Search results for: distributed systems
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 10740

Search results for: distributed systems

7140 Pressure Sensitive v/s Pressure Resistance Institutional Investors towards Socially Responsible Investment Behavior: Evidence from Malaysia

Authors: Mohammad Talha, Abdullah Sallehhuddin Abdullah Salim, Abdul Aziz Abdul Jalil, Norzarina Md Yatim

Abstract:

The significant contribution of institutional investors across the globe in socially responsible investment (SRI) is well-documented in the literature. Nevertheless, how the SRI behavior of pressure-resistant, pressure-sensitive and pressure-indeterminate institutional investors remain unexplored extensively. This study examines the moderating effect of institutional investors towards socially responsible investment behavior in the context of emerging economies. This study involved 229 institutional investors in Malaysia. A total of 1,145 questionnaires were distributed. Out of these, 308 (130 pressure sensitive institutional investors and 178 pressure resistant institutional investors), representing a usable rate of 26.9 per cent, were found fit for data analysis. Utilizing multi-group analysis via AMOS, this study found evidence for the presence of moderating effect by a type of institutional investor topology in socially responsible investment behavior. At intentional level, it established that type of institutional investor was a significant moderator in the relationship between subjective norms, and caring ethical climate with intention among pressure-resistant institutional investors, as well as between perceived behavioral controls with intention among pressure-sensitive institutional investors. At the behavioral level, the results evidenced that there was only a significant moderating effect between intention and socially responsible investment behavior among pressure-resistant institutional investors. The outcomes are expected to benefit policy makers, regulators, and market participants in order to leap forward SRI growth in developing economies. Nevertheless, the outcomes are limited to a few factors, and it is believed that future studies shall address those limitations.

Keywords: socially responsible investment, behavior, pressure sensitive investors, pressure insensitive investors, Institutional Investment Malaysia

Procedia PDF Downloads 347
7139 Opacity Synthesis with Orwellian Observers

Authors: Moez Yeddes

Abstract:

The property of opacity is widely used in the formal verification of security in computer systems and protocols. Opacity is a general language-theoretic scheme of many security properties of systems. Opacity is parametrized with framework in which several security properties of a system can be expressed. A secret behaviour of a system is opaque if a passive attacker can never deduce its occurrence from the system observation. Instead of considering the case of static observability where the set of observable events is fixed off-line or dynamic observability where the set of observable events changes over time depending on the history of the trace, we introduce Orwellian partial observability where unobservable events are not revealed provided that downgrading events never occurs in the future of the trace. Orwellian partial observability is needed to model intransitive information flow. This Orwellian observability is knwon as ipurge function. We show in previous work how to verify opacity for regular secret is opaque for a regular language L w.r.t. an Orwellian projection is PSPACE-complete while it has been proved undecidable even for a regular language L w.r.t. a general Orwellian observation function. In this paper, we address two problems of opacification of a regular secret ϕ for a regular language L w.r.t. an Orwellian projection: Given L and a secret ϕ ∈ L, the first problem consist to compute some minimal regular super-language M of L, if it exists, such that ϕ is opaque for M and the second consists to compute the supremal sub-language M′ of L such that ϕ is opaque for M′. We derive both language-theoretic characterizations and algorithms to solve these two dual problems.

Keywords: security policies, opacity, formal verification, orwellian observation

Procedia PDF Downloads 216
7138 Multi-Criteria Evaluation of IDS Architectures in Cloud Computing

Authors: Elmahdi Khalil, Saad Enniari, Mostapha Zbakh

Abstract:

Cloud computing promises to increase innovation and the velocity with witch applications are deployed, all while helping any enterprise meet most IT service needs at a lower total cost of ownership and higher return investment. As the march of cloud continues, it brings both new opportunities and new security challenges. To take advantages of those opportunities while minimizing risks, we think that Intrusion Detection Systems (IDS) integrated in the cloud is one of the best existing solutions nowadays in the field. The concept of intrusion detection was known since past and was first proposed by a well-known researcher named Anderson in 1980's. Since that time IDS's are evolving. Although, several efforts has been made in the area of Intrusion Detection systems for cloud computing environment, many attacks still prevail. Therefore, the work presented in this paper proposes a multi criteria analysis and a comparative study between several IDS architectures designated to work in a cloud computing environments. To achieve this objective, in the first place we will search in the state of the art of several consistent IDS architectures designed to work in a cloud environment. Whereas, in a second step we will establish the criteria that will be useful for the evaluation of architectures. Later, using the approach of multi criteria decision analysis Mac Beth (Measuring Attractiveness by a Categorical Based Evaluation Technique we will evaluate the criteria and assign to each one the appropriate weight according to their importance in the field of IDS architectures in cloud computing. The last step is to evaluate architectures against the criteria and collecting results of the model constructed in the previous steps.

Keywords: cloud computing, cloud security, intrusion detection/prevention system, multi-criteria decision analysis

Procedia PDF Downloads 461
7137 Sustainability Innovation Capacity Building Framework for UN Sustainable Development Goals

Authors: C. Park, H. Lee, Y-J. Lee

Abstract:

Aim: This study aims to present the Sustainability Innovation Capacity Building Framework (SICBF) to enable the wider public to achieve UN Sustainable Development Goals (UN SDGs) for a sustainable future. The intrinsically interwoven nature of sustainability requires systematic approaches to attain. However, there is a lack of an effective framework for capacity building that enables a systematic implementation approach for UN SDGs. The SICBF illustrates the six core components and their dynamics: 1. Momentum creation; 2. Exposure to diverse worldviews; 3. Serendipity/Eureka moment; 4. Creative problem solving; 5. Individual empowerment; 6. Systems thinking. Method: First, a structured literature review was used to synthesise existing sustainability competencies studies and generic innovation competencies. Secondly, the conceptual framework based on literature findings was tested with the participants' survey and interview data collected from four sets of MAKEathon events. The interview analysis and event observation data were used to further refine and validate the conceptual framework. Contributions: The scientific contribution of this study is to pave the way for SDGs specific capacity building framework that caters to the need for systematic approaches to allow the wider public aspiring to tackle the seemingly intractable sustainable development goals. The framework will aid sustainable development academics, educators, and practitioners in understanding the dynamics of how capacity building can be facilitated.

