Search results for: water security
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 11263

Search results for: water security

10693 Water Safety Strategies by Service: A Study of Implementation Studies

Authors: Prince Amartey

Abstract:

Water is critical to public health, quality of life, environmental preservation, economic activity, and long-term growth. In this environment, it is critical to ensure the ongoing improvement of all processes and practices that contribute to the quality and safety of water. Water safety plans (WSPs) developed by water companies are an essential public policy instrument for achieving these objectives. This manuscript examines international evidence of water safety planning adoption and implementation and reports on the current situation in Portugal as part of the necessary adaptation of the national legal framework to the publication of the Directive on water quality for human consumption. The goal is to take lessons from various successful WSP projects throughout the world while writing new legislation in Ghana and elsewhere. According to the findings, four crucial aspects and key factors of success in establishing and implementing WSPs exist commitment from leadership, technical proficiency, administration, and cooperation among agencies.

Keywords: safe drinking, risk, policy, implementation

Procedia PDF Downloads 86
10692 Analysis of Security Vulnerabilities for Mobile Health Applications

Authors: Yuli Paola Cifuentes Sanabria, Lina Paola Beltrán Beltrán, Leonardo Juan Ramírez López

Abstract:

The availability to deploy mobile applications for healthcare is increasing daily thru different mobile app stores. But within these capabilities the number of hacking attacks has also increased, in particular into medical mobile applications. The security vulnerabilities in medical mobile apps can be triggered by errors in code, incorrect logic, poor design, among other parameters. This is usually used by malicious attackers to steal or modify the users’ information. The aim of this research is to analyze the vulnerabilities detected in mobile medical apps according to risk factor standards defined by OWASP in 2014.

Keywords: mHealth apps, OWASP, protocols, security vulnerabilities, risk factors

Procedia PDF Downloads 518
10691 Water, Hygiene, and Sanitation in Senegal’s School Environment: A Study of the Performance of a Reed Bed Filter Installed at Gandiol School for Wastewater Treatment and Reuse

Authors: Abdou Khafor Ndiaye

Abstract:

The article examines clean water and sanitation in Saint-Louis region schools. It finds that 59% have clean water, with disparities between departments, urban/rural areas, and school types. Podor and Dagana lack water due to distance and costs. 70% have sanitation, but rural schools lack it due to low investment. Podor and Dagana suffer the most. Many sanitation facilities need renovation. Wastewater treatment is effective, reducing pollutants and nitrogen, but adjustments are needed for nitrates. Treated water meets Senegalese standards and can be used for irrigation but needs monitoring for strict standards. In conclusion, the wastewater system is good for regions with limited water. Meeting stricter European standards and monitoring for health and environmental standards are needed.

Keywords: water, constructed wetland, sanitation, hygiene

Procedia PDF Downloads 77
10690 Towards a Secure Storage in Cloud Computing

Authors: Mohamed Elkholy, Ahmed Elfatatry

Abstract:

Cloud computing has emerged as a flexible computing paradigm that reshaped the Information Technology map. However, cloud computing brought about a number of security challenges as a result of the physical distribution of computational resources and the limited control that users have over the physical storage. This situation raises many security challenges for data integrity and confidentiality as well as authentication and access control. This work proposes a security mechanism for data integrity that allows a data owner to be aware of any modification that takes place to his data. The data integrity mechanism is integrated with an extended Kerberos authentication that ensures authorized access control. The proposed mechanism protects data confidentiality even if data are stored on an untrusted storage. The proposed mechanism has been evaluated against different types of attacks and proved its efficiency to protect cloud data storage from different malicious attacks.

Keywords: access control, data integrity, data confidentiality, Kerberos authentication, cloud security

Procedia PDF Downloads 335
10689 From Risk/Security Analysis via Timespace to a Model of Human Vulnerability and Human Security

Authors: Anders Troedsson

Abstract:

For us humans, risk and insecurity are intimately linked to vulnerabilities - where there is vulnerability, there is potentially risk and insecurity. Reducing vulnerability through compensatory measures means decreasing the likelihood of a certain external event be qualified as a risk/threat/assault, and thus also means increasing the individual’s sense of security. The paper suggests that a meaningful way to approach the study of risk/ insecurity is to organize thinking about the vulnerabilities that external phenomena evoke in humans as perceived by them. Such phenomena are, through a set of given vulnerabilities, potentially translated into perceptions of "insecurity." An ontological discussion about salient timespace characteristics of external phenomena as perceived by humans, including such which potentially can be qualified as risk/threat/assault, leads to the positing of two dimensions which are central for describing what in the paper is called the essence of risk/threat/assault. As is argued, such modeling helps analysis steer free of the subjective factor which is intimately connected to human perception and which mediates between phenomena “out there” potentially identified as risk/threat/assault, and their translation into an experience of security or insecurity. A proposed set of universally given vulnerabilities are scrutinized with the help of the two dimensions, resulting in a modeling effort featuring four realms of vulnerabilities which together represent a dynamic whole. This model in turn informs modeling on human security.

