Search results for: conservation threats
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 1857

Search results for: conservation threats

1167 Location Management in Wireless Sensor Networks with Mobility

Authors: Amrita Anil Agashe, Sumant Tapas, Ajay Verma Yogesh Sonavane, Sourabh Yeravar

Abstract:

Due to advancement in MEMS technology today wireless sensors network has gained a lot of importance. The wide range of its applications includes environmental and habitat monitoring, object localization, target tracking, security surveillance etc. Wireless sensor networks consist of tiny sensor devices called as motes. The constrained computation power, battery power, storage capacity and communication bandwidth of the tiny motes pose challenging problems in the design and deployment of such systems. In this paper, we propose a ubiquitous framework for Real-Time Tracking, Sensing and Management System using IITH motes. Also, we explain the algorithm that we have developed for location management in wireless sensor networks with the aspect of mobility. Our developed framework and algorithm can be used to detect emergency events and safety threats and provides warning signals to handle the emergency.

Keywords: mobility management, motes, multihop, wireless sensor networks

Procedia PDF Downloads 398
1166 Volume Estimation of Trees: An Exploratory Study on Pterocarpus erinaceus Logging Operations within Forest Transition and Savannah Ecological Zones of Ghana

Authors: Albert Kwabena Osei Konadu

Abstract:

Pterocarpus erinaceus, also known as Rosewood, is tropical wood, endemic in forest savannah transition zones within the middle and northern portion of Ghana. Its economic viability has made it increasingly popular and in high demand, leading to widespread conservation concerns. Ghana’s forest resource management regime for these ecozones is mainly on conservation and very little on resource utilization. Consequently, commercial logging management standards are at teething stage and not fully developed, leading to a deficiency in the monitoring of logging operations and quantification of harvested trees volumes. Tree information form (TIF); a volume estimation and tracking regime, has proven to be an effective, sustainable management tool for regulating timber resource extraction in the high forest zones of the country. This work aims to generate TIF that can track and capture requisite parameters to accurately estimate the volume of harvested rosewood within forest savannah transition zones. Tree information forms were created on three scenarios of individual billets, stacked billets and conveying vessel basis. These TIFs were field-tested to deduce the most viable option for the tracking and estimation of harvested volumes of rosewood using the smallian and cubic volume estimation formula. Overall, four districts were covered with individual billets, stacked billets and conveying vessel scenarios registering mean volumes of 25.83m3,45.08m3 and 32.6m3, respectively. These adduced volumes were validated by benchmarking to assigned volumes of the Forestry Commission of Ghana and known standard volumes of conveying vessels. The results did indicate an underestimation of extracted volumes under the quotas regime, a situation that could lead to unintended overexploitation of the species. The research revealed conveying vessels route is the most viable volume estimation and tracking regime for the sustainable management of the Pterocarpous erinaceus species as it provided a more practical volume estimate and data extraction protocol.

Keywords: convention on international trade in endangered species, cubic volume formula, forest transition savannah zones, pterocarpus erinaceus, smallian’s volume formula, tree information form

Procedia PDF Downloads 69
1165 Souk Waqif in Old Doha, Qatar: Cultural Heritage, Urban Regeneration, and Sustainability

Authors: Djamel Boussaa

Abstract:

Cultural heritage and tourism have become during the last two decades dynamic areas of development in the world. The idea of heritage is crucial to the critical decision-making process as to how irreplaceable resources are to be utilized by people of the present or conserved for future generations in a fast changing world. In view of the importance of ‘heritage’ to the development of a tourist destination the emphasis on developing appropriate adaptive reuse strategies cannot be overemphasized. In October 1999, the 12th general assembly of the ICOMOS in Mexico stated, that in the context of sustainable development, two interrelated issues need urgent attention, cultural tourism and historic towns and cities. These two issues underscore the fact that historic resources are non-renewable, belonging to all of humanity. Without adequate adaptive reuse actions to ensure a sustainable future for these historic resources, may lead to their complete vanishing. The growth of tourism and its role in dispersing cultural heritage to everyone is developing rapidly. According to the World Tourism Organization, natural and cultural heritage resources are and will remain motivating factors for travel in the foreseeable future. According to the experts, people choose travel destinations where they can learn about traditional and distinct cultures in their historic context. The Qatar rich urban heritage is now being recognized as a valuable resource for future development. This paper discusses the role of cultural heritage and tourism in regenerating Souk Waqif, and consequently the city of Doha. Therefore, in order to use cultural heritage wisely, it will be necessary to position heritage as an essential element of sustainable development, giving particular attention to cultural heritage and tourism. The research methodology is based on an empirical survey of the situation, based on several visits, meetings and interviews with the local heritage players. The rehabilitation project initiated since 2004 will be examined and assessed. Therefore, there is potential to assess the situation and propose directions for a sustainable future to this historic landmark. Conservation for the sake of conservation appears to be an outdated concept. Many irreplaceable natural and cultural sites are being compromised because local authorities are not giving economic consideration to the value of rehabilitating such sites. The question to be raised here is 'How can cultural heritage be used wisely for tourism without compromising its social sustainability within the emerging global world?'

Keywords: cultural heritage, tourism, regeneration, economy, social sustainability

Procedia PDF Downloads 406
1164 Combustion Analysis of Suspended Sodium Droplet

Authors: T. Watanabe

Abstract:

Combustion analysis of suspended sodium droplet is performed by solving numerically the Navier-Stokes equations and the energy conservation equations. The combustion model consists of the pre-ignition and post-ignition models. The reaction rate for the pre-ignition model is based on the chemical kinetics, while that for the post-ignition model is based on the mass transfer rate of oxygen. The calculated droplet temperature is shown to be in good agreement with the existing experimental data. The temperature field in and around the droplet is obtained as well as the droplet shape variation, and the present numerical model is confirmed to be effective for the combustion analysis.

Keywords: analysis, combustion, droplet, sodium

Procedia PDF Downloads 197
1163 Participatory Planning of the III Young Sea Meeting: An Experience of the Young Albatroz Collective

Authors: Victor V. Ribeiro, Thais C. Lopes, Rafael A. A. Monteiro

Abstract:

The Albatroz, Baleia Jubarte, Coral Vivo, Golfinho Rotador and Tamar projects make up the Young Sea Network (YSN), part of the BIOMAR Network, which aims to integrate the environmental youths of the Brazilian coast. For this, three editions of the Young Sea Meeting (YSM) were performed. Seeking to stimulate belonging, self-knowledge, participation, autonomy and youth protagonism, the Albatroz Project hosted the III YSM, in Bertioga (SP), in April 2019 and aimed to collectively plan the meeting. Five pillars of Environmental Education were used: identity, community, dialogue, power to act and happiness, the OCA Method and the Young Educates Young; Young Chooses Young; and One Generation Learns from the Other principals. In December 2018, still in the II YSM, the participatory planning of the III YSM began. Two "representatives" of each group were voluntarily elected to facilitate joint decisions, propose, receive and communicate demands from their groups and coordinators. The Young Albatroz Collective (YAC) facilitated the organization process as a whole. The purpose of the meeting was collectively constructed, answering the following question: "What is the YSM for?". Only two of the five pairs of representatives responded. There was difficulty gathering the young people in each group, because it was the end of the year, with people traveling. Thus, due to the short planning time, the YAC built a pre-programming to be validated by the other groups, defining as the objective of the meeting the strengthening of youth protagonism within the YSN. In the planning process, the YAC held 20 meetings, with 60 hours of face-to-face work, in three months, and two technical visits to the headquarters of the III YSM. The participatory dynamics of consultation, when it occurred, required up to two weeks, evidencing the limits of participation. The project coordinations stated that they were not being included in the process by their young people. There is a need to work more to be able to aloud the participation, developing skills and understanding about its principles. This training must take place in an articulated way between the network, implying the important role of the five projects in jointly developing and implementing educator processes with this objective in a national dimension, but without forgetting the specificities of each young group. Finally, it is worth highlighting the great potential of the III YSM by stimulating the exercise of leading environmental youth in more than 50 young people from Brazilian coast, linked to the YSN, stimulating the learning and mobilization of young people in favor of coastal and marine conservation.