Keywords: capacity building, sustainability innovation, sustainable development, systems thinking, UN SDGs

Procedia PDF Downloads 67
7136 Food Sovereignty as Local Resistance to Unequal Access to Food and Natural Resources in Latin America: A Gender Perspective

Authors: Ana Alvarenga De Castro

Abstract:

Food sovereignty has been brought by the international peasants’ movement, La Via Campesina, as a precondition to food security, speaking about the right of each nation to keep its own supply of foods respecting cultural, sustainable practices and productive diversity. The political conceptualization nowadays goes beyond saying that this term is about achieving the rights of farmers to control the food systems according to local specificities, and about equality in the access to natural resources and quality food. The current feminization of agroecosystems and of food insecurity identified by researchers and recognized by international agencies like the UN and FAO has enhanced the feminist discourse into the food sovereignty movement, considering the historical inequalities that place women farmers in subaltern positions inside the families and rural communities. The current tendency in many rural areas of more women taking responsibility for food production and still facing the lack of access to natural resources meets particular aspects in Latin America due to the global economic logic which places the Global South in the position of raw material supplier for the industrialized North, combined with regional characteristics. In this context, Latin American countries play the role of commodities exporters in the international labor division, including among exported items grains, soybean paste, and ores, to the expense of local food chains which provide domestic quality food supply under more sustainable practices. The connections between gender inequalities and global territorial inequalities related to the access and control of food and natural resources are pointed out by feminist political ecology - FPE - authors, and are linked in this article to the potentialities and limitations of women farmers to reproduce diversified agroecosystems in the tropical environments. The work brings the importance of local practices held by women farmers which are crucial to maintaining sustainable agricultural systems and their results on seeds, soil, biodiversity and water conservation. This work presents an analysis of documents, releases, videos and other publicized experiences launched by some peasants’ organizations in Latin America which evidence the different technical and political answers that meet food sovereignty from peasants’ groups that are attributed to women farmers. They are associated with articles presenting the empirical analysis of women farmers' practices in Latin America. The combination drove to discuss the benefits of peasants' conceptions about food systems and their connections with local realities and the gender issues linked to the food sovereignty conceptualization. Conclusion meets that reality on the field cannot reach food sovereignty's ideal homogeneously and that agricultural sustainable practices are dependent on rights' achievement and social inequalities' eradication.

Keywords: food sovereignty, gender, diversified agricultural systems, access to natural resources

Procedia PDF Downloads 236
7135 Tick Infestation and its Implications on Health and Welfare of Cattle under Pastoral System in Nigeria

Authors: Alabi Olufemi, Adeyanju Taiwo, Oloruntoba Oluwasegun, Adeleye Bobola, Alabi Oyekemi

Abstract:

The pastoral system is a predominant form of cattle production in Nigeria, characterized by extensive grazing on communal lands. However, this system is challenged by various factors, including tick infestation, which significantly affects cattle health and welfare hence this investigation which aims to provide an in-depth understanding of tick infestation in the context of Nigerian pastoral systems, emphasizing its impact on cattle health and welfare. The country harbors a diverse array of tick species that affect cattle. These ticks belong to different genera, including Rhipicephalus, Amblyomma, and Hyalomma, among others. Each species has unique characteristics, life cycles, and host preferences, contributing to the complexity of tick infestation dynamics in pastoral settings. Tick infestation has numerous detrimental effects on cattle health. The direct effects include blood loss, anemia, skin damage due to feeding, and the transmission of pathogens that cause diseases such as anaplasmosis, babesiosis, and theileriosis. Indirectly, tick infestation can lead to reduced productivity, weight loss, and increased susceptibility to other diseases.The welfare of cattle in Nigerian pastoral systems is significantly impacted by tick infestation. Infested cattle often exhibit signs of distress, including restlessness, reduced grazing activity, and altered behavior. Furthermore, the discomfort caused by tick bites can lead to chronic stress, compromising the overall welfare of the animals. Effective tick control is crucial for mitigating the impact of infestation on cattle health and welfare. Strategies such as acaricide application, pasture management, genetic selection for tick resistance cattle, and vaccination against tick-borne diseases are commonly used. Tick infestation presents a significant challenge to cattle production under the pastoral system in Nigeria. It not only impacts cattle health but also compromises their welfare. Addressing the issue of tick infestation requires a multifaceted approach that integrates effective control strategies with sustainable management practices. Further research is needed to develop tailored interventions that account for the unique characteristics of Nigerian pastoral systems, ultimately ensuring the well-being and productivity of cattle in these settings.

Keywords: tick infestation, pastoral system, welfare, cattle

Procedia PDF Downloads 36
7134 Campus Signage and Wayfinding Design Guidelines: Challenges of Visual Literacy in University of Port Harcourt

Authors: Kasi Jockeil-Ojike

Abstract:

The study of signage and wayfinding design guidelines is to provide consistent, coherent, and comprehensive guidelines for all type of signage design that may be applied to guide persons from the freeway into campus, and to specific building. As the world becomes more complex and the population increases, people increasingly rely on signage and wayfinding systems to navigate their way in built environment such as university campus. This paper will demonstrate and discuss signage and wayfinding, and the importance of visual literacy in university campuses. It discusses the process of wayfinding and signage, how poor signage and wayfinding systems affect people when navigating, and why wayfinding is more than just signage. Hence, this paper tries to examine the design guideline that primarily addresses the signage and wayfinding system that improves visual literacy within University of Port Harcourt multi-campuses. In doing this, the paper explore the environmental graphic design senori-emotional values and communicative information theories that takes the subjectivity of the observer in account. By making these connections, the paper will also determine what University of Port Harcourt need to focus on to be counted in the global trends, using developed visual communication guidelines based on previous studies or concept from professional. In conclusion, information about why physical structures (buildings and waypaths) on University of Port Harcourt multiple campuses need to be branded in self-communicative manner using signage and wayfinding design as integral part of its physical planning policy is recommended.