Keywords: human vulnerabilities, human security, immediate-inert, material-immaterial, timespace

Procedia PDF Downloads 298
10688 Service Life Prediction of Tunnel Structures Subjected to Water Seepage

Authors: Hassan Baji, Chun-Qing Li, Wei Yang

Abstract:

Water seepage is one of the most common causes of damage in tunnel structures, which can cause direct and indirect e.g. reinforcement corrosion and calcium leaching damages. Estimation of water seepage or inflow is one of the main challenges in probabilistic assessment of tunnels. The methodology proposed in this study is an attempt for mathematically modeling the water seepage in tunnel structures and further predicting its service life. Using the time-dependent reliability, water seepage is formulated as a failure mode, which can be used for prediction of service life. Application of the formulated seepage failure mode to a case study tunnel is presented.

Keywords: water seepage, tunnels, time-dependent reliability, service life

Procedia PDF Downloads 484
10687 Standards of Toxicity and Food Security in Brazil

Authors: Ana Luiza Da Gama E Souza

Abstract:

This article aims to discuss the problem of food insecurity in Brazil in what it refers to contamination of food by chemical substances such as herbicides, pesticides, and other contaminants. The issue will be faced by analyzing, on the one hand, the standards that guide the food system in the world and, on the other hand, human rights indicators whose purpose is to provide an effective monitoring of the State's obligations to guarantee food security, analyzing the implications of the former for the success of the latter. The methodology adopted in this article was bibliographic-documentary and consists of three moments of analysis. The first moment consists in the analysis of the reports of the Commission on Human Rights of the Organization of American States to identify the set of progress indicators developed by the Commission. This analysis will involve the new methodology used to evaluate the efficiency in monitoring food security in Brazil the case of using pesticides in the production of food at levels of toxicity not admitted by the inspection bodies. The second moment consists in evaluating the mechanism for monitoring food security in Brazil, which was initially established by the National Food Security Plan (PLANSAN) for 2012-2015 and improved by the II National Food Security Plan for 2016-2019. Those mechanisms were prepared by the Chamber (CAISAN), and have the function to compare the monitoring proposals with the results presented by CAISAN on the Indicators and Results Report of the National Plan for Food and Nutrition Security 2012-2015. The third moment was intended to understand, analyze and evaluate the standardization process of the agri-food system, especially regarding the level of toxicity standards, that is related to food safety monitoring as a guarantee of pesticide-free food. The results show the dependence between private standards of toxicity and the indicators of food safety that leads to inefficiency on monitoring that mechanism in Brazil.

Keywords: standards, indicators, human rights, food security

Procedia PDF Downloads 333
10686 Water Accessibility at Household Levels in Zambia: A Case Study of Fitobaula Settlement

Authors: Emmanuel Sachikumba, Micheal Msoni, Westone Mafuleka

Abstract:

Zambia has a good climate with favourable rainfall pattern; this provides sufficient recharge for the surface and groundwater resources. In spite of the sufficient surface and ground water resources, accessibility to water at household levels is problematic both in quality and quantity. The study examined water accessibility as well as water quality at the household level. The research looked at the sources of water for the households and considered the complications of accessibility to water and the available opportunities therein. The investigation involved fifty households and the data was collected by the use of questionnaires (to assess accessibility) and laboratory tests (for ascertaining water quality). In addition to this, government departments such as the health, agriculture, forestry and education as well as the municipal council were interviewed on the topic under study. The study was descriptive in nature where clustered sampling procedures using simple random methods were utilised to select the households which were to participate in the study. The key findings were that; accessibility to water household levels is still a challenge in the settlement as most of the point sources (shallow wells, the stream and the river) were found to be contaminated. In addition to this, it was found that there was no direct relationship between the economic performance of a household and the accessibility to water. The study also observed that there were opportunities for the people in the settlement as they were increasingly getting into the education system, and adult literacy was being encouraged in the settlement. Furthermore, the settlement has groundwater resources which indicate that there can be sufficient water provision for the settlers.

