Search results for: water security
10603 Evaluation and Analysis of the Secure E-Voting Authentication Preparation Scheme
Authors: Nidal F. Shilbayeh, Reem A. Al-Saidi, Ahmed H. Alsswey
Abstract:
In this paper, we presented an evaluation and analysis of E-Voting Authentication Preparation Scheme (EV-APS). EV-APS applies some modified security aspects that enhance the security measures and adds a strong wall of protection, confidentiality, non-repudiation and authentication requirements. Some of these modified security aspects are Kerberos authentication protocol, PVID scheme, responder certificate validation, and the converted Ferguson e-cash protocol. Authentication and privacy requirements have been evaluated and proved. Authentication guaranteed only eligible and authorized voters were permitted to vote. Also, the privacy guaranteed that all votes will be kept secret. Evaluation and analysis of some of these security requirements have been given. These modified aspects will help in filtering the counter buffer from unauthorized votes by ensuring that only authorized voters are permitted to vote.Keywords: e-voting preparation stage, blind signature protocol, Nonce based authentication scheme, Kerberos Authentication Protocol, pseudo voter identity scheme PVID
Procedia PDF Downloads 29910602 Oil Displacement by Water in Hauterivian Sandstone Reservoir of Kashkari Oil Field
Authors: A. J. Nazari, S. Honma
Abstract:
This paper evaluates oil displacement by water in Hauterivian sandstone reservoir of Kashkari oil field in North of Afghanistan. The core samples of this oil field were taken out from well No-21st, and the relative permeability and fractional flow are analyzed. Steady state flow laboratory experiments are performed to empirically obtain the fractional flow curves and relative permeability in different water saturation ratio. The relative permeability represents the simultaneous flow behavior in the reservoir. The fractional flow approach describes the individual phases as fractional of the total flow. The fractional flow curve interprets oil displacement by water, and from the tangent of fractional flow curve can find out the average saturation behind the water front flow saturation. Therefore, relative permeability and fractional flow curves are suitable for describing the displacement of oil by water in a petroleum reservoir. The effects of irreducible water saturation, residual oil saturation on the displaceable amount of oil are investigated through Buckley-Leveret analysis.Keywords: fractional flow, oil displacement, relative permeability, simultaneously flow
Procedia PDF Downloads 39410601 Investigation of Surface Water Quality Intera-Annual Variations, Gorganroud Basin, Iran
Authors: K. Ebrahimi, S. Shahid, H. Dehban
Abstract:
Climate variability can affect surface water quality. The objective of present study is to assess the impacts of climate variability on water quality of Gorganroud River, Iran, over the time period 1971 to 2011. To achieve this aim, climate variability and water quality variations were studied involving a newly developed drought index (MRDI) and hysteresis curves, respectively. The results show that climate variability significantly affected surface water quality over the time. The existence of yearly internal variation and hysteresis phenomenon for pH and EC parameters was observed. It was found that though drought affected pH considerably, it could not affect EC significantly.Keywords: climate variability, hysteresis curves, multi drought index, water quality
Procedia PDF Downloads 36910600 In a Situation of Great Distress: Cross Border Migration and the Quest for Enduring Security in North-East Nigeria
Authors: Nuhu Bitrus Mailabari
Abstract:
Nigeria is a highly multifarious nation trapped between affluence and affliction. On one hand, the state has vast territorial size, economic strength, relative internal cohesion, and good external linkages. On the other, it is bedeviled with enormous challenges. It is common knowledge that the North-East geo-political zone has suffered colossal destruction for the most part of the last ten years due to the activities of the insurgent group Boko Haram. Several factors (political, economic, religious, socio-cultural) have been credited with the heightened insecurity in the region. Without a doubt, the security crisis in the region has rekindled several discussions critical to Nigeria’s security architecture. However, the debate on finding an enduring solution to the devastation in the North East continually neglects the nexus between cross border migration and national security. Using content analysis, this paper debates two main issues that continue to affect security in the North East. One, the cumulative impact of the Economic Community of West African States (ECOWAS) protocol on the free movement of people and goods. Two, the porous nature of Nigeria’s borders. Theoretically, the paper will rely on the systems theory because of its broad focus on structure, linkage, and process. The work concludes in twofold. First, that cross border migration and poor border management processes further worsened the political and socio-economic conditions of a region that is already in a bad state. Secondly, in addition to the existing strategies, Nigeria must develop a holistic approach including new methods of handling cross border movements in solving the security issues.Keywords: border, cross border, migration, Nigeria, northeast region, security
Procedia PDF Downloads 16910599 Direct Palladium-Catalyzed Selective N-Allylation of 2,3-Disubstituted Indoles with Allylic Alcohols in Water
Authors: Bai-Jing Peng, Shyh-Chyun Yang
Abstract:
Organic reactions in water have recently attracted much attention, not only because unique reactivity is often observed in water but also because water is a safe and economical substitute for conventional organic solvents. Thus, development of environmental safe, atom-economical reactions in water is one of the most important goals of synthetic chemistry. The recent paper has documented renewed interest in the use of allylic substrates in the synthesis of new C−C, C−N, and C−O bonds. We have reported our attempts and some successful applications of a process involving the C-O bond cleavage catalyzed by palladium or platinum complexes in water. Because of the importance of heterocycle indole derivatives, much effort has been directed toward the development of methods for functionalization of the indole nucleus at N1 site. In our research, the palladium-catalyzed 2,3-disubstitued indoles with allylic alcohols was investigated under different conditions. Herein, we will establish a simple, convenient, and efficient method, which affords high yields of allylated indoles.Keywords: palladium-catalyzed, allylic alcohols, indoles, water, allylation
Procedia PDF Downloads 23810598 Multivariate Analysis on Water Quality Attributes Using Master-Slave Neural Network Model
Authors: A. Clementking, C. Jothi Venkateswaran
Abstract:
Mathematical and computational functionalities such as descriptive mining, optimization, and predictions are espoused to resolve natural resource planning. The water quality prediction and its attributes influence determinations are adopted optimization techniques. The water properties are tainted while merging water resource one with another. This work aimed to predict influencing water resource distribution connectivity in accordance to water quality and sediment using an innovative proposed master-slave neural network back-propagation model. The experiment results are arrived through collecting water quality attributes, computation of water quality index, design and development of neural network model to determine water quality and sediment, master–slave back propagation neural network back-propagation model to determine variations on water quality and sediment attributes between the water resources and the recommendation for connectivity. The homogeneous and parallel biochemical reactions are influences water quality and sediment while distributing water from one location to another. Therefore, an innovative master-slave neural network model [M (9:9:2)::S(9:9:2)] designed and developed to predict the attribute variations. The result of training dataset given as an input to master model and its maximum weights are assigned as an input to the slave model to predict the water quality. The developed master-slave model is predicted physicochemical attributes weight variations for 85 % to 90% of water quality as a target values.The sediment level variations also predicated from 0.01 to 0.05% of each water quality percentage. The model produced the significant variations on physiochemical attribute weights. According to the predicated experimental weight variation on training data set, effective recommendations are made to connect different resources.Keywords: master-slave back propagation neural network model(MSBPNNM), water quality analysis, multivariate analysis, environmental mining
Procedia PDF Downloads 47710597 The Impact of Undocumented Migration on Human Security in Northern Nigeria
Authors: Targba Aondowase
Abstract:
Undocumented migration along Nigeria’s boarder with Cameroon, Chad and Niger is a key issue in tackling the human security challenges in the region as the security situation cannot be contained without proper boarder control. The paper adopts migration systems theory which asserts that migration alters the social, cultural, economic, and institutional conditions at both the sending and receiving ends to explain the influence of unregistered migrants on institutional changes as it affects the security situation in Northern Nigeria. It was found that undocumented migration is majorly influenced by poverty, illegal trade, wars and asylum. The study also discovers that Nigerian boarders are porous with over 250 footpaths that link directly to Cameroon, Chad and Niger, making the proliferation of small arms and light weapons a transnational organized crime in the region. These porous borders are unmanned by security operatives with limited government presence in the boarder communities. The study also found that undocumented immigrants are easily integrated into the northern communities due to common religious beliefs and race where they carry out normal and civic functions without obstruction. The paper concluded that the level of undocumented migration in Northern Nigeria is high due to unmanned and porous borders. The paper therefore recommended that the security agencies should be strengthened through adequate funding, innovative technology, sound policies and proficient processes that will help protect the country’s borders. The National Populations Commission and the National Identity Management Commission should be strengthened to have a good data base of the country’s citizens and there should be international cooperation between the neighbouring countries to tackle illegal migration and illegal trade along the borders. The findings and recommendations of this paper will serve as a guide towards curtailing the impact of undocumented migration on human security in Northern Nigeria.Keywords: human security, impact, migration, undocumented
Procedia PDF Downloads 33510596 Process Integration: Mathematical Model for Contaminant Removal in Refinery Process Stream
Authors: Wasif Mughees, Malik Al-Ahmad
Abstract:
This research presents the graphical design analysis and mathematical programming technique to dig out the possible water allocation distribution to minimize water usage in process units. The study involves the mass and property integration in its core methodology. Tehran Oil Refinery is studied to implement the focused water pinch technology for regeneration, reuse and recycling of water streams. Process data is manipulated in terms of sources and sinks, which are given in terms of properties. Sources are the streams to be allocated. Sinks are the units which can accept the sources. Suspended Solids (SS) is taken as a single contaminant. The model minimizes the mount of freshwater from 340 to 275m3/h (19.1%). Redesigning and allocation of water streams was built. The graphical technique and mathematical programming shows the consistency of results which confirms mass transfer dependency of water streams.Keywords: minimization, water pinch, process integration, pollution prevention