Keywords: campus-signage, movement, visual-literacy, wayfinding-guidelines

Procedia PDF Downloads 432
7133 Energy Storage Modelling for Power System Reliability and Environmental Compliance

Authors: Rajesh Karki, Safal Bhattarai, Saket Adhikari

Abstract:

Reliable and economic operation of power systems are becoming extremely challenging with large scale integration of renewable energy sources due to the intermittency and uncertainty associated with renewable power generation. It is, therefore, important to make a quantitative risk assessment and explore the potential resources to mitigate such risks. Probabilistic models for different energy storage systems (ESS), such as the flywheel energy storage system (FESS) and the compressed air energy storage (CAES) incorporating specific charge/discharge performance and failure characteristics suitable for probabilistic risk assessment in power system operation and planning are presented in this paper. The proposed methodology used in FESS modelling offers flexibility to accommodate different configurations of plant topology. It is perceived that CAES has a high potential for grid-scale application, and a hybrid approach is proposed, which embeds a Monte-Carlo simulation (MCS) method in an analytical technique to develop a suitable reliability model of the CAES. The proposed ESS models are applied to a test system to investigate the economic and reliability benefits of the energy storage technologies in system operation and planning, as well as to assess their contributions in facilitating wind integration during different operating scenarios. A comparative study considering various storage system topologies are also presented. The impacts of failure rates of the critical components of ESS on the expected state of charge (SOC) and the performance of the different types of ESS during operation are illustrated with selected studies on the test system. The paper also applies the proposed models on the test system to investigate the economic and reliability benefits of the different ESS technologies and to evaluate their contributions in facilitating wind integration during different operating scenarios and system configurations. The conclusions drawn from the study results provide valuable information to help policymakers, system planners, and operators in arriving at effective and efficient policies, investment decisions, and operating strategies for planning and operation of power systems with large penetrations of renewable energy sources.

Keywords: flywheel energy storage, compressed air energy storage, power system reliability, renewable energy, system planning, system operation

Procedia PDF Downloads 118
7132 O-LEACH: The Problem of Orphan Nodes in the LEACH of Routing Protocol for Wireless Sensor Networks

Authors: Wassim Jerbi, Abderrahmen Guermazi, Hafedh Trabelsi

Abstract:

The optimum use of coverage in wireless sensor networks (WSNs) is very important. LEACH protocol called Low Energy Adaptive Clustering Hierarchy, presents a hierarchical clustering algorithm for wireless sensor networks. LEACH is a protocol that allows the formation of distributed cluster. In each cluster, LEACH randomly selects some sensor nodes called cluster heads (CHs). The selection of CHs is made with a probabilistic calculation. It is supposed that each non-CH node joins a cluster and becomes a cluster member. Nevertheless, some CHs can be concentrated in a specific part of the network. Thus, several sensor nodes cannot reach any CH. to solve this problem. We created an O-LEACH Orphan nodes protocol, its role is to reduce the sensor nodes which do not belong the cluster. The cluster member called Gateway receives messages from neighboring orphan nodes. The gateway informs CH having the neighboring nodes that not belong to any group. However, Gateway called (CH') attaches the orphaned nodes to the cluster and then collected the data. O-Leach enables the formation of a new method of cluster, leads to a long life and minimal energy consumption. Orphan nodes possess enough energy and seeks to be covered by the network. The principal novel contribution of the proposed work is O-LEACH protocol which provides coverage of the whole network with a minimum number of orphaned nodes and has a very high connectivity rates.As a result, the WSN application receives data from the entire network including orphan nodes. The proper functioning of the Application requires, therefore, management of intelligent resources present within each the network sensor. The simulation results show that O-LEACH performs better than LEACH in terms of coverage, connectivity rate, energy and scalability.

Keywords: WSNs; routing; LEACH; O-LEACH; Orphan nodes; sub-cluster; gateway; CH’

Procedia PDF Downloads 361
7131 Hand Symbol Recognition Using Canny Edge Algorithm and Convolutional Neural Network

Authors: Harshit Mittal, Neeraj Garg

Abstract:

Hand symbol recognition is a pivotal component in the domain of computer vision, with far-reaching applications spanning sign language interpretation, human-computer interaction, and accessibility. This research paper discusses the approach with the integration of the Canny Edge algorithm and convolutional neural network. The significance of this study lies in its potential to enhance communication and accessibility for individuals with hearing impairments or those engaged in gesture-based interactions with technology. In the experiment mentioned, the data is manually collected by the authors from the webcam using Python codes, to increase the dataset augmentation, is applied to original images, which makes the model more compatible and advanced. Further, the dataset of about 6000 coloured images distributed equally in 5 classes (i.e., 1, 2, 3, 4, 5) are pre-processed first to gray images and then by the Canny Edge algorithm with threshold 1 and 2 as 150 each. After successful data building, this data is trained on the Convolutional Neural Network model, giving accuracy: 0.97834, precision: 0.97841, recall: 0.9783, and F1 score: 0.97832. For user purposes, a block of codes is built in Python to enable a window for hand symbol recognition. This research, at its core, seeks to advance the field of computer vision by providing an advanced perspective on hand sign recognition. By leveraging the capabilities of the Canny Edge algorithm and convolutional neural network, this study contributes to the ongoing efforts to create more accurate, efficient, and accessible solutions for individuals with diverse communication needs.

Keywords: hand symbol recognition, computer vision, Canny edge algorithm, convolutional neural network

Procedia PDF Downloads 55
7130 Hidro-IA: An Artificial Intelligent Tool Applied to Optimize the Operation Planning of Hydrothermal Systems with Historical Streamflow

Authors: Thiago Ribeiro de Alencar, Jacyro Gramulia Junior, Patricia Teixeira Leite

Abstract:

The area of the electricity sector that deals with energy needs by the hydroelectric in a coordinated manner is called Operation Planning of Hydrothermal Power Systems (OPHPS). The purpose of this is to find a political operative to provide electrical power to the system in a given period, with reliability and minimal cost. Therefore, it is necessary to determine an optimal schedule of generation for each hydroelectric, each range, so that the system meets the demand reliably, avoiding rationing in years of severe drought, and that minimizes the expected cost of operation during the planning, defining an appropriate strategy for thermal complementation. Several optimization algorithms specifically applied to this problem have been developed and are used. Although providing solutions to various problems encountered, these algorithms have some weaknesses, difficulties in convergence, simplification of the original formulation of the problem, or owing to the complexity of the objective function. An alternative to these challenges is the development of techniques for simulation optimization and more sophisticated and reliable, it can assist the planning of the operation. Thus, this paper presents the development of a computational tool, namely Hydro-IA for solving optimization problem identified and to provide the User an easy handling. Adopted as intelligent optimization technique is Genetic Algorithm (GA) and programming language is Java. First made the modeling of the chromosomes, then implemented the function assessment of the problem and the operators involved, and finally the drafting of the graphical interfaces for access to the User. The results with the Genetic Algorithms were compared with the optimization technique nonlinear programming (NLP). Tests were conducted with seven hydroelectric plants interconnected hydraulically with historical stream flow from 1953 to 1955. The results of comparison between the GA and NLP techniques shows that the cost of operating the GA becomes increasingly smaller than the NLP when the number of hydroelectric plants interconnected increases. The program has managed to relate a coherent performance in problem resolution without the need for simplification of the calculations together with the ease of manipulating the parameters of simulation and visualization of output results.

