Search results for: pilot contamination attacks
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 2292

Search results for: pilot contamination attacks

1932 Assessment of Heavy Metals in Irrigation Water Collected from Various Vegetables Growing Areas of Swat Valley

Authors: Islam Zeb

Abstract:

The water of poor quality used for irrigation purposes has the potential to be the direct source of contamination and a vehicle for spreading contamination in the field. A number of wide-ranging review articles have been published that highlight irrigation water as a source of heavy metals toxicity which leads to chronic diseases in the human body. Here a study was planned to determine the microbial and heavy metals status of irrigation water collected from various locations of district Swat in various months. The analyses were carried out at the Environmental Horticulture Laboratory, Department of Horticulture, The University of Agriculture Peshawar, during the year 2018 – 19. The experiment was laid out in Randomized Complete Block Design (RCBD) with two factors and three replicates. Factor A consist of different locations and factor B represent various months. The result of heavy metals concentration in different regions, maximum Lead, Cadmium, Chromium, Nickel and Copper (4.27, 0.56, 0.81, 1.33 and 1.51 mg L-1 respectively) were noted for the irrigation water samples collected from Mingora while minimum Lead, Cadmium, Chromium, Nickel and Copper concentration (2.59, 0.30, 0.27, 0.40 and 0.54 mg L-1 respectively) were noted for the samples of matta. Whereas results of heavy metals content in irrigation water samples for various months maximum content of Lead, Cadmium, Chromium, Nickel and Copper (4.56, 0.63, 1.15, 1.31 and 1.48 mg L-1 respectively) were noted for the samples collected in Jan/Feb while lowest values for Lead, Cadmium, Chromium, Nickel and Copper (2.38, 0.24, 0.21, 0.41 and 0.52 mg L-1 respectively) were noted in the samples of July/August. A significant interaction was found for all the studied parameters. It was concluded that the concentration of heavy metal was maximum in irrigation water samples collected from the Mingora location during the month of Jan/Feb because Mingora is the most polluted area as compared to other studied regions, whereas the water content in winter goes to freeze and mostly contaminated water is used for irrigation purposes.

Keywords: irrigation water, various months, different regions, heavy metals contamination, Swat

Procedia PDF Downloads 60
1931 Environmental Impact Assessment of Municipal Solid Waste Disposal Site in Shahrood City

Authors: Mehri Bagherkazemi, Naser Hafezi Moghaddas

Abstract:

This study investigates the environmental impact of the disposal site located in Shahrood city, focusing on the geological characteristics of the region. Shahrood's disposal site primarily consists of limestone bedrock, overlaid by substantial alluvial deposits. The area's highly permeable soil is anticipated to have a significant influence on groundwater pollution. Spanning 52 hectares, the Shahrood disposal site is situated in the eastern sector of the city. Historically, waste disposal took place on the surface, but recent practices involve on-site trenching. This research involved the collection of soil and water samples near the disposal site, with subsequent analysis of 11 soil samples and 3 water samples. The soil's particle size distribution was determined, and comprehensive analyses were conducted for 35 elements in the soil and 42 elements in water. The study combines the results of these tests with field investigations to evaluate the landfill's impact on the surrounding soil and groundwater contamination.

Keywords: environmental geology, environmental impact assessment, disposal site, heavy metals contamination

Procedia PDF Downloads 53
1930 Assessment of Heavy Metal Contamination in Ground Water in the Coastal Part of Cauvery Deltaic Region, South India

Authors: Gnanachandrasamy G., Zhou Y., Ramkumar T., Venkatramanan S., Wang S., Mo Liping, Jingru Zhang

Abstract:

In order to assess the heavy metal contamination totally fourty five groundwater samples were collected from the coastal part of Cauvery deltaic region, South India, during monsoon season in the year of 2017. The study area lies between longitudes 79º15’ to 79º 50’ E and latitudes 10º10’ to 11º20’ N with total area of 2,569 km². The concentration of As, Ba, Cd, Cr, Co, Cu, Ni, Pb, Se, and Zn were analyzed by Inductively Coupled Plasma Mass Spectrometry (ICP-MS). The heavy metals ranged between 0.007-117.8 µg/l for As, 8.503-1281 µg/l for Ba, 0.006-0.12 µg/l for Cd, 0.23-5.572µg/l for Cr, 0.44-17.9 µg/l for Co, 0.633-11.56 µg/l for Cu, 0.467-29.34 µg/l for Ni, 0.008-5.756 µg/l for Pb, 0.979 to 45.49 µg/l for Se, and 2.712-10480 µg/l for Zn in the groundwaters. A comparison of heavy metal concentration with WHO and BIS drinking water standards shows that Ni, Zn, As, Se, and Ba level is higher than the drinking water standards in some of the groundwater samples, and the concentrations of all the other heavy metals were lower than the drinking water standards. The present levels of heavy metal concentration in the studied area groundwaters are moderate to severe to public health and environmental concerns and need attention.

Keywords: cauvery delta, drinking water, groundwater, heavy metals

Procedia PDF Downloads 319
1929 Secure Hashing Algorithm and Advance Encryption Algorithm in Cloud Computing

Authors: Jaimin Patel

Abstract:

Cloud computing is one of the most sharp and important movement in various computing technologies. It provides flexibility to users, cost effectiveness, location independence, easy maintenance, enables multitenancy, drastic performance improvements, and increased productivity. On the other hand, there are also major issues like security. Being a common server, security for a cloud is a major issue; it is important to provide security to protect user’s private data, and it is especially important in e-commerce and social networks. In this paper, encryption algorithms such as Advanced Encryption Standard algorithms, their vulnerabilities, risk of attacks, optimal time and complexity management and comparison with other algorithms based on software implementation is proposed. Encryption techniques to improve the performance of AES algorithms and to reduce risk management are given. Secure Hash Algorithms, their vulnerabilities, software implementations, risk of attacks and comparison with other hashing algorithms as well as the advantages and disadvantages between hashing techniques and encryption are given.

