Search results for: flooding attacks
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 925

Search results for: flooding attacks

385 The Applicability of International Humanitarian Law to Non-State Actors

Authors: Yin Cheung Lam

Abstract:

In 1949, the ratification of the Geneva Conventions heralded the international community’s adoption of a new universal and non-discriminatory approach to human rights in situations of conflict. However, with the proliferation of international terrorism after the 9/11 attacks on the United States (U.S.), the international community’s uneven and contradictory implementations of international humanitarian law (IHL) questioned its agenda of universal human rights. Specifically, the derogation from IHL has never been so pronounced in the U.S. led ‘War on Terror’. While an extensive literature has ‘assessed the impact’ of the implementation of the Geneva Conventions, limited attention has been paid to interrogating the ways in which the Geneva Conventions and its resulting implementation have functioned to discursively reproduce certain understandings of human rights between states and non-state actors. Through a discursive analysis of the Geneva Conventions and the conceptualization of human rights in relation to terrorism, this thesis problematises the way in which the U.S. has understood and reproduced understandings of human rights. Using the U.S. ‘War on Terror’ as an example, it seeks to extend previous analyses of the U.S.’ practice of IHL through a qualitative discursive analysis of the human rights content that appears in the Geneva Conventions in addition to the speeches and policy documents on the ‘War on Terror’.

Keywords: discursive analysis, human rights, non-state actors, war on terror

Procedia PDF Downloads 593
384 Valuing Public Urban Street Trees and Their Environmental Spillover Benefits

Authors: Sofia F. Franco, Jacob Macdonald

Abstract:

This paper estimates the value of urban public street trees and their complementary and substitution value with other broader urban amenities and dis-amenities via the residential housing market. We estimate a lower bound value on a city’s tree amenities under instrumental variable and geographic regression discontinuity approaches with an application to Lisbon, Portugal. For completeness, we also explore how urban trees and in particular public street trees impact house prices across the city. Finally, we jointly analyze the planting and maintenance costs and benefits of urban street trees. The estimated value of all public trees in Lisbon is €8.84M. When considering specifically trees planted alongside roads and in public squares, the value is €6.06M or €126.64 per tree. This value is conditional on the distribution of trees in terms of their broader density, with higher effects coming from the overall greening of larger areas of the city compared to the greening of the direct neighborhood. Detrimental impacts are found when the number of trees is higher near street canyons, where they may exacerbate the stagnation of air pollution from traffic. Urban street trees also have important spillover benefits due to pollution mitigation around €6.21 million, or an additional €129.93 per tree. There are added benefits of €26.32 and €28.58 per tree in terms of flooding and heat mitigation, respectively. With significant resources and policies aimed at urban greening, the value obtained is shown to be important for discussions on the benefits of urban trees as compared to mitigation and abatement costs undertaken by a municipality.

Keywords: urban public goods, urban street trees, spatial boundary discontinuities, geospatial and remote sensing methods

Procedia PDF Downloads 154
383 Minimization of Denial of Services Attacks in Vehicular Adhoc Networking by Applying Different Constraints

Authors: Amjad Khan

Abstract:

The security of Vehicular ad hoc networking is of great importance as it involves serious life threats. Thus to provide secure communication amongst Vehicles on road, the conventional security system is not enough. It is necessary to prevent the network resources from wastage and give them protection against malicious nodes so that to ensure the data bandwidth availability to the legitimate nodes of the network. This work is related to provide a non conventional security system by introducing some constraints to minimize the DoS (Denial of services) especially data and bandwidth. The data packets received by a node in the network will pass through a number of tests and if any of the test fails, the node will drop those data packets and will not forward it anymore. Also if a node claims to be the nearest node for forwarding emergency messages then the sender can effectively identify the true or false status of the claim by using these constraints. Consequently the DoS(Denial of Services) attack is minimized by the instant availability of data without wasting the network resources.

Keywords: black hole attack, grey hole attack, intransient traffic tempering, networking

Procedia PDF Downloads 267
382 Comparative Life Cycle Assessment of an Extensive Green Roof with a Traditional Gravel-Asphalted Roof: An Application for the Lebanese Context

Authors: Makram El Bachawati, Rima Manneh, Thomas Dandres, Carla Nassab, Henri El Zakhem, Rafik Belarbi

Abstract:

A vegetative roof, also called a garden roof, is a "roofing system that endorses the growth of plants on a rooftop". Garden roofs serve several purposes for a building, such as embellishing the roofing system, enhancing the water management, and reducing the energy consumption and heat island effects. Lebanon is a Middle East country that lacks the use of a sustainable energy system. It imports 98% of its non-renewable energy from neighboring countries and suffers flooding during heavy rains. The objective of this paper is to determine if the implementation of vegetative roofs is effectively better than the traditional roofs for the Lebanese context. A Life Cycle Assessment (LCA) is performed in order to compare an existing extensive green roof to a traditional gravel-asphalted roof. The life cycle inventory (LCI) was established and modeled using the SimaPro 8.0 software, while the environmental impacts were classified using the IMPACT 2002+ methodology. Results indicated that, for the existing extensive green roof, the waterproofing membrane and the growing medium were the highest contributors to the potential environmental impacts. When comparing the vegetative to the traditional roof, results showed that, for all impact categories, the extensive green roof had the less environmental impacts.