Keywords: energy, optimization, hydrothermal power systems, artificial intelligence and genetic algorithms

Procedia PDF Downloads 415
7129 Optimal Operation of Bakhtiari and Roudbar Dam Using Differential Evolution Algorithms

Authors: Ramin Mansouri

Abstract:

Due to the contrast of rivers discharge regime with water demands, one of the best ways to use water resources is to regulate the natural flow of the rivers and supplying water needs to construct dams. Optimal utilization of reservoirs, consideration of multiple important goals together at the same is of very high importance. To study about analyzing this method, statistical data of Bakhtiari and Roudbar dam over 46 years (1955 until 2001) is used. Initially an appropriate objective function was specified and using DE algorithm, the rule curve was developed. In continue, operation policy using rule curves was compared to standard comparative operation policy. The proposed method distributed the lack to the whole year and lowest damage was inflicted to the system. The standard deviation of monthly shortfall of each year with the proposed algorithm was less deviated than the other two methods. The Results show that median values for the coefficients of F and Cr provide the optimum situation and cause DE algorithm not to be trapped in local optimum. The most optimal answer for coefficients are 0.6 and 0.5 for F and Cr coefficients, respectively. After finding the best combination of coefficients values F and CR, algorithms for solving the independent populations were examined. For this purpose, the population of 4, 25, 50, 100, 500 and 1000 members were studied in two generations (G=50 and 100). result indicates that the generation number 200 is suitable for optimizing. The increase in time per the number of population has almost a linear trend, which indicates the effect of population in the runtime algorithm. Hence specifying suitable population to obtain an optimal results is very important. Standard operation policy had better reversibility percentage, but inflicts severe vulnerability to the system. The results obtained in years of low rainfall had very good results compared to other comparative methods.

Keywords: reservoirs, differential evolution, dam, Optimal operation

Procedia PDF Downloads 68
7128 Energy Efficient Plant Design Approaches: Case Study of the Sample Building of the Energy Efficiency Training Facilities

Authors: Idil Kanter Otcu

Abstract:

Nowadays, due to the growing problems of energy supply and the drastic reduction of natural non-renewable resources, the development of new applications in the energy sector and steps towards greater efficiency in energy consumption are required. Since buildings account for a large share of energy consumption, increasing the structural density of buildings causes an increase in energy consumption. This increase in energy consumption means that energy efficiency approaches to building design and the integration of new systems using emerging technologies become necessary in order to curb this consumption. As new systems for productive usage of generated energy are developed, buildings that require less energy to operate, with rational use of resources, need to be developed. One solution for reducing the energy requirements of buildings is through landscape planning, design and application. Requirements such as heating, cooling and lighting can be met with lower energy consumption through planting design, which can help to achieve more efficient and rational use of resources. Within this context, rather than a planting design which considers only the ecological and aesthetic features of plants, these considerations should also extend to spatial organization whereby the relationship between the site and open spaces in the context of climatic elements and planting designs are taken into account. In this way, the planting design can serve an additional purpose. In this study, a landscape design which takes into consideration location, local climate morphology and solar angle will be illustrated on a sample building project.

Keywords: energy efficiency, landscape design, plant design, xeriscape landscape

Procedia PDF Downloads 251
7127 Integrating the Modbus SCADA Communication Protocol with Elliptic Curve Cryptography

Authors: Despoina Chochtoula, Aristidis Ilias, Yannis Stamatiou

Abstract:

Modbus is a protocol that enables the communication among devices which are connected to the same network. This protocol is, often, deployed in connecting sensor and monitoring units to central supervisory servers in Supervisory Control and Data Acquisition, or SCADA, systems. These systems monitor critical infrastructures, such as factories, power generation stations, nuclear power reactors etc. in order to detect malfunctions and ignite alerts and corrective actions. However, due to their criticality, SCADA systems are vulnerable to attacks that range from simple eavesdropping on operation parameters, exchanged messages, and valuable infrastructure information to malicious modification of vital infrastructure data towards infliction of damage. Thus, the SCADA research community has been active over strengthening SCADA systems with suitable data protection mechanisms based, to a large extend, on cryptographic methods for data encryption, device authentication, and message integrity protection. However, due to the limited computation power of many SCADA sensor and embedded devices, the usual public key cryptographic methods are not appropriate due to their high computational requirements. As an alternative, Elliptic Curve Cryptography has been proposed, which requires smaller key sizes and, thus, less demanding cryptographic operations. Until now, however, no such implementation has been proposed in the SCADA literature, to the best of our knowledge. In order to fill this gap, our methodology was focused on integrating Modbus, a frequently used SCADA communication protocol, with Elliptic Curve based cryptography and develop a server/client application to demonstrate the proof of concept. For the implementation we deployed two C language libraries, which were suitably modify in order to be successfully integrated: libmodbus (https://github.com/stephane/libmodbus) and ecc-lib https://www.ceid.upatras.gr/webpages/faculty/zaro/software/ecc-lib/). The first library provides a C implementation of the Modbus/TCP protocol while the second one offers the functionality to develop cryptographic protocols based on Elliptic Curve Cryptography. These two libraries were combined, after suitable modifications and enhancements, in order to give a modified version of the Modbus/TCP protocol focusing on the security of the data exchanged among the devices and the supervisory servers. The mechanisms we implemented include key generation, key exchange/sharing, message authentication, data integrity check, and encryption/decryption of data. The key generation and key exchange protocols were implemented with the use of Elliptic Curve Cryptography primitives. The keys established by each device are saved in their local memory and are retained during the whole communication session and are used in encrypting and decrypting exchanged messages as well as certifying entities and the integrity of the messages. Finally, the modified library was compiled for the Android environment in order to run the server application as an Android app. The client program runs on a regular computer. The communication between these two entities is an example of the successful establishment of an Elliptic Curve Cryptography based, secure Modbus wireless communication session between a portable device acting as a supervisor station and a monitoring computer. Our first performance measurements are, also, very promising and demonstrate the feasibility of embedding Elliptic Curve Cryptography into SCADA systems, filling in a gap in the relevant scientific literature.