Procedia PDF Downloads 31910595 Balancing Act: Political Dynamics of Economic and Climatological Security in the Politics of the Middle East
Authors: Zahra Bakhtiari
Abstract:
Middle East countries confront a multitude of main environmental challenges which are inevitable. The unstable economic and political structure which dominates numerous middle East countries makes it difficult to react effectively to unfavorable climate change impacts. This study applies a qualitative methodology and relies on secondary literature aimed to investigate how countries in the Middle East are balancing economic security and climatic security in terms of budgeting, infrastructure investment, political engagement (domestically through discourses or internationally in terms of participation in international organizations or bargaining, etc.) There has been provided an outline of innovative measures in both economic and environmental fields that are in progress in the Middle East countries and what capacity they have for economic development and environmental adaptation, as well as what has already been performed. The primary outcome is that countries that rely more on infrastructure investment such as negative emissions technologies (NET) through green social capital enterprises and political engagement, especially nationally determined contributions (NDCs) commitments and United Nations Framework Convention on Climate Change (UNFCCC), experience more economic and climatological security balance in the Middle East. Since implementing these measures is not the same in all countries in the region, we see different levels of balance between climate security and economic security. The overall suggestion is that the collaboration of both the bottom-up and top-down approaches helps create strategic environmental strategies which are in line with the economic circumstances of each country and creates the desired balance.Keywords: climate change, economic growth, sustainability, the Middle East, green economy, renewable energy
Procedia PDF Downloads 8110594 Building Climate Resilience in the Health Sector in Developing Countries: Experience from Tanzania
Authors: Hussein Lujuo Mohamed
Abstract:
Introduction: Public health has always been influenced by climate and weather. Changes in climate and climate variability, particularly changes in weather extremes affect the environment that provides people with clean air, food, water, shelter, and security. Tanzania is not an exception to the threats of climate change. The health sector is mostly affected due to emergence and proliferation of infectious diseases, thereby affecting health of the population and thus impacting achievement of sustainable development goals. Methodology: A desk review on documented issues pertaining to climate change and health in Tanzania was done using Google search engine. Keywords included climate change, link, health, climate initiatives. In cases where information was not available, documents from Ministry of Health, Vice Presidents Office-Environment, Local Government Authority, Ministry of Water, WHO, research, and training institutions were reviewed. Some of the reviewed documents from these institutions include policy brief papers, fieldwork activity reports, training manuals, and guidelines. Results: Six main climate resilience activities were identified in Tanzania. These were development and implementation of climate resilient water safety plans guidelines both for rural and urban water authorities, capacity building of rural and urban water authorities on implementation of climate-resilient water safety plans, and capacity strengthening of local environmental health practitioners on mainstreaming climate change and health into comprehensive council health plans. Others were vulnerability and adaptation assessment for the health sector, mainstreaming climate change in the National Health Policy, and development of risk communication strategy on climate. In addition information, education, and communication materials on climate change and to create awareness were developed aiming to sensitize and create awareness among communities on climate change issues and its effect on public health. Conclusion: Proper implementation of these interventions will help the country become resilient to many impacts of climate change in the health sector and become a good example for other least developed countries.Keywords: climate, change, Tanzania, health
Procedia PDF Downloads 12110593 Security Analysis of SIMSec Protocol
Authors: Kerem Ok, Cem Cevikbas, Vedat Coskun, Mohammed Alsadi, Busra Ozdenizci
Abstract:
Un-keyed SIM cards do not contain the required security infrastructure to provide end-to-end encryption with Service Providers. Hence, new, emerging, or smart services those require end-to-end encryption between SIM card and a Service Provider is impossible. SIMSec key exchange protocol creates symmetric keys between SIM card and Service Provider. After a successful protocol execution, SIM card and Service Provider creates the symmetric keys and can perform end-to-end data encryption when required. In this paper, our aim is to analyze the SIMSec protocol’s security. According to the results, SIM card and Service Provider can generate keys securely using SIMSec protocol.Keywords: End-to-end encryption, key exchange, SIM card, smart card
Procedia PDF Downloads 28510592 Freezing Characteristics and Texture Variation of Apple Fruits after Dehydrofreezing Assisted by Instant Controlled Pressure Drop Treatment
Authors: Leila Ben Haj Said, Sihem Bellagha, Karim Allaf
Abstract:
The present study deals with the dehydrofreezing assisted by instant controlled pressure drop (DIC) treatment of apple fruits. Samples previously dehydrated until different water contents (200, 100, and 30% dry basis (db)) and DIC treated were frozen at two different freezing velocities (V+ and V-), depending on the thermal resistance established between the freezing airflow and the sample surface. The effects of sample water content (W) and freezing velocity (V) on freezing curves and characteristics, exudate water (EW) and texture variation were examined. Lower sample water content implied higher freezing rates, lower initial freezing points (IFP), lower practical freezing time (PFT), and lower specific freezing time (SFT). EW (expressed in g exudate water/100 g water in the product) of 200% and 100% db apple samples was approximately 3%, at low freezing velocity (V-). Whereas, it was lower than 0.5% for apple samples with 30% db water content. Moreover, the impact of freezing velocity on EW was significant and very important only for high water content samples. For samples whose water content was lower than 100% db, firmness (maximum puncture force) was as higher as the water content was lower, without any insignificant impact of freezing velocity.Keywords: dehydrofreezing, instant controlled pressure drop DIC, freezing time, texture
Procedia PDF Downloads 38010591 Drinking Water Quality Assessment Using Fuzzy Inference System Method: A Case Study of Rome, Italy
Authors: Yas Barzegar, Atrin Barzegar
Abstract:
Drinking water quality assessment is a major issue today; technology and practices are continuously improving; Artificial Intelligence (AI) methods prove their efficiency in this domain. The current research seeks a hierarchical fuzzy model for predicting drinking water quality in Rome (Italy). The Mamdani fuzzy inference system (FIS) is applied with different defuzzification methods. The Proposed Model includes three fuzzy intermediate models and one fuzzy final model. Each fuzzy model consists of three input parameters and 27 fuzzy rules. The model is developed for water quality assessment with a dataset considering nine parameters (Alkalinity, Hardness, pH, Ca, Mg, Fluoride, Sulphate, Nitrates, and Iron). Fuzzy-logic-based methods have been demonstrated to be appropriate to address uncertainty and subjectivity in drinking water quality assessment; it is an effective method for managing complicated, uncertain water systems and predicting drinking water quality. The FIS method can provide an effective solution to complex systems; this method can be modified easily to improve performance.Keywords: water quality, fuzzy logic, smart cities, water attribute, fuzzy inference system, membership function
Procedia PDF Downloads 7610590 e-Learning Security: A Distributed Incident Response Generator
Authors: Bel G Raggad
Abstract:
An e-Learning setting is a distributed computing environment where information resources can be connected to any public network. Public networks are very unsecure which can compromise the reliability of an e-Learning environment. This study is only concerned with the intrusion detection aspect of e-Learning security and how incident responses are planned. The literature reported great advances in intrusion detection system (ids) but neglected to study an important ids weakness: suspected events are detected but an intrusion is not determined because it is not defined in ids databases. We propose an incident response generator (DIRG) that produces incident responses when the working ids system suspects an event that does not correspond to a known intrusion. Data involved in intrusion detection when ample uncertainty is present is often not suitable to formal statistical models including Bayesian. We instead adopt Dempster and Shafer theory to process intrusion data for the unknown event. The DIRG engine transforms data into a belief structure using incident scenarios deduced by the security administrator. Belief values associated with various incident scenarios are then derived and evaluated to choose the most appropriate scenario for which an automatic incident response is generated. This article provides a numerical example demonstrating the working of the DIRG system.Keywords: decision support system, distributed computing, e-Learning security, incident response, intrusion detection, security risk, statefull inspection
Procedia PDF Downloads 43810589 A PHREEQC Reactive Transport Simulation for Simply Determining Scaling during Desalination
Authors: Andrew Freiburger, Sergi Molins
Abstract:
Freshwater is a vital resource; yet, the supply of clean freshwater is diminishing as the consequence of melting snow and ice from global warming, pollution from industry, and an increasing demand from human population growth. The unsustainable trajectory of diminishing water resources is projected to jeopardize water security for billions of people in the 21st century. Membrane desalination technologies may resolve the growing discrepancy between supply and demand by filtering arbitrary feed water into a fraction of renewable, clean water and a fraction of highly concentrated brine. The leading hindrance of membrane desalination is fouling, whereby the highly concentrated brine solution encourages micro-organismal colonization and/or the precipitation of occlusive minerals (i.e. scale) upon the membrane surface. Thus, an understanding of brine formation is necessary to mitigate membrane fouling and to develop efficacious desalination technologies that can bolster the supply of available freshwater. This study presents a reactive transport simulation of brine formation and scale deposition during reverse osmosis (RO) desalination. The simulation conceptually represents the RO module as a one-dimensional domain, where feed water directionally enters the domain with a prescribed fluid velocity and is iteratively concentrated in the immobile layer of a dual porosity model. Geochemical PHREEQC code numerically evaluated the conceptual model with parameters for the BW30-400 RO module and for real water feed sources – e.g. the Red and Mediterranean seas, and produced waters from American oil-wells, based upon peer-review data. The presented simulation is computationally simpler, and hence less resource intensive, than the existent and more rigorous simulations of desalination phenomena, like TOUGHREACT. The end-user may readily prepare input files and execute simulations on a personal computer with open source software. The graphical results of fouling-potential and brine characteristics may therefore be particularly useful as the initial tool for screening candidate feed water sources and/or informing the selection of an RO module.Keywords: desalination, PHREEQC, reactive transport, scaling