Keywords: life cycle assessment, green roofs, vegatative roof, environmental impact

Procedia PDF Downloads 447
381 Geoplanology Modeling and Applications Engineering of Earth in Spatial Planning Related with Geological Hazard in Cilegon, Banten, Indonesia

Authors: Muhammad L. A. Dwiyoga

Abstract:

The condition of a spatial land in the industrial park needs special attention to be studied more deeply. Geoplanology modeling can help arrange area according to his ability. This research method is to perform the analysis of remote sensing, Geographic Information System, and more comprehensive analysis to determine geological characteristics and the ability to land on the area of research and its relation to the geological disaster. Cilegon is part of Banten province located in western Java, and the direction of the north is the Strait of Borneo. While the southern part is bordering the Indian Ocean. Morphology study area is located in the highlands to low. In the highlands of identified potential landslide prone, whereas in low-lying areas of potential flooding. Moreover, in the study area has the potential prone to earthquakes, this is due to the proximity of enough research to Mount Krakatau and Subdcution Zone. From the results of this study show that the study area has a susceptibility to landslides located around the District Waringinkurung. While the region as a potential flood areas in the District of Cilegon and surrounding areas. Based on the seismic data, this area includes zones with a range of magnitude 1.5 to 5.5 magnitude at a depth of 1 to 60 Km. As for the ability of its territory, based on the analyzes and studies carried out the need for renewal of the map Spatial Plan that has been made, considering the development of a fairly rapid Cilegon area.

Keywords: geoplanology, spatial plan, geological hazard, cilegon, Indonesia

Procedia PDF Downloads 485
380 Evaluation of Rehabilitation in Ischemic Stroke

Authors: Amirmohammad Dahouri

Abstract:

Each year, more than 795,000 individuals in the United States grieve a stroke, and by 2030, it is predictable that 4% of the U.S. people will have had a stroke. Ischemic stroke, accounting for about 80% of all strokes, is one of the main causes of disability. The goal of stroke rehabilitation is to help patients return to physical and mental functions and relearn the required aids to living everyday life. This flagging has an adverse effect on patients’ quality of life and affects their daily living activities. In recent years, the rehabilitation of ischemic stroke attractions more attention in the world. A review of the rudimentary perceptions of stroke rehabilitation that are price stressing to all specialists who delicacy patients with stroke. Ideas are made for patients on how to functionally manage daily activities after they have qualified for a stroke. It is vital for home healthcare clinicians to understand the process from acute events to medical equilibrium and rehabilitation to adaptation. Different sources such as Pub Med Google Scholar and science direct have been used and various contemporary articles in this era have been analyzed. The care plan must also foundation actual actions to protect against recurrent stroke, as stroke patients are generally at significant risk for further ischemic or hemorrhagic attacks. Here, we review evidence of rehabilitation in treating post-stroke impairment.

Keywords: rehabilitation, stroke, ischemic, hemorrhagic, brain

Procedia PDF Downloads 145
379 VANETs: Security Challenges and Future Directions

Authors: Jared Oluoch

Abstract:

Connected vehicles are equipped with wireless sensors that aid in Vehicle to Vehicle (V2V) and Vehicle to Infrastructure (V2I) communication. These vehicles will in the near future provide road safety, improve transport efficiency, and reduce traffic congestion. One of the challenges for connected vehicles is how to ensure that information sent across the network is secure. If security of the network is not guaranteed, several attacks can occur, thereby compromising the robustness, reliability, and efficiency of the network. This paper discusses existing security mechanisms and unique properties of connected vehicles. The methodology employed in this work is exploratory. The paper reviews existing security solutions for connected vehicles. More concretely, it discusses various cryptographic mechanisms available, and suggests areas of improvement. The study proposes a combination of symmetric key encryption and public key cryptography to improve security. The study further proposes message aggregation as a technique to overcome message redundancy. This paper offers a comprehensive overview of connected vehicles technology, its applications, its security mechanisms, open challenges, and potential areas of future research.

Keywords: VANET, connected vehicles, 802.11p, WAVE, DSRC, trust, security, cryptography

Procedia PDF Downloads 292
378 A Hybrid Digital Watermarking Scheme

Authors: Nazish Saleem Abbas, Muhammad Haris Jamil, Hamid Sharif

Abstract:

Digital watermarking is a technique that allows an individual to add and hide secret information, copyright notice, or other verification message inside a digital audio, video, or image. Today, with the advancement of technology, modern healthcare systems manage patients’ diagnostic information in a digital way in many countries. When transmitted between hospitals through the internet, the medical data becomes vulnerable to attacks and requires security and confidentiality. Digital watermarking techniques are used in order to ensure the authenticity, security and management of medical images and related information. This paper proposes a watermarking technique that embeds a watermark in medical images imperceptibly and securely. In this work, digital watermarking on medical images is carried out using the Least Significant Bit (LSB) with the Discrete Cosine Transform (DCT). The proposed methods of embedding and extraction of a watermark in a watermarked image are performed in the frequency domain using LSB by XOR operation. The quality of the watermarked medical image is measured by the Peak signal-to-noise ratio (PSNR). It was observed that the watermarked medical image obtained performing XOR operation between DCT and LSB survived compression attack having a PSNR up to 38.98.

