Search results for: water security
10985 Enhancing Food Security through Cabbage Production by Local Fammers in Nkokobe Municipality
Authors: Sipumle Qapeshu, Bongiwe Mcata, Ajuruchukwu Obi
Abstract:
Subsistence farmers practice farming for survival while commercial farmers produce to feed themselves and larger society with the motive to achieve highest profit. These types of farmers are characterised by growing what they eat, live without making regular purchases in the markets. The main objective of subsistence/peasant farmers is to ensure food security at household level. Cabbage is a crop that has been identified to have vital food nutrient sources like Vitamin A, B and C, protein, calcium, iron and antioxidative compounds beneficial for preventing cancer. This paper, therefore, looks at the potential that cabbage production has in enhancing household food security and also the challenges encountered by these cabbage producers. Primary data was obtained from 50 respondents, and linear regression model was used to analyse the data used. Income was used as food security measure. The results showed that three variables were statistically significant and they are gender (10%), education (5%) and household size (5%). Meaning that these are variables that influenced cabbage production by these households, and it also affects their food security status since income is affected.Keywords: subsistence farmers, food security, cabbage, farming
Procedia PDF Downloads 30110984 Enhancing Security and Privacy Protocols in Telehealth: A Comprehensive Approach across IoT/Fog/Cloud Environments
Authors: Yunyong Guo, Man Wang, Bryan Guo, Nathan Guo
Abstract:
This paper introduces an advanced security and privacy model tailored for Telehealth systems, emphasizing end-to-end protection across IoT, Fog, and Cloud components. The proposed model integrates encryption, key management, intrusion detection, and privacy-preserving measures to safeguard patient data. A comprehensive simulation study evaluates the model's effectiveness in scenarios such as unauthorized access, physical breaches, and insider threats. Results indicate notable success in detecting and mitigating threats yet underscore areas for refinement. The study contributes insights into the intricate balance between security and usability in Telehealth environments, setting the stage for continued advancements.Keywords: cloud, enhancing security, fog, IoT, telehealth
Procedia PDF Downloads 7810983 Awareness and Perception of Food Safety, Nutrition and Food Security among Omani Women
Authors: Abeer Al Kalbani
Abstract:
Oman is a sub-tropical country with limited water resources, harsh weather and limited soil fertility, constraining food production. Therefore, it largely depends on international markets to assure supply of food. In the light of these circumstances, food security in Oman is defined as the ability of the country to grant the staple food needs of people (e.g. rice, wheat, lentil, sugar, dates, dairy products, fish and plant or vegetable oils). It also involves exporting local goods with high production rates to exchange them with required food products. This concept of food security includes the availability of food through production and/or importing, stability of the market prices during all circumstances, and the ability of people to meet their needs within their income capabilities. As a result, most of the food security work is focused on availability and access dimensions of the issue. Not much research is focused on the utilization aspect of food security in Oman. Although women play a vital role in food security, there is limited research on women’s role in food security neither in Oman nor in neighboring Gulf countries. Women play an important role not only by carrying the responsibility of feeding their families but also by setting the consumption model for the household. Therefore, the research aims to contribute to the work done on food security in Oman and similar regions of the world by studying the role women play at the utilization level. Methods used in this research include Qualitative unstructured interviews, focus groups, survey questionnaire and an experimental study. Based on the FAO definition of food security, it consists of availability, access, utilization and sustainability. Results from a pilot study conducted for this research on two groups of women in Oman; urban and rural women, showed that women in Oman are responsible for achieving these four pillars at the household level. Moreover, awareness of women increased as their educational level increased. Urban women showed more awareness and openness to adopt healthier and proper food related choices than rural women. Urban women seem also more open than rural women to new ideas and concepts and ways to healthier food. However, both urban and rural women claim that no training and educational programs are available for them and awareness of food security in general remains relatively low in both groups. In the light of these findings, this research attempts to further investigate the social beliefs, practices and attitudes women adopt in relation to food purchase, storage, preparation and consumption as considered as important parts of the food system. It also seeks to examine the effect of educational training programs and media on the level of women awareness on the issue.Keywords: food security, household food security, utilization, role of women
Procedia PDF Downloads 40610982 Examining the Presence of Heterotrophic Aerobic Bacteria (HAB), and Sulphate Reducing Bacteria (SRB) in Some Types of Water from the City of Tripoli, Libya
Authors: Abdulsalam. I. Rafida, Marwa. F. Elalem, Hasna. E. Alemam
Abstract:
This study aimed at testing the various types of water in some areas of the city of Tripoli, Libya for the presence of Heterotrophic Aerobic Bacteria (HAB), and anaerobic Sulphate Reducing Bacteria (SRB). The water samples under investigation included rainwater accumulating on the ground, sewage water (from the city sewage treatment station, sulphate water from natural therapy swimming sites), and sea water (i.e. sea water exposed to pollution by untreated sewage water, and unpolluted sea water from specific locations). A total of 20 samples have been collected distributed as follows: rain water (8 samples), sewage water (6 samples), and sea water (6 samples). An up-to-date method for estimation has been used featuring readymade solutions i.e. (BARTTM test for HAB and BARTTM test for SRB). However, with the exception of one rain water sample, the results have indicated that the target bacteria have been present in all samples. Regarding HAB bacteria the samples have shown a maximum average of 7.0 x 106 cfu/ml featuring sewage and rain water and a minimum average of 1.8 x 104 cuf/ml featuring unpolluted sea water collected from a specific location. As for SRB bacteria; a maximum average of 7.0 x 105 cfu/ml has been shown by sewage and rain water and a minimum average of 1.8 x 104 cfu/ml by sewage and sea water. The above results highlight the relationship between pollution and the presence of bacteria in water particularly water collected from specific locations, and also the presence of bacteria as the result of the use of water provided that a suitable environment exists for its growth.Keywords: heterotrophic aerobic bacteria (HAB), sulphate reducing bacteria (SRB), water, environmental sciences
Procedia PDF Downloads 49110981 Network User Rules in Universities
Authors: Michel Berthiaume, Daniel Chamberland-Tremblay, Elaine Paiva Mosconi, Jérôme Blanchet-Brisson
Abstract:
This presentation documents the overall failure of North-American universities to build an effective IT Policies communication with their primary users: the students. A sample of 12 universities was selected. A set of indicators based on usability principles to assess the content of IT Policies vas devised. Then, IT Policies were rated according to the indicators and the results analyzed to build an overall picture of the potential of communication problems in policy communication. The initial finding is that network security professionals in Universities have to reach a delicate balance between asset protection, asset valorization and user security awareness.Keywords: computer security, IT policy, security awareness, network user rules
Procedia PDF Downloads 56210980 Defense Strategy: Perang Semesta Strategy as a Reliable National Security System of Indonesia
Authors: Erdianta S, Chastiti M. Wulolo, IDK Kerta Widana
Abstract:
Perang Semesta strategy is a national security system used by Republic of Indonesia. It comes from local wisdom, cultural, and hereditary of Indonesia itself. This system involves all people and all nation resources, and it is early prepared by government and conducted totality, integratedly, directly, and continously to enforce a sovereignty of country, teritorial integrity and the safety of the whole nation from threats. This study uses a qualitative content analysis method by studying, recording, and analyzing government policy. The Perang Semesta strategy divided into main, backup, and supporting components. Every component has its function and responsibility in security perspective. So when an attack comes, all people of Indonesia will voluntary to defend the country. Perang Semesta strategy is a national security system which becomes the most reliable strategy toward geography and demography of Indonesia.Keywords: Indonesia, Perang Semesta strategy, national security, local wisdom
Procedia PDF Downloads 45510979 Foreign Artificial Intelligence Investments and National Security Exceptions in International Investment Law
Authors: Ying Zhu
Abstract:
Recent years have witnessed a boom of foreign investments in the field of artificial intelligence (AI). Foreign investments provide critical capital for AI development but also trigger national security concerns of host states. A notable example is an increasing number of cases in which the Committee on Foreign Investment in the United States (CFIUS) has denied Chinese acquisitions of US technology companies on national security grounds. On July 19, 2018, the Congress has reached a deal on the final draft of a new provision to strengthen CFIUS’s authority to review overseas transactions involving sensitive US technology. The question is: how to reconcile the emerging tension between, on the one hand, foreign AI investors’ expectations of a predictable investment environment, and on the other hand, host states’ regulatory power on national security? This paper provides a methodology to reconcile this tension under international investment law. Based on an examination, the national security exception clauses in international investment treaties and the application of national security justification in investor-state arbitration jurisprudence, the paper argues that a traditional interpretation of the national security exception, based on the necessity concept in customary international law, fails to take into account new risks faced by countries, including security concerns over strategic industries such as AI. To overcome this shortage, the paper proposes to incorporate an integrated national security clause in international investment treaties, which includes a two-tier test: a ‘self-judging’ test in the pre-establishment period and a ‘proportionality’ test in the post-establishment period. At the end, the paper drafts a model national security clause for future treaty-drafting practice.Keywords: foreign investment, artificial intelligence, international investment law, national security exception
Procedia PDF Downloads 15310978 The Effect of Shading on Cooling Tower Performance
Authors: Eitidal Albassam
Abstract:
Cooling towers (CTs) in arid zone countries, used for heat rejection in water-cooled (WC) systems, consume a large quantity of water. Universally, water conservation is an issue because of the scarcity of fresh water and natural resources. Therefore, many studies have aimed to conserve fresh water and limit the water wasted. Nonetheless, all these methods are not related to improving the weather conditions around the entering air to CT. In Kuwait and other arid-zone countries, the dry bulb temperature (DBT) during the summer season is significantly greater than the incoming hot water temperature, and the air undergoes sensible cooling. This high DBT leads to extra heat transfer from air to water, demanding high water vaporization to achieve the required cooling of water. Thus, any reduction in ambient air temperature around the CT will minimize water consumption. This paper aims to discuss theoretically the effect of reducing the DBT around the cooling tower when considering the sun-shading barrier. The theoretical simulation model results show that if the DBT reduces by 2.8 °C approximately, the percentage of water evaporation savings in gallon per minute (GPM) starts from 6.48% when DBT reaches 51.67 °C till 9.80% for 37.78 °C. Moreover, the performance of the cooling tower will be improved when considering the appropriate shading barriers, which will not affect the existing wet-bulb temperature.Keywords: dry-bulb temperature, entering air, water consumption, water vaporization
Procedia PDF Downloads 14310977 Evaluation of the Quality Water Irrigation in Region of Lioua (Biskra), Algeria
Authors: F. Hiouani, M. Henouda, A. Masmoudi, M. Rechachi
Abstract:
The objective of this study was to evaluate the quality of irrigation water of some underground water resources in the region of Lioua (Biskra, Algéria). Analysis of cations (Ca++, Mg++, Na+, K+), anions (Cl-, SO4--, CO3--, HCO3-, NO3-), pH and electrical conductivity (EC) of ten water samples taken during March 2015. The resulted showed that water samples are designated salty and very salty. On the other hand, average SAR values show that there is no alkalinity risk of soil. According to Riverside diagram water samples are grouped into five classes (C3-S1, C4-S1, C4-S3, C5-S2 and C5-S3).Keywords: groundwater, irrigation, quality, lioua biskra
Procedia PDF Downloads 31310976 Analysis of Practical Guidelines for Mobile Device Security in Indonesia Based on NIST SP 1800-4
Authors: Mardiyansyah Mardiyansyah, Hendrik Maulana, Eka Kurnia Sari, Imam Baehaki, Mohammad Agus Prihandono
Abstract:
Mobile device has become a key feature in Indonesian society and the economy, including government and private sector. Enterprises and government agencies already have a concern about mobile device security. However, small and medium enterprises (SME) do not have that sense yet, especially the new startups company. Indonesia has several laws, regulations, and standards for managing security in mobile devices. Currently, Indonesian information security policies have not been harmonized, each government organization and large enterprise has its own rules and policies. It leads to a conflict of interest among government agencies. This will certainly cause ineffectiveness in the implementation of policies. Therefore, an analysis of various government policies, regulations, and standards related to information security, especially on mobile devices, is carried out. This analysis is conducted to map the existing regulatory policies and standards into practical guidelines regarding NIST's information security to show the effectiveness of NIST SP 1800-4 towards existing policies. This work focused on the mapping of the NIST SP 1800-4 framework towards existing regulations, standards, and guidelines in Indonesia. The research approach is literature study to identify existing regulations, standards, and guidelines then the regulation mapped into the NIST SP 1800-4 framework and analyzed whether the framework could be applied to the organization in Indonesia. Finally, the finding and recommendations by documenting the security characteristics can be concluded. Based on the research finding, some of the regulations, standards, and guidelines in Indonesia are relevant to the elements in the NIST SP 1800-4 framework. From mapping analysis, the strength and weakness of mobile device security in Indonesia can be reported. It also can be concluded that the application of NIST SP 1800-4 can improve the effectiveness of mobile device security policies in Indonesia.Keywords: mobile security, mobile security framework, NIST SP 1800-4, regulations
Procedia PDF Downloads 15510975 Integrated Approach Towards Safe Wastewater Reuse in Moroccan Agriculture
Authors: Zakia Hbellaq
Abstract:
The Mediterranean region is considered a hotbed for climate change. Morocco is a semi-arid Mediterranean country facing water shortages and poor water quality. Its limited water resources limit the activities of various economic sectors. Most of Morocco's territory is in arid and desert areas. The potential water resources are estimated at 22 billion m3, which is equivalent to about 700 m3/inhabitant/year, and Morocco is in a state of structural water stress. Strictly speaking, the Kingdom of Morocco is one of the “very riskiest” countries, according to the World Resources Institute (WRI), which oversees the calculation of water stress risk in 167 countries. The surprising results of the Institute (WRI) rank Morocco as one of the riskiest countries in terms of water scarcity, ranking 3.89 out of 5, thus occupying the 23rd place out of a total of 167 countries, which indicates that the demand for water exceeds the available resources. Agriculture with a score of 3.89 is most affected by water stress from irrigation and places a heavy burden on the water table. Irrigation is an unavoidable technical need and has undeniable economic and social benefits given the available resources and climatic conditions. Irrigation, and therefore the agricultural sector, currently uses 86% of its water resources, while industry uses 5.5%. Although its development has undeniable economic and social benefits, it also contributes to the overfishing of most groundwater resources and the surprising decline in levels and deterioration of water quality in some aquifers. In this context, REUSE is one of the proposed solutions to reduce the water footprint of the agricultural sector and alleviate the shortage of water resources. Indeed, wastewater reuse, also known as REUSE (reuse