Keywords: Cloud computing, encryption algorithm, secure hashing algorithm, brute force attack, birthday attack, plaintext attack, man in middle attack

Procedia PDF Downloads 260
1928 Impact of Teacher Qualifications on the Pedagogical Competencies of University Lecturers in Northwest Nigeria: A Pilot Study Report

Authors: Collins Ekpiwre Augustine

Abstract:

Taking into account the impact of teacher training on primary and secondary teachers’ classroom competencies and practices, as revealed by many empirical studies, this study investigated the impact of teacher qualifications on the pedagogical competencies of university teachers in Northwest Nigeria.Four research questions were answered while four hypotheses were tested. Both descriptive statistic of frequencies/arithmetic mean and inferential statistic oft-test were used to analyze the data collected. In order to provide a focus to the study,an observational rating scale titled “University Teachers’ Pedagogical Competency Observation Rating Scale” (UTPCORS) was used to collect data for the study. The population for the study comprised all the university teachers in the three Federal Universities in Northwest Nigeria totaling about 3,401. However, this pilot study was administered on 8 teachers - with 4 participants in each comparison group in Bayero University, Kano.The findings of the study revealed that there was no significant difference in the four hypotheses postulated for the study.

Keywords: impact, university teachers, teachers' qualifications, competencies

Procedia PDF Downloads 494
1927 Secure Distance Bounding Protocol on Ultra-WideBand Based Mapping Code

Authors: Jamel Miri, Bechir Nsiri, Ridha Bouallegue

Abstract:

Ultra WidBand-IR physical layer technology has seen a great development during the last decade which makes it a promising candidate for short range wireless communications, as they bring considerable benefits in terms of connectivity and mobility. However, like all wireless communication they suffer from vulnerabilities in terms of security because of the open nature of the radio channel. To face these attacks, distance bounding protocols are the most popular counter measures. In this paper, we presented a protocol based on distance bounding to thread the most popular attacks: Distance Fraud, Mafia Fraud and Terrorist fraud. In our work, we study the way to adapt the best secure distance bounding protocols to mapping code of ultra-wideband (TH-UWB) radios. Indeed, to ameliorate the performances of the protocol in terms of security communication in TH-UWB, we combine the modified protocol to ultra-wideband impulse radio technology (IR-UWB). The security and the different merits of the protocols are analyzed.

Keywords: distance bounding, mapping code ultrawideband, terrorist fraud, physical layer technology

Procedia PDF Downloads 273
1926 Communication Layer Security in Smart Farming: A Survey on Wireless Technologies

Authors: Hossein Mohammadi Rouzbahani, Hadis Karimipour, Evan Fraser, Ali Dehghantanha, Emily Duncan, Arthur Green, Conchobhair Russell

Abstract:

Human population growth has driven rising demand for food that has, in turn, imposed huge impacts on the environment. In an effort to reconcile our need to produce more sustenance while also protecting the world’s ecosystems, farming is becoming more reliant on smart tools and communication technologies. Developing a smart farming framework allows farmers to make more efficient use of inputs, thus protecting water quality and biodiversity habitat. Internet of Things (IoT), which has revolutionized every sphere of the economy, is being applied to agriculture by connecting on-farm devices and providing real-time monitoring of everything from environmental conditions to market signals through to animal health data. However, utilizing IoT means farming networks are now vulnerable to malicious activities, mostly when wireless communications are highly employed. With that in mind, this research aims to review different utilized communication technologies in smart farming. Moreover, possible cyber-attacks are investigated to discover the vulnerabilities of communication technologies considering the most frequent cyber-attacks that have been happened.

Keywords: smart farming, Internet of Things, communication layer, cyber-attack

Procedia PDF Downloads 219
1925 Microbial Contamination of Cell Phones of Health Care Workers: Case Study in Mampong Municipal Government Hospital, Ghana

Authors: Francis Gyapong, Denis Yar

Abstract:

The use of cell phones has become an indispensable tool in the hospital's settings. Cell phones are used in hospitals without restrictions regardless of their unknown microbial load. However, the indiscriminate use of mobile devices, especially at health facilities, can act as a vehicle for transmitting pathogenic bacteria and other microorganisms. These potential pathogens become exogenous sources of infection for the patients and are also a potential health hazard for self and as well as family members. These are a growing problem in many health care institutions. Innovations in mobile communication have led to better patient care in diabetes, asthma, and increased in vaccine uptake via SMS. Notwithstanding, the use of cell phones can be a great potential source for nosocomial infections. Many studies reported heavy microbial contamination of cell phones among healthcare workers and communities. However, limited studies have been reported in our region on bacterial contamination on cell phones among healthcare workers. This study assessed microbial contamination of cell phones of health care workers (HCWs) at the Mampong Municipal Government Hospital (MMGH), Ghana. A cross-sectional design was used to characterize bacterial microflora on cell phones of HCWs at the MMGH. A total of thirty-five (35) swab samples of cell phones of HCWs at the Laboratory, Dental Unit, Children’s Ward, Theater and Male ward were randomly collected for laboratory examinations. A suspension of the swab samples was each streak on blood and MacConkey agar and incubated at 37℃ for 48 hours. Bacterial isolates were identified using appropriate laboratory and biochemical tests. Kirby-Bauer disc diffusion method was used to determine the antimicrobial sensitivity tests of the isolates. Data analysis was performed using SPSS version 16. All mobile phones sampled were contaminated with one or more bacterial isolates. Cell phones from the Male ward, Dental Unit, Laboratory, Theatre and Children’s ward had at least three different bacterial isolates; 85.7%, 71.4%, 57.1% and 28.6% for both Theater and Children’s ward respectively. Bacterial contaminants identified were Staphylococcus epidermidis (37%), Staphylococcus aureus (26%), E. coli (20%), Bacillus spp. (11%) and Klebsiella spp. (6 %). Except for the Children ward, E. coli was isolated at all study sites and predominant (42.9%) at the Dental Unit while Klebsiella spp. (28.6%) was only isolated at the Children’s ward. Antibiotic sensitivity testing of Staphylococcus aureus indicated that they were highly sensitive to cephalexin (89%) tetracycline (80%), gentamycin (75%), lincomycin (70%), ciprofloxacin (67%) and highly resistant to ampicillin (75%). Some of these bacteria isolated are potential pathogens and their presence on cell phones of HCWs could be transmitted to patients and their families. Hence strict hand washing before and after every contact with patient and phone be enforced to reduce the risk of nosocomial infections.