Keywords: accessibility, household, water, settlement

Procedia PDF Downloads 452
10685 Design and Implementation of an Image Based System to Enhance the Security of ATM

Authors: Seyed Nima Tayarani Bathaie

Abstract:

In this paper, an image-receiving system was designed and implemented through optimization of object detection algorithms using Haar features. This optimized algorithm served as face and eye detection separately. Then, cascading them led to a clear image of the user. Utilization of this feature brought about higher security by preventing fraud. This attribute results from the fact that services will be given to the user on condition that a clear image of his face has already been captured which would exclude the inappropriate person. In order to expedite processing and eliminating unnecessary ones, the input image was compressed, a motion detection function was included in the program, and detection window size was confined.

Keywords: face detection algorithm, Haar features, security of ATM

Procedia PDF Downloads 420
10684 Philippine Foreign Policy in the West Philippine Sea after the 2012 Scarborough Standoff: Implications for National Security

Authors: Rhisan Mae Enriquez-Morales

Abstract:

The primary concern of this study is to answer the question: How does the Philippine government formulate its foreign policy with respect to its territorial claims over areas in the West Philippine Sea after the Scarborough standoff in April 2012? Specifically, the study seeks to provide understanding on the political process in the formulation of foreign policy relating to the Philippine claims in the West Philippine Sea after the 2012 Scarborough Standoff, by looking into the relationship of bureaucracies and how it influences the decision-making process. Secondly, this study aims to determine the long and short term foreign policies of the Philippines with respect to its territorial claims over the West Philippine Sea. Lastly, this study seeks to determine the implication of Philippine foreign policy in settling the West Philippine Sea dispute on the country’s national security. The Bureaucratic Politics Model (BPM) in Foreign Policy Analysis (FPA) is the framework utilized in this study, which focuses primarily on the relationship of bureaucracies in the formulation of foreign policy and how these agencies influence the process of foreign policy formulation. The findings of this study reveal that: first, the Philippines foreign policy in the West Philippine Sea continues to develop to address current developments in the WPS. Second, as the government requires demilitarization there is a shift from traditional to non-traditional security approach. This shift caused inconvenience from the defense sector particularly the Navy thinking that they are being deprived of their traditional roles. Lastly, the Philippine government’s greater emphasis on internal security operation implies the need to reassess its security concerns and look into territorial security.

Keywords: bureaucratic politics model, foreign policy analysis, security, West Philippine sea

Procedia PDF Downloads 395
10683 Chaos Cryptography in Cloud Architectures with Lower Latency

Authors: Mohammad A. Alia

Abstract:

With the rapid evolution of the internet applications, cloud computing becomes one of today’s hottest research areas due to its ability to reduce costs associated with computing. Cloud is, therefore, increasing flexibility and scalability for computing services in the internet. Cloud computing is Internet based computing due to shared resources and information which are dynamically delivered to consumers. As cloud computing share resources via the open network, hence cloud outsourcing is vulnerable to attack. Therefore, this paper will explore data security of cloud computing by implementing chaotic cryptography. The proposal scenario develops a problem transformation technique that enables customers to secretly transform their information. This work proposes the chaotic cryptographic algorithms have been applied to enhance the security of the cloud computing accessibility. However, the proposed scenario is secure, easy and straightforward process. The chaotic encryption and digital signature systems ensure the security of the proposed scenario. Though, the choice of the key size becomes crucial to prevent a brute force attack.

Keywords: chaos, cloud computing, security, cryptography

Procedia PDF Downloads 346
10682 Effect of Evaporator Temperature on the Performance of Water Desalination/Refrigeration Adsorption System Using AQSOA-ZO2

Authors: Peter G. Youssef, Saad M. Mahmoud, Raya K. AL-Dadah

Abstract:

Many water desalination technologies have been developed but in general they are energy intensive and have high cost and adverse environmental impact. Recently, adsorption technology for water desalination has been investigated showing the potential of using low temperature waste heat (50-85oC) thus reducing energy consumption and CO2 emissions. This work mathematically compares the performance of an adsorption cycle that produces two useful effects namely, fresh water and cooling using two different adsorbents, silica-gel and an advanced zeolite material AQSOA-ZO2, produced by Mitsubishi plastics. It was found that at low chilled water temperatures, typically below 20oC, the AQSOA-Z02 is more efficient than silica-gel as the cycle can produce 5.8 m3 of fresh water per day and 50.1 Rton of cooling per tonne of AQSOA-ZO2. Above 20oC silica-gel is still better as the cycle production reaches 8.4 m3 per day and 62.4 Rton per tonne of silica-gel. These results show the potential of using the AQSOA-Z02 at low chilled water temperature for water desalination and cooling applications.