Keywords: Marine Conservation, Environmental Education, Youth, Participation, Planning

Procedia PDF Downloads 143
1162 A Review on the Necessities of Green Building in Bangladesh and Its Construction Process

Authors: Syeda Afsana Azad

Abstract:

Climate change, due to the release of greenhouse gases into the atmosphere has been recognized as one of the biggest threats to the present world. The condition of the earth is getting worse day by day due to climate change. Bangladesh is considered to be one of the most vulnerable countries to climate change due to large population, sharp urbanization, etc. Construction of green building is a very good solution to reduce the greenhouse effect. Green building technology refers to that kind of structures which are environmentally friendly and resource-efficient throughout a building’s service life. This technology can provide at least 50% energy saving opportunity to the nation. The necessity of the construction of structures in an environment-friendly way is increasing now. This study shows the scenario of rapid population growth, urbanization, necessity of green building in Bangladesh and also discusses the construction process of green building. As the present climate condition of Bangladesh is not friendly, construction of green building is very much needed. To battle climate change, it is mandatory to construct green building.

Keywords: Bangladesh, climate change, green building, green house effect

Procedia PDF Downloads 356
1161 Catch Composition and Amount of Illegal and Unreported Fishing in Iranian Coastal Waters - Hormozgan Province

Authors: Yasemi Mehran, Parsa Mehran, Farzingohar Mehrnaz

Abstract:

Illegal, unreported, and unregulated (IUU) fishing has been identified as one of the most serious threats to the sustainability of the world’s fisheries. In the present study, illegal and unreported fishing of different species in waters of Persian Gulf and Oman Sea (Hormozgan province) were evaluated. Among 47 species of 33 families identified in this study, with 39 species belong to teleosts, 4 species belong to elasmobranchs and 4 species belong to invertebrate. The total weight of illegal and unreported catch were 78525.22 tonnes. Maximum and minimum values were found for Dussumiera acuta (20640.74 tonnes) and Tenualosa ilisha (0.733 tonnes), respectively. The most commercial species group was scombridae, carangidae and clupeidae, respectively. Teleosts with 91.15%, elasmobranchs with 4.82 and invertebrates with 4.03% constituted total weight of illegal and unreported fishing. Results of this study provide valuable information in order to access a sustainable management on fish resources.

Keywords: catch composition, illegal, unreported fishing, Hormozgan province

Procedia PDF Downloads 270
1160 Finite Element Method for Solving the Generalized RLW Equation

Authors: Abdel-Maksoud Abdel-Kader Soliman

Abstract:

The General Regularized Long Wave (GRLW) equation is solved numerically by giving a new algorithm based on collocation method using quartic B-splines at the mid-knot points as element shape. Also, we use the Fourth Runge-Kutta method for solving the system of first order ordinary differential equations instead of finite difference method. Our test problems, including the migration and interaction of solitary waves, are used to validate the algorithm which is found to be accurate and efficient. The three invariants of the motion are evaluated to determine the conservation properties of the algorithm.

Keywords: generalized RLW equation, solitons, quartic b-spline, nonlinear partial differential equations, difference equations

Procedia PDF Downloads 475
1159 An Alternative to Resolve Land use Conflicts: the Rétköz Lake Project

Authors: Balázs Kulcsár

Abstract:

Today, there is no part of the world that does not bear the mark of man in some way. This process seems unstoppable. So perhaps the best thing we can do is to touch that handprint gently and with the utmost care. There are multiple uses for the same piece of land, the coordination of which requires careful and sustainable spatial planning. The case study of the Rétközlake in north-eastern Hungary illustrates a habitat rehabilitation project in which a number of human uses were coordinated with the conservation and restoration of the natural environment. Today, the good condition of the habitat can only be maintained artificially, but the project has paid particular attention to finding a sustainable solution. The rehabilitation of Lake Rétköz is considered good practice in resolving land-use conflicts.