Keywords: mobile phones, bacterial contamination, patients, MMGH

Procedia PDF Downloads 77
1924 Bioremediation of PAHs-Contaminated Soil Using Land Treatment Processes

Authors: Somaye Eskandary

Abstract:

Polycyclic aromatic hydrocarbons (PAHs) are present in crude oil and its derivatives contaminate soil and also increase carcinogen and mutagen contamination, which is a concern for researchers. Land farming is one of the methods that remove pollutants from the soil by native microorganisms. It seems that this technology is cost-effective, environmentally friendly and causes less debris problem to be disposed. This study aimed to refine the polycyclic aromatic hydrocarbons from oil-contaminated soil using the land farming method. In addition to examine the concentration of polycyclic aromatic hydrocarbons by GC-FID, some characteristics such as soil microbial respiration and dehydrogenase, peroxidase, urease, acid and alkaline phosphatase enzyme concentration were also measured. The results showed that after land farming process the concentrations of some polycyclic aromatic hydrocarbons dropped to 50 percent. The results showed that the enzyme concentration is reduced by reducing the concentration of hydrocarbons and microbial respiration. These results emphasize the process of land farming for removal of polycyclic aromatic hydrocarbons from soil by indigenous microorganisms.

Keywords: soil contamination, gas chromatography, native microorganisms, soil enzymes, microbial respiration, carcinogen

Procedia PDF Downloads 363
1923 Robust Data Image Watermarking for Data Security

Authors: Harsh Vikram Singh, Ankur Rai, Anand Mohan

Abstract:

In this paper, we propose secure and robust data hiding algorithm based on DCT by Arnold transform and chaotic sequence. The watermark image is scrambled by Arnold cat map to increases its security and then the chaotic map is used for watermark signal spread in middle band of DCT coefficients of the cover image The chaotic map can be used as pseudo-random generator for digital data hiding, to increase security and robustness .Performance evaluation for robustness and imperceptibility of proposed algorithm has been made using bit error rate (BER), normalized correlation (NC), and peak signal to noise ratio (PSNR) value for different watermark and cover images such as Lena, Girl, Tank images and gain factor .We use a binary logo image and text image as watermark. The experimental results demonstrate that the proposed algorithm achieves higher security and robustness against JPEG compression as well as other attacks such as addition of noise, low pass filtering and cropping attacks compared to other existing algorithm using DCT coefficients. Moreover, to recover watermarks in proposed algorithm, there is no need to original cover image.

Keywords: data hiding, watermarking, DCT, chaotic sequence, arnold transforms

Procedia PDF Downloads 492
1922 Effect of Hydraulic Residence Time on Aromatic Petrochemical Wastewater Treatment Using Pilot-Scale Submerged Membrane Bioreactor

Authors: Fatemeh Yousefi, Narges Fallah, Mohsen Kian, Mehrzad Pakzadeh

Abstract:

The petrochemical complex releases wastewater, which is rich in organic pollutants and could not be treated easily. Treatment of the wastewater from a petrochemical industry has been investigated using a submerged membrane bioreactor (MBR). For this purpose, a pilot-scale submerged MBR with a flat-sheet ultrafiltration membrane was used for treatment of petrochemical wastewater according to Bandar Imam Petrochemical complex (BIPC) Aromatic plant. The testing system ran continuously (24-h) over 6 months. Trials on different membrane fluxes and hydraulic retention time (HRT) were conducted and the performance evaluation of the system was done. During the 167 days operation of the MBR at hydraulic retention time (HRT) of 18, 12, 6, and 3 and at an infinite sludge retention time (SRT), the MBR effluent quality consistently met the requirement for discharge to the environment. A fluxes of 6.51 and 13.02 L m-2 h-1 (LMH) was sustainable and HRT of 6 and 12 h corresponding to these fluxes were applicable. Membrane permeability could be fully recovered after cleaning. In addition, there was no foaming issue in the process. It was concluded that it was feasible to treat the wastewater using submersed MBR technology.

Keywords: membrane bioreactor (MBR), petrochemical wastewater, COD removal, biological treatment

Procedia PDF Downloads 497
1921 Evaluation of Cardiac Rhythm Patterns after Open Surgical Maze-Procedures from Three Years' Experiences in a Single Heart Center

Authors: J. Yan, B. Pieper, B. Bucsky, H. H. Sievers, B. Nasseri, S. A. Mohamed

Abstract:

In order to optimize the efficacy of medications, the regular follow-up with long-term continuous monitoring of heart rhythmic patterns has been facilitated since clinical introduction of cardiac implantable electronic monitoring devices (CIMD). Extensive analysis of rhythmic circadian properties is capable to disclose the distributions of arrhythmic events, which may support appropriate medication according rate-/rhythm-control strategy and minimize consequent afflictions. 348 patients (69 ± 0.5ys, male 61.8%) with predisposed atrial fibrillation (AF), undergoing primary ablating therapies combined to coronary or valve operations and secondary implantation of CIMDs, were involved and divided into 3 groups such as PAAF (paroxysmal AF) (n=99, male 68.7%), PEAF (persistent AF) (n=94, male 62.8%), and LSPEAF (long-standing persistent AF) (n=155, male 56.8%). All patients participated in three-year ambulant follow-up (3, 6, 9, 12, 18, 24, 30 and 36 months). Burdens of atrial fibrillation recurrence were assessed using cardiac monitor devices, whereby attacks frequencies and their circadian patterns were systemically analyzed. Anticoagulants and regular anti-arrhythmic medications were evaluated and the last were listed in terms of anti-rate and anti-rhythm regimens. Patients in the PEAF-group showed the least AF-burden after surgical ablating procedures compared to both of the other subtypes (p < 0.05). The AF-recurrences predominantly performed such attacks’ property as shorter than one hour, namely within 10 minutes (p < 0.05), regardless of AF-subtypes. Concerning circadian distribution of the recurrence attacks, frequent AF-attacks were mostly recorded in the morning in the PAAF-group (p < 0.05), while the patients with predisposed PEAF complained less attack-induced discomforts in the latter half of the night and the ones with LSPEAF only if they were not physically active after primary surgical ablations. Different AF-subtypes presented distinct therapeutic efficacies after appropriate surgical ablating procedures and recurrence properties in sense of circadian distribution. An optimization of medical regimen and drug dosages to maintain the therapeutic success needs more attention to detailed assessment of the long-term follow-up. Rate-control strategy plays a much more important role than rhythm-control in the ongoing follow-up examinations.