Keywords: adsorption, desalination, refrigeration, seawater

Procedia PDF Downloads 496
10681 Performance Evaluation of Thermosiphon Based Solar Water Heater in India

Authors: Dnyandip K. Bhamare, Manish K Rathod, Jyotirmay Banerjee

Abstract:

This paper aims to study performance of a thermosiphon solar water heating system with the help of the proposed analytical model. This proposed model predicts the temperature and mass flow rate in a thermosiphon solar water heating system depending on radiation intensity and ambient temperature. The performance of the thermosiphon solar water heating system is evaluated in the Indian context. For this, eight cities in India are selected considering radiation intensity and geographical positions. Predicted performance at various cities reveals the potential for thermosiphon solar water in India.

Keywords: solar water heater, collector outlet temperature, thermosyphon, India

Procedia PDF Downloads 260
10680 Diversity for Safety and Security of Autonomous Vehicles against Accidental and Deliberate Faults

Authors: Anil Ranjitbhai Patel, Clement John Shaji, Peter Liggesmeyer

Abstract:

Safety and security of autonomous vehicles (AVs) is a growing concern, first, due to the increased number of safety-critical functions taken over by automotive embedded systems; second, due to the increased exposure of the software-intensive systems to potential attackers; third, due to dynamic interaction in an uncertain and unknown environment at runtime which results in changed functional and non-functional properties of the system. Frequently occurring environmental uncertainties, random component failures, and compromise security of the AVs might result in hazardous events, sometimes even in an accident, if left undetected. Beyond these technical issues, we argue that the safety and security of AVs against accidental and deliberate faults are poorly understood and rarely implemented. One possible way to overcome this is through a well-known diversity approach. As an effective approach to increase safety and security, diversity has been widely used in the aviation, railway, and aerospace industries. Thus, the paper proposes fault-tolerance by diversity model takes into consideration the mitigation of accidental and deliberate faults by application of structure and variant redundancy. The model can be used to design the AVs with various types of diversity in hardware and software-based multi-version system. The paper evaluates the presented approach by employing an example from adaptive cruise control, followed by discussing the case study with initial findings.

Keywords: autonomous vehicles, diversity, fault-tolerance, adaptive cruise control, safety, security

Procedia PDF Downloads 128
10679 The Threshold Values of Soil Water Index for Landslides on Country Road No.89

Authors: Ji-Yuan Lin, Yu-Ming Liou, Yi-Ting Chen, Chen-Syuan Lin

Abstract:

Soil water index obtained by tank model is now commonly used in soil and sand disaster alarm system in Japan. Comparing with the rainfall trigging index in Taiwan, the tank model is easy to predict the slope water content on large-scale landslide. Therefore, this study aims to estimate the threshold value of large-scale landslide using the soil water index Sixteen typhoons and heavy rainfall events, were selected to establish the, to relationship between landslide event and soil water index. Finally, the proposed threshold values for landslides on country road No.89 are suggested in this study. The study results show that 95% landslide cases occurred in soil water index more than 125mm, and 30% of the more serious slope failure occurred in the soil water index is greater than 250mm. Beside, this study speculates when soil water index more than 250mm and the difference value between second tank and third tank less than -25mm, it leads to large-scale landslide more probably.

Keywords: soil water index, tank model, landslide, threshold values

Procedia PDF Downloads 387
10678 Main Chaos-Based Image Encryption Algorithm

Authors: Ibtissem Talbi

Abstract:

During the last decade, a variety of chaos-based cryptosystems have been investigated. Most of them are based on the structure of Fridrich, which is based on the traditional confusion-diffusion architecture proposed by Shannon. Compared with traditional cryptosystems (DES, 3DES, AES, etc.), the chaos-based cryptosystems are more flexible, more modular and easier to be implemented, which make them suitable for large scale-data encyption, such as images and videos. The heart of any chaos-based cryptosystem is the chaotic generator and so, a part of the efficiency (robustness, speed) of the system depends greatly on it. In this talk, we give an overview of the state of the art of chaos-based block ciphers and we describe some of our schemes already proposed. Also we will focus on the essential characteristics of the digital chaotic generator, The needed performance of a chaos-based block cipher in terms of security level and speed of calculus depends on the considered application. There is a compromise between the security and the speed of the calculation. The security of these block block ciphers will be analyzed.