Keywords: elliptic curve cryptography, ICT security, modbus protocol, SCADA, TCP/IP protocol

Procedia PDF Downloads 249
7126 The Role of Cornulaca aucheri in Stabilization of Degraded Sandy Soil in Kuwait

Authors: Modi M. Ahmed, Noor Al-Dousari, Ali M. Al-Dousari

Abstract:

Cornulaca aucheri is an annual herb consider as disturbance indicator currently visible and widely distributed in disturbed lands in Liyah area. Such area is suffered from severe land degradation due to multiple interacting factors such as, overgrazing, gravel and sand quarrying, military activities and natural process. The restoration program is applied after refilled quarries sites and levelled the surface irregularities in order to rehabilitate the natural vegetation and wildlife to its original shape. During the past 10 years of rehabilitation, noticeable greenery healthy cover of Cornulaca sp. are shown specially around artificial lake and playas. The existence of such species in high density it means that restoration program has succeeded and transit from bare ground state to Cornulaca and annual forb state. This state is lower state of Range State Transition Succession model, but it is better than bare soil. Cornulaca spp is native desert plant grows in arid conditions on sandy, stony ground, near oasis, on sand dunes and in sandy depressions. The sheep and goats are repulsive of it. Despite its spiny leaves, it provides good grazing for camels and is said to increase the milk supply produced by lactating females. It is about 80 cm tall and has stems that branched from the base with new faster greenery growth in the summer. It shows good environmental potential to be managed as natural types used for the restoration of degraded lands in desert areas.

Keywords: land degradation, range state transition succession model, rehabilitation, restoration program

Procedia PDF Downloads 352
7125 Process Modeling in an Aeronautics Context

Authors: Sophie Lemoussu, Jean-Charles Chaudemar, Robertus A. Vingerhoeds

Abstract:

Many innovative projects exist in the field of aeronautics, each addressing specific areas so to reduce weight, increase autonomy, reduction of CO2, etc. In many cases, such innovative developments are being carried out by very small enterprises (VSE’s) or small and medium sized-enterprises (SME’s). A good example concerns airships that are being studied as a real alternative to passenger and cargo transportation. Today, no international regulations propose a precise and sufficiently detailed framework for the development and certification of airships. The absence of such a regulatory framework requires a very close contact with regulatory instances. However, VSE’s/SME’s do not always have sufficient resources and internal knowledge to handle this complexity and to discuss these issues. This poses an additional challenge for those VSE’s/SME’s, in particular those that have system integration responsibilities and that must provide all the necessary evidence to demonstrate their ability to design, produce, and operate airships with the expected level of safety and reliability. The main objective of this research is to provide a methodological framework enabling VSE’s/SME’s with limited resources to organize the development of airships while taking into account the constraints of safety, cost, time and performance. This paper proposes to provide a contribution to this problematic by proposing a Model-Based Systems Engineering approach. Through a comprehensive process modeling approach applied to the development processes, the regulatory constraints, existing best practices, etc., a good image can be obtained as to the process landscape that may influence the development of airships. To this effect, not only the necessary regulatory information is taken on board, also other international standards and norms on systems engineering and project management are being modeled and taken into account. In a next step, the model can be used for analysis of the specific situation for given developments, derive critical paths for the development, identify eventual conflicting aspects between the norms, standards, and regulatory expectations, or also identify those areas where not enough information is available. Once critical paths are known, optimization approaches can be used and decision support techniques can be applied so to better support VSE’s/SME’s in their innovative developments. This paper reports on the adopted modeling approach, the retained modeling languages, and how they all fit together.

Keywords: aeronautics, certification, process modeling, project management, regulation, SME, systems engineering, VSE

Procedia PDF Downloads 153
7124 Impact of Intelligent Transportation System on Planning, Operation and Safety of Urban Corridor

Authors: Sourabh Jain, S. S. Jain

Abstract:

Intelligent transportation system (ITS) is the application of technologies for developing a user–friendly transportation system to extend the safety and efficiency of urban transportation systems in developing countries. These systems involve vehicles, drivers, passengers, road operators, managers of transport services; all interacting with each other and the surroundings to boost the security and capacity of road systems. The goal of urban corridor management using ITS in road transport is to achieve improvements in mobility, safety, and the productivity of the transportation system within the available facilities through the integrated application of advanced monitoring, communications, computer, display, and control process technologies, both in the vehicle and on the road. Intelligent transportation system is a product of the revolution in information and communications technologies that is the hallmark of the digital age. The basic ITS technology is oriented on three main directions: communications, information, integration. Information acquisition (collection), processing, integration, and sorting are the basic activities of ITS. In the paper, attempts have been made to present the endeavor that was made to interpret and evaluate the performance of the 27.4 Km long study corridor having eight intersections and four flyovers. The corridor consisting of six lanes as well as eight lanes divided road network. Two categories of data have been collected such as traffic data (traffic volume, spot speed, delay) and road characteristics data (no. of lanes, lane width, bus stops, mid-block sections, intersections, flyovers). The instruments used for collecting the data were video camera, stop watch, radar gun, and mobile GPS (GPS tracker lite). From the analysis, the performance interpretations incorporated were the identification of peak and off-peak hours, congestion and level of service (LOS) at midblock sections and delay followed by plotting the speed contours. The paper proposed the urban corridor management strategies based on sensors integrated into both vehicles and on the roads that those have to be efficiently executable, cost-effective, and familiar to road users. It will be useful to reduce congestion, fuel consumption, and pollution so as to provide comfort, safety, and efficiency to the users.

Keywords: ITS strategies, congestion, planning, mobility, safety

Procedia PDF Downloads 172
7123 Place and Situational Management in Crime Prevention

Authors: Mehdi Moghimi

Abstract:

Doctrines associated with situational prevention considers 'place of committing crime' as one of the fundamental elements of a crime. Meanwhile, with regard to causing or having effect on a crime situation, 'place' can be one of the pivotal indices in situational prevention analyses. This study aims at examining the role of place in construction of a crime situation and explaining the relationship between 'place' and situational preventive measures and procedures. Also, how to identify high-crime places, types of high-crime places and the factors influencing their creation are among the most important secondary objectives of this article. Concerning the purpose, it is a practical study whose material has been written through a documentary method using original sources (English), books and written and translated articles etc. This article is written in two main parts. In the first section, cognitive-conceptual issues about 'place' as one of the main causes of crime situation, and its effective interaction with situational preventive measures will be reviewed. The second part of this paper will focus on criminological examination of places and critical locations of crime and provide situational preventive measures to deal with the situation. 'Crime displacement' and 'geographical distribution of benefits'are also considered as the possible consequences of implementing preventive strategies. The results of the study suggest that the inventory of offenses is distributed according to the spatial characteristics. Moreover, according to the criminological characteristics governing region or location, offenders choose the place of crime based on a logical calculation. Therefore, some locations, regions or neighborhoods are permanent places of occurring lots of crimes. As a result, considering "place", preventive measures and procedures can be systematically directed, and using the most effective ways, limited preventive resources are utilized in the most critical places. Finally, some suggestions for further research and application are provided in line with more favorable promotion of situational preventive measures.