Keywords: atrial fibrillation, CIMD, MAZE, rate-control, rhythm-control, rhythm patterns

Procedia PDF Downloads 137
1920 Machine Learning Invariants to Detect Anomalies in Secure Water Treatment

Authors: Jonathan Heng, Yoong Cheah Huei

Abstract:

A strategic model that does not trigger any false alarms to detect anomalies in Secure Water Treatment (SWaT) test bed is presented. This model uses machine learning invariants formulated from streamlining the general form of Auto-Regressive models with eXogenous input. A creative generalized CUSUM algorithm to integrate the invariants and the detection strategy technique is successfully developed and tested in the SWaT Programmable Logic Controllers (PLCs). Three steps to fine-tune parameters, b and τ in the generalized algorithm are stated and an example used to demonstrate the tuning process is discussed. This approach can swiftly and effectively detect various scopes of cyber-attacks such as multiple points single stage and multiple points multiple stages in SWaT. This technique can be applied in water treatment plants and other cyber physical systems like power and gas plants too.

Keywords: machine learning invariants, generalized CUSUM algorithm with invariants and detection strategy, scope of cyber attacks, strategic model, tuning parameters

Procedia PDF Downloads 162
1919 The Impact of Motor Predispositions of Pilot-Cadets on Results in Aviation Synthetic Efficiency Test

Authors: Zbigniew Wochynski, Justyna Skrzynska, Robert Jedrys, Zdzislaw Kobos

Abstract:

The aim of the study is to determine the types of motor skills and their impact on achieving results while undergoing Aviation Synthetic Efficiency Test (ASET). The study involved 59 cadets, 21 years-old on average, who are studying on first year for a pilot. The average weight of the respondents is 73.8 kg. The subjects were divided into two groups by weight: up to 73.8 kg -group A (n-30) and above 73,8kg -group B (n-29). All subjects underwent the following tests: running at 40m, 100m, 1000m, 2000m, pull-ups, ASET. In both groups, the cadets were divided into two motor skills types taking into advance 40 m running, pull-ups, 2000 meters running and then subjected to do ASET. There has been shown statistically significant increase in group B in body height, weight and BMI with p <0.0003, p <0.0001, p <0.0001 compared to group A. The results indicate that the dominant motor type in all subjects is the endurance-strength model, which reached the speed V = 1,42m/s in overcoming ASET. This is confirmed by the correlation between 2000m and pull-ups r = 0.37 (p <0.05). In group A, the results indicate that the dominant type of motor is a high-speed-endurance model (26.6%), which reached speed V = 1,42m/s in overcoming ASET. In Group B, there was type of motor speed-strength (20.6%), which reached speed of V = 1.45m/s in overcoming ASET. This confirms the correlation between ASET and pull-ups r = 0.56 (p <0.005). Examined cadets who were having one dominant characteristic achieved worse results is ASET. The best results from all examined cadets in overcoming ASET had the type of motor endurance-strength, in group A endurance-speed model and in group B type of speed-strength

Keywords: ASET, Aviation Synthetic Efficiency Test, motor skills, physical tests, pilot-cadets

Procedia PDF Downloads 269
1918 Feel Good - Think Positive: A Positive Psychology Intervention for Enhancing Optimism and Hope in Elementary School Students - A Pilot Study

Authors: Stephanos Vassilopoulos

Abstract:

Positive psychology interventions (PPIs) targeting optimism and hope in young children are scarce. This pilot study explored the feasibility and promise of the “Feel Good - Think Positive” intervention, a brief, manualized, multicomponent group PPI for young children. The intervention aimed to enhance participants’ optimism, hope, and self-esteem while reducing their anxiety levels. Forty-one students (Mage = 9.68, SD = 1.64) participated in the intervention and provided data on optimism, hope, self-esteem, and anxiety at baseline and after the intervention was concluded. Analyses showed a significant increase in optimism and self-esteem and a significant decrease in anxiety. However, no change was observed in hope levels. The results complement previous studies of school-based PPIs and hint at the promise of designing feasible interventions that can be easily incorporated into school curriculum and produce both a promoting and a remedial effect in young children.

Keywords: positive psychology intervention, positive education, hope, children

Procedia PDF Downloads 70
1917 A Community Solution to Address Extensive Nitrate Contamination in the Lower Yakima Valley Aquifer

Authors: Melanie Redding

Abstract:

Historic widespread nitrate contamination of the Lower Yakima Valley aquifer in Washington State initiated a community-based effort to reduce nitrate concentrations to below-drinking water standards. This group commissioned studies on characterizing local nitrogen sources, deep soil assessments, drinking water, and assessing nitrate concentrations at the water table. Nitrate is the most prevalent groundwater contaminant with common sources from animal and human waste, fertilizers, plants and precipitation. It is challenging to address groundwater contamination when common sources, such as agriculture, on-site sewage systems, and animal production, are widespread. Remediation is not possible, so mitigation is essential. The Lower Yakima Valley is located over 175,000 acres, with a population of 56,000 residents. Approximately 25% of the population do not have access to safe, clean drinking water, and 20% of the population is at or below the poverty level. Agriculture is the primary economic land-use activity. Irrigated agriculture and livestock production make up the largest percentage of acreage and nitrogen load. Commodities include apples, grapes, hops, dairy, silage corn, triticale, alfalfa and cherries. These commodities are important to the economic viability of the residents of the Lower Yakima Valley, as well as Washington State. Mitigation of nitrate in groundwater is challenging. The goal is to ensure everyone has safe drinking water. There are no easy remedies due to the extensive and pervasiveness of the contamination. Monitoring at the water table indicates that 45% of the 30 spatially distributed monitoring wells exceeded the drinking water standard. This indicates that there are multiple sources that are impacting water quality. Washington State has several areas which have extensive groundwater nitrate contamination. The groundwater in these areas continues to degrade over time. However, the Lower Yakima Valley is being successful in addressing this health issue because of the following reasons: the community is engaged and committed; there is one common goal; there has been extensive public education and outreach to citizens; and generating credible data using sound scientific methods. Work in this area is continuing as an ambient groundwater monitoring network is established to assess the condition of the aquifer over time. Nitrate samples are being collected from 170 wells, spatially distributed across the aquifer. This research entails quarterly sampling for two years to characterize seasonal variability and then continue annually afterward. This assessment will provide the data to statistically determine trends in nitrate concentrations across the aquifer, over time. Thirty-three of these wells are monitoring wells that are screened across the aquifer. The water quality from these wells are indicative of activities at the land surface. Additional work is being conducted to identify land use management practices that are effective in limiting nitrate migration through the soil column. Tracking nitrate in the soil column every season is an important component of bridging land-use practices with the fate and transport of nitrate through the subsurface. Patience, tenacity, and the ability to think outside the box are essential for dealing with widespread nitrate contamination of groundwater.