Procedia PDF Downloads 13610588 Relation between Properties of Internally Cured Concrete and Water Cement Ratio
Authors: T. Manzur, S. Iffat, M. A. Noor
Abstract:
In this paper, relationship between different properties of IC concrete and water cement ratio, obtained from a comprehensive experiment conducted on IC using local materials (Burnt clay chips- BC) is presented. In addition, saturated SAP was used as an IC material in some cases. Relationships have been developed through regression analysis. The focus of this analysis is on developing relationship between a dependent variable and an independent variable. Different percent replacements of BC and water cement ratios were used. Compressive strength, modulus of elasticity, water permeability and chloride permeability were tested and variations of these parameters were analyzed with respect to water cement ratio.Keywords: compressive strength, concrete, curing, lightweight, aggregate, superabsorbent polymer, internal curing
Procedia PDF Downloads 46410587 Effect of Cloud Computing on Enterprises
Authors: Amir Rashid
Abstract:
Today is the world of innovations where everyone is looking for a change. Organizations are now looking toward virtualization in order to minimize their computing cost. Cloud Computing has also introduced itself by the means of reducing computing cost. It offers different approach to make computing better by improving utilization and reducing infrastructure and administrative costs. Cloud Computing is basically the amalgamation of Utility Computing and SaaS (Software as a Service). Cloud Computing is quite new to organizations as it is still at its deploying stage. Due to this reason, organizations are not confident whether to adopt it or not. This thesis investigates the problem for organization concerning the security and cost issues. Benefits and drawbacks are being highlighted which organizations can have or suffer in order to adopt Cloud Computing. In Conclusion, Cloud Computing is a better option available for small and medium organizations with a comparison to large companies both in terms of data security and cost.Keywords: cloud computing, security, cost, elasticity, PaaS, IaaS, SaaS
Procedia PDF Downloads 34210586 Assessment of Drinking Water Contamination from the Water Source to the Consumer in Palapye Region, Botswana
Authors: Tshegofatso Galekgathege
Abstract:
Poor water quality is of great concern to human health as it can cause disease outbreaks. A standard practice today, in developed countries, is that people should be provided with safe-reliable drinking water, as safe drinking water is recognized as a basic human right and a cost effective measure of reducing diseases. Over 1.1 billion people worldwide lack access to a safe water supply and as a result, the majority are forced to use polluted surface or groundwater. It is widely accepted that our water supply systems are susceptible to the intentional or accidental contamination .Water quality degradation may occur anywhere in the path that water takes from the water source to the consumer. Chlorine is believed to be an effective tool in disinfecting water, but its concentration may decrease with time due to consumption by chemical reactions. This shows that we are at the risk of being infected by waterborne diseases if chlorine in water falls below the required level of 0.2-1mg/liter which should be maintained in water and some contaminants enter into the water distribution system. It is believed that the lack of adequate sanitation also contributes to the contamination of water globally. This study therefore, assesses drinking water contamination from the source to the consumer by identifying the point vulnerable to contamination from the source to the consumer in the study area .To identify the point vulnerable to contamination, water was sampled monthly from boreholes, water treatment plant, water distribution system (WDS), service reservoirs and consumer taps from all the twenty (20) villages of Palapye region. Sampled water was then taken to the laboratory for testing and analysis of microbiological and chemical parameters. Water quality analysis were then compared with Botswana drinking water quality standards (BOS32:2009) to see if they comply. Major sources of water contamination identified during site visits were the livestock which were found drinking stagnant water from leaking pipes in 90 percent of the villages. Soils structure around the area was negatively affected because of livestock movement even vegetation in the area. In conclusion microbiological parameters of water in the study area do not comply with drinking water standards, some microbiological parameters in water indicated that livestock do not only affect land degradation but also the quality of water. Chlorine has been applied to water over some years but it is not effective enough thus preventative measures have to be developed, to prevent contaminants from reaching water. Remember: Prevention is better than cure.Keywords: land degradation, leaking systems, livestock, water contamination
Procedia PDF Downloads 35210585 Secure Content Centric Network
Authors: Syed Umair Aziz, Muhammad Faheem, Sameer Hussain, Faraz Idris
Abstract:
Content centric network is the network based on the mechanism of sending and receiving the data based on the interest and data request to the specified node (which has cached data). In this network, the security is bind with the content not with the host hence making it host independent and secure. In this network security is applied by taking content’s MAC (message authentication code) and encrypting it with the public key of the receiver. On the receiver end, the message is first verified and after verification message is saved and decrypted using the receiver's private key.Keywords: content centric network, client-server, host security threats, message authentication code, named data network, network caching, peer-to-peer