Keywords: chaos-based cryptosystems, chaotic generator, security analysis, structure of Fridrich

Procedia PDF Downloads 684
10677 Nexus of Socio-Demographic Factors and Water Fetching Practices: A Study in South-Western Bangladesh

Authors: Mufti Nadimul Quamar Ahmed

Abstract:

Universal and equitable access to safe and inexpensive water is one of the core goals of UN Sustainable Development (Goal-6). Rainwater harvesting and drinkable water scarcity are also prominent themes in the current literature. However, the lack of readily available drinking water sources is a serious roadblock in achieving this major goal in developing countries, especially in Bangladesh. In this study, we aimed to explore how water collecting activities in Bangladesh's coastal region are influenced by participants’ selected socio-demographic characteristics. We gathered information using a structured questionnaire from 154 people who were chosen at random from two of Bangladesh's most susceptible subdistricts situated in the country's southwest coast. Our results show that majority of the respondents think water fetching is a job for the woman as like their other day-day to household works and it’s not a man's duty. Interestingly, we found that person's age, family structure, monthly income and religion all play important roles in how they see and behave water-gathering techniques. Moreover, the local taboo on women and men's roles in water-gathering is also evident in the studied areas.

Keywords: water fetching, socio-demographic characteristic, coastal region, Bangladesh, SDG

Procedia PDF Downloads 124
10676 Measuring the Amount of Eroded Soil and Surface Runoff Water in the Field

Authors: Abdulfatah Faraj Aboufayed

Abstract:

Water erosion is the most important problems of the soil in the Jebel Nefusa area located in north west of Libya, therefore erosion station had been established in the Faculty of Veterinary and rainfed agriculture research Station, University of the Jepel Algherbee in Zentan. The length of the station is 72.6 feet, 6 feet width, and the percentage of it's slope is 3%. The station was established to measure the mount of soil eroded and amount of surface water produced during the seasons 95/96 and 96/97 from each rain storms. The Monitoring shows that there was a difference between the two seasons in the number of rainstorms which made differences in the amount of surface runoff water and the amount of soil eroded between the two seasons. Although the slope is low (3%), the soil texture is sandy and the land ploughed twice during each season surface runoff and soil eroded occurred. The average amount of eroded soil was 3792 grams (gr) per season and the average amount of surface runoff water was 410 litter (L) per season. The amount of surface runoff water would be much greater from Jebel Nefusa upland with steep slopes and collecting of them will save a valuable amount of water which lost as a runoff while this area is in desperate of this water. The regression analysis of variance show strong correlation between rainfall depth and the other two depended variable (the amount of surface runoff water and the amount of eroded soil). It shows also strong correlation between amount of surface runoff water and amount of eroded soil.

Keywords: rain, surface runoff water, soil, water erosion, soil erosion

Procedia PDF Downloads 403
10675 Water Productivity and Sensitivity Tolerance Stress Indices in Five Soybean Cultivars (Glycine max L.) at Different Levels of Water Deficit

Authors: Hassan Masoumi, Rashed Alavi, Mahmoud Reza Khorshidian

Abstract:

In order to measure the water deficit stress effects on seed yield and water productivity of soybean cultivars, a two field experiments wad conducted out via split plot in a randomized complete block design with four replications in 2011 and 2012. Irrigation treatments were three levels (S1; 50, S2; 62.5 and S3; 150 mm) that applied based on evaporation from the ‘class A’ pan. Cultivars were L17, Clean, T.M.S, Williams×Chippewa and M9, too. The results showed that, only extreme water deficit stresses (S3) was reduced number of pods per plants, dry weight, seed yield and also water productivity and water economic productivity, significantly. Among cultivars and at the first and second levels of irrigation (S1, S2) cultivar of L17 and at the third level (S3) cultivar of Wiiliams*Chippwea had the highest seed yield, water productivity and water economic productivity. There were observed a positive and significant correlation between seed yield with number of pods per plants and plants dry weight, too. Also, despite the reduction in water consumption at level of S2 than S1 and due to the lack of a significant reduction in seed yield, water productivity and water economic productivity was also increased, significantly (P < 0.01). All indices of sensitivity and tolerance (SSI, STI and GMP) investigated in this study showed that at the moderate and extreme water deficit stresses (S2, S3), the cultivars of L17 and Wiiliams * Chippwea had the highest tolerance and lowest sensitivity among the cultivars.