Keywords: community, groundwater, monitoring, nitrate

Procedia PDF Downloads 154
1916 Preliminary Assessment of Arsenic Levels in Farmland Soils of Bokkos Local Government Area, Plateau State Nigeria

Authors: W. M. Buba, J. G. Nangbes, J. P. Butven

Abstract:

This research was undertaken to evolve community based awareness on the arsenic contamination from agricultural practices in Communities of Bokkos local government area. Contaminated farmland soil samples were collected from the surface for tailings and at various depths (50, 100, 150 cm intervals) in eight holes drilled in each farm at different locations using hand auger. A total of sixty- four (64) soil samples were collected from eight (8) different communities. A standard titrimetric method was applied for the determination of arsenic. It was found that the average concentration of arsenic in the surface soil (0-150cm) for the entire study areas was 0.0525mg/kg with range 0.0425 -0.0601mg/kg which is well above the recommended the soil to plant concentration guideline range of 2.3 – 4.3 x10-4 mg/kg value. This indicates that the arsenic concentration in the study areas does pose health risk for agricultural practices via potential bioaccumulation in plant food crops. However, some risks measures could follow the arsenic occurrence through direct exposure such as those resulting from the inhalation, oral or dermal intake of arsenic during agricultural practices and in the course of stay on the contaminated soil.

Keywords: agrochemicals, arsenic, bokkos, contamination, soil

Procedia PDF Downloads 324
1915 Terrorism in German and Italian Press Headlines: A Cognitive Linguistic Analysis of Conceptual Metaphors

Authors: Silvia Sommella

Abstract:

Islamic terrorism has gained a lot of media attention in the last years also because of the striking increase of terror attacks since 2014. The main aim of this paper is to illustrate the phenomenon of Islamic terrorism by applying frame semantics and metaphor analysis to German and Italian press headlines of the two online weekly publications Der Spiegel and L’Espresso between 2014 and 2019. This study focuses on how media discourse – through the use of conceptual metaphors – let arise in people a particular reception of the phenomenon of Islamic terrorism and accept governmental strategies and policies, perceiving terrorists as evildoers, as the members of an uncivilised group ‘other’ opposed to the civilised group ‘we’: two groups that are perceived as opposed. The press headlines are analyzed on the basis of the cognitive linguistics, namely Lakoff and Johnson’s conceptualization of metaphor to distinguish between abstract conceptual metaphors and specific metaphorical expressions. The study focuses on the contexts, frames, and metaphors. The method adopted in this study is Konerding’s frame semantics (1993). Konerding carried out on the basis of dictionaries – in particular of the Duden Deutsches Universalwörterbuch (Duden Universal German Dictionary) – in a pilot study of a lexicological work hyperonym reduction of substantives, working exclusively with nouns because hyperonyms usually occur in the dictionary meaning explanations as for the main elements of nominal phrases. The results of Konerding’s hyperonym type reduction is a small set of German nouns and they correspond to the highest hyperonyms, the so-called categories, matrix frames: ‘object’, ‘organism’, ‘person/actant’, ‘event’, ‘action/interaction/communication’, ‘institution/social group’, ‘surroundings’, ‘part/piece’, ‘totality/whole’, ‘state/property’. The second step of Konerding’s pilot study consists in determining the potential reference points of each category so that conventionally expectable routinized predications arise as predictors. Konerding found out which predicators the ascertained noun types can be linked to. For the purpose of this study, metaphorical expressions will be listed and categorized in conceptual metaphors and under the matrix frames that correspond to the particular conceptual metaphor. All of the corpus analyses are carried out using Ant Conc corpus software. The research will verify some previously analyzed metaphors such as TERRORISM AS WAR, A CRIME, A NATURAL EVENT, A DISEASE and will identify new conceptualizations and metaphors about Islamic terrorism, especially in the Italian language like TERRORISM AS A GAME, WARES, A DRAMATIC PLAY. Through the identification of particular frames and their construction, the research seeks to understand the public reception and the way to handle the discourse about Islamic terrorism in the above mentioned online weekly publications under a contrastive analysis in the German and in the Italian language.