Keywords: watermarking, image processing, DCT, LSB, PSNR

Procedia PDF Downloads 24
377 Review of Theories and Applications of Genetic Programing in Sediment Yield Modeling

Authors: Adesoji Tunbosun Jaiyeola, Josiah Adeyemo

Abstract:

Sediment yield can be considered to be the total sediment load that leaves a drainage basin. The knowledge of the quantity of sediments present in a river at a particular time can lead to better flood capacity in reservoirs and consequently help to control over-bane flooding. Furthermore, as sediment accumulates in the reservoir, it gradually loses its ability to store water for the purposes for which it was built. The development of hydrological models to forecast the quantity of sediment present in a reservoir helps planners and managers of water resources systems, to understand the system better in terms of its problems and alternative ways to address them. The application of artificial intelligence models and technique to such real-life situations have proven to be an effective approach of solving complex problems. This paper makes an extensive review of literature relevant to the theories and applications of evolutionary algorithms, and most especially genetic programming. The successful applications of genetic programming as a soft computing technique were reviewed in sediment modelling and other branches of knowledge. Some fundamental issues such as benchmark, generalization ability, bloat and over-fitting and other open issues relating to the working principles of GP, which needs to be addressed by the GP community were also highlighted. This review aim to give GP theoreticians, researchers and the general community of GP enough research direction, valuable guide and also keep all stakeholders abreast of the issues which need attention during the next decade for the advancement of GP.

Keywords: benchmark, bloat, generalization, genetic programming, over-fitting, sediment yield

Procedia PDF Downloads 427
376 Cyber Security in Russia: Offense, Defense and Strategy in Cyberspace

Authors: Da Eun Sung

Abstract:

In today’s world, cyber security has become an important international agenda. As the information age has arrived, the need for cyber defense against cyber attacks is mounting, and the significance of cyber cooperation in the international community is drawing attention. Through the course, international society has agreed that the institutionalization of international norms dealing with cyber space and cyber security is crucial ever. Nevertheless, the West, led by the United States of America, and 'the East', composed of Russia and China, have shown conflicting views on forming international norms and principles which would regulate and ward off the possible threats in cyber space. Thus, the international community hasn’t yet to reach an agreement on cyber security. In other words, the difference between both sides on the approach and understanding of principles, objects, and the definition has rendered such. Firstly, this dissertation will cover the Russia’s perception, strategy, and definition on cyber security through analyzing primary source. Then, it will delve into the two contrasting cyber security strategy between Russia and the US by comparing them. And in the conclusion, it will seek the possible solution for the cooperation in the field of cyber security. It is quite worthwhile to look into Russia’s views, which is the main counterpart to the US in this field, especially when the efforts to institutionalize cyber security by the US-led international community have met with their boundaries, and when the legitimacy of them have been challenged.

Keywords: cyber security, cyber security strategic, international relation in cyberspace, Russia

Procedia PDF Downloads 290
375 Models, Methods and Technologies for Protection of Critical Infrastructures from Cyber-Physical Threats

Authors: Ivan Župan

Abstract:

Critical infrastructure is essential for the functioning of a country and is designated for special protection by governments worldwide. Due to the increase in smart technology usage in every facet of the industry, including critical infrastructure, the exposure to malicious cyber-physical attacks has grown in the last few years. Proper security measures must be undertaken in order to defend against cyber-physical threats that can disrupt the normal functioning of critical infrastructure and, consequently the functioning of the country. This paper provides a review of the scientific literature of models, methods and technologies used to protect from cyber-physical threats in industries. The focus of the literature was observed from three aspects. The first aspect, resilience, concerns itself with the robustness of the system’s defense against threats, as well as preparation and education about potential future threats. The second aspect concerns security risk management for systems with cyber-physical aspects, and the third aspect investigates available testbed environments for testing developed models on scaled models of vulnerable infrastructure.

Keywords: critical infrastructure, cyber-physical security, smart industry, security methodology, security technology

Procedia PDF Downloads 57
374 A Blockchain-Based Protection Strategy against Social Network Phishing

Authors: Francesco Buccafurri, Celeste Romolo

Abstract:

Nowadays phishing is the most frequent starting point of cyber-attack vectors. Phishing is implemented both via email and social network messages. While a wide scientific literature exists which addresses the problem of contrasting email spam-phishing, no specific countermeasure has been so far proposed for phishing included into private messages of social network platforms. Unfortunately, the problem is severe. This paper proposes an approach against social network phishing, based on a non invasive collaborative information-sharing approach which leverages blockchain. The detection method works by filtering candidate messages, by distilling them by means of a distance-preserving hash function, and by publishing hashes over a public blockchain through a trusted smart contract (thus avoiding denial of service attacks). Phishing detection exploits social information embedded into social network profiles to identify similar messages belonging to disjoint contexts. The main contribution of the paper is to introduce a new approach to contrasting the problem of social network phishing, which, despite its severity, received little attention by both research and industry.

