The Biosecurity Risks of International Forest Tree Seed Movements

Abstract

Purpose of Review

Because tree seeds have been considered a low-risk pathway for the spread of plant pathogenic fungi, their international movement is not subject to strict phytosanitary regulation. However, recent studies have provided scientific evidence that the biosecurity risk of seed trade may not be as negligible as assumed. This review summarises current knowledge about seed trade activity across the world and seed-borne plant pathogenic fungi and highlights knowledge gaps that need to be filled to mitigate the risk of spreading tree pathogens via seeds.

Recent Findings

Several outbreaks of severe tree diseases in natural forests and plantations worldwide have been linked to fungal pathogens spread by seed trade. Indeed, recent studies based on modern sequencing technologies have shown that tree seeds harbour highly diverse fungal communities, including well-known pathogens and fungal taxa belonging to unknown species. While it has become clear that even apparently healthy seeds can carry potentially pathogenic fungi, the likelihood of seed-borne pathogens being introduced and becoming established, spreading and causing impact in the new environment is still unclear which challenges the assessment of the phytosanitary risk posed by seed trade.

Summary

Our analyses show that large amounts of tree seeds have been traded among countries and continents. Based on published literature, the risk of spreading pathogenic fungi via tree seed movement is high. However, the role of the taxonomically and functionally diverse fungal communities associated with seeds is still poorly understood. In particular, more research is needed to assess the likelihood of seed-borne fungi being transmitted to the seedlings and spreading and causing impact in the new environment.

The role of transportation in developing the tourism sector at high altitude destination, Kinnaur

Abstract

As a supporting factor, transportation is an important element of destination image that provides a base for the successful tourism industry. It is like the blood vessels of an area and is considered a determinant in developing a tourist destination. The article aims to characterize the status or problem of transportation accessibility in Kinnaur. GARMIN hand GPS (Global Positioning System) has been used to identify the damaged roads from their start to endpoints. In addition, a simple random sample technique has been used to register the opinion of 280 tourists about the transport facilities. Study results suggest that the bad condition of National Highway–22 is one of the barriers to tourism development in Kinnaur. There were no significant differences found between the selected destinations. Overall, the district headquarters, Kalpa, has been perceived significantly higher agreements by tourists. The government should ensure that the Border Road Organization, the organization entrusted with the responsibility of construction and maintenance of roads in international border areas, has sufficient resources to invest in transport development and its maintenance.

Optimal planning for power systems considering the interconnections between isolated regions

Abstract

Climate change and global warming have made clear the need to change the way we generate and consume energy. To achieve this objective, a sustainable energy transition that encourages the use of renewable energy sources is needed. This study presents an optimization model, which allows the planning of a sustainable electricity system on a large scale, to replace some non-renewable power plants with renewables. The installation of new transmission lines is considered to avoid the oversizing of the new installed capacity, as well as the increase in the energy security of the isolated regions taking advantage of the temporary generation of renewable energies. The optimal solution is achieved by simultaneously minimizing the costs, greenhouse gas emissions and water consumption using a multi-stakeholder approach. To show the applicability of the proposed model, it is presented a case study of the Mexican electricity system. The results show that planning the expansion of generation and transmission capacities using the proposed model decreases water consumption and greenhouse gas emissions by up to 45 percent considering an increase in energy demand, as a result of demographic and industrial growth.

Graphical Abstract

Alpha-Asarone Ameliorates Neurological Dysfunction of Subarachnoid Hemorrhagic Rats in Both Acute and Recovery Phases via Regulating the CaMKII-Dependent Pathways