Keywords: cognitive linguistics, frame semantics, Islamic terrorism, media

Procedia PDF Downloads 158
1914 Assessment of Milk Quality in Vehari: Evaluation of Public Health Concerns

Authors: Muhammad Farhan Saeed, Waheed Aslam Khan, Muhammad Nadeem, Iftikhar Ahmad, Zakir Ali

Abstract:

Milk is an important and fundamental nutrition source of human diet. In Pakistan, the milk used by the consumer is of low quality and is often contaminated due to the lack of quality controls. Mycotoxins produced from molds which contaminate the agriculture commodities of animal feed. Mycotoxins are poisons which affect the animals when they consume contaminated feeds. Aflatoxin AFM1 is naturally occurring form of mycotoxins in milk which is carcinogenic. To assess public awareness regarding milk Aflatoxin contamination, a population-based survey using a questionnaire was carried out from general public and from farmers of both rural and urban areas. It was revealed from the data that people of rural area were more satisfied about quality of available milk but the awareness level about milk contamination was found lower in both areas. Total 297 samples of milk were collected from rural (n=156) and urban (n=141) areas of district Vehari during June-July 2015. Milk samples were collected from three different point sources; farmer, milkman and milkshop. These point sources had three types of dairy milk including cow milk, buffalo milk and mixed milk. After performing ELISA test 18 samples with positive ELISA results were maintain per source for further analysis for aflatoxin M1 (AFM1) by High Performance Liquid Chromatography (HPLC). Higher percentages of samples were found exceeding the permissible limit for urban area. In rural area about 15% samples and from urban area about 35% samples were exceeded the permissible limit of AFM1 with 0.05µg/kg set by European Union. From urban areas about 55% of buffalo, 33% of cows and 17% of mixed milk samples were exceeded the permissible AFM1 level as compared with 17%, 11% and 17% for milk samples from rural areas respectively. Samples from urban areas 33%, 44% and 28% were exceeded the permissible AFM1 level for farmer, milkman and of milk shop respectively as compared with 28% and 17% of farmer and milkman’s samples from rural areas respectively. The presence of AFM1 in milk samples demands the implementation of strict regulations and also urges the need for continuous monitoring of milk and milk products in order to minimize the health hazards. Regulations regarding aflatoxins contamination and adulteration should be strictly imposed to prevent health problems related to milk quality. Permissible limits for aflatoxin should be enforced strongly in Pakistan so that economic loss due to aflatoxin contamination can be reduced.

Keywords: Vehari, aflatoxins AFM1, milk, HPLC

Procedia PDF Downloads 339
1913 Central Composite Design for the Optimization of Fenton Process Parameters in Treatment of Hydrocarbon Contaminated Soil using Nanoscale Zero-Valent Iron

Authors: Ali Gharaee, Mohammad Reza Khosravi Nikou, Bagher Anvaripour, Ali Asghar Mahjoobi

Abstract:

Soil contamination by petroleum hydrocarbon (PHC) is a major concern facing the oil and gas industry. Particularly, condensate liquids have been found to contaminate soil at gas production sites. The remediation of PHCs is a difficult challenge due to the complex interaction between contaminant and soil. A study has been conducted to enhance degradation of PHCs by Fenton oxidation and using Nanoscale Zero-Valent Iron as catalyst. The various operating conditions such as initial H2O2 concentration, nZVI dosage, reaction time, and initial contamination dose were investigated. Central composite design was employed to optimize and analyze the effect of operational parameters on the PHC removal efficiency. It was found that optimal molar ratio of H2O2/Fe0 was 58 with maximum TPH removal of 84% and 3hr reaction time and initial contaminant concentration was 15g oil /kg soil. Based on the results, combination of Nanoscale ZVI and Fenton has proved to be a promising remedy for contaminated soil.

Keywords: oil contaminated Soil, fenton oxidation, zero valent iron nano-particles

Procedia PDF Downloads 265
1912 Improving Cryptographically Generated Address Algorithm in IPv6 Secure Neighbor Discovery Protocol through Trust Management

Authors: M. Moslehpour, S. Khorsandi

Abstract:

As transition to widespread use of IPv6 addresses has gained momentum, it has been shown to be vulnerable to certain security attacks such as those targeting Neighbor Discovery Protocol (NDP) which provides the address resolution functionality in IPv6. To protect this protocol, Secure Neighbor Discovery (SEND) is introduced. This protocol uses Cryptographically Generated Address (CGA) and asymmetric cryptography as a defense against threats on integrity and identity of NDP. Although SEND protects NDP against attacks, it is computationally intensive due to Hash2 condition in CGA. To improve the CGA computation speed, we parallelized CGA generation process and used the available resources in a trusted network. Furthermore, we focused on the influence of the existence of malicious nodes on the overall load of un-malicious ones in the network. According to the evaluation results, malicious nodes have adverse impacts on the average CGA generation time and on the average number of tries. We utilized a Trust Management that is capable of detecting and isolating the malicious node to remove possible incentives for malicious behavior. We have demonstrated the effectiveness of the Trust Management System in detecting the malicious nodes and hence improving the overall system performance.

Keywords: CGA, ICMPv6, IPv6, malicious node, modifier, NDP, overall load, SEND, trust management

Procedia PDF Downloads 170
1911 Hybridization of Mathematical Transforms for Robust Video Watermarking Technique

Authors: Harpal Singh, Sakshi Batra

Abstract:

The widespread and easy accesses to multimedia contents and possibility to make numerous copies without loss of significant fidelity have roused the requirement of digital rights management. Thus this problem can be effectively solved by Digital watermarking technology. This is a concept of embedding some sort of data or special pattern (watermark) in the multimedia content; this information will later prove ownership in case of a dispute, trace the marked document’s dissemination, identify a misappropriating person or simply inform user about the rights-holder. The primary motive of digital watermarking is to embed the data imperceptibly and robustly in the host information. Extensive counts of watermarking techniques have been developed to embed copyright marks or data in digital images, video, audio and other multimedia objects. With the development of digital video-based innovations, copyright dilemma for the multimedia industry increases. Video watermarking had been proposed in recent years to serve the issue of illicit copying and allocation of videos. It is the process of embedding copyright information in video bit streams. Practically video watermarking schemes have to address some serious challenges as compared to image watermarking schemes like real-time requirements in the video broadcasting, large volume of inherently redundant data between frames, the unbalance between the motion and motionless regions etc. and they are particularly vulnerable to attacks, for example, frame swapping, statistical analysis, rotation, noise, median and crop attacks. In this paper, an effective, robust and imperceptible video watermarking algorithm is proposed based on hybridization of powerful mathematical transforms; Fractional Fourier Transform (FrFT), Discrete Wavelet transforms (DWT) and Singular Value Decomposition (SVD) using redundant wavelet. This scheme utilizes various transforms for embedding watermarks on different layers by using Hybrid systems. For this purpose, the video frames are portioned into layers (RGB) and the watermark is being embedded in two forms in the video frames using SVD portioning of the watermark, and DWT sub-band decomposition of host video, to facilitate copyright safeguard as well as reliability. The FrFT orders are used as the encryption key that allows the watermarking method to be more robust against various attacks. The fidelity of the scheme is enhanced by introducing key generation and wavelet based key embedding watermarking scheme. Thus, for watermark embedding and extraction, same key is required. Therefore the key must be shared between the owner and the verifier via some safe network. This paper demonstrates the performance by considering different qualitative metrics namely Peak Signal to Noise ratio, Structure similarity index and correlation values and also apply some attacks to prove the robustness. The Experimental results are presented to demonstrate that the proposed scheme can withstand a variety of video processing attacks as well as imperceptibility.