of treated wastewater), is a step forward not only for the circular economy but also for the future, especially in the context of climate change. In particular, water reuse provides an alternative to existing water supplies and can be used to improve water security, sustainability, and resilience. However, given the introduction of organic trace pollutants or, organic micro-pollutants, the absorption of emerging contaminants, and decreasing salinity, it is possible to tackle innovative capabilities to overcome these problems and ensure food and health safety. To this end, attention will be paid to the adoption of an integrated and attractive approach, based on the reinforcement and optimization of the treatments proposed for the elimination of the organic load with particular attention to the elimination of emerging pollutants, to achieve this goal. , membrane bioreactors (MBR) as stand-alone technologies are not able to meet the requirements of WHO guidelines. They will be combined with heterogeneous Fenton processes using persulfate or hydrogen peroxide oxidants. Similarly, adsorption and filtration are applied as tertiary treatment In addition, the evaluation of crop performance in terms of yield, productivity, quality, and safety, through the optimization of Trichoderma sp strains that will be used to increase crop resistance to abiotic stresses, as well as the use of modern omics tools such as transcriptomic analysis using RNA sequencing and methylation to identify adaptive traits and associated genetic diversity that is tolerant/resistant/resilient to biotic and abiotic stresses. Hence, ensuring this approach will undoubtedly alleviate water scarcity and, likewise, increase the negative and harmful impact of wastewater irrigation on the condition of crops and the health of their consumers.Keywords: water scarcity, food security, irrigation, agricultural water footprint, reuse, emerging contaminants
Procedia PDF Downloads 16210974 Efficient and Timely Mutual Authentication Scheme for RFID Systems
Authors: Hesham A. El Zouka, Mustafa M. Hosni ka
Abstract:
The Radio Frequency Identification (RFID) technology has a diverse base of applications, but it is also prone to security threats. There are different types of security attacks that limit the range of the RFID applications. For example, deploying the RFID networks in insecure environments could make the RFID system vulnerable to many types of attacks such as spoofing attack, location traceability attack, physical attack and many more. Therefore, security is often an important requirement for RFID systems. In this paper, RFID mutual authentication protocol is implemented based on mobile agent technology and timestamp, which are used to provide strong authentication and integrity assurances to both the RFID readers and their corresponding RFID tags. The integration of mobile agent technology and timestamp provides promising results towards achieving this goal and towards reducing the security threats in RFID systems.Keywords: RFID, security, authentication protocols, privacy, agent-based architecture, time-stamp, digital signature
Procedia PDF Downloads 27010973 The Effect of Awareness-Raising on Household Water Consumption
Authors: R. Morbidelli, C. Saltalippi, A. Flammini, J. Dari
Abstract:
This work analyses what effect systematic awareness-raising of the population on domestic water consumption produces. In a period where the availability of water is continually decreasing due to reduced rainfall, it is of paramount importance to raise awareness among the population. We conducted an experiment on a large sample of homes in urban areas of Central Italy. In the first phase, lasting three weeks, normal per capita, water consumption was quantified. Subsequently, instructions were given on how to save water during various uses in the household (showers, cleaning hands, use of water in toilets, watering small green areas, use of water in the kitchen, ...), and small visual messages were posted at water dispensers to remind users to behave properly. Finally, household consumption was assessed again for a further three weeks. This experiment made it possible to quantify the effect of the awareness-raising action on the reduction of water consumption without the use of any structural action (replacement of dispensers, improvement of the water system, ...).Keywords: water saving, urban areas, awareness-raising, climate change
Procedia PDF Downloads 10510972 Modeling of Hydraulic Networking of Water Supply Subsystem Case of Addis Ababa
Authors: Solomon Weldegebriel Gebrelibanos
Abstract:
Water is one of the most important substances in human life that can give a human liberality with its cost and availability. Water comes from rainfall and runoff and reaches the ground as runoff that is stored in a river, ponds, and big water bodies, including sea and ocean and the remaining water portion is infiltrated into the ground to store in the aquifer. Water can serve human beings in various ways, including irrigation, water supply, hydropower and soon. Water supply is the main pillar of the water service to the human being. Water supply distribution in Addis Ababa arises from Legedadi, Akakai, and Gefersa. The objective of the study is to measure the performance of the water supply distribution in Addis Ababa city. The water supply distribution model is developed by computer-aided design software. The model can analyze the operational change, loss of water, and performance of the network. The two design criteria that have been employed to analyze the network system are velocity and pressure. The result shows that the customers are using the water at high pressure with low demand. The water distribution system is older than the expected service life with more leakage. Hence the study recommended that fixing Pressure valves and new distribution facilities can resolve the performance of the water supply systemKeywords: distribution, model, pressure, velocity
Procedia PDF Downloads 13710971 Application of WebGIS-Based Water Environment Capacity Inquiry and Planning System in Water Resources Management