Procedia PDF Downloads 64610584 Bitplanes Gray-Level Image Encryption Approach Using Arnold Transform
Authors: Ali Abdrhman M. Ukasha
Abstract:
Data security needed in data transmission, storage, and communication to ensure the security. The single step parallel contour extraction (SSPCE) method is used to create the edge map as a key image from the different Gray level/Binary image. Performing the X-OR operation between the key image and each bit plane of the original image for image pixel values change purpose. The Arnold transform used to changes the locations of image pixels as image scrambling process. Experiments have demonstrated that proposed algorithm can fully encrypt 2D Gary level image and completely reconstructed without any distortion. Also shown that the analyzed algorithm have extremely large security against some attacks like salt & pepper and JPEG compression. Its proof that the Gray level image can be protected with a higher security level. The presented method has easy hardware implementation and suitable for multimedia protection in real time applications such as wireless networks and mobile phone services.Keywords: SSPCE method, image compression-salt- peppers attacks, bitplanes decomposition, Arnold transform, lossless image encryption
Procedia PDF Downloads 43910583 Conceptualizing the Cyber Insecurity Risk in the Ethics of Automated Warfare
Authors: Otto Kakhidze, Hoda Alkhzaimi, Adam Ramey, Nasir Memon
Abstract:
This paper provides an alternative, cyber security based a conceptual framework for the ethics of automated warfare. The large body of work produced on fully or partially autonomous warfare systems tends to overlook malicious security factors as in the possibility of technical attacks on these systems when it comes to the moral and legal decision-making. The argument provides a risk-oriented justification to why technical malicious risks cannot be dismissed in legal, ethical and policy considerations when warfare models are being implemented and deployed. The assumptions of the paper are supported by providing a broader model that contains the perspective of technological vulnerabilities through the lenses of the Game Theory, Just War Theory as well as standard and non-standard defense ethics. The paper argues that a conventional risk-benefit analysis without considering ethical factors is insufficient for making legal and policy decisions on automated warfare. This approach will provide the substructure for security and defense experts as well as legal scholars, ethicists and decision theorists to work towards common justificatory grounds that will accommodate the technical security concerns that have been overlooked in the current legal and policy models.Keywords: automated warfare, ethics of automation, inherent hijacking, security vulnerabilities, risk, uncertainty
Procedia PDF Downloads 35710582 Water Use Efficiency of Sunflower Genotypes Under Drip Irrigation
Authors: Adel M. Mahmoud
Abstract:
This Investigation was conducted to determine the productivity and water use efficiency for new sunflower genotypes. Ten sunflower genotypes were evaluated under drip irrigation using two treatments of. Results indicate that decreasing the amount of irrigation water from 1500 to 1130 mm/hectar significantly reduced all studied traits. Mutation (M1-63) surpassed all the other one genotypes in seed yield and WUE. Lines which gave the highest yield of the seed have water use efficiency under drought conditions higher than water use efficiency under normal irrigation. The lowest depression in seed yield due to drought conditions has been registered for Line 20, Line M1-63 and Sakha 53 genotypes (11 , 18 and 16 %, respectively). Genotypes (Line 20 , Line M1-63 and Sakha 53) are more tolerant to drought than others and we can used its in breeding program to develop sunflower hybrids suitable for cultivation under drought condition.Keywords: sunflower genotypes, water use efficiency, mutation, inbred lines
Procedia PDF Downloads 37910581 Possible Risks for Online Orders in the Furniture Industry - Customer and Entrepreneur Perspective
Authors: Justyna Żywiołek, Marek Matulewski
Abstract:
Data, is information processed by enterprises for primary and secondary purposes as processes. Thanks to processing, the sales process takes place; in the case of the surveyed companies, sales take place online. However, this indirect form of contact with the customer causes many problems for both customers and furniture manufacturers. The article presents solutions that would solve problems related to the analysis of data and information in the order fulfillment process sent to post-warranty service. The article also presents an analysis of threats to the security of this information, both for customers and the enterprise.Keywords: ordering furniture online, information security, furniture industry, enterprise security, risk analysis
Procedia PDF Downloads 4910580 Application of GPRS in Water Quality Monitoring System
Authors: V. Ayishwarya Bharathi, S. M. Hasker, J. Indhu, M. Mohamed Azarudeen, G. Gowthami, R. Vinoth Rajan, N. Vijayarangan
Abstract:
Identification of water quality conditions in a river system based on limited observations is an essential task for meeting the goals of environmental management. The traditional method of water quality testing is to collect samples manually and then send to laboratory for analysis. However, it has been unable to meet the demands of water quality monitoring today. So a set of automatic measurement and reporting system of water quality has been developed. In this project specifies Water quality parameters collected by multi-parameter water quality probe are transmitted to data processing and monitoring center through GPRS wireless communication network of mobile. The multi parameter sensor is directly placed above the water level. The monitoring center consists of GPRS and micro-controller which monitor the data. The collected data can be monitor at any instant of time. In the pollution control board they will monitor the water quality sensor data in computer using Visual Basic Software. The system collects, transmits and processes water quality parameters automatically, so production efficiency and economy benefit are improved greatly. GPRS technology can achieve well within the complex environment of poor water quality non-monitored, and more specifically applicable to the collection point, data transmission automatically generate the field of water analysis equipment data transmission and monitoring.Keywords: multiparameter sensor, GPRS, visual basic software, RS232