Keywords: discrete wavelet transform, robustness, video watermarking, watermark

Procedia PDF Downloads 211
1910 The Neurofunctional Dissociation between Animal and Tool Concepts: A Network-Based Model

Authors: Skiker Kaoutar, Mounir Maouene

Abstract:

Neuroimaging studies have shown that animal and tool concepts rely on distinct networks of brain areas. Animal concepts depend predominantly on temporal areas while tool concepts rely on fronto-temporo-parietal areas. However, the origin of this neurofunctional distinction for processing animal and tool concepts remains still unclear. Here, we address this question from a network perspective suggesting that the neural distinction between animals and tools might reflect the differences in their structural semantic networks. We build semantic networks for animal and tool concepts derived from McRae and colleagues’s behavioral study conducted on a large number of participants. These two networks are thus analyzed through a large number of graph theoretical measures for small-worldness: centrality, clustering coefficient, average shortest path length, as well as resistance to random and targeted attacks. The results indicate that both animal and tool networks have small-world properties. More importantly, the animal network is more vulnerable to targeted attacks compared to the tool network a result that correlates with brain lesions studies.

Keywords: animals, tools, network, semantics, small-worls, resilience to damage

Procedia PDF Downloads 519
1909 Security Issues in Long Term Evolution-Based Vehicle-To-Everything Communication Networks

Authors: Mujahid Muhammad, Paul Kearney, Adel Aneiba

Abstract:

The ability for vehicles to communicate with other vehicles (V2V), the physical (V2I) and network (V2N) infrastructures, pedestrians (V2P), etc. – collectively known as V2X (Vehicle to Everything) – will enable a broad and growing set of applications and services within the intelligent transport domain for improving road safety, alleviate traffic congestion and support autonomous driving. The telecommunication research and industry communities and standardization bodies (notably 3GPP) has finally approved in Release 14, cellular communications connectivity to support V2X communication (known as LTE – V2X). LTE – V2X system will combine simultaneous connectivity across existing LTE network infrastructures via LTE-Uu interface and direct device-to-device (D2D) communications. In order for V2X services to function effectively, a robust security mechanism is needed to ensure legal and safe interaction among authenticated V2X entities in the LTE-based V2X architecture. The characteristics of vehicular networks, and the nature of most V2X applications, which involve human safety makes it significant to protect V2X messages from attacks that can result in catastrophically wrong decisions/actions include ones affecting road safety. Attack vectors include impersonation attacks, modification, masquerading, replay, MiM attacks, and Sybil attacks. In this paper, we focus our attention on LTE-based V2X security and access control mechanisms. The current LTE-A security framework provides its own access authentication scheme, the AKA protocol for mutual authentication and other essential cryptographic operations between UEs and the network. V2N systems can leverage this protocol to achieve mutual authentication between vehicles and the mobile core network. However, this protocol experiences technical challenges, such as high signaling overhead, lack of synchronization, handover delay and potential control plane signaling overloads, as well as privacy preservation issues, which cannot satisfy the adequate security requirements for majority of LTE-based V2X services. This paper examines these challenges and points to possible ways by which they can be addressed. One possible solution, is the implementation of the distributed peer-to-peer LTE security mechanism based on the Bitcoin/Namecoin framework, to allow for security operations with minimal overhead cost, which is desirable for V2X services. The proposed architecture can ensure fast, secure and robust V2X services under LTE network while meeting V2X security requirements.

Keywords: authentication, long term evolution, security, vehicle-to-everything

Procedia PDF Downloads 149
1908 Reading Literacy and Methods of Improving Reading

Authors: Iva Košek Bartošová, Andrea Jokešová, Eva Kozlová, Helena Matějová

Abstract:

The paper presents results of a research team from Faculty of Education, University of Hradec Králové in the Czech Republic. It introduces with the most reading methods used in the 1st classes of a primary school and presents results of a pilot research focused on mastering reading techniques and the quality of reading comprehension of pupils in the first half of a school year during training in teaching reading by an analytic-synthetic method and by a genetic method. These methods of practicing reading skills are the most used ones in the Czech Republic. During the school year 2015/16 there has been a measurement made of two groups of pupils of the 1st year and monitoring of quantitative and qualitative parameters of reading pupils’ outputs by several methods. Both of these methods are based on different theoretical basis and each of them has a specific educational and methodical procedure. This contribution represents results during a piloting project and draws pilot conclusions which will be verified in the subsequent broader research at the end of the school year of the first class of primary school.

Keywords: analytic-synthetic method of reading, genetic method of reading, reading comprehension, reading literacy, reading methods, reading speed

Procedia PDF Downloads 235
1907 The Causes and Consequences of Anti-muslim Prejudice: Evidence from a National Scale Longitudinal Study in New Zealand

Authors: Aarif Rasheed, Joseph Bulbulia

Abstract:

Western democracies exhibit signs of distinctive anti-Muslim prejudice, but little is known about its causes and effects on Muslim minorities. Here, drawing on nine years of responses from a nationally representative longitudinal sample of New Zealanders (New Zealand Attitudes and Values Study, N > 31,000), we systematically investigate the demographic and ideological predictors of factors that predict both positive and negative change in Muslim attitudes. First, we find that that education, moderate and liberal political ideology, and positive views about religion predict greater Muslim acceptance. Second, we find a there though there is a general trend for increasing acceptance over nine years, we find evidence of increasing extremism at the margins. Third, focusing on the Muslim sub-sample and comparing it to other religious sub-groups, we find substantially higher reports of perceived anti-religious prejudice. Collectively, these results point to serious challenges to the health of New Zealand as a democracy where people can worship freely without discrimination. Finally, we find consistency in our responses with the reported experiences of victims of the Christchurch attacks, in terms of harassment, assault, slurs, and other hostile behaviour both before and after the attacks.