Authors: Tao Ding, Danjia Yan, Jinye Li, Chao Ren, Xinhua Hu
Abstract:
The paper based on the research background of the current situation of water shortage in China and intelligent management of water resources in the information era. And the paper adopts WebGIS technology, combining the mathematical model of water resources management to develop a WebGIS-based water environment capacity inquiry and polluted water emission planning. The research significance of the paper is that it can inquiry the water environment capacity of Jinhua City in real time and plan how to drain polluted water into the river, so as to realize the effective management of water resources. This system makes sewage planning more convenient and faster. For the planning of the discharge enterprise, the decision on the optimal location of the sewage outlet can be achieved through calculation of the Sewage discharge planning model in the river, without the need for site visits. The system can achieve effective management of water resources and has great application value.Keywords: sewerage planning, water environment capacity, water resources management, WebGIS
Procedia PDF Downloads 18410970 Rural Households' Sources of Water and Willingness to Pay for Improved Water Services in South-West, Nigeria
Authors: Alaba M. Dare, Idris A. Ayinde, Adebayo M. Shittu, Sam O. Sam-Wobo
Abstract:
Households' source of water is one of the core development indicators recently gaining pre-eminence in Nigeria. This study examined rural households' sources of water, Willingness to Pay (WTP) and factors influencing mean WTP. A cross-sectional survey which involved the use of questionnaire was used. A dichotomous choice (DC) with follow up was used as elicitation method. A multi-stage random sampling technique was used to select 437 rural households. Descriptive statistics and Tobit model were used for data estimation. The result revealed that about 70% fetched from unimproved water sources. Most (74.4%) respondents showed WTP for improved water sources. Age (p < 0.01), sex (p < 0.01), education (p < 0.01), occupation (p < 0.01), income (p < 0.01), price of water (P < 0.01), quantity of water (p < 0.01), household size (p < 0.01) and distance (p < 0.01) to existing water sources significantly influenced rural households' WTP for these services. The inference from this study showed that rural dweller sources of water is highly primitive and deplorable. Governments and stakeholders should prioritize the provision of rural water at an affordable price by rural dwellers.Keywords: households, source of water, willingness to pay (WTP), tobit model
Procedia PDF Downloads 38310969 Security as the Key Factor in Contemporary Tourism: Specificities Identified from the Analysis of Responders' Attitudes
Authors: Petar Kurecic, Josipa Penic
Abstract:
The paper represents a product of mentor-graduate student cooperation, developed at the graduate study of Business Economics, major Tourism. The analysis was made through the anonymous questionnaire filled by the respondents from Croatia. Following the latest threatening events and having in mind those yet to come, it can be concluded that no country can benefit from the tourism industry if at the same time does not develop its security system as an integral part of the standard tourist offer. Analyzing the trends in contemporary tourism, the safety and security issues became the decisive factors for the choice of a certain destination. Consequently, countries must not perceive security systems and measures as an unnecessary expense but as an essential element in organizing their tourist services. All hotels and respectable tourist agencies should have a crisis management, with detailed, thoroughly elaborated procedures for emergency situations. Tourists should be timely informed about the potential dangers and risks and the measures taken to prevent them, as well as on procedures for emergency situations. Additionally, it would be good to have mobile applications that would enable tourists to make direct emergency calls with instructions on behavior in crisis situations. It is also essential to implement and put into effect sophisticated security measures such as using surveillance cameras, controlling access to buildings, information exchange with colleagues and neighbors, reporting the suspicious occurrences to the security services, and training staff for crisis management. The security issue is definitely one of the crucial factors in the development of tourism in a certain country.Keywords: security, security measures in tourism, tourism, tourist destinations
Procedia PDF Downloads 28210968 Evalutaion of the Surface Water Quality Using the Water Quality Index and Discriminant Analysis Method
Authors: Lazhar Belkhiri, Ammar Tiri, Lotfi Mouni
Abstract:
Water resources present to the public order of the world a very important problem for the protection and management of water quality given the complexity of water quality data sets. In this study, the water quality index (WQI) and irrigation water quality index (IWQI) were calculated in order to evaluate the surface water quality for drinking and irrigation purposes based on nine hydrochemical parameters. In order to separate the variables that are the most responsible for the spatial differentiation, the discriminant analysis (DA) was applied. The results show that the surface water quality for drinking is poor quality and very poor quality based on WQI values, however, the values of IWQI reflect that this water is acceptable for irrigation with a restriction for sensitive plants. Consequently, the discriminant analysis DA method has shown that the following parameters pH, potassium, chloride, sulfate, and bicarbonate are significant discrimination between the different stations with the spatial variation of the surface water quality, therefore, the results obtained in this study provide very useful information to decision-makersKeywords: surface water quality, drinking and irrigation purposes, water quality index, discriminant analysis