Keywords: phishing, social networks, information sharing, blockchain

Procedia PDF Downloads 313
373 Overview on Sustainable Coastal Protection Structures

Authors: Suresh Reddi, Mathew Leslie, Vishnu S. Das

Abstract:

Sustainable design is a prominent concept across all sectors of engineering and its importance is widely recognized within the Arabian Gulf region. Despite that sustainable or soft engineering options are not widely deployed in coastal engineering projects and a preference for utilizing ‘hard engineering’ solutions remain. The concept of soft engineering lies in “working together” with the nature to manage the coastline. This approach allows hard engineering options, such as breakwaters or sea walls, to be minimized or even eliminated altogether. Hard structures provide a firm barrier to wave energy or flooding, but in doing so they often have a significant impact on the natural processes of the coastline. This may affect the area locally or impact on neighboring zones. In addition, they often have a negative environmental impact and may create a sense of disconnect between the marine environment and local users. Soft engineering options, seek to protect the coastline by working in harmony with the natural process of sediment transport/budget. They often consider new habitat creation and creating usable spaces that will increase the sense of connection with nature. Often soft engineering options, where appropriately deployed can provide a low-maintenance, aesthetically valued, natural line of coastal protection. This paper deals with an overview of the following: The widely accepted soft engineering practices across the world; How this approach has been considered by Ramboll in some recent projects in Middle East and Asia; Challenges and barriers to use in using soft engineering options in the region; Way forward towards more widespread adoption.

Keywords: coastline, hard engineering, low maintenance, soft engineering options

Procedia PDF Downloads 121
372 Image Encryption Using Eureqa to Generate an Automated Mathematical Key

Authors: Halima Adel Halim Shnishah, David Mulvaney

Abstract:

Applying traditional symmetric cryptography algorithms while computing encryption and decryption provides immunity to secret keys against different attacks. One of the popular techniques generating automated secret keys is evolutionary computing by using Eureqa API tool, which got attention in 2013. In this paper, we are generating automated secret keys for image encryption and decryption using Eureqa API (tool which is used in evolutionary computing technique). Eureqa API models pseudo-random input data obtained from a suitable source to generate secret keys. The validation of generated secret keys is investigated by performing various statistical tests (histogram, chi-square, correlation of two adjacent pixels, correlation between original and encrypted images, entropy and key sensitivity). Experimental results obtained from methods including histogram analysis, correlation coefficient, entropy and key sensitivity, show that the proposed image encryption algorithms are secure and reliable, with the potential to be adapted for secure image communication applications.

Keywords: image encryption algorithms, Eureqa, statistical measurements, automated key generation

Procedia PDF Downloads 467
371 On Dynamic Chaotic S-BOX Based Advanced Encryption Standard Algorithm for Image Encryption

Authors: Ajish Sreedharan

Abstract:

Security in transmission and storage of digital images has its importance in today’s image communications and confidential video conferencing. Due to the increasing use of images in industrial process, it is essential to protect the confidential image data from unauthorized access. Advanced Encryption Standard (AES) is a well known block cipher that has several advantages in data encryption. However, it is not suitable for real-time applications. This paper presents modifications to the Advanced Encryption Standard to reflect a high level security and better image encryption. The modifications are done by adjusting the ShiftRow Transformation and using On Dynamic chaotic S-BOX. In AES the Substitute bytes, Shift row and Mix columns by themselves would provide no security because they do not use the key. In Dynamic chaotic S-BOX Based AES the Substitute bytes provide security because the S-Box is constructed from the key. Experimental results verify and prove that the proposed modification to image cryptosystem is highly secure from the cryptographic viewpoint. The results also prove that with a comparison to original AES encryption algorithm the modified algorithm gives better encryption results in terms of security against statistical attacks.

Keywords: advanced encryption standard (AES), on dynamic chaotic S-BOX, image encryption, security analysis, ShiftRow transformation

Procedia PDF Downloads 417
370 Blind Watermarking Using Discrete Wavelet Transform Algorithm with Patchwork

Authors: Toni Maristela C. Estabillo, Michaela V. Matienzo, Mikaela L. Sabangan, Rosette M. Tienzo, Justine L. Bahinting

Abstract:

This study is about blind watermarking on images with different categories and properties using two algorithms namely, Discrete Wavelet Transform and Patchwork Algorithm. A program is created to perform watermark embedding, extraction and evaluation. The evaluation is based on three watermarking criteria namely: image quality degradation, perceptual transparency and security. Image quality is measured by comparing the original properties with the processed one. Perceptual transparency is measured by a visual inspection on a survey. Security is measured by implementing geometrical and non-geometrical attacks through a pass or fail testing. Values used to measure the following criteria are mostly based on Mean Squared Error (MSE) and Peak Signal to Noise Ratio (PSNR). The results are based on statistical methods used to interpret and collect data such as averaging, z Test and survey. The study concluded that the combined DWT and Patchwork algorithms were less efficient and less capable of watermarking than DWT algorithm only.

