Search results for: hiding information in plain sight
11158 Impacts Of Salinity on Co2 Turnover in Some Gefara Soils of Libya
Authors: Fathi Elyaagubi
Abstract:
Salinization is a major threat to the productivity of agricultural land. The Gefara Plain located in the northwest of Libya; comprises about 80% of the total agricultural activity. The high water requirements for the populations and agriculture are depleting the groundwater aquifer, resulting in intrusion of seawater in the first few kilometers along the coast. Due to increasing salinity in the groundwater used for irrigation, the soils of the Gefara Plain are becoming increasingly saline. This research paper investigated the sensitivity of these soils to increased salinity using Co2 evolution as an integrating measure of soil function. Soil was collected from four sites located in the Gefara Plain, Almaya, Janzur, Gargaresh and Tajura. Soil collected from Tajura had the highest background salinity, and Janzur had the highest organic matter content. All of the soils had relatively low organic matter content, ranging between 0.49-%1.25. The cumulative rate of 14CO2 of added 14C-labelled Lolium shoots (Lolium perenne L.) to soils was decreased under effects of water containing different concentrations of NaCl at 20, 50, 70, 90, 150, and 200 mM compared to the control at any time of incubation in four sites.Keywords: soil salinity, gefara plain, organic matter, 14C-labelled lolium shoots
Procedia PDF Downloads 22111157 An Approach for Thermal Resistance Prediction of Plain Socks in Wet State
Authors: Tariq Mansoor, Lubos Hes, Vladimir Bajzik
Abstract:
Socks comfort has great significance in our daily life. This significance even increased when we have undergone a work of low or high activity. It causes the sweating of our body with different rates. In this study, plain socks with differential fibre composition were wetted to saturated level. Then after successive intervals of conditioning, these socks are characterized by thermal resistance in dry and wet states. Theoretical thermal resistance is predicted by using combined filling coefficients and thermal conductivity of wet polymers instead of dry polymer (fibre) in different models. By this modification, different mathematical models could predict thermal resistance at different moisture levels. Furthermore, predicted thermal resistance by different models has reasonable correlation range between (0.84 -0.98) with experimental results in both dry (lab conditions moisture) and wet states. "This work is supported by Technical University of Liberec under SGC-2019. Project number is 21314".Keywords: thermal resistance, mathematical model, plain socks, moisture loss rate
Procedia PDF Downloads 19711156 Alive Cemeteries with Augmented Reality and Semantic Web Technologies
Authors: Tamás Matuszka, Attila Kiss
Abstract:
Due the proliferation of smartphones in everyday use, several different outdoor navigation systems have become available. Since these smartphones are able to connect to the Internet, the users can obtain location-based information during the navigation as well. The users could interactively get to know the specifics of a particular area (for instance, ancient cultural area, Statue Park, cemetery) with the help of thus obtained information. In this paper, we present an Augmented Reality system which uses Semantic Web technologies and is based on the interaction between the user and the smartphone. The system allows navigating through a specific area and provides information and details about the sight an interactive manner.Keywords: augmented reality, semantic web, human computer interaction, mobile application
Procedia PDF Downloads 34011155 High Performance Electrocardiogram Steganography Based on Fast Discrete Cosine Transform
Authors: Liang-Ta Cheng, Ching-Yu Yang
Abstract:
Based on fast discrete cosine transform (FDCT), the authors present a high capacity and high perceived quality method for electrocardiogram (ECG) signal. By using a simple adjusting policy to the 1-dimentional (1-D) DCT coefficients, a large volume of secret message can be effectively embedded in an ECG host signal and be successfully extracted at the intended receiver. Simulations confirmed that the resulting perceived quality is good, while the hiding capability of the proposed method significantly outperforms that of existing techniques. In addition, our proposed method has a certain degree of robustness. Since the computational complexity is low, it is feasible for our method being employed in real-time applications.Keywords: data hiding, ECG steganography, fast discrete cosine transform, 1-D DCT bundle, real-time applications
Procedia PDF Downloads 19411154 Numerical Analysis of Heat Transfer Enhancement in Heat Exchangers by using Dimpled Tube
Authors: Bader Alhumaidi Alsubaei, Zahid H. Akash, Ali Imam Sunny
Abstract:
The heat transfer coefficient can be improved passively by using a dimpled surface on the tube. The contact area where heat transfer takes place can be enlarged and turbulence will be purposefully produced inside the duct; as a consequence, higher heat transfer quality will be achieved by employing an extended inner or outer surface (dimpled surface). In order to compare the rate and quality of heat transfer between a regular-shaped pipe and a dimpled pipe, a dimpled tube with a fixed dimple radius was created. Numerical analysis of the plain and dimpled pipes was performed using ANSYS. A 23% increase in Nusselt number was seen for dimpled tubes compared to plain tubes. In comparison to plain tubes, dimpled tubes' increase in thermal performance index was found to be between 8% and 10%. An increase in pressure drop of 18% was noted.Keywords: heat transfer, dimpled tube, CFD, ANSYS