Procedia PDF Downloads 8910967 Numerical Predictions of Trajectory Stability of a High-Speed Water-Entry and Water-Exit Projectile
Authors: Lin Lu, Qiang Li, Tao Cai, Pengjun Zhang
Abstract:
In this study, a detailed analysis of trajectory stability and flow characteristics of a high-speed projectile during the water-entry and water-exit process has been investigated numerically. The Zwart-Gerber-Belamri (Z-G-B) cavitation model and the SST k-ω turbulence model based on the Reynolds Averaged Navier-Stokes (RANS) method are employed. The numerical methodology is validated by comparing the experimental photograph of cavitation shape and the experimental underwater velocity with the numerical simulation results. Based on the numerical methodology, the influences of rotational speed, water-entry and water-exit angle of the projectile on the trajectory stability and flow characteristics have been carried out in detail. The variation features of projectile trajectory and total resistance have been conducted, respectively. In addition, the cavitation characteristics of water-entry and water-exit have been presented and analyzed. Results show that it may not be applicable for the water-entry and water-exit to achieve the projectile stability through the rotation of projectile. Furthermore, there ought to be a critical water-entry angle for the water-entry stability of practical projectile. The impact of water-exit angle on the trajectory stability and cavity phenomenon is not as remarkable as that of the water-entry angle.Keywords: cavitation characteristics, high-speed projectile, numerical predictions, trajectory stability, water-entry, water-exit
Procedia PDF Downloads 13610966 Cloud Data Security Using Map/Reduce Implementation of Secret Sharing Schemes
Authors: Sara Ibn El Ahrache, Tajje-eddine Rachidi, Hassan Badir, Abderrahmane Sbihi
Abstract:
Recently, there has been increasing confidence for a favorable usage of big data drawn out from the huge amount of information deposited in a cloud computing system. Data kept on such systems can be retrieved through the network at the user’s convenience. However, the data that users send include private information, and therefore, information leakage from these data is now a major social problem. The usage of secret sharing schemes for cloud computing have lately been approved to be relevant in which users deal out their data to several servers. Notably, in a (k,n) threshold scheme, data security is assured if and only if all through the whole life of the secret the opponent cannot compromise more than k of the n servers. In fact, a number of secret sharing algorithms have been suggested to deal with these security issues. In this paper, we present a Mapreduce implementation of Shamir’s secret sharing scheme to increase its performance and to achieve optimal security for cloud data. Different tests were run and through it has been demonstrated the contributions of the proposed approach. These contributions are quite considerable in terms of both security and performance.Keywords: cloud computing, data security, Mapreduce, Shamir's secret sharing
Procedia PDF Downloads 30710965 Environmental Protection and Natural Resources Management, and Organic Farming in Nepal
Authors: Megha Raj Regmi
Abstract:
Nepalese topography has the largest variations in altitude in the world, ranging from 60 metre to 8848 metre above the mean sea level, Nepal is endowed with second position in water resources in the world, and is comprised of more than 6,000 rivers and rivulets, however, it faces serious water crunch and water pollution : deterioration of ecosystem. Due to climate change reasons, in all the places of Nepal ground water table has been substantially depleted and with its impact many people are suffering seriously to fetch water for daily use. This research work basically deals with twenty-two biogas toilets constructed in peri-urban areas of Nepal in two research centres for organic agriculture. The work has used appropriate technology and studied their performances in the context of Nepal, based on the regular monitoring. The work found that the biogas energy producing toilet have a clear advantage in the gas recovery for domestic purpose and a sustainable mitigation measure for climate change and organic farming. This paper describes the climate change issues of Nepal; similarly it deals with the potential threats of climate change to water supply, agriculture, food security, temperature increase, and adaptation measures. This paper also deals in depth analysis of the different types of successful biogas energy production technology, organic farming, sustainable sanitation and health aspects from the twenty two biogas energy units constructed in different altitudes of Nepal.Keywords: environmental protection, biomass energy, climate change, organic farming
Procedia PDF Downloads 1110964 An Investigation of Surface Water Quality in an Industrial Area Using Integrated Approaches
Authors: Priti Saha, Biswajit Paul
Abstract:
Rapid urbanization and industrialization has increased the pollution load in surface water bodies. However, these water bodies are major source of water for drinking, irrigation, industrial activities and fishery. Therefore, water quality assessment is paramount importance to evaluate its suitability for all these purposes. This study focus to evaluate the surface water quality of an industrial city in eastern India through integrating interdisciplinary techniques. The multi-purpose Water Quality Index (WQI) assess the suitability for drinking, irrigation as well as fishery of forty-eight sampling locations, where 8.33% have excellent water quality (WQI:0-25) for fishery and 10.42%, 20.83% and 45.83% have good quality (WQI:25-50), which represents its suitability for drinking irrigation and fishery respectively. However, the industrial water quality was assessed through Ryznar Stability Index (LSI), which affirmed that only 6.25% of sampling locations have neither corrosive nor scale forming properties (RSI: 6.2-6.8). Integration of these statistical analysis with geographical information system (GIS) helps in spatial assessment. It identifies of the regions where the water quality is suitable for its use in drinking, irrigation, fishery as well as industrial activities. This research demonstrates the effectiveness of statistical and GIS techniques for water quality assessment.Keywords: surface water, water quality assessment, water quality index, spatial assessment