Keywords: blind watermarking, discrete wavelet transform algorithm, patchwork algorithm, digital watermark

Procedia PDF Downloads 251
369 Combating Islamophobia in Australia: An Analysis of Six Legal and Holistic Strategies to Help Address Discrimination towards Muslims

Authors: F. Zamani Ashni, P. Gerber

Abstract:

In today's religious and political climate, Muslims find themselves the focus of much attention, often in the form of discrimination and vilification. There is a widely held belief that Islam and terrorism are inextricably intertwined. An anti-Muslim narrative has been shaping policy around the world for some time now. This study, which focuses on the experience of Muslims in Australia, provides guidance on legislative and other steps that can be taken by Australia to help address Islamophobia. This study provides a doctrinal analysis of the state, territory, and federal anti-discrimination laws in Australia. Using principles of statutory interpretation along aside an analysis of relevant jurisprudence, this study concludes that Australian anti-discrimination laws are ill-equipped to address modern-day Islamophobia. The study also finds that laws alone are insufficient to combat Islamophobia, and a more holistic approach is required. Six strategies are identified, which can, in combination, help to successfully respond to Islamophobia. In addition to legislative initiatives, combating Islamophobia requires Australia to promote inclusive human rights education, fair media coverage, strong leadership, integration of the Islamic community, and comprehensive documentation of anti-Muslim attacks.

Keywords: Australia, discrimination, Islamophobia, Muslim

Procedia PDF Downloads 118
368 Evaluating the Total Costs of a Ransomware-Resilient Architecture for Healthcare Systems

Authors: Sreejith Gopinath, Aspen Olmsted

Abstract:

This paper is based on our previous work that proposed a risk-transference-based architecture for healthcare systems to store sensitive data outside the system boundary, rendering the system unattractive to would-be bad actors. This architecture also allows a compromised system to be abandoned and a new system instance spun up in place to ensure business continuity without paying a ransom or engaging with a bad actor. This paper delves into the details of various attacks we simulated against the prototype system. In the paper, we discuss at length the time and computational costs associated with storing and retrieving data in the prototype system, abandoning a compromised system, and setting up a new instance with existing data. Lastly, we simulate some analytical workloads over the data stored in our specialized data storage system and discuss the time and computational costs associated with running analytics over data in a specialized storage system outside the system boundary. In summary, this paper discusses the total costs of data storage, access, and analytics incurred with the proposed architecture.

Keywords: cybersecurity, healthcare, ransomware, resilience, risk transference

Procedia PDF Downloads 117
367 Parameter Selection for Computationally Efficient Use of the Bfvrns Fully Homomorphic Encryption Scheme

Authors: Cavidan Yakupoglu, Kurt Rohloff

Abstract:

In this study, we aim to provide a novel parameter selection model for the BFVrns scheme, which is one of the prominent FHE schemes. Parameter selection in lattice-based FHE schemes is a practical challenges for experts or non-experts. Towards a solution to this problem, we introduce a hybrid principles-based approach that combines theoretical with experimental analyses. To begin, we use regression analysis to examine the parameters on the performance and security. The fact that the FHE parameters induce different behaviors on performance, security and Ciphertext Expansion Factor (CEF) that makes the process of parameter selection more challenging. To address this issue, We use a multi-objective optimization algorithm to select the optimum parameter set for performance, CEF and security at the same time. As a result of this optimization, we get an improved parameter set for better performance at a given security level by ensuring correctness and security against lattice attacks by providing at least 128-bit security. Our result enables average ~ 5x smaller CEF and mostly better performance in comparison to the parameter sets given in [1]. This approach can be considered a semiautomated parameter selection. These studies are conducted using the PALISADE homomorphic encryption library, which is a well-known HE library. The abstract goes here.

Keywords: lattice cryptography, fully homomorphic encryption, parameter selection, LWE, RLWE

Procedia PDF Downloads 129
366 Multisignature Schemes for Reinforcing Trust in Cloud Software-As-A-Service Services

Authors: Mustapha Hedabou, Ali Azougaghe, Ahmed Bentajer, Hicham Boukhris, Mourad Eddiwani, Zakaria Igarramen

Abstract:

Software-as-a-service (SaaS) is emerging as a dominant approach to delivering software. It encompasses a range of business, technical opportunities, issue, and challenges. Trustiness in the cloud services regarding the security and the privacy of the delivered data is the most critical issue with the SaaS model. In this paper, we survey the security concerns related to the SaaS model, and we propose the design of a trusted SaaS model that gives users more confidence into SaaS services by leveraging a trust in a neutral source code certifying authority. The proposed design is based on the use of the multisignature mechanism for signing the source code of the application service. In our model, the cloud provider acts as a root of trust by ensuring the integrity of the application service when it was running on its platform. The proposed design prevents insider attacks from tampering with application service before and after it was launched in a cloud provider platform.