Keywords: drought, sensitivity indices, yield components, seed

Procedia PDF Downloads 410
10674 Balancing Security and Human Rights: A Comprehensive Approach to Security and Defense Policy

Authors: Babatunde Osabiya

Abstract:

Cybersecurity has emerged as a pressing policy problem in recent years, affecting individuals, businesses, and governments worldwide. This research paper aims to critically review the literature on cybersecurity policy and apply policy theory to propose a policy approach that balances the freedom to access and use technology with the human rights risks and threats posed by cyber. Drawing on various credible sources, the paper examines the scale and seriousness of cyber threats, highlighting the growing threat posed by cybercriminals, hackers, and nation-states. The paper also identifies the key challenges facing policymakers, including the need for more significant investment in cybersecurity research and development and the importance of balancing the benefits of technological innovation with the risks to privacy, security, and human rights. To address these challenges, the paper proposes a policy approach emphasizing investing in cybersecurity research and development to maintain a technological edge over potential adversaries. This approach also highlights the need for greater collaboration between government, industry, and civil society to develop effective cybersecurity policies and practices that protect the rights and freedoms of people while mitigating the risks posed by cyber threats. This paper will contribute to the growing body of literature on cybersecurity policy and offers a policy framework for addressing this critical policy challenge.

Keywords: security risk, legal framework, cyber security and policy, national security

Procedia PDF Downloads 94
10673 Determining Water Infiltration Zone Using 2-D Resistivity Imaging Technique

Authors: Azim Hilmy Mohamad Yusof, Muhamad Iqbal Mubarak Faharul Azman, Nur Azwin Ismail, Noer El Hidayah Ismail

Abstract:

Infiltration is the process by which precipitation or water soaks into subsurface soils and moves into rocks through cracks and pore spaces. This paper explains how the water infiltration will be identified using 2-D resistivity imaging. Padang Minden, in Universiti Sains Malaysia, Penang has been chosen as the survey area during this study. The study area consists of microcline granite with grain size of medium to coarse. 2-D Resistivity Imaging survey is used to detect subsurface layer for many years by making measurements on the ground surface. The result shows that resistivity value of 0.015 Ωm - 10 Ωm represent the salt water intrusion zone while the resistivity value of 11 Ωm - 100 Ωm is suggested as the boundary zone between the salt water intrusion zone and low saturated zone.

Keywords: 2-D resistivity imaging, microcline granite, salt water intrusion, water infiltration

Procedia PDF Downloads 342
10672 Design of a New Architecture of IDS Called BiIDS (IDS Based on Two Principles of Detection)

Authors: Yousef Farhaoui

Abstract:

An IDS is a tool which is used to improve the level of security.In this paper we present different architectures of IDS. We will also discuss measures that define the effectiveness of IDS and the very recent works of standardization and homogenization of IDS. At the end, we propose a new model of IDS called BiIDS (IDS Based on the two principles of detection).

Keywords: intrusion detection, architectures, characteristic, tools, security

Procedia PDF Downloads 462
10671 Water Temperature on Early Age Concrete Property

Authors: Tesfaye Sisay Dessalegn

Abstract:

The long-term performance of concrete structures is affected by the properties and behavior of concrete at an early age. However, the fundamental mechanisms affecting the early-age behavior of concrete have not yet been fully studied. The effect of water temperature on concrete is not sufficiently studied, and at the same time, the majority of studies focused on the effect of mixing water temperature on the workability and mechanical properties of concrete. However, to the best of the authors' knowledge, the effect of mixing water temperatures on plastic shrinkage cracking of concrete has not been studied yet.

Keywords: water temperature, early age concrete strength, mechanical properties of concrete, strength

Procedia PDF Downloads 58
10670 Experimental Support for the District Metered Areas/Pressure Management Areas Application

Authors: K. Ilicic, D. Smoljan

Abstract:

The purpose of the paper is to present and verify a methodology of decreasing water losses by introducing and managing District Metered Areas (DMA) and Pressure Management Areas (PMA) by analyzing the results of the application of the methodology to the water supply system of the city of Zagreb. Since it is a relatively large system that has been expanding rapidly, approach to addressing water losses was possible only by splitting the system to smaller flow and pressure zones. Besides, the geographical and technical limitations had imposed the necessity of high pressure in the system that needed to be reduced to the technically optimal level. Results of activities were monitored on a general and local level by establishing, monitoring, and controlling indicators that had been established by the International Water Association (IWA), among which the most recognizable were non-revenue water, water losses and real losses as presented in the paper.