Procedia PDF Downloads 10911153 An Optimal Steganalysis Based Approach for Embedding Information in Image Cover Media with Security
Authors: Ahlem Fatnassi, Hamza Gharsellaoui, Sadok Bouamama
Abstract:
This paper deals with the study of interest in the fields of Steganography and Steganalysis. Steganography involves hiding information in a cover media to obtain the stego media in such a way that the cover media is perceived not to have any embedded message for its unintended recipients. Steganalysis is the mechanism of detecting the presence of hidden information in the stego media and it can lead to the prevention of disastrous security incidents. In this paper, we provide a critical review of the steganalysis algorithms available to analyze the characteristics of an image stego media against the corresponding cover media and understand the process of embedding the information and its detection. We anticipate that this paper can also give a clear picture of the current trends in steganography so that we can develop and improvise appropriate steganalysis algorithms.Keywords: optimization, heuristics and metaheuristics algorithms, embedded systems, low-power consumption, steganalysis heuristic approach
Procedia PDF Downloads 29211152 Evaluation of Ecological Resilience in Mountain-plain Transition Zones: A Case Study of Dujiangyan City, Chengdu
Authors: Zhu Zhizheng, Huang Yong, Li Tong
Abstract:
In the context of land and space development and resource environmental protection. Due to its special geographical location, mountain-plain transition zones are limited by many factors such as topography, mountain forest protection, etc., and their ecology is also more sensitive, with the characteristics of disaster susceptibility and resource gradient. Taking Dujiangyan City, Chengdu as an example, this paper establishes resilience evaluation indicators on the basis of ecological suitability evaluation through the analysis of current situation data and relevant policies: water conservation evaluation, soil and water conservation evaluation, biodiversity evaluation, soil erosion sensitivity evaluation, etc. Based on GIS spatial analysis, the ecological suitability and resilience evaluation results of Dujiangyan city were obtained by disjunction operation. The ecological resilience level of Dujiangyan city was divided into three categories: high, medium and low, with an area ratio of 50.81%, 16.4% and 32.79%, respectively. This paper can provide ideas for solving the contradiction between man and land in the mountain-plain transition zones, and also provide a certain basis for the construction of regional ecological protection and the delineation of three zones and three lines.Keywords: urban and rural planning, ecological resilience, dujiangyan city, mountain-plain transition zones
Procedia PDF Downloads 11011151 A Preliminary Development of Virtual Sight-Seeing Website for Thai Temples on Rattanakosin Island
Authors: Pijitra Jomsri
Abstract:
Currently, the sources of cultures and tourist attractions are presented in online documentary form only. In order to make them more virtual, the researcher then collected and presented them in the form of Virtual Temple. The prototype, which is a replica of the actual location, was developed to the website and allows people who are interested in Rattanakosin Island can see in form of Panorama Pan View. By this way, anyone can access the data and appreciate the beauty of Rattanakosin Island in the virtual model like the real place. The result from the experiment showed that the levels of the knowledge on Thai temples in Rattanakosin Island increased; moreover, the users were highly satisfied with the systems. It can be concluded that virtual temples can support to publicize Thai arts, cultures and travels, as well as it can be utilized effectively.Keywords: virtual sight-seeing, Rattanakosin Island, Thai temples, virtual temple
Procedia PDF Downloads 33811150 Confidence Levels among UK Emergency Medicine Doctors in Performing Emergency Lateral Canthotomy: Should it be a Key Skill in the ED
Authors: Mohanad Moustafa, Julia Sieberer, Rhys Davies
Abstract:
Background: Orbital compartment syndrome (OCS) is a sight-threatening Ophthalmologic emergency caused by rapidly increasing intraorbital pressure. It is usually caused by a retrobulbar hemorrhage as a result of trauma. If not treated in a timely manner, permanent vision loss can occur. Lateral canthotomy and cantholysis are minor procedures that can be performed bedside with equipment available in the emergency department. The aim of the procedure is to release the attachments between the suspensory ligaments of the eye and the bony orbital wall, leading to a decrease in intraorbital pressure and preventing irreversible loss of vision. As most Ophthalmologists across the UK provide non-resident on-call service, this may lead to a delay in the treatment of OCS and stresses the need for Emergency medical staff to be able to provide this sight-saving procedure independently. Aim: To survey current training, experience, and confidence levels among Emergency Medicine doctors in performing emergency lateral canthotomy and to establish whether these variables change the following teaching from experienced ophthalmologists. RESULTS: Most EM registrars had little to no experience in performing lateral canthotomy and cantholysis. The majority of them showed a significant increase in their confidence to perform the procedure following ophthalmic-led teaching. The survey also showed that the registrars felt such training should be added to/part of the EM curriculum. Conclusion: The involvement of Ophthalmologists in the teaching of EM doctors to recognise and treat OCS independently may prevent delays in treatment and reduce the risk of permanent sight loss. This project showed potential in improving patient care and will lead to a National Survey of EM doctors across the UK.Keywords: lateral canthotomy, retrobulbar hemorrhage, Ophthalmology, orbital compartment syndrome, sight loss, blindness