Procedia PDF Downloads 18110963 A Practice of Zero Trust Architecture in Financial Transactions
Authors: Liwen Wang, Yuting Chen, Tong Wu, Shaolei Hu
Abstract:
In order to enhance the security of critical financial infrastructure, this study carries out a transformation of the architecture of a financial trading terminal to a zero trust architecture (ZTA), constructs an active defense system for cybersecurity, improves the security level of trading services in the Internet environment, enhances the ability to prevent network attacks and unknown risks, and reduces the industry and security risks brought about by cybersecurity risks. This study introduces the SDP technology of ZTA, adapts and applies it to a financial trading terminal to achieve security optimization and fine-grained business grading control. The upgraded architecture of the trading terminal moves security protection forward to the user access layer, replaces VPN to optimize remote access, and significantly improves the security protection capability of Internet transactions. The study achieves 1. deep integration with the access control architecture of the transaction system; 2. no impact on the performance of terminals and gateways, and no perception of application system upgrades; 3. customized checklist and policy configuration; 4. introduction of industry-leading security technology such as single-packet authorization (SPA) and secondary authentication. This study carries out a successful application of ZTA in the field of financial trading and provides transformation ideas for other similar systems while improving the security level of financial transaction services in the Internet environment.Keywords: zero trust, trading terminal, architecture, network security, cybersecurity
Procedia PDF Downloads 16910962 Comparison between Hardy-Cross Method and Water Software to Solve a Pipe Networking Design Problem for a Small Town
Authors: Ahmed Emad Ahmed, Zeyad Ahmed Hussein, Mohamed Salama Afifi, Ahmed Mohammed Eid
Abstract:
Water has a great importance in life. In order to deliver water from resources to the users, many procedures should be taken by the water engineers. One of the main procedures to deliver water to the community is by designing pressurizer pipe networks for water. The main aim of this work is to calculate the water demand of a small town and then design a simple water network to distribute water resources among the town with the smallest losses. Literature has been mentioned to cover the main point related to water distribution. Moreover, the methodology has introduced two approaches to solve the research problem, one by the iterative method of Hardy-cross and the other by water software Pipe Flow. The results have introduced two main designs to satisfy the same research requirements. Finally, the researchers have concluded that the use of water software provides more abilities and options for water engineers.Keywords: looping pipe networks, hardy cross networks accuracy, relative error of hardy cross method
Procedia PDF Downloads 16810961 Evaluation of Water Efficiency in Farming: Empirical Evidence from a Semi-Arid Region
Authors: Laura Piedra-Munoz, Angeles Godoy-Duran, Emilio Galdeano-Gomez, Juan C. Perez-Mesa
Abstract:
Spain is very sensitive to water management issues due to its climatic characteristics and the deficit of this resource in many areas of its territory. This study examines the characteristics of the family farms that are more efficient in the use of water, focusing on a semi-arid area located in Almeria, southeast of Spain. In the case of irrigated agriculture, water usage efficiency usually indicates water productivity in terms of yield (kg/m³), or in economic terms (euros/m³). These two water usage indicators were considered to analyse water usage efficiency according to other studies on water efficiency in the horticultural area under analysis. This work also takes into account other water usage characteristics such as water supplied, innovative irrigation practices, water-efficient technology, and water-saving practices. The results show that the most water efficient farms have technical advisors and use irrigation on demand, that measures the water needs of the crops and are considered the most technological irrigation system. These farms are more technological and less labor intensive. They are also aware of water scarcity and the need to conserve the environment. This approach allow managers to identify the principal factors and best practices related to water efficiency in order to promote and implement them in inefficient farms and promote sustainability.Keywords: cluster analysis, family farms, Spain, sustainability, water-use efficiency
Procedia PDF Downloads 28810960 Evaluation of Water Quality of the Surface Water of the Damietta Nile Branch, Damietta Governorate, Egypt
Authors: M. S. M. El-Bady
Abstract:
Water quality and heavy metals pollution of the Damietta Nile Branch at Damietta governorate were investigated in the current work. Fourteen different sampling points were selected along the Damietta Nile branch from Ras EL-Bar (sample 1) to Sheremsah (sample 14). Physical and chemical parameters and the concentrations of Cd, Cr, Cu, Ni, Fe, Al, Hg, Pb and Zn were investigated for water quality assessment of Damietta Nile Branch at Damietta Governorate. Most of the samples show that the water is suitable for drinking and irrigation purposes. All locations of samples near the sea are unsuitable water but the samples in the south direction away from the sea are suitable or good water for drinking and irrigation.Keywords: water quality indices, Damietta Governorate, Nile river, pollution