Keywords: district metered area, pressure metered area, active leakage control, water losses

Procedia PDF Downloads 184
10669 Effective Strategies Migrants Adopted to Improve Food Security in a Regional Area of Australia

Authors: Joanne Sin Wei Yeoh, Quynh Lê, Daniel R. Terry, Rosa Mc Manamey

Abstract:

Food security is a global issue and one of the concerns in Australia, particularly in regional and rural areas. Despite Australia’s current ability to produce enough food to feed more than its current population, evidence has been accumulating over the last decade to demonstrate many Australians struggle to feed themselves, including immigrants from cultural and linguistically diverse (CALD) backgrounds. This study aims to identify the acculturation strategies used by migrants to enhance their approach to food security in Tasmania. The study employed a mixed methods approach that used both questionnaires and semi-structured interviews with migrants living in Tasmania. Descriptive and inferential statistics was used to analyse data collected from questionnaire, whereas, thematic analysis was employed to analyse the interview data. Migrants (n=301) completed the questionnaire with a response rate of 50.2% and 33 follow-up interviews were conducted. We found that majority of the migrants (70.0%) replaced food ingredients and went without the food they could not buy from shops with similar ingredients. Support and advice from friends were effective ways to improve their food access. Additionally, length of stays in Tasmania and region of origin were significantly associated with the ways migrants dealing with food security. The interview results revealed that migrants managed to adapt to the new food culture by using different acculturation strategies, including access food ingredients from other country; adjusting or adapting; home gardening and access to technology. In addition, social and cultural capitals were also treated as vital roles in improving migrants’ food security. To summarize, migrants employed different strategies for food security while acculturating into the new environment. Our findings could become the guidelines for migrants and relevant government or private sectors that address food security.

Keywords: food security, migrants, strategies, inferential statistics

Procedia PDF Downloads 527
10668 Effect of Wettability Alteration in Low Salt Water Injection Modeling

Authors: H. Vahdani

Abstract:

By the adsorption of polar compounds and/or the deposition of organic material, the wettability of originally water-wet reservoir rock can be altered. The degree of alteration is determined by the interaction of the oil constituents, the mineral surface, and the brine chemistry. Recently improving oil recovery by tuning wettability alteration is believed as a new recovery method. Various researchers have demonstrated that low salt water injection has a significant impact on oil recovery. It has been shown, for instance, that additional oil can be produced from reservoir rock by managing the injection water. Large wettability sensitivity has been observed, indicating that the oil/water capillary pressure profiles play a major role during low saline water injection simulation. Although the exact physics on how this alteration occurs is still a research topic; however, it has been reported that some of its effect can be captured by a relative permeability shift from an oil-wet system to a water-wet system. Modeling of low salt water injection mainly is based on the theory of wettability alteration and is hence strongly dependent on the wettability of the reservoir. In this article, combination of different wettabilities has been simulated and it is observed that the highest recoveries were from the cases were the reservoir initially was water-wet, and the lowest recoveries was from the cases were the reservoir initially was considered oil-wet. However for the cases where the reservoir initially was oil-wet, the effect of low-salinity waterflooding was the largest.

Keywords: low salt water injection, wettability alteration, modelling, relative permeability

Procedia PDF Downloads 499
10667 Silver Nanoparticles in Drinking Water Purification

Authors: S. Pooja Pragati, B. Sudarsan, S. Rajkumar

Abstract:

Silver nanoparticles (AgNP) are known for their excellent antimicrobial agents, and thus can be used as alternative disinfectant agents. However, released silver nanoparticles is a threat to naturally occurring microorganisms. This paper exhibits information on the environmental fate, toxicological effects, and application of AgNP and the current estimate on the physicochemical and antimicrobial properties of AgNP in different aqueous solutions, as well as their application as alternative disinfectants in water-treatment systems. It also gives a better approximation and experimental data of AgNP’s antimicrobial properties at different water chemistry conditions. A saturation-type fitting curve was established, showing the survival of bacteria under different water chemistry conditions as a function of the size of the nanoparticles. The results obtained show that silver nanoparticles in surface water, ground water, and brackish water are stable. The paper demonstrates the comparative study of AgNP-impregnated point-of-use ceramic water filters and ceramic filters impregnated with silver nitrate. It is observed that AgNP-impregnated ceramic water filters are more appropriate for this application due to the lesser amount of silver desorbed. Experimental data of the comparison of a polymer-based quaternary amine functionalized silsesquioxanes compound and AgNP are also tabulated and conclusions are analysed with the goal of optimizing. The simplicity of synthesis and application of Silver nanoparticles enables us to consider its effective modified version for the purification of water.