Procedia PDF Downloads 9811149 The Effect of the Pronunciation of Emphatic Sounds on Perceived Masculinity/Femininity
Authors: M. Sayyour, M. Abdulkareem, O. Osman, S. Salmeh
Abstract:
Emphatic sounds in Arabic are /tˤ/, /sˤ/, /dˤ/, and /ðˤ/. They involve a secondary articulation in the pharynx area as opposed to their counterparts: /t/,/s/,/d/and /ð/. Although they are present in most Arabic dialects, some dialects have lost this class as a historical development, such as Maltese Arabic. It has been found that there is a difference in the pronunciation of these emphatic sounds between the two genders, arguing that males tend to produce more evident emphasis than females. This study builds on these studies by trying to investigate whether listeners perceive fully emphatic sounds as more masculine and less emphatic sounds as more feminine. Furthermore, the study aims to find out which is more important in this perception process: the emphatic consonant itself or the vowel following it. To test this, natural and manipulated tokens of two male and two female speakers were used. The natural tokens include words that have emphatic consonant and emphatic vowel and tokens that have plain consonant and plain vowel. The manipulated tokens include words that have emphatic consonant but central vowel and plain consonant followed by the same central vowel. These manipulated tokens allow us to see whether the consonant will still affect the perception even if the vowel is controlled. Another group of words that contained no emphatic sounds was used as a control group. The total number of tokens (natural, manipulated, and control) are 160 tokens. After that, 60 university students (30 males and 30 females) listened to these tokens and responded by choosing a specific character that they think is likely to produce each token. The characters’ descriptions are carefully written with two degrees of femininity and two degrees of masculinity. The preliminary results for the femininity level showed that the highest degree of femininity was for tokens that contain a plain consonant and a plain vowel. The lowest level of femininity was given for tokens that have fully emphatic consonant and vowel. For the manipulated tokens that contained plain consonant and central vowel, the femininity degree was high which indicates that the consonant is more important than the vowel, while for the manipulated tokens that contain emphatic consonant and a central vowel, the femininity level was higher than that for the tokens that have emphatic consonant and emphatic vowel, which indicates that the vowel is more important for the perception of emphatic consonants. These results are interpreted in light of feminist linguistic theories, linguistic expectations, performed gender and linguistic change theories.Keywords: Emphatic sounds, gender studies, perception, sociophonetics
Procedia PDF Downloads 38211148 Evaluation of Satellite and Radar Rainfall Product over Seyhan Plain
Authors: Kazım Kaba, Erdem Erdi, M. Akif Erdoğan, H. Mustafa Kandırmaz
Abstract:
Rainfall is crucial data source for very different discipline such as agriculture, hydrology and climate. Therefore rain rate should be known well both spatial and temporal for any area. Rainfall is measured by using rain-gauge at meteorological ground stations traditionally for many years. At the present time, rainfall products are acquired from radar and satellite images with a temporal and spatial continuity. In this study, we investigated the accuracy of these rainfall data according to rain-gauge data. For this purpose, we used Adana-Hatay radar hourly total precipitation product (RN1) and Meteosat convective rainfall rate (CRR) product over Seyhan plain. We calculated daily rainfall values from RN1 and CRR hourly precipitation products. We used the data of rainy days of four stations located within range of the radar from October 2013 to November 2015. In the study, we examined two rainfall data over Seyhan plain and the correlation between the rain-gauge data and two raster rainfall data was observed lowly.Keywords: meteosat, radar, rainfall, rain-gauge, Turkey
Procedia PDF Downloads 32711147 Modelling Interactions between Saturated and Unsaturated Zones by Hydrus 1D, Plain of Kairouan, Central Tunisia
Authors: Mariem Saadi, Sabri Kanzari, Adel Zghibi
Abstract:
In semi-arid areas like the Kairouan region, the constant irrigation with saline water and the overuse of groundwater resources, soils and aquifers salinization has become an increasing concern. In this study, a methodology has been developed to evaluate the groundwater contamination risk based on the unsaturated zone hydraulic properties. Two soil profiles with different ranges of salinity, one located in the north of the plain and another one in the south of plain (each 30 m deep) and both characterized by direct recharge of the aquifer were chosen. Simulations were conducted with Hydrus-1D code using measured precipitation data for the period 1998-2003 and calculated evapotranspiration for both chosen profiles. Four combinations of initial conditions of water content and salt concentration were used for the simulation process in order to find the best match between simulated and measured values. The success of the calibration of Hydrus-1D allowed the investigation of some scenarios in order to assess the contamination risk under different natural conditions. The aquifer risk contamination is related to the natural conditions where it increased while facing climate change and temperature increase and decreased in the presence of a clay layer in the unsaturated zone. Hydrus-1D was a useful tool to predict the groundwater level and quality in the case of a direct recharge and in the absence of any information related to the soil layers except for the texture.Keywords: Hydrus-1D, Kairouan, salinization, semi-arid region, solute transport, unsaturated zone
Procedia PDF Downloads 18311146 Secret Sharing in Visual Cryptography Using NVSS and Data Hiding Techniques
Authors: Misha Alexander, S. B. Waykar
Abstract:
Visual Cryptography is a special unbreakable encryption technique that transforms the secret image into random noisy pixels. These shares are transmitted over the network and because of its noisy texture it attracts the hackers. To address this issue a Natural Visual Secret Sharing Scheme (NVSS) was introduced that uses natural shares either in digital or printed form to generate the noisy secret share. This scheme greatly reduces the transmission risk but causes distortion in the retrieved secret image through variation in settings and properties of digital devices used to capture the natural image during encryption / decryption phase. This paper proposes a new NVSS scheme that extracts the secret key from randomly selected unaltered multiple natural images. To further improve the security of the shares data hiding techniques such as Steganography and Alpha channel watermarking are proposed.Keywords: decryption, encryption, natural visual secret sharing, natural images, noisy share, pixel swapping
Procedia PDF Downloads 40411145 Reproductive Health Behavior and Nutritional Status of Plain Land Ethnic Women in Bangladesh
Authors: Zainal Abedin
Abstract:
Introduction: Reproductive health is one of the major priorities of global health and is a fundamental and inalienable part of women’s health due to childbearing, and it is closely associated with nutritional status. Objective: This study was done to assess reproductive health behavior and nutritional status of reproductive-age ethnic women residing in plain land. Method: It was a cross-sectional study conducted among conveniently selected 120 reproductive-aged ethnic women at three Upazila of Rajshahi District. Nutritional status was determined by the WHO cut-off value of BMI for the Asian population. Results: About 88% of respondents noticed that they seek treatment in response to disease, and most of them seek treatment from the pharmacy attendant. Two-thirds of women used contraceptives, and 76% of women received antenatal care visits from Govt health centers, private clinics, and NGO clinics, but 86% of respondents delivered at home. In terms of nutritional status, 70% were normal, 23% underweight, and 7% overweight. Conclusion: Though most of them were normal regarding nutritional status but one-fourth were still underweight. Local pharmacy/quack-dependent treatment should be reduced.Keywords: reproductive health behavior, nutritional status, plain land, ethnic women
Procedia PDF Downloads 8111144 Enhanced Bit Error Rate in Visible Light Communication: A New LED Hexagonal Array Distribution
Authors: Karim Matter, Heba Fayed, Ahmed Abd-Elaziz, Moustafa Hussein
Abstract:
Due to the exponential growth of mobile devices and wireless services, a huge demand for radiofrequency has increased. The presence of several frequencies causes interference between cells, which must be minimized to get the lower Bit Error Rate (BER). For this reason, it is of great interest to use visible light communication (VLC). This paper suggests a VLC system that decreases the BER by applying a new LED distribution with a hexagonal shape using a Frequency Reuse (FR) concept to mitigate the interference between the reused frequencies inside the hexagonal shape. The BER is measured in two scenarios, Line of Sight (LoS) and Non-Line of Sight (Non-LoS), for each technique that we used. The recommended values of BER in the proposed model for Soft Frequency Reuse (SFR) in the case of Los at 4, 8, and 10 dB signal to noise ratio (SNR), are 3.6×10⁻⁶, 6.03×10⁻¹³, and 2.66×10⁻¹⁸, respectively.Keywords: visible light communication (VLC), field of view (FoV), hexagonal array, frequency reuse
Procedia PDF Downloads 16011143 Effect of Fiber Types and Elevated Temperatures on the Bond Characteristic of Fiber Reinforced Concretes
Authors: Erdoğan Özbay, Hakan T. Türker, Müzeyyen Balçıkanlı, Mohamed Lachemi
Abstract:
In this paper, the effects of fiber types and elevated temperatures on compressive strength, modulus of rapture and the bond characteristics of fiber reinforced concretes (FRC) are presented. By using the three different types of fibers (steel fiber-SF, polypropylene-PPF and polyvinyl alcohol-PVA), FRC specimens were produced and exposed to elevated temperatures up to 800 ºC for 1.5 hours. In addition, a plain concrete (without fiber) was produced and used as a control. Test results obtained showed that the steel fiber reinforced concrete (SFRC) had the highest compressive strength, modulus of rapture and bond stress values at room temperatures, the residual bond, flexural and compressive strengths of both FRC and plain concrete dropped sharply after exposure to high temperatures. The results also indicated that the reduction of bond, flexural and compressive strengths with increasing the exposed temperature was relatively less for SFRC than for plain, and FRC with PPF and PVA.Keywords: bond stress, compressive strength, elevated temperatures, fiber reinforced concrete, modulus of rapture