Procedia PDF Downloads 41410579 Synthesis of Iron Oxide Doped Zeolite: An Antimicrobial Nanomaterial for Drinking Water Purification Applications
Authors: Muhammad Zeeshan, Rabia Nazir, Lubna Tahir
Abstract:
Low cost filter based on iron doped zeolite (Fe-Z) and pottery clay was developed for an effective and efficient treatment of the drinking water contaminated with microbes. Fe-Z was characterized using powder XRD, SEM and EDX and shown to have average particle size of 49 nm with spongy appearance. The simulated samples of water self-contaminated with six microbes (S. typhi, B. subtilus, E. coli, S. aures, K. pneumoniae, and P. aeruginosa) after treatment with Fe-Z indicated effective removal of all the microbes in less than 30 min. Equally good results were obtained when actual drinking water samples, totally unfit for human consumption, were treated with Fe-Z.Keywords: iron doped zeolite, biological and chemical treatment, drinking water
Procedia PDF Downloads 44810578 Ancient Iran Water Technologies
Authors: Akbar Khodavirdizadeh, Ali Nemati Babaylou, Hassan Moomivand
Abstract:
The history of human access to water technique has been one of the factors in the formation of human civilizations in the ancient world. The technique that makes surface water and groundwater accessible to humans on the ground has been a clever technique in human life to reach the water. In this study, while examining the water technique of ancient Iran using the Qanats technique, the water supply system of different regions of the ancient world were also studied and compared. Six groups of the ancient region of ancient Greece (Archaic 480-750 BC and Classical 223-480 BC), Urartu in Tuspa (600-850 BC), Petra (106-168 BC), Ancient Rome (265 BC), and the ancient United States (1450 BC) and ancient Iranian water technologies were studied under water supply systems. Past water technologies in these areas: water transmission systems in primary urban centers, use of water structures in water control, use of bridges in water transfer, construction of waterways for water transfer, storage of rainfall, construction of various types of pottery- ceramic, lead, wood and stone pipes have been used in water transfer, flood control, water reservoirs, dams, channel, wells, and Qanat. The central plateau of Iran is one of the arid and desert regions. Archaeological, geomorphological, and paleontological studies of the central region of the Iranian plateau showed that without the use of Qanats, the possibility of urban civilization in this region was difficult and even impossible. Zarch aqueduct is the most important aqueduct in Yazd region. Qanat of Zarch is a plain Qanat with a gallery length of 80 km; its mother well is 85 m deep and has 2115 well shafts. The main purpose of building the Qanat of Zārch was to access the groundwater source and transfer it to the surface of the ground. Regarding the structure of the aqueduct and the technique of transferring water from the groundwater source to the surface, it has a great impact on being different from other water techniques in the ancient world. The results show that the use of water technologies in ancient is very important to understand the history of humanity in the use of hydraulic techniques.Keywords: ancient water technologies, groundwaters, qanat, human history, Ancient Iran
Procedia PDF Downloads 11210577 An Approach towards Smart Future: Ict Infrastructure Integrated into Urban Water Networks
Authors: Ahsan Ali, Mayank Ostwal, Nikhil Agarwal
Abstract:
Abstract—According to a World Bank report, millions of people across the globe still do not have access to improved water services. With uninterrupted growth of cities and urban inhabitants, there is a mounting need to safeguard the sustainable expansion of cities. Efficient functioning of the urban components and high living standards of the residents are needed to be ensured. The water and sanitation network of an urban development is one of its most essential parts of its critical infrastructure. The growth in urban population is leading towards increased water demand, and thus, the local water resources are severely strained. 'Smart water' is referred to water and waste water infrastructure that is able to manage the limited resources and the energy used to transport it. It enables the sustainable consumption of water resources through co-ordinate water management system, by integrating Information Communication Technology (ICT) solutions, intended at maximizing the socioeconomic benefits without compromising the environmental values. This paper presents a case study from a medium sized city in North-western Pakistan. Currently, water is getting contaminated due to the proximity between water and sewer pipelines in the study area, leading to public health issues. Due to unsafe grey water infiltration, the scarce ground water is also getting polluted. This research takes into account the design of smart urban water network by integrating ICT (Information and Communication Technology) with urban water network. The proximity between the existing water supply network and sewage network is analyzed and a design of new water supply system is proposed. Real time mapping of the existing urban utility networks will be projected with the help of GIS applications. The issue of grey water infiltration is addressed by providing sustainable solutions with the help of locally available materials, keeping in mind the economic condition of the area. To deal with the current growth of urban population, it is vital to develop new water resources. Hence, distinctive and cost effective procedures to harness rain water would be suggested as a part of the research study experiment.Keywords: GIS, smart water, sustainability, urban water management