Keywords: democracy, longitudinal, Muslim, panel data, prejudice

Procedia PDF Downloads 122
1906 The Output Fallacy: An Investigation into Input, Noticing, and Learners’ Mechanisms

Authors: Samantha Rix

Abstract:

The purpose of this research paper is to investigate the cognitive processing of learners who receive input but produce very little or no output, and who, when they do produce output, exhibit a similar language proficiency as do those learners who produced output more regularly in the language classroom. Previous studies have investigated the benefits of output (with somewhat differing results); therefore, the presentation will begin with an investigation of what may underlie gains in proficiency without output. Consequently, a pilot study was designed and conducted to gain insight into the cognitive processing of low-output language learners looking, for example, at quantity and quality of noticing. This will be carried out within the paradigm of action classroom research, observing and interviewing low-output language learners in an intensive English program at a small Midwest university. The results of the pilot study indicated that autonomy in language learning, specifically utilizing strategies such self-monitoring, self-talk, and thinking 'out-loud', were crucial in the development of language proficiency for academic-level performance. The presentation concludes with an examination of pedagogical implication for classroom use in order to aide students in their language development.

Keywords: cognitive processing, language learners, language proficiency, learning strategies

Procedia PDF Downloads 452
1905 Risk Prediction Based on Heavy Metal Distribution in Groundwater

Authors: Rama Bhattacharyya, S. N. Ojha, Umesh K. Singh

Abstract:

Anthropogenic control on groundwater chemistry has emerged as a critical concern now-a-days, especially in the industrial areas. In view of this, a comprehensive study on the distribution of the heavy metal in the groundwater was conducted to investigate the impact of urbanization in the aquatic media. Water samples either from well or borehole from Fourty different sites in and around, Durgapur, West Bengal were collected for this purpose. The samples were analyzed using Inductively Coupled Plasma Mass Spectrometry (ICP-MS) for Calcium (Ca), Cobalt (Co), Chromium (Cr), Copper (Cu), Iron (Fe), Potassium (K), Magnesium (Mg), Manganese (Mn), Sodium (Na), Nickel (Ni), Lead (Pb), Zinc (Zn) content and the levels were compared with WHO specified maximum contaminant level as well as permissible limits given by the Bureau of Indian Standards (BIS). The result obtained from the present study indicates a significant risk to the population of this important emerging ‘smart city’ of eastern India. Because of the toxicity of these metals and the fact that for many tube-wells, dug-wells and bore-wells are the only sources of the water supply for a major fraction of the population in this environment. In this study, an attempt has been made to develop metal contamination risk map.

Keywords: heavy metals, ground water, maximum contamination level, ICP-MS

Procedia PDF Downloads 196
1904 Accumulation of Pollutants, Self-Purification and Impact on Peripheral Urban Areas: A Case Study in Shantytowns in Argentina

Authors: N. Porzionato, M. Mantiñan, E. Bussi, S. Grinberg, R. Gutierrez, G. Curutchet

Abstract:

This work sets out to debate the tensions involved in the processes of contamination and self-purification in the urban space, particularly in the streams that run through the Buenos Aires metropolitan area. For much of their course, those streams are piped; their waters do not come into contact with the outdoors until they have reached deeply impoverished urban areas with high levels of environmental contamination. These are peripheral zones that, until thirty years ago, were marshlands and fields. They are now densely populated areas largely lacking in urban infrastructure. The Cárcova neighborhood, where this project is underway, is in the José León Suárez section of General San Martín country, Buenos Aires province. A stretch of José León Suarez canal crosses the neighborhood. Starting upstream, this canal carries pollutants due to the sewage and industrial waste released into it. Further downstream, in the neighborhood, domestic drainage is poured into the stream. In this paper, we formulate a hypothesis diametrical to the one that holds that these neighborhoods are the primary source of contamination, suggesting instead that in the stretch of the canal that runs through the neighborhood the stream’s waters are actually cleaned and the sediments accumulate pollutants. Indeed, the stretches of water that runs through these neighborhoods act as water processing plants for the metropolis. This project has studied the different organic-load polluting contributions to the water in a certain stretch of the canal, the reduction of that load over the course of the canal, and the incorporation of pollutants into the sediments. We have found that the surface water has considerable ability to self-purify, mostly due to processes of sedimentation and adsorption. The polluting load is accumulated in the sediments where that load stabilizes slowly by means of anaerobic processes. In this study, we also investigated the risks of sediment management and the use of the processes studied here in controlled conditions as tools of environmental restoration.

Keywords: bioremediation, pollutants, sediments, urban streams

Procedia PDF Downloads 423
1903 Growth of Algal Biomass in Laboratory and in Pilot-Scale Algal Photobioreactors in the Temperate Climate of Southern Ireland

Authors: Linda A. O’Higgins, Astrid Wingler, Jorge Oliveira

Abstract:

The growth of Chlorella vulgaris was characterized as a function of irradiance in a laboratory turbidostat (1 L) and compared to batch growth in sunlit modules (5–25 L) of the commercial Phytobag photobioreactor. The effects of variable sunlight and culture density were deconvoluted by a mathematical model. The analysis showed that algal growth was light-limited due to shading by external construction elements and due to light attenuation within the algal bags. The model was also used to predict maximum biomass productivity. The manipulative experiments and the model predictions were confronted with data from a production season of a 10m2 pilot-scale photobioreactor, Phytobag (10,000 L). The analysis confirmed light limitation in all three photobioreactors. An additional limitation of biomass productivity was caused by the nitrogen starvation that was used to induce lipid accumulation. Reduction of shading and separation of biomass and lipid production are proposed for future optimization.

Keywords: microalgae, batch cultivation, Chlorella vulgaris, Mathematical model, photobioreactor, scale-up

Procedia PDF Downloads 86