Procedia PDF Downloads 42011142 Integrated Model for Enhancing Data Security Performance in Cloud Computing
Authors: Amani A. Saad, Ahmed A. El-Farag, El-Sayed A. Helali
Abstract:
Cloud computing is an important and promising field in the recent decade. Cloud computing allows sharing resources, services and information among the people of the whole world. Although the advantages of using clouds are great, but there are many risks in a cloud. The data security is the most important and critical problem of cloud computing. In this research a new security model for cloud computing is proposed for ensuring secure communication system, hiding information from other users and saving the user's times. In this proposed model Blowfish encryption algorithm is used for exchanging information or data, and SHA-2 cryptographic hash algorithm is used for data integrity. For user authentication process a user-name and password is used, the password uses SHA-2 for one way encryption. The proposed system shows an improvement of the processing time of uploading and downloading files on the cloud in secure form.Keywords: cloud Ccomputing, data security, SAAS, PAAS, IAAS, Blowfish
Procedia PDF Downloads 47711141 Management of Al-Khaldiyah Road (Al Khobar) in Order to Optimize Safety and Improve Sight View
Authors: Amer Alsari, Hassan Alhalal, Tahar Ayadat, Andi Asiz, Omar KM Ouda
Abstract:
Al Khaldiyah is a regional road situated in west-south of Al Khobar, precisely in the area of Half Moon Bay. It is characterized by four lines, which become six lines in some places, in both directions extending over about 10 km length. The road extends between the bridge near the Air Force Base and Half Moon Bay Road. Many accidents have been observed in this road notably over the last two years. Many injuries and deaths were recorded, some of the victims were PMU students. Consequently, management of the road to eliminate or reduce accidents to a large extend becomes imperative. The main goal of this project are to propose sustainable solutions for the purpose optimizing safety and improving its sight view by designing some appropriate junctions including bridge and tunnel in the critical locations.Keywords: management, road, accident, traffic, safety, sustainable, solutions
Procedia PDF Downloads 44911140 High Secure Data Hiding Using Cropping Image and Least Significant Bit Steganography
Authors: Khalid A. Al-Afandy, El-Sayyed El-Rabaie, Osama Salah, Ahmed El-Mhalaway
Abstract:
This paper presents a high secure data hiding technique using image cropping and Least Significant Bit (LSB) steganography. The predefined certain secret coordinate crops will be extracted from the cover image. The secret text message will be divided into sections. These sections quantity is equal the image crops quantity. Each section from the secret text message will embed into an image crop with a secret sequence using LSB technique. The embedding is done using the cover image color channels. Stego image is given by reassembling the image and the stego crops. The results of the technique will be compared to the other state of art techniques. Evaluation is based on visualization to detect any degradation of stego image, the difficulty of extracting the embedded data by any unauthorized viewer, Peak Signal-to-Noise Ratio of stego image (PSNR), and the embedding algorithm CPU time. Experimental results ensure that the proposed technique is more secure compared with the other traditional techniques.Keywords: steganography, stego, LSB, crop
Procedia PDF Downloads 26911139 Strength and Permeability Characteristics of Fiber Reinforced Concrete
Authors: Amrit Pal Singh Arora
Abstract:
The paper reports the results of a study undertaken to study the effects of addition of steel fibres of different aspect ratios on the permeability and strength characteristics of steel fiber reinforced fly ash concrete (SFRC). Corrugated steel fibres having a diameter of 0.6 mm and lengths of 12.5 mm, 30 mm and 50 mm were used in this study. Cube samples of 100 mm x 100 mm x 100 mm were cast from mixes replacing 0%, 10%, 20% and 30% cement content by fly ash with and without fibres and tested for the determination of coefficient of water permeability, compressive and split tensile strengths after 7 and 28 days of curing. Plain concrete samples were also cast and tested for reference purposes. Permeability was observed to decrease significantly for all concrete mixes with the addition of steel fibers as compared to plain concrete. The replacement of cement content by fly ash results in an increase in the coefficient of water permeability. With the addition of fly ash to the plain mix the7 day compressive and split tensile strengths decreased, however both the compressive and split tensile strengths increased with increase in curing age.Keywords: curing age, fiber shape, fly ash, Darcy’s law, Ppermeability
Procedia PDF Downloads 31411138 Integrated Model for Enhancing Data Security Processing Time in Cloud Computing
Authors: Amani A. Saad, Ahmed A. El-Farag, El-Sayed A. Helali
Abstract:
Cloud computing is an important and promising field in the recent decade. Cloud computing allows sharing resources, services and information among the people of the whole world. Although the advantages of using clouds are great, but there are many risks in a cloud. The data security is the most important and critical problem of cloud computing. In this research a new security model for cloud computing is proposed for ensuring secure communication system, hiding information from other users and saving the user's times. In this proposed model Blowfish encryption algorithm is used for exchanging information or data, and SHA-2 cryptographic hash algorithm is used for data integrity. For user authentication process a simple user-name and password is used, the password uses SHA-2 for one way encryption. The proposed system shows an improvement of the processing time of uploading and downloading files on the cloud in secure form.Keywords: cloud computing, data security, SAAS, PAAS, IAAS, Blowfish
Procedia PDF Downloads 35811137 Impact of Agriculture on the Groundwater Quality: Case of the Alluvial Plain of Nil River (North-Eastern Algerian)
Authors: S. Benessam, T. H. Debieche, A. Drouiche, F. Zahi, S. Mahdid
Abstract:
The intensive use of the chemical fertilizers and the pesticides in agriculture often produces a contamination of the groundwater by organic pollutants. The irrigation and/or rainwater transport the pollutants towards groundwater or water surface. Among these pollutants, one finds the nitrogen, often observed in the agricultural zones in the nitrate form. In order to understand the form and chemical mobility of nitrogen in groundwater, this study was conducted. A two-monthly monitoring of the parameters physicochemical and chemistry of water of the alluvial plain of Nil river (North-eastern Algerian) were carried out during the period from November 2013 to January 2015 as well as an in-situ investigation of the various chemical products used by the farmers. The results show a raise concentration of nitrates in the wells (depth < 20 m) of the plain, which the concentrations arrive at 50 mg/L (standard of potable water). On the other hand in drillings (depth > 20 m), one observes two behaviors. The first in the upstream part, where the aquifer is unconfined and the medium is oxidizing, one observes the weak nitrate concentrations, indicating its absorption by the ground during the infiltration of water towards the groundwater. The second in the central and downstream parts, where the groundwater is locally confined and the reducing medium, one observes an absence of nitrates and the appearance of nitrites and ammonium, indicating the reduction of nitrates. The projection of the analyses on diagrams Eh-pH of nitrogen has enabled to us to determine the intervals of variation of the nitrogen forms. This study also highlighted the effect of the rains, the pumping and the nature of the geological formations in the form and the mobility of nitrogen in the plain.Keywords: groundwater, nitrogen, mobility, speciation
Procedia PDF Downloads 24811136 Assessment of the Groundwater Agricultural Pollution Risk: Case of the Semi-Arid Region (Batna-East Algeria)
Authors: Dib Imane, Chettah Wahid, Khedidja Abdelhamid
Abstract:
The plain of Gadaïne - Ain Yaghout, located in the wilaya of Batna (Eastern Algeria), experiences intensive human activities, particularly in agricultural practices which are accompanied by an increasing use of chemical fertilizers and manure. These activities lead to a degradation of the quality of water resources. In order to protect the quality of groundwater in this plain and formulate effective strategies to mitigate or avoid any contamination of groundwater, a risk assessment using the European method known as “COSTE Action 620” was applied to the mio-. plio-quaternary aquifer of this plain. Risk assessment requires the identification of existing dangers and their potential impact on groundwater by using a system of evaluation and weighting. In addition, it also requires the integration of the hydrogeological factors that influence the movement of contaminants by means of the intrinsic vulnerability maps of groundwater, which were produced according to the modified DRASTIC method. The overall danger on the plain ranges from very low to high. Farms containing stables, houses detached from the public sewer system, and sometimes manure piles were assigned a weighting factor expressing the highest degree of harmfulness; this created a medium to high danger index. Large areas for agricultural practice and grazing are characterized, successively, by low to very low danger. Therefore, the risks present at the study site are classified according to a range from medium to very high-risk intensity. These classes successively represent 3%, 49%, and 0.2% of the surface of the plain. Cultivated land and farms present a high to very high level of risk successively. In addition, with the exception of the salt mine, which presents a very high level of risk, the gas stations and cemeteries, as well as the railway line, represent a high level of risk.Keywords: semi-arid, quality of water resources, risk assessment, vulnerability, contaminants
Procedia PDF Downloads 4911135 Fear of Crime Among Females on University Campuses
Authors: Shahed, Tala, Ahlam, Marah, Sara, Shaden
Abstract:
Research on fear of crime has shown that there are many influences on it, including gender, age, and geographic location. For example, women are more afraid of crime than men. The campus has a high crime rate and fear of crime due to many hiding places and blind spots; women are more likely than men to be victims of certain types of crime, such as rape and verbal and sexual harassment. And it became clear that older female students have a different perception of the place over time and other knowledge and fear of it, another study at Hashemite University. This study aims to understand better how the environment affects the negative experiences of female students and how their age and familiarity environment affects their sense of safety. This study also examines whether CPTED can be used to help prevent crime. The Broken Windows Theory also states that crime occurs in areas with overt indications of criminal activity, antisocial behavior, and civil unrest. This is related to the principle of CPTED maintenance and monitoring, activity support, regional development, and access control. Given their increased vulnerability to harassment, “sexual harassment” can refer to different behaviors. On campuses, harassment was happening everywhere, but it was most prevalent in "blind spots" that were out of sight and deserted. This study uses a methodology based on quantitative data that depends on putting a number on the amount of a particular phenomenon that exists in the world. The main finding shows how CPTED works in an academic context and what adjustments need to be made.Keywords: Hashmite University, CPTED, crime prevention, university campus, fear of crime, female faer, broken window theory
Procedia PDF Downloads 7911134 The Impact of Surface Roughness and PTFE/TiF3/FeF3 Additives in Plain ZDDP Oil on the Friction and Wear Behavior Using Thermal and Tribological Analysis under Extreme Pressure Condition
Authors: Gabi N. Nehme, Saeed Ghalambor
Abstract:
The use of titanium fluoride and iron fluoride (TiF3/FeF3) catalysts in combination with polutetrafluoroethylene (PTFE) in plain zinc dialkyldithiophosphate (ZDDP) oil is important for the study of engine tribocomponents and is increasingly a strategy to improve the formation of tribofilm and to provide low friction and excellent wear protection in reduced phosphorus plain ZDDP oil. The influence of surface roughness and the concentration of TiF3/FeF3/PTFE were investigated using bearing steel samples dipped in lubricant solution @100°C for two different heating time durations. This paper addresses the effects of water drop contact angle using different surface finishes after treating them with different lubricant combination. The calculated water drop contact angles were analyzed using Design of Experiment software (DOE) and it was determined that a 0.05 μm Ra surface roughness would provide an excellent TiF3/FeF3/PTFE coating for antiwear resistance as reflected in the scanning electron microscopy (SEM) images and the tribological testing under extreme pressure conditions. Both friction and wear performance depend greatly on the PTFE/and catalysts in plain ZDDP oil with 0.05% phosphorous and on the surface finish of bearing steel. The friction and wear reducing effects, which was observed in the tribological tests, indicated a better micro lubrication effect of the 0.05 μm Ra surface roughness treated at 100°C for 24 hours when compared to the 0.1 μm Ra surface roughness with the same treatment.Keywords: scanning electron microscopy, ZDDP, catalysts, PTFE, friction, wear
Procedia PDF Downloads 35011133 Digital Image Steganography with Multilayer Security
Authors: Amar Partap Singh Pharwaha, Balkrishan Jindal
Abstract:
In this paper, a new method is developed for hiding image in a digital image with multilayer security. In the proposed method, the secret image is encrypted in the first instance using a flexible matrix based symmetric key to add first layer of security. Then another layer of security is added to the secret data by encrypting the ciphered data using Pythagorean Theorem method. The ciphered data bits (4 bits) produced after double encryption are then embedded within digital image in the spatial domain using Least Significant Bits (LSBs) substitution. To improve the image quality of the stego-image, an improved form of pixel adjustment process is proposed. To evaluate the effectiveness of the proposed method, image quality metrics including Peak Signal-to-Noise Ratio (PSNR), Mean Square Error (MSE), entropy, correlation, mean value and Universal Image Quality Index (UIQI) are measured. It has been found experimentally that the proposed method provides higher security as well as robustness. In fact, the results of this study are quite promising.Keywords: Pythagorean theorem, pixel adjustment, ciphered data, image hiding, least significant bit, flexible matrix
Procedia PDF Downloads 33711132 Building a Measure of Sensory Preferences For (Wrestling and Boxing) Players
Authors: Mohamed Nabhan
Abstract:
The research aims to build a measure of sensory preferences for (wrestling and boxing) players. The researchers used the descriptive approach and a sample of (8) consisting of (40) wrestling players, (40) boxing players with different scales, and they were chosen in a deliberate random way, and the most important results were that there were statistically significant differences between wrestlers and boxers in the sensory preferences of their senses. There is no indication in the sensory preferences for the senses of “sight and hearing” and that the significance is in favor of the wrestlers in the senses of “sight and touch,” and there is a convergence in the sense of hearing. Through the value of the averagesAfter collecting the data and statistical treatments and the results reached by the researcher, it was possible to reach: The following conclusions and recommendations: There are differences between wrestling and boxing players in their sensory preferences, the senses used in learning, due to several reasons, the most important of which may be as follows:- Scales for the player and for each sport separately. The nature of the game, the performance of skills, and dealing with the opponent or competitor.Tools used in performance and training.Keywords: sensory preferences, sensory scale, wrestling players, boxing players