Keywords: crime prevention, place, police crime, situational crime prevention

Procedia PDF Downloads 501
7122 Effects of Surface Roughness on a Unimorph Piezoelectric Micro-Electro-Mechanical Systems Vibrational Energy Harvester Using Finite Element Method Modeling

Authors: Jean Marriz M. Manzano, Marc D. Rosales, Magdaleno R. Vasquez Jr., Maria Theresa G. De Leon

Abstract:

This paper discusses the effects of surface roughness on a cantilever beam vibrational energy harvester. A silicon sample was fabricated using MEMS fabrication processes. When etching silicon using deep reactive ion etching (DRIE) at large etch depths, rougher surfaces are observed as a result of increased response in process pressure, amount of coil power and increased helium backside cooling readings. To account for the effects of surface roughness on the characteristics of the cantilever beam, finite element method (FEM) modeling was performed using actual roughness data from fabricated samples. It was found that when etching about 550um of silicon, root mean square roughness parameter, Sq, varies by 1 to 3 um (at 100um thick) across a 6-inch wafer. Given this Sq variation, FEM simulations predict an 8 to148 Hz shift in the resonant frequency while having no significant effect on the output power. The significant shift in the resonant frequency implies that careful consideration of surface roughness from fabrication processes must be done when designing energy harvesters.

Keywords: deep reactive ion etching, finite element method, microelectromechanical systems, multiphysics analysis, surface roughness, vibrational energy harvester

Procedia PDF Downloads 113
7121 Analysis of Intra-Varietal Diversity for Some Lebanese Grapevine Cultivars

Authors: Stephanie Khater, Ali Chehade, Lamis Chalak

Abstract:

The progressive replacement of the Lebanese autochthonous grapevine cultivars during the last decade by the imported foreign varieties almost resulted in the genetic erosion of the local germplasm and the confusion with cultivars' names. Hence there is a need to characterize these local cultivars and to assess the possible existing variability at the cultivar level. This work was conducted in an attempt to evaluate the intra-varietal diversity within Lebanese traditional cultivars 'Aswad', 'Maghdoushe', 'Maryame', 'Merweh', 'Meksese' and 'Obeide'. A total of 50 accessions distributed over five main geographical areas in Lebanon were collected and submitted to both ampelographic description and ISSR DNA analysis. A set of 35 ampelographic descriptors previously established by the International Office of Vine and Wine and related to leaf, bunch, berry, and phenological stages, were examined. Variability was observed between accessions within cultivars for blade shape, density of prostrate and erect hairs, teeth shape, berry shape, size and color, cluster shape and size, and flesh juiciness. At the molecular level, nine ISSR (inter-simple sequence repeat) primers, previously developed for grapevine, were used in this study. These primers generated a total of 35 bands, of which 30 (85.7%) were polymorphic. Totally, 29 genetic profiles were differentiated, of which 9 revealed within 'Obeide', 6 for 'Maghdoushe', 5 for 'Merweh', 4 within 'Maryame', 3 for 'Aswad' and 2 within 'Meksese'. Findings of this study indicate the existence of several genotypes that form the basis of the main indigenous cultivars grown in Lebanon and which should be further considered in the establishment of new vineyards and selection programs.

Keywords: ampelography, autochthonous cultivars, ISSR markers, Lebanon, Vitis vinifera L.

Procedia PDF Downloads 132
7120 Development of a 3D Model of Real Estate Properties in Fort Bonifacio, Taguig City, Philippines Using Geographic Information Systems

Authors: Lyka Selene Magnayi, Marcos Vinas, Roseanne Ramos

Abstract:

As the real estate industry continually grows in the Philippines, Geographic Information Systems (GIS) provide advantages in generating spatial databases for efficient delivery of information and services. The real estate sector is not only providing qualitative data about real estate properties but also utilizes various spatial aspects of these properties for different applications such as hazard mapping and assessment. In this study, a three-dimensional (3D) model and a spatial database of real estate properties in Fort Bonifacio, Taguig City are developed using GIS and SketchUp. Spatial datasets include political boundaries, buildings, road network, digital terrain model (DTM) derived from Interferometric Synthetic Aperture Radar (IFSAR) image, Google Earth satellite imageries, and hazard maps. Multiple model layers were created based on property listings by a partner real estate company, including existing and future property buildings. Actual building dimensions, building facade, and building floorplans are incorporated in these 3D models for geovisualization. Hazard model layers are determined through spatial overlays, and different scenarios of hazards are also presented in the models. Animated maps and walkthrough videos were created for company presentation and evaluation. Model evaluation is conducted through client surveys requiring scores in terms of the appropriateness, information content, and design of the 3D models. Survey results show very satisfactory ratings, with the highest average evaluation score equivalent to 9.21 out of 10. The output maps and videos obtained passing rates based on the criteria and standards set by the intended users of the partner real estate company. The methodologies presented in this study were found useful and have remarkable advantages in the real estate industry. This work may be extended to automated mapping and creation of online spatial databases for better storage, access of real property listings and interactive platform using web-based GIS.

Keywords: geovisualization, geographic information systems, GIS, real estate, spatial database, three-dimensional model

Procedia PDF Downloads 154
7119 Receptiveness of Market Segmentation Towards Online Shopping Attitude: A Quality Management Strategy for Online Passenger Car Market

Authors: Noor Hasmini Abdghani, Nik Kamariah Nikmat, Nor Hayati Ahmad

Abstract:

Rapid growth of the internet technology led to changes in the consumer lifestyles. This involved customer buying behaviour-based internet that create new kind of buying strategy. Hence, it has summoned many of world firms including Malaysia to generate new quality strategy in preparation to face new customer buying lifestyles. Particularly, this study focused on identifying online customer segment of automobile passenger car customers. Secondly, the objective is to understand online customer’s receptiveness towards internet technologies. This study distributed 700 questionnaires whereby 582 were returned representing 83% response rate. The data were analysed using factor and regression analyses. The result from the factor analysis precipitates four online passenger car segmentations in Malaysia, which are: Segment (1)- Automobile Online shopping Preferences, Segment (2)- Automobile Online Brand Comparison, Segment (3)- Automobile Online Information Seeking and Segment (4)- Automobile Offline Shopping Preferences. In understanding the online customer’s receptiveness towards internet, the regression result shows that there is significant relationship between each of four segments of online passenger car customer with attitude towards automobile online shopping. This implies that, for online customers to have receptiveness toward internet technologies, he or she must have preferences toward online shopping or at least prefer to browse any related information online even if the actual purchase is made at the traditional store. With this proposed segmentation strategy, the firms especially the automobile firms will be able to understand their online customer behavior. At least, the proposed segmentation strategy will help the firms to strategize quality management approach for their online customers’ buying decision making.