Abstract

Early brain injury (EBI) is the leading cause of poor prognosis for patients suffering from subarachnoid hemorrhage (SAH), particularly learning and memory deficits in the repair phase. A recent report has involved calcium/calmodulin-dependent protein kinase II (CaMKII) in the pathophysiological process underlying SAH-induced EBI. Alpha-asarone (ASA), a major compound isolated from the Chinese medicinal herb Acorus tatarinowii Schott, was proven to reduce secondary brain injury by decreasing CaMKII over-phosphorylation in rats’ model of intracerebral hemorrhage in our previous report. However, the effect of ASA on SAH remains unclear, and the role of CaMKII in both acute and recovery stages of SAH needs further investigation. In this work, we first established a classic SAH rat model by endovascular perforation and intraperitoneally administrated different ASA doses (10, 20, and 40 mg/kg) 2 h after successful modeling. Then, the short- and long-term neurobehavioral performances were blindly evaluated to confirm ASA’s efficacy against SAH. Subsequently, we explored ASA’s therapeutic mechanism in both acute and recovery stages using histopathological examination, TUNEL staining, flow cytometry, Western-blot, double-immunofluorescence staining, and transmission electron microscopy (TEM) observation. Finally, KN93, a selective CaMKII inhibitor, was applied in oxyhemoglobin-damaged HT22 cells to explore the role of CaMKII in ASA’s neuroprotective effect. The results demonstrated that ASA alleviated short- and long-term neurological dysfunction, reduced mortality and seizure rate within 24 h, and prolonged 14-day survival in SAH rats. Histopathological examination showed a reduction of neuronal damage and a restoration of the hippocampal structure after ASA treatment in both acute and recovery phases of SAH. In the acute stage, the Western-blot and flow cytometer analyses showed that ASA restored E/I balance, reduced calcium overload and CaMKII phosphorylation, and inhibited mitochondrion-involved apoptosis, thus preventing neuronal damage and apoptosis underlying EBI post-SAH. In the recovery stage, the TEM observation, double-immunofluorescence staining, and Western-blot analyses indicated that ASA increased the numbers of synapses and enhanced synaptic plasticity in the ipsilateral hippocampi, probably by promoting NR2B/CaMKII interaction and activating subsequent CREB/BDNF/TrkB signaling pathways. Furthermore, KN93 notably reversed ASA’s neuroprotective effect on oxyhemoglobin-damaged HT22 cells, confirming CaMKII a potential target for ASA’s efficacy against SAH. Our study confirmed for the first time that ASA ameliorated the SAH rats’ neurobehavioral deterioration, possibly via modulating CaMKII-involved pathways. These findings provided a promising candidate for the clinical treatment of SAH and shed light on future drug discovery against SAH.

Using multimodal approach in teaching literacy to Deaf college students

Abstract

The research studied the perception of Deaf college students on the use of a multimodal approach in teaching literacy to them. The research used a case study design to present five Deaf college students who underwent multimodal intervention sessions. The study primarily used qualitative data, supported by quantitative data from instrument scores. There were 10 intervention lessons that followed a scaffolded reading experience framework. Each lesson utilized all four modalities: linguistic, visual, socio-cultural, and kinesthetic. The intervention sessions were separate from the regular literature classes and lasted four months. Data were taken from pre- and post-intervention interview answers, independent work, and results of the QRI-5. Data were content analyzed by thematic analysis. Quantitative data, such as test scores and activities, were plotted to show individual performance. Findings suggested that comprehension is affected by the type of literature read, students’ prior knowledge, and availability of the modalities. The study showed that even though the Deaf are generally considered visual learners, the participants in the study prefer the integration of the different modalities for them to comprehend better. Recommendations include for teachers of the Deaf to consider tapping different modalities in teaching, as utilizing a multimodal approach brings out the uniqueness of each learner.

Vulnerabilities and attacks assessments in blockchain 1.0, 2.0 and 3.0: tools, analysis and countermeasures

Abstract

Nowadays, blockchain has become increasingly popular due to its promise of supporting critical business services in various areas. Blockchain systems, like Ethereum and Hyperledger Fabric, rely on sophisticated middleware, which enables the execution of smart contracts. Smart contracts define the business logic within cooperative applications. Detecting attacks and vulnerabilities within blockchain is a crucial issue for ensuring the security of different generations of blockchains. Testing a blockchain application serves multiple purposes: it ensures its quality, maximizes test coverage, and minimizes the risks associated with insufficient knowledge that could potentially impact the software development process. That is why several static analysis tools targeting Ethereum smart contracts and Hyperledger Fabric chaincode have recently been proposed by the blockchain research community. However, the efficiency of these analysis tools remains an open issue that requires further investigation. In this context, this paper presents a new taxonomy related to attacks targeting different generations of blockchain and evaluates the available analysis tools that can be utilized to assess the resilience of blockchain 2.0 and blockchain 3.0 against a range of vulnerabilities and attacks. Additionally, this study presents two quantitative analyses: one assessing the performance of tools in evaluating smart contract vulnerabilities within blockchain 2.0, and another analyzing the performance of tools in assessing blockchain 3.0 vulnerabilities within chaincode. Furthermore, this comprehensive study holds value for the research community as it considers various generations of blockchain.