Procedia PDF Downloads 11211131 Physical Dynamics of Planet Earth and Their Implications for Global Climate Change and Mitigation: A Case Study of Sistan Plain, Balochistan Region, Southeastern Iran
Authors: Hamidoddin Yousefi, Ahmad Nikbakht
Abstract:
The Sistan Plain, situated in the Balochistan region of southeastern Iran, is renowned for its arid climatic conditions and prevailing winds that persist for approximately 120 days annually. The region faces multiple challenges, including drought susceptibility, exacerbated by wind erosion, temperature fluctuations, and the influence of policies implemented by neighboring Afghanistan and Iran. This study focuses on investigating the characteristics of jet streams within the Sistan Plain and their implications for global climate change. Various models are employed to analyze convective mass fluxes, horizontal moisture transport, temporal variance, and the calculation of radiation convective equilibrium within the atmosphere. Key considerations encompass the distribution of relative humidity, dry air, and absolute humidity. Moreover, the research aims to predict the interplay between jet streams and human activities, particularly regarding their environmental impacts and water scarcity. The investigation encompasses both local and global environmental consequences, drawing upon historical climate change data and comprehensive field research. The anticipated outcomes of this study hold substantial potential for mitigating global climate change and its associated environmental ramifications. By comprehending the dynamics of jet streams and their interconnections with human activities, effective strategies can be formulated to address water scarcity and minimize environmental degradation.Keywords: Sistani plain, Baluchistan, Hamoun lake, climate change, jet streams, environmental impact, water scarcity, mitigation
Procedia PDF Downloads 7311130 Controlled Size Synthesis of ZnO and PEG-ZnO NPs and Their Biological Evaluation
Authors: Mahnoor Khan, Bashir Ahmad, Khizar Hayat, Saad Ahmad Khan, Laiba Ahmad, Shumaila Bashir, Abid Ali Khan
Abstract:
The objective of this study was to synthesize the smallest possible size of ZnO NPs using a modified wet chemical synthesis method and to prepare core shell using polyethylene glycol (PEG) as shell material. Advanced and sophisticated techniques were used to confirm the synthesis, size, and shape of these NPs. Rounded, clustered NPs of size 5.343 nm were formed. Both the plain and core shell NPs were tested against MDR bacteria (E. cloacae, E. amnigenus, Shigella, S. odorifacae, Citrobacter, and E. coli). Both of the NPs showed excellent antibacterial properties, whereas E. cloacae showed maximum zone of inhibition of 16 mm, 27 mm, and 32 mm for 500 μg/ml, 1000 μg/ml, and 1500 μg/ml, respectively for plain ZnO NPs and 18 mm, 28 mm and 35 mm for 500 μg/ml, 1000 μg/ml and 1500 μg/ml for core shell NPs. These NPs were also biocompatible on human red blood cells showing little hemolysis of only 4% for 70 μg/ml for plain NPs and 1.5% for 70 μg/ml for core shell NPs. Core shell NPs were highly biocompatible because of the PEG. Their therapeutic effect as photosensitizers in photodynamic therapy (PDT) for cancer treatment was also monitored. The cytotoxicity of ZnO and PEG-ZnO was evaluated using MTT assay. Our results demonstrated that these NPs could generate ROS inside tumor cells after irradiation which in turn initiates an apoptotic pathway leading to cell death hence proving to be an effective candidate for PDT.Keywords: ZnO, hemolysis, cytotoxiciy assay, photodynamic therapy, antibacterial
Procedia PDF Downloads 13911129 The Use Management of the Knowledge Management and the Information Technologies in the Competitive Strategy of a Self-Propelling Industry
Authors: Guerrero Ramírez Sandra, Ramos Salinas Norma Maricela, Muriel Amezcua Vanesa
Abstract:
This article presents the beginning of a wider study that intends to demonstrate how within organizations of the automotive industry from the city of Querétaro. Knowledge management and technological management are required, as well as people’s initiative and the interaction embedded at the interior of it, with the appropriate environment that facilitates information conversion with wide information technologies management (ITM) range. A company was identified for the pilot study of this research, where descriptive and inferential research information was obtained. The results of the pilot suggest that some respondents did noted entity the knowledge management topic, even if staffs have access to information technology (IT) that serve to enhance access to knowledge (through internet, email, databases, external and internal company personnel, suppliers, customers and competitors) data, this implicates that there are Knowledge Management (KM) problems. The data shows that academically well-prepared organizations normally do not recognize the importance of knowledge in the business, nor in the implementation of it, which at the end is a great influence on how to manage it, so that it should guide the company to greater in sight towards a competitive strategy search, given that the company has an excellent technological infrastructure and KM was not exploited. Cultural diversity is another factor that was observed by the staff.Keywords: Knowledge Management (KM), Technological Knowledge Management (TKM), Technology Information Management (TI), access to knowledge
Procedia PDF Downloads 499