Keywords: Automobile, Market Segmentation, Online Shopping Attitude, Quality Management Strategy

Procedia PDF Downloads 534
7118 Perceived Physical Exercise Benefits among Staff of Tertiary Institutions in Adamawa State

Authors: Salihu Mohammed Umar

Abstract:

Perceived physical exercise benefits among staff of tertiary institutions in Adamawa State was investigated as a basis for formulating proper exercise intervention strategies. The study utilized descriptive survey design. The purpose of the study was to determine perceived exercise benefits among staff of tertiary institutions in Adamawa state, Nigeria. The instrument used for data collection was a questionnaire adapted from Exercise Benefit/Barrier Scale (EBBS) developed by Sechrist, Walker and Pender (1985) which was validated by five experts. Three hundred and thirty (330) copies of the questionnaire were distributed among study participants in six institutions of higher learning in Adamawa state. The scale comprised two components; Benefits and Barriers dimensions. To achieve this purpose, three research questions were posed. The instrument had a four response forced-choice Likert-type format with responses ranging from 4 = strongly agree (SA), 3 = Agree (A), 2 = Disagree (D) and 1 = Strongly Disagree (SD). The findings of the study revealed that both male and female staff in institutions of higher learning in Adamawa state perceived exercise as highly beneficial. However, male staff had higher perceived benefits score than their female counterparts. (Male: x̄ = 95.02. SD = 3.08) > female: x̄ = 94.04, SD = 4.35. There was also no significant difference in perceived exercise barriers between staff and students of tertiary institutions in Adamawa state. Based on the finding of the study, it was concluded that staff of tertiary institutions perceived exercise as highly beneficial. It was recommended that since staff of institutions of higher learning in Adamawa State irrespective of gender and religious affiliations have basic knowledge of perceived benefits of exercise, there is the need to explore programmes that will enable staff across the sub-groups to overcome barriers that could discourage physical exercise participation.

Keywords: perception, physical exercise, staff, benefits

Procedia PDF Downloads 302
7117 Symbolic Partial Differential Equations Analysis Using Mathematica

Authors: Davit Shahnazaryan, Diogo Gomes, Mher Safaryan

Abstract:

Many symbolic computations and manipulations required in the analysis of partial differential equations (PDE) or systems of PDEs are tedious and error-prone. These computations arise when determining conservation laws, entropies or integral identities, which are essential tools for the study of PDEs. Here, we discuss a new Mathematica package for the symbolic analysis of PDEs that automate multiple tasks, saving time and effort. Methodologies: During the research, we have used concepts of linear algebra and partial differential equations. We have been working on creating algorithms based on theoretical mathematics to find results mentioned below. Major Findings: Our package provides the following functionalities; finding symmetry group of different PDE systems, generation of polynomials invariant with respect to different symmetry groups; simplification of integral quantities by integration by parts and null Lagrangian cleaning, computing general forms of expressions by integration by parts; finding equivalent forms of an integral expression that are simpler or more symmetric form; determining necessary and sufficient conditions on the coefficients for the positivity of a given symbolic expression. Conclusion: Using this package, we can simplify integral identities, find conserved and dissipated quantities of time-dependent PDE or system of PDEs. Some examples in the theory of mean-field games and semiconductor equations are discussed.

Keywords: partial differential equations, symbolic computation, conserved and dissipated quantities, mathematica

Procedia PDF Downloads 152
7116 Concepts in the Design of Lateral-Load Systems in High Rise Buildings to Reduce Operational Energy Consumption

Authors: Mohamed Ali MiladKrem Salem, Sergio F.Breña, Sanjay R. Arwade, Simi T. Hoque

Abstract:

The location of the main lateral‐load resisting system in high-rise buildings may have positive impacts on sustainability through a reduction in operational energy consumption, and this paper describes an assessment of the accompanying effects on structural performance. It is found that there is a strong influence of design for environmental performance on the structural performance the building, and that systems selected primarily with an eye towards energy use reduction may require substantial additional structural stiffening to meet safety and serviceability limits under lateral load cases. We present a framework for incorporating the environmental costs of meeting structural design requirements through the embodied energy of the core structural materials and also address the issue of economic cost brought on by incorporation of environmental concerns into the selection of the structural system. We address these issues through four case study high-rise buildings with differing structural morphologies (floor plan and core arrangement) and assess each of these building models for cost and embodied energy when the base structural system, which has been suggested by architect Kenneth Yeang based on environmental concerns, is augmented to meet lateral drift requirements under the wind loads prescribed by ASCE 7-10.

Keywords: sustainable, embodied, Outrigger, skyscraper, morphology, efficiency

Procedia PDF Downloads 460
7115 Physiotherapy Assessment of People with Neurological Conditions in Australia: A National Survey of Clinical Practice

Authors: Jill Garner, Belinda Lange, Sheila Lennon, Maayken van den Berg

Abstract:

Currently, there are approximately one billion people worldwide affected by a neurological condition. Many of whom are assessed and treated by a physiotherapist in a variety of settings. There is a lack of consensus in the literature related to what is clinically assessed by physiotherapists in people with neurological conditions. This study aimed to explore assessment in people with neurological conditions, including how health care setting, experience, and therapeutic approach, may influence neurological assessment. A national survey targeted Australian physiotherapists who assess adults with neurological conditions as part of their clinical practice. The survey consisted of 39 questions and was distributed to physiotherapists through the Australian Physiotherapy Association, and Chief Allied Health Officers across Australia and advertised on the National Neurological Physiotherapy Facebook page. In total, 395 respondents consented to the survey from all states within Australia. Most respondents were female (85.4%) with a mean (SD) age of 35.7 years. Respondents reported working clinically in acute, community, outpatients, and community settings. Stroke was the most assessed condition (58.0%). There is variability in domains assessed by Australian physiotherapists, with common inclusions of balance, muscle strength, gait, falls and safety, function, goal setting, range of movement, pain, coordination, activity tolerance, postural alignment and symmetry and upper limb. There is little evidence to support what physiotherapists assess in practice, in different settings, and in different states within Australia and not enough information to develop a decision tree regarding what is important for assessment in different settings. Further research is needed to explore this area and develop a consensus around best practices.