Procedia PDF Downloads 21810576 Civilian and Military Responses to Domestic Security Threats: A Cross-Case Analysis of Belgium, France, and the United Kingdom
Authors: John Hardy
Abstract:
The domestic security environment in Europe has changed dramatically in recent years. Since January 2015, a significant number of domestic security threats that emerged in Europe were located in Belgium, France and the United Kingdom. While some threats were detected in the planning phase, many also resulted in terrorist attacks. Authorities in all three countries instituted special or emergency measures to provide additional security to their populations. Each country combined an additional policing presence with a specific military operation to contribute to a comprehensive security response to domestic threats. This study presents a cross-case analysis of three countries’ civilian and military responses to domestic security threats in Europe. Each case study features a unique approach to combining civilian and military capabilities in similar domestic security operations during the same time period and threat environment. The research design focuses on five variables relevant to the relationship between civilian and military roles in each security response. These are the distinction between policing and military roles, the legal framework for the domestic deployment of military forces, prior experience in civil-military coordination, the institutional framework for threat assessments, and the level of public support for the domestic use of military forces. These variables examine the influence of domestic social, political, and legal factors on the design of combined civil-military operations in response to domestic security threats. Each case study focuses on a specific operation: Operation Vigilant Guard in Belgium, Operation Sentinel in France, and Operation Temperer in the United Kingdom. The results demonstrate that the level of distinction between policing and military roles and the existence of a clear and robust legal framework for the domestic use force by military personnel significantly influence the design and implementation of civilian and military roles in domestic security operations. The findings of this study indicate that Belgium, France and the United Kingdom experienced different design and implementation challenges for their domestic security operations. Belgium and France initially had less-developed legal frameworks for deploying the military in domestic security operations than the United Kingdom. This was offset by public support for enacting emergency measures and the strength of existing civil-military coordination mechanisms. The United Kingdom had a well-developed legal framework for integrating civilian and military capabilities in domestic security operations. However, its experiences in Ireland also made the government more sensitive to public perceptions regarding the domestic deployment of military forces.Keywords: counter-terrorism, democracy, homeland security, intelligence, militarization, policing
Procedia PDF Downloads 14310575 Potato Production under Brakish Water and Compost Use
Authors: Samih Abubaker, Amjad Abuserhan, Ghandi Anfoka
Abstract:
Potato yield reduction and soil salt accumulation are the main obstacles of using brackish water in irrigation. This study was carried out at Al- Balqa` Applied University research station, to investigate the impact of compost use on potato production and salt accumulation in the soil under brackish water, during 2014 growing season. Whole tubers of three imported potato cultivars (Spunta, Faluka and Ammbetion) were planted in pots with different soil and compost percentages (0, 20, 40, 60, 80, and 100%) and were irrigated with three water salinity levels (1.25, 5 and 10 ds/cm). A split-split plot design was used, where potato cultivars were arranged in the main plots, the brackish water treatments were in the sub-main and the soil amended treatments were in the sub-sub plots. Potato yield was generally decreased only when pots were irrigated by water of 10 ds/cm salinity compared with 1.25 and 5 ds/cm. Drainage water salinity, however, was increased as compost percentage increased. Nevertheless, salt accumulation in the growing media was decreased as the compost percentage level increased. Therefore, it can be concluded that brackish water, up to 5 ds/cm can be used to irrigate potato especially, when organic amendments were added to the soil to promote plant growth, yield and reduce salt accumulation.Keywords: brackish water, compost, potato, salt accumulation
Procedia PDF Downloads 32310574 Effect of Acute Ingestion of Ice Water on Blood Pressure in Relation to Body Mass Index
Authors: Savitri Siddanagoudra, Shantala Herlekar, Priya Arjunwadekar
Abstract:
Background: The physiological response to water drinking in healthy subjects is an integrated response with an increase in sympathetic vasoconstrictor activity with induced bradycardia. Obesity is a modern pandemic, implicated in the pathogenesis of cardiovascular disease. In autonomic failure patients, water drinking has been shown the increased high blood pressure and bradycardia. Acute effects of ice water ingestion on blood pressure (BP) in relation to body mass index (BMI) is not addressed in literature. Objectives: Objective of this study is to evaluate BP before and after ingestion of cold water in all the three groups. Methods and Material: 60 healthy subjects between the age group of 18-24 yrs were selected and assigned into 3 groups based on BMI. BMI less than and equal to 25 kg/m2 is selected as Normal BMI group ,between 25- 29 kg/m2 as Overweight and BMI more than and equal to 30 kg/m2 as Obese. Procedure: Basal and after ingestion of 250 ml of cold water (7 0C ± 0.5 0C)BP was recorded in all the 3 groups. Results: Basal and after ice water ingestion BP increased statistically in all 3 groups. Conclusion: On acute ingestion of ice water overweight, obese may have more sympathoexcitaion compared to normal subjects.Keywords: blood pressure, body mass index, ice water, symathoexcitation
Procedia PDF Downloads 160