Image and Object Geo-Localization

Abstract

The concept of geo-localization broadly refers to the process of determining an entity’s geographical location, typically in the form of Global Positioning System (GPS) coordinates. The entity of interest may be an image, a sequence of images, a video, a satellite image, or even objects visible within the image. Recently, massive datasets of GPS-tagged media have become available due to smartphones and the internet, and deep learning has risen to prominence and enhanced the performance capabilities of machine learning models. These developments have enabled the rise of image and object geo-localization, which has impacted a wide range of applications such as augmented reality, robotics, self-driving vehicles, road maintenance, and 3D reconstruction. This paper provides a comprehensive survey of visual geo-localization, which may involve either determining the location at which an image has been captured (image geo-localization) or geolocating objects within an image (object geo-localization). We will provide an in-depth study of visual geo-localization including a summary of popular algorithms, a description of proposed datasets, and an analysis of performance results to illustrate the current state of the field.

Information security and privacy challenges of cloud computing for government adoption: a systematic review

Abstract

The advent of new technologies and applications coupled with the COVID-19 pandemic tremendously increased cloud computing adoption in private and public institutions (government) and raised the demand for communication and access to a shared pool of resources and storage capabilities. Governments across the globe are moving to the cloud to improve services, reduce costs, and increase effectiveness and efficiency while fostering innovation and citizen engagement. However, information security and privacy concerns raised in the past remain significant to government adoption and utilisation of cloud computing. The study conducts a systematic literature review (SLR) using the Preferred Reporting Items for Systematic Reviews and Meta-Analyses (PRISMA) approach to examine information security and privacy as the fundamental challenges to government intention to adopt cloud computing. This study screened 758 articles and included 33 articles that revealed information security and privacy as critical factors and barriers to adopting cloud computing through a systematic evaluation (PRISMA approach). The combined two factors contributed 70% of the significant gaps to the cloud computing adoption challenges. In contrast, the individual contribution of information security and privacy as a significant gap to the challenges of cloud adoption yielded 9% and 12%, respectively. Furthermore, 9% of the authors recognised the need for a framework to address the challenges but could not attempt to develop the framework. The study contributes to the information security body of knowledge, PRISMA studies and provides direction in proposing strategies and frameworks to tackle information security and privacy challenges as future research.

Ecospirituality and Health: A Systematic Review

Abstract

Environmental changes are affecting human health. A renewal of the way we understand and relate to the planet is needed. Ecospirituality brings together the terms spirituality and environment and is born as a means of solution to this dilemma. This systematic review aimed to find out the influence of ecospirituality on global health. A search of scientific literature was carried out in the main health science databases. A review was conducted to critically evaluate the studies that identified relevant ecospiritual aspects regarding health care for communities. After a systematic search and screening, and following specified methodological criteria, a total of 14 articles were selected in the review. The findings of the review suggest that a new perspective in our worldview such as ecospirituality will provide us with the necessary keys to improve health. To understand ecospirituality, we must keep in mind the indigenous way of life, which is the clear example to follow to achieve environmental health and global health. Ecospirituality leads to a healthier environment, and as this is directly related to health, there is also an improvement in global health.

The Role of Self-Esteem in Protecting Against Cyber-Victimization and Gaming Disorder Symptoms Among Adolescents: A Temporal Dynamics Analysis

Abstract

Previous literature has suggested that victimization is linked to low self-esteem and increases the symptoms of gaming disorder. However, little is known about the intra-individual processes, and the temporal dynamics of cyber-victimization, self-esteem, and gaming disorder symptoms. To address this gap, a three-year longitudinal study was performed using data collected at six different time points from 4206 Chinese adolescents (aged 12–17 years; 50.4% boys). Results of random intercept cross-lagged panel models (RI-CLPMs) indicated that at the within-person level, the fluctuation in self-esteem weakly predicted late cyber-victimization, and the fluctuation of cyber-victimization also weakly predicted late self-esteem. Additionally, the current study identified an interactive effect between self-esteem and gaming disorder symptoms at the within-person level. Fluctuations in self-esteem negatively predicted late gaming disorder symptoms, and vice versa. However, when combining the three variables (i.e., cyber-victimization, self-esteem, and gaming disorder symptoms) into one RI-CLPM, the results did not support the mediation of self-esteem in the relationship between cyber-victimization and gaming disorder symptoms at the within-person level. Moreover, fluctuations in self-esteem negatively predicted late gaming disorder symptoms and cyber-victimization at the within-person level in the RI-CLPM. These findings emphasize the protective role of self-esteem developed against cyber-victimization and gaming disorder symptoms among adolescents.