Keywords: physiotherapy, neurological, assessment, domains

Procedia PDF Downloads 82
7114 Comparative Study of Seismic Isolation as Retrofit Method for Historical Constructions

Authors: Carlos H. Cuadra

Abstract:

Seismic isolation can be used as a retrofit method for historical buildings with the advantage that minimum intervention on super-structure is required. However, selection of isolation devices depends on weight and stiffness of upper structure. In this study, two buildings are considered for analyses to evaluate the applicability of this retrofitting methodology. Both buildings are located at Akita prefecture in the north part of Japan. One building is a wooden structure that corresponds to the old council meeting hall of Noshiro city. The second building is a brick masonry structure that was used as house of a foreign mining engineer and it is located at Ani town. Ambient vibration measurements were performed on both buildings to estimate their dynamic characteristics. Then, target period of vibration of isolated systems is selected as 3 seconds is selected to estimate required stiffness of isolation devices. For wooden structure, which is a light construction, it was found that natural rubber isolators in combination with friction bearings are suitable for seismic isolation. In case of masonry building elastomeric isolator can be used for its seismic isolation. Lumped mass systems are used for seismic response analysis and it is verified in both cases that seismic isolation can be used as retrofitting method of historical construction. However, in the case of the light building, most of the weight corresponds to the reinforced concrete slab that is required to install isolation devices.

Keywords: historical building, finite element method, masonry structure, seismic isolation, wooden structure

Procedia PDF Downloads 149
7113 FEM and Experimental Modal Analysis of Computer Mount

Authors: Vishwajit Ghatge, David Looper

Abstract:

Over the last few decades, oilfield service rolling equipment has significantly increased in weight, primarily because of emissions regulations, which require larger/heavier engines, larger cooling systems, and emissions after-treatment systems, in some cases, etc. Larger engines cause more vibration and shock loads, leading to failure of electronics and control systems. If the vibrating frequency of the engine matches the system frequency, high resonance is observed on structural parts and mounts. One such existing automated control equipment system comprising wire rope mounts used for mounting computers was designed approximately 12 years ago. This includes the use of an industrial- grade computer to control the system operation. The original computer had a smaller, lighter enclosure. After a few years, a newer computer version was introduced, which was 10 lbm heavier. Some failures of internal computer parts have been documented for cases in which the old mounts were used. Because of the added weight, there is a possibility of having the two brackets impact each other under off-road conditions, which causes a high shock input to the computer parts. This added failure mode requires validating the existing mount design to suit the new heavy-weight computer. This paper discusses the modal finite element method (FEM) analysis and experimental modal analysis conducted to study the effects of vibration on the wire rope mounts and the computer. The existing mount was modelled in ANSYS software, and resultant mode shapes and frequencies were obtained. The experimental modal analysis was conducted, and actual frequency responses were observed and recorded. Results clearly revealed that at resonance frequency, the brackets were colliding and potentially causing damage to computer parts. To solve this issue, spring mounts of different stiffness were modeled in ANSYS software, and the resonant frequency was determined. Increasing the stiffness of the system increased the resonant frequency zone away from the frequency window at which the engine showed heavy vibrations or resonance. After multiple iterations in ANSYS software, the stiffness of the spring mount was finalized, which was again experimentally validated.

Keywords: experimental modal analysis, FEM Modal Analysis, frequency, modal analysis, resonance, vibration

Procedia PDF Downloads 314
7112 Development of Sustainable Building Environmental Model (SBEM) in Hong Kong

Authors: Kwok W. Mui, Ling T. Wong, F. Xiao, Chin T. Cheung, Ho C. Yu

Abstract:

This study addresses a concept of the Sustainable Building Environmental Model (SBEM) developed to optimize energy consumption in air conditioning and ventilation (ACV) systems without any deterioration of indoor environmental quality (IEQ). The SBEM incorporates two main components: an adaptive comfort temperature control module (ACT) and a new carbon dioxide demand control module (nDCV). These two modules take an innovative approach to maintain satisfaction of the Indoor Environmental Quality (IEQ) with optimum energy consumption, they provide a rational basis of effective control. A total of 2133 sets of measurement data of indoor air temperature (Ta), relative humidity (Rh) and carbon dioxide concentration (CO2) were conducted in some Hong Kong offices to investigate the potential of integrating the SBEM. A simulation was used to evaluate the dynamic performance of the energy and air conditioning system with the integration of the SBEM in an air-conditioned building. It allows us make a clear picture of the control strategies and performed any pre-tuned of controllers before utilized in real systems. With the integration of SBEM, it was able to save up to 12.3% in simulation and 15% in field measurement of overall electricity consumption, and maintain the average carbon dioxide concentration within 1000ppm and occupant dissatisfaction in 20%.

Keywords: sustainable building environmental model (SBEM), adaptive comfort temperature (ACT), new demand control ventilation (nDCV), energy saving

Procedia PDF Downloads 632
7111 Construction and Optimization of Green Infrastructure Network in Mountainous Counties Based on Morphological Spatial Pattern Analysis and Minimum Cumulative Resistance Models: A Case Study of Shapingba District, Chongqing

Authors: Yuning Guan

Abstract:

Under the background of rapid urbanization, mountainous counties need to break through mountain barriers for urban expansion due to undulating topography, resulting in ecological problems such as landscape fragmentation and reduced biodiversity. Green infrastructure networks are constructed to alleviate the contradiction between urban expansion and ecological protection, promoting the healthy and sustainable development of urban ecosystems. This study applies the MSPA model, the MCR model and Linkage Mapper Tools to identify eco-sources and eco-corridors in the Shapingba District of Chongqing and combined with landscape connectivity assessment and circuit theory to delineate the importance levels to extract ecological pinch point areas on the corridors. The results show that: (1) 20 ecological sources are identified, with a total area of 126.47 km², accounting for 31.88% of the study area, and showing a pattern of ‘one core, three corridors, multi-point distribution’. (2) 37 ecological corridors are formed in the area, with a total length of 62.52km, with a ‘more in the west, less in the east’ pattern. (3) 42 ecological pinch points are extracted, accounting for 25.85% of the length of the corridors, which are mainly distributed in the eastern new area. Accordingly, this study proposes optimization strategies for sub-area protection of ecological sources, grade-level construction of ecological corridors, and precise restoration of ecological pinch points.

Keywords: green infrastructure network, morphological spatial pattern, minimal cumulative resistance, mountainous counties, circuit theory, shapingba district

Procedia PDF Downloads 33