Keywords: cloud computing, SaaS Platform, TPM, trustiness, code source certification, multi-signature schemes

Procedia PDF Downloads 256
365 Assessment of Green Infrastructure for Sustainable Urban Water Management

Authors: Suraj Sharma

Abstract:

Green infrastructure (GI) offers a contemporary approach for reducing the risk of flooding, improve water quality, and harvesting stormwater for sustainable use. GI promotes landscape planning to enhance sustainable development and urban resilience. However, the existing literature is lacking in ensuring the comprehensive assessment of GI performance in terms of ecosystem function and services for social, ecological, and economical system resilience. We propose a robust indicator set and fuzzy comprehensive evaluation (FCE) for quantitative and qualitative analysis for sustainable water management to assess the capacity of urban resilience. Green infrastructure in urban resilience water management system (GIUR-WMS) supports decision-making for GI planning through scenario comparisons with urban resilience capacity index. To demonstrate the GIUR-WMS, we develop five scenarios for five sectors of Chandigarh (12, 26, 14, 17, and 34) to test common type of GI (rain barrel, rain gardens, detention basins, porous pavements, and open spaces). The result shows the open spaces achieve the highest green infrastructure urban resilience index of 4.22/5. To implement the open space scenario in urban sites, suitable vacant can be converted to green spaces (example: forest, low impact recreation areas, and detention basins) GIUR-WMS is easy to replicate, customize and apply to cities of different sizes to assess environmental, social and ecological dimensions.

Keywords: green infrastructure, assessment, urban resilience, water management system, fuzzy comprehensive evaluation

Procedia PDF Downloads 128
364 A Framework for Blockchain Vulnerability Detection and Cybersecurity Education

Authors: Hongmei Chi

Abstract:

The Blockchain has become a necessity for many different societal industries and ordinary lives including cryptocurrency technology, supply chain, health care, public safety, education, etc. Therefore, training our future blockchain developers to know blockchain programming vulnerability and I.T. students' cyber security is in high demand. In this work, we propose a framework including learning modules and hands-on labs to guide future I.T. professionals towards developing secure blockchain programming habits and mitigating source code vulnerabilities at the early stages of the software development lifecycle following the concept of Secure Software Development Life Cycle (SSDLC). In this research, our goal is to make blockchain programmers and I.T. students aware of the vulnerabilities of blockchains. In summary, we develop a framework that will (1) improve students' skills and awareness of blockchain source code vulnerabilities, detection tools, and mitigation techniques (2) integrate concepts of blockchain vulnerabilities for IT students, (3) improve future IT workers’ ability to master the concepts of blockchain attacks.

Keywords: software vulnerability detection, hands-on lab, static analysis tools, vulnerabilities, blockchain, active learning

Procedia PDF Downloads 70
363 From Conflicts to Synergies between Mitigation and Adaptation Strategies to Climate Change: The Case of Lisbon Downtown 2010-2030

Authors: Nuno M. Pereira

Abstract:

In the last thirty years, European cities have been addressing global climate change and its local impacts by implementing mitigation and adaptation strategies. Lisbon Downtown is no exception with 10 plans under implementation since 2010 with completion scheduled for 2030 valued 1 billion euros of public investment. However, the gap between mitigation and adaptation strategies is not yet sufficiently studied alongside with its nuances- vulnerability and risk mitigation, resilience and adaptation. In Lisbon Downtown, these plans are being implemented separately, therefore compromising the effectiveness of public investment. The research reviewed the common ground of mitigation and adaptation strategies of the theoretical framework and analyzed the current urban development actions in Lisbon Downtown in order to identify potential conflicts and synergies. The empirical fieldwork supported by a sounding board of experts has been developed during two years and the results suggest that the largest public investment in Lisbon on flooding mitigation will conflict with the new Cruise ship terminal and old Downton building stock, therefore increasing risk and vulnerability factors. The study concludes that the Lisbon Downtown blue infrastructure plan should be redesigned in some areas in a trans- disciplinary and holistic approach and that the current theoretical framework on climate change should focus more on mitigation and adaptation synergies articulating the gray, blue and green infrastructures, combining old knowledge tested by resilient communities and new knowledge emerging from the digital era.

Keywords: adaptation, climate change, conflict, Lisbon Downtown, mitigation, synergy

Procedia PDF Downloads 180
362 Influence of Precipitation and Land Use on Extreme Flow in Prek Thnot River Basin of Mekong River in Cambodia

Authors: Chhordaneath Hen, Ty Sok, Ilan Ich, Ratboren Chan, Chantha Oeurng

Abstract:

The damages caused by hydrological extremes such as flooding have been severe globally, and several research studies indicated extreme precipitations play a crucial role. Cambodia is one of the most vulnerable countries exposed to floods and drought as consequences of climate impact. Prek Thnot River Basin in the southwest part of Cambodia, which is in the plate and plateau region and a part of the Mekong Delta, was selected to investigate the changes in extreme precipitation and hydrological extreme. Furthermore, to develop a statistical relationship between these phenomena in this basin from 1995 to 2020 using Multiple Linear Regression. The precipitation and hydrological extreme were assessed via the attributes and trends of rainfall patterns during the study periods. The extreme flow was defined as a dependent variable, while the independent variables are various extreme precipitation indices. The study showed that all extreme precipitations indices (R10, R20, R35, CWD, R95p, R99p, and PRCPTOT) had increasing decency. However, the number of rain days per year had a decreasing tendency, which can conclude that extreme rainfall was more intense in a shorter period of the year. The study showed a similar relationship between extreme precipitation and hydrological extreme and land use change association with hydrological extreme. The direct combination of land use and precipitation equals 37% of the flood causes in this river. This study provided information on these two causes of flood events and an understanding of expectations of climate change consequences for flood and water resources management.

Keywords: extreme precipitation, hydrological extreme, land use, land cover, Prek Thnot river basin

Procedia PDF Downloads 83
361 Sea-Level Rise and Shoreline Retreat in Tainan Coast

Authors: Wen-Juinn Chen, Yi-Phei Chou, Jou-Han Wang

Abstract:

Tainan coast is suffering from beach erosion, wave overtopping, and lowland flooding; though most of the shoreline has been protected by seawalls, they still threatened by sea level rise. For coastal resources developing, coastal land utilization, and to draft an appropriate mitigate strategy. Firstly; we must assess the impact of beach erosion under a different scenario of climate change. Here, we have used the meteorological data since 1898 to 2012 to prove that the Tainan area did suffer the impact of climate change. The result shows the temperature has been raised to about 1.7 degrees since 1989. Also, we analyzed the tidal data near the Tainan coast (Anpin site and Junjunn site), it shows sea level rising with a rate about 4.1~4.8 mm/year, this phenomenon will have serious impacts on Tainan coastal area, especially it will worsen coastal erosion. So we have used Bruun rule to calculate the shoreline retreated rate at every two decade period since 2012. Wave data and bottom sand diameter D50 were used to calculate the closure depth that will be used in Bruun formula and the active length of the profile is computed by the beach slope and Dean's equilibrium concept. After analysis, we found that in 2020, the shoreline will be retreated about 3.0 to 12 meters. The maximum retreat is happening at Chigu coast. In 2060, average shoreline retreated distance is 22m, but at Chigu and Tsenwen, shoreline may be backward retreat about 70m and will be reached about 130m at 2100, this will cause a lot of coastal land loss to the sea, protect and mitigate project must be quickly performed.

Keywords: sea level rise, shoreline, coastal erosion, climate change

Procedia PDF Downloads 388
360 Nature-based Solutions for Mitigating the Impact of Climate Change on Plants: Utilizing Encapsulated Plant Growth Regulators and Associative Microorganisms

Authors: Raana Babadi Fathipour

Abstract:

Over the past decades, the climatic CO2 concentration and worldwide normal temperature have been expanding, and this drift is anticipated to before long gotten to be more extreme. This situation of climate alter escalate abiotic stretch components (such as dry spell, flooding, saltiness, and bright radiation) that debilitate timberland and related environments as well as trim generation. These variables can contrarily influence plant development and advancement with a ensuing lessening in plant biomass aggregation and surrender, in expansion to expanding plant defenselessness to biotic stresses. As of late, biostimulants have ended up a hotspot as an viable and economical elective to reduce the negative impacts of stresses on plants. In any case, the larger part of biostimulants has destitute solidness beneath natural conditions, which leads to untimely debasement, shortening their organic movement. To unravel these bottlenecks, small scale- and nano-based definitions containing biostimulant atoms and/or microorganisms are picking up consideration as they illustrate a few points of interest over their routine details. In this survey, we center on the embodiment of plant development controllers and plant acquainted microorganisms as a technique to boost their application for plant assurance against abiotic stresses. We moreover address the potential restrictions and challenges confronted for the execution of this innovation, as well as conceivable outcomes with respect to future inquire about.

Keywords: bio stimulants, Seed priming, nano biotechnology, plant growth-promoting, rhizobacteria, plant growth regulators, microencapsulation

Procedia PDF Downloads 49
359 Intrusion Detection and Prevention System (IDPS) in Cloud Computing Using Anomaly-Based and Signature-Based Detection Techniques

Authors: John Onyima, Ikechukwu Ezepue

Abstract:

Virtualization and cloud computing are among the fast-growing computing innovations in recent times. Organisations all over the world are moving their computing services towards the cloud this is because of its rapid transformation of the organization’s infrastructure and improvement of efficient resource utilization and cost reduction. However, this technology brings new security threats and challenges about safety, reliability and data confidentiality. Evidently, no single security technique can guarantee security or protection against malicious attacks on a cloud computing network hence an integrated model of intrusion detection and prevention system has been proposed. Anomaly-based and signature-based detection techniques will be integrated to enable the network and its host defend themselves with some level of intelligence. The anomaly-base detection was implemented using the local deviation factor graph-based (LDFGB) algorithm while the signature-based detection was implemented using the snort algorithm. Results from this collaborative intrusion detection and prevention techniques show robust and efficient security architecture for cloud computing networks.