Procedia PDF Downloads 24510959 Effects of Irregular Migration from Different Aspects of Security
Authors: Muzaffer Topgul, Hasan Atac
Abstract:
In case of explaining the migration concept, although it is not a new phenomenon, it is easy to understand that communities have migrated for variety of reasons such as natural disasters, famine, wars, economic problems, and several theories have been put forth to define and find solution for migration within its changing nature. Examining of migration theories denotes that the circumstances under which they appear reflect political, social, and economic conditions of the age they appear. In this day and time, security is considered not only from military perspective but also from economic, political, sociological dimensions. Based on the changing security environment new impacts of migration has occurred; the migration is proceed to be conferred as a type of war, qualified as a transnational crime because of its outcomes and interpreted in a different dimension owing to its effects on the health and education areas. Social security dimension in the context of expanding concept of security; when dealing with the safety of people and social groups with the assumption that national unity and identity are threatened, it sees immigrants as a source of threat. The human security assesses the safety of individuals in terms of survival and quality of life. Changes in the standard of living under the influence of immigrants and possible terrorist acts can be seen as a threat source in this type of security. Economic security of the individuals and the regional changes at the micro level created by the immigrants are covered issues of economic security. Due to the factors such as terrorism and civil war, the increasing numbers of displaced people who have taken refugee status affect the countries, whether it is near or far to the crisis areas, in the new and different dimensions of security day by day. In this study, the term of immigration through the eyes of national and international law will be evaluated, the place of the irregular and illegal immigration in the changing security sphere will be revealed and the effects of the irregular migration to short-term, mid-term and long-term security issues will be assessed through human and social security aspects. In order to analyze the threats for the human security; the parameters such as living conditions of the immigrants, the ratio of the genders, birth rate occasions, the education circumstances of the immigrant children and the effects of the illegal passing on the public order will be evaluated. The outcomes of the problem areas for the human security and the demographic alteration resulting from the human flow of displaced people will be discussed thorough social security extent. The fizzling economic diversity, which has shown up by irregular migration, will be presented within the scope of economic dimension of security.Keywords: irregular migration, the changing dimensions of security, human security, social security
Procedia PDF Downloads 33710958 Security Analysis and Implementation of Achterbahn-128 for Images Encryption
Authors: Aissa Belmeguenai, Oulaya Berrak, Khaled Mansouri
Abstract:
In this work, efficiency implementation and security evaluation of the keystream generator of Achterbahn-128 for images encryption and decryption was introduced. The implementation for this simulated project is written with MATLAB.7.5. First of all, two different original images are used to validate the proposed design. The developed program is used to transform the original images data into digital image file. Finally, the proposed program is implemented to encrypt and decrypt images data. Several tests are done to prove the design performance, including visual tests and security evaluation.Keywords: Achterbahn-128, keystream generator, stream cipher, image encryption, security analysis
Procedia PDF Downloads 31610957 Trace Metals in Natural Bottled Water on Montenegrin Market and Comaparison with Tap Water in Podgorica
Authors: Katarina Živković, Ivana Joksimović
Abstract:
Many different chemicals may occur in drinking water and cause significant human health risks after prolonged periods of exposure. In particular concern are contaminants that have cumulative toxic properties, such as heavy metals. This investigation was done to clarify concerns about chemical quality and safety of drinking tap water in Podgorica. For comparison, all available natural bottled water on Montenegrin market were bought. All samples (bottled water and tap water from Podgorica) were analyzed using ICP –OES on contents of Al, Cd, Pb, Cu, Zn,Cr, Fe, As and Mn. All results compared with the maximum concentration levels allowed by international standards and World Health Organization (WHO) guidelines. The results of analysis showed that all trace of heavy metals were very low and in same time below MCL according to WHO and International standard.Keywords: inductively coupled plasma - optical emission spectrometry (ICP-OES), Montenegro (Podgorica), natural bottled water, tap water , trace of heavy metal
Procedia PDF Downloads 45510956 Type of Dam Construction and It’s Challengings
Authors: Mokhtar Nikgoo
Abstract:
Definition of dam: A dam is one of the most important and widely used engineering structures, which means stopping or changing the course of water on a river. A lake is formed behind the dam, which is called (reservoir). Water is stored in the tank to be used when needed. The dam building industry is a great service to mankind in the use of water and land resources. If they build the dam in a suitable place, they will prevent floods. The water that collects behind the dam and in the dam's lake and reservoir is a valuable reserve for drinking by people and animals. Dry agricultural lands are also irrigated with this water. In addition, in many dams, the pressure caused by the water fall is directed by turbines, and the turbines move the power generation devices and provide power from electricityKeywords: dam, shaft, gallery, spillway, power plant
Procedia PDF Downloads 62