakistan, was carried out for the measures of fatness and self-reported comorbidities. Body mass index (BMI), waist circumference (WC), and waist-to-hip ratio (WHR) were measured and demographic information and self-reported comorbidities were documented.The prevalence of obesity was 4.8% (95% CI: [3.8, 6.1]) and 21.7% (95% CI: [19.5, 24.0]), as defined by the World Health Organization (WHO) international and Asia/Asia-Pacific BMI cut-offs, respectively. The proportion exhibiting comorbidity increased with increasing levels of fatness in a dose-response relationship

    Quadrupole resonances in unstable oxygen isotopes in time-dependent density-matrix formalism

    Get PDF
    The strength functions of quadrupole modes in the unstable oxygen isotopes 22O and 24O are calculated using an extended version of the time-dependent Hartree-Fock theory known as the time-dependent density-matrix theory (TDDM). It is found that TDDM gives the lowest quadrupole states which are energetically shifted upward and become significantly collective due to the coupling to two-body configurations. It is pointed out that these features of the lowest quadrupole states are similar to those obtained in the quasi-particle random phase approximation.Comment: 6 pages, 6 figure

    Threats Advancement in Primary User Emulation Attack and Spectrum Sensing Data Falsication (SSDF) Attack in Cognitive Radio Network (CRN) for 5G Wireless Network Environment

    Get PDF
    Primary User Emulation (PUE) attack and Spectrum Sensing Data Falsification (SSDF) attack on Data Fusion Centre and attack on Common Control Channel (CCC) is a serious security problems and need to be addressed in cognitive radio network environment. We are reviewing the recent advances of threats for the future 5th Generation (5G) wireless radio network from these attacks. Several existing security schemes have been proposed and discussed to overcome these attacks. We propose new security scheme that able to mitigate the attacks and provide security solutions. This scheme intended to mitigate the threats from the attacks in CRN and improve the future 5G network security

    Dataset of why inclusion matters for Alzheimer's disease biomarker discovery in plasma

    Get PDF
    Here we present a plasma proteomics dataset that was generated to understand the importance of self-reported race for biomarker discovery in Alzheimer's disease. This dataset is related to the article “Why inclusion matters for Alzheimer's disease biomarker discovery in plasma” [1]. Plasma samples were obtained from clinically diagnosed Alzheimer's disease and cognitively normal adults of African American/Black and non-Hispanic White racial and ethnic backgrounds. Plasma was immunodepleted, digested, and isobarically tagged with commercial reagents. Tagged peptides were fractionated using high pH fractionation and resulting fractions analysed by liquid chromatography – mass spectrometry (LC-MS/MS & MS3) analysis on an Orbitrap Fusion Lumos mass spectrometer. The resulting data was processed using Proteome Discoverer to produce a list of identified proteins with corresponding tandem mass tag (TMT) intensity information

    Quantum-Elliptic curve Cryptography for Multihop Communication in 5G Networks

    Get PDF
    The Internet of Things (IoT) depicts a giant network where every “thing” can be interconnected through the communication network. The communication can be initiated between people-people, people-things, and things-things. Meanwhile, the fifth generation (5G) mobile communicating systems are the mainspring to power the IoT concept in the upcoming future. However, the heterogeneous environment in 5G networks as well as the high dependency on radio spectrum have raised deep concerns about the security assurance against network attacks such as eavesdropping. In this paper, we propose an end-to-end security mechanism to ensure the multi-hop relay communications in 5G based IoT networks to stay secured. We design a scenario to explain the insecure multi-hop relay communications which involves Base Station (BS), Subscriber Station (SS) and Relay Station (RS). Next, we utilize Quantum Cryptography between BS to RS and RS to RS as well as adopting Elliptic Curve Cryptography between BS to SS or RS to SS to mitigate the network against typical replay attacks. By using the concept of integrating both cryptographic methods, the secret key that yield from Quantum Cryptography will be used in Elliptic Curve Cryptography to secure the transmission of information across IoT networks. Thereupon, extensive discussion has been carried out and it shows that the suggested mechanism has potential to ensure confidentiality, integrity, availability and non-repudiation in the proposed scenario. In the final part of this paper, we conclude our study by a comparison analysis between the two proposed cryptographic solutions. The comparison analysis illustrates the performance of each proposed strategy in terms of the achievable level of secrecy in IoT networks
    • …
    corecore