Keywords: disinfectant agent, purification of water, nano particles, water treatment

Procedia PDF Downloads 337
10666 Evaluating Water Quality Index of Euphrates River South-West Part of Iraq, Najaf, Alhadaria by Using GIS Technique

Authors: Ali Abojassim, Nabeel Kadhim, Adil Jaber, Ali Hussein

Abstract:

Water quality index (WQI) is valuable and unique rating to depict the total water quality status in a single term that is helpful for the selection of appropriate treatment technique to meet the concerned issues. Fifteen surface water samples were collected from the Euphrates river within AlHaydria is sub district of AL-Najaf (Iraq). The quality of surface water were evaluated by testing various physicochemical parameters such as pH, Total Dissolved Solid (TDS), , Calcium, Chloride, Sulphate and Electrical conductivity. The WQI for all samples were found in the range of 25.92 to 47.22. The highest value of WQI was observed in the Ali Hajj Hassan(SW4,SW8), El Haj Abdel Sayed (SW 10 to SW 12)and Hasan alsab(SW 14) sampling locations. Most of the water samples within study area were found good to moderate categories. most of the water samples for study area were found good as well as moderate categories

Keywords: water quality index, GIS, physicochemical parameters, Iraq Standards for irrigation purpose 2012

Procedia PDF Downloads 158
10665 Physiochemical Parameters Assessment and Evaluation of the Quality of Drinking Water in Some Parts of Lagos State

Authors: G. T. Mudashiru, Mayowa P. Ibitola

Abstract:

Investigation was carried out at Ikorodu North local council development area of Lagos state using physiochemical parameters to study the quality drinking water. It was ascertained that the human functions and activities were dependent on the continuous and availability of good drinking water. Six water samples were collected at six different boreholes from various outlets and homes in Ikorodu North local council development area. Lagos state Nigeria. Analysis was carried out to determine the purity of water for domestic use. Physicochemical properties evaluation was adapted using standard chemical methods. A number of parameters such as PH, turbidity, conductivity, total dissolved solids, color, chloride, sulphate, nitrate, hardness were determined. Heavy metals such as Zn, Mg, Fe, Pb, Hg, and Mn as well as total coliform counts were observed. The resulted values of each parameter were justified with World Health Organization (WHO) and Lagos state water regulatory commission LSWRC standard values for quantitative comparison. The result reveals that all the water had pH value well below the WHO maximum permissible level for potable water. Other physicochemical parameters were within the safe limit of WHO standard showing the portability nature of the water. It can be concluded that though the water is potable, there should be a kind of treatment of the water before consumption to prevent outbreak of diseases.

Keywords: drinking water, physiology, boreholes, heavy metals, domestic

Procedia PDF Downloads 221
10664 Improving Digital Data Security Awareness among Teacher Candidates with Digital Storytelling Technique

Authors: Veysel Çelik, Aynur Aker, Ebru Güç

Abstract:

Developments in information and communication technologies have increased both the speed of producing information and the speed of accessing new information. Accordingly, the daily lives of individuals have started to change. New concepts such as e-mail, e-government, e-school, e-signature have emerged. For this reason, prospective teachers who will be future teachers or school administrators are expected to have a high awareness of digital data security. The aim of this study is to reveal the effect of the digital storytelling technique on the data security awareness of pre-service teachers of computer and instructional technology education departments. For this purpose, participants were selected based on the principle of volunteering among third-grade students studying at the Computer and Instructional Technologies Department of the Faculty of Education at Siirt University. In the research, the pretest/posttest half experimental research model, one of the experimental research models, was used. In this framework, a 6-week lesson plan on digital data security awareness was prepared in accordance with the digital narration technique. Students in the experimental group formed groups of 3-6 people among themselves. The groups were asked to prepare short videos or animations for digital data security awareness. The completed videos were watched and evaluated together with prospective teachers during the evaluation process, which lasted approximately 2 hours. In the research, both quantitative and qualitative data collection tools were used by using the digital data security awareness scale and the semi-structured interview form consisting of open-ended questions developed by the researchers. According to the data obtained, it was seen that the digital storytelling technique was effective in creating data security awareness and creating permanent behavior changes for computer and instructional technology students.

Keywords: digital storytelling, self-regulation, digital data security, teacher candidates, self-efficacy

Procedia PDF Downloads 127