Keywords: anomaly-based detection, cloud computing, intrusion detection, intrusion prevention, signature-based detection

Procedia PDF Downloads 284
358 Investigating the Effect of the Shape of the Side Supports of the Gates of the Gotvand Reservoir Dam (from the Peak Overflows) on the Narrowing Coefficients

Authors: M. Abbasi

Abstract:

A spillway structure is used to pass excess water and floods from upstream or upstream to downstream or tributary. The spillway is considered one of the most key members of the dam, and the failure of many dams is attributed to the inefficiency of their spillway. Weirs should be selected as strong, reliable and high-performance structures, and weirs should be ready for use in all conditions and able to drain the flood so that we do not witness many casualties and financial losses when a flood occurs. The purpose of this study is to simulate the flow pattern passing over the peak spillway in order to optimize and adjust the height of the spillway walls. In this research, the effect of the shape of the side wings on the flow pattern over the peak spillways of the Gotvand reservoir dam was simulated and modelled using Flow3D software. In this research, side wings with rounded walls with six different approach angles were used. In addition, the different value of H/Hd was used to check the effect of the tank head. The results showed that with the constant H/Hd ratio and the increase of the approach angle of the side wing, the flow depth first decreases and then increases. These changes were the opposite regarding the depth average speed of the flow and the depth average concentration of the air entering the flow. At the same time, with the constant angle of approach of the side wing and with the increase of H/Hd ratio, the flow depth increases. In general, a correct understanding of the operation of overflows and a correct design can significantly reduce construction costs and solve flooding problems.

Keywords: effect of the shape, gotvand reservoir dam, narrowing coefficients, supports of the gates

Procedia PDF Downloads 49
357 Challenges of Solid Waste Management: Insights into the Management and Disposal Behaviour in Bauchi Metropolis of Northeast Nigeria

Authors: Salisu Abdullahi Dalhat, Ibrahim Aliyu Adamu, Abubakar Magaji, Ridwan Adebola Adedigba

Abstract:

The paper examined the municipal solid waste disposal methods and the environmental issues associated with the management of solid waste in Bauchi Metropolis, Nigeria. Data were obtained through the administration of structured questionnaires, oral interviews, and field observations, as well as the desk review method. The research identifies how the city was composed of both biodegradable and non-biodegradable materials, which are mostly paper waste, polythene, and plastic materials. Most of the solid wastes are left unattended for a long period. Poor design of dump sites, ineffective management of urban development plans, and poor enforcement of environmental laws were observed to be the major causes of poor waste management, and in a few areas where large waste containers are provided, they are hardly used by the community. The major environmental issues resulting from improper disposal and poor management of solid waste in the Bauchi metropolis are a nuisance of the waste to the environment, emitting of methane gas which contributes to climate change, blockage of drainages during rainstorms causing flooding within the metropolis as well as the decomposition of such waste leading to contamination of groundwater thereby leading to the cholera outbreak. Relevant stakeholders should, without compromise, design enforceable short, workable bye-laws; local supervisors should be stationed at the designated dump sites across the city as well as public enlightenment/sensitization campaigns could be the way out.

Keywords: biodegradable, contamination, cholera outbreak, solid waste, solid waste management, urban development

Procedia PDF Downloads 103
356 The Role of Phycoremediation in the Sustainable Management of Aquatic Pollution

Authors: Raymond Ezenweani, Jeffrey Ogbebor

Abstract:

The menace of aquatic pollution has become increasingly of great concern and the effects of this pollution as a result of anthropogenic activities cannot be over emphasized. Phycoremediation is the application of algal remediation technology in the removal of harmful products from the environment. Harmful products also known as pollutants are usually introduced into the environment through variety of processes such as industrial discharge, agricultural runoff, flooding, and acid rain. This work has to do with the capability of algae in the efficient removal of different pollutants, ranging from hydrocarbons, eutrophication, agricultural chemicals and wastes, heavy metals, foul smell from septic tanks or dumps through different processes such as bioconversion, biosorption, bioabsorption and biodecomposition. Algae are capable of bioconversion of environmentally persistent compounds to degradable compounds and also capable of putting harmful bacteria growth into check in waste water remediation. Numerous algal organisms such as Nannochloropsis spp, Chlorella spp, Tetraselmis spp, Shpaerocystics spp, cyanobacteria and different macroalgae have been tested by different researchers in laboratory scale and shown to have 100% efficiency in environmental remediation. Algae as a result of their photosynthetic capacity are also efficient in air cleansing and management of global warming by sequestering carbon iv oxide in air and converting it into organic carbon, thereby making food available for the other organisms in the higher trophic level of the aquatic food chain. Algae play major role in the sustenance of the aquatic ecosystem by their virtue of being photosynthetic. They are the primary producers and their role in environmental sustainability is remarkable.

Keywords: Algae , Pollutant, ., Phycoremediation, Aquatic, Sustainability

Procedia PDF Downloads 102