Keywords: sustainability, ecosystem service, land use conflict, landscape utilization

Procedia PDF Downloads 139
1158 A Cross-Sectional Study Assessing Communication Practices among Doctors at a University Hospital in Pakistan

Authors: Muhammad Waqas Baqai, Noman Shahzad, Rehman Alvi

Abstract:

Communication among health care givers is the essence of quality patient care and any compromise results in errors and inefficiency leading to cumbersome outcomes. The use of smartphone among health professionals has increased tremendously. Almost every health professional carries it and majority of them uses a third party communication software called whatsApp for work related communications. It gives instant access to the person responsible for any particular query and therefore helps in efficient and timely decision making. It is also an easy way of sharing medical documents, multimedia and provides platform for consensual decision making through group discussions. However clinical communication through whatsApp has some demerits too including reduction in verbal communication, worsening professional relations, unprofessional behavior, risk of confidentiality breach and threats from cyber-attacks. On the other hand the traditional pager device being used in many health care systems is a unidirectional communication that lacks the ability to convey any information other than the number to which the receiver has to respond. Our study focused on these two widely used modalities of communication among doctors of the largest tertiary care center of Pakistan i.e. The Aga Khan University Hospital. Our aim was to note which modality is considered better and has fewer threats to medical data. Approval from ethical review committee of the institute was taken prior to conduction of this study. We submitted an online survey form to all the interns and residents working at our institute and collected their response in a month’s time. 162 submissions were recorded and analyzed using descriptive statistics. Only 20% of them were comfortable with using pagers exclusively, 52% with whatsApp and 28% with both. 65% think that whatsApp is time-saving and quicker than pager. 54% of them considered whatsApp to be causing nuisance from work related notifications in their off-work hours. 60% think that they are more likely to miss information through pager system because of the unidirectional nature. Almost all (96%) of residents and interns found whatsApp to be useful in terms of saving information for future reference. For urgent issues, majority (70%) preferred pager over whatsApp and also pager was considered more valid in terms of hospital policies and legal issues. Among major advantages of whatsApp as listed by them were; easy mass communication, sharing of clinical pictures, universal access and no need of carrying additional device. However the major drawback of using whatsApp for clinical communication that everyone shared was threat to patients’ confidentiality as clinicians usually share pictures of wounds, clinical documents etc. Lastly we asked them if they think there is a need of a separate application for instant communication dedicated to clinical communication only and 90% responded positively. Therefore, we concluded that both modalities have their merits and demerits but the greatest drawback with whatsApp is the risk of breach in patients’ confidentiality and off-work disturbance. Hence, we recommend a more secure, institute-run application for all intra hospital communications where they can share documents, pictures etc. easily under a controlled environment.

Keywords: WhatsApp, pager, clinical communication, confidentiality

Procedia PDF Downloads 123
1157 Higher Education in India Strength, Weakness, Opportunities and Threats

Authors: Renu Satish Nair

Abstract:

Indian higher education system is the third largest in the world next to United States and China. India is experiencing a rapid growth in higher education in terms of student enrollment as well as establishment of new universities, colleges and institutes of national importance. Presently about 22 million students are being enrolled in higher education and more than 46 thousand institutions’ are functioning as centers of higher education. Indian government plays a 'command and control' role in higher education. The main governing body is University Grants Commission, which enforces its standards, advises the government, and helps coordinate between the centre and the state. Accreditation of higher learning is over seen by 12 autonomous institutions established by the University Grants Commission. The present paper is an effort to analyze the strength, weakness, opportunities and threat (SWOT Analysis) of Indian Higher education system. The higher education in India is progressing ahead by virtue of its strength which is being recognized at global level. Several institutions of India, such as Indian Institutes of Technology (IITs), Indian Institutes of Management (IIMs) and National Institutes of Technology (NITs) have been globally acclaimed for their standard of education. Three Indian universities were listed in the Times Higher Education list of the world’s top 200 universities i.e. Indian Institutes of Technology, Indian Institute of Management and Jawahar Lal Nehru University in 2005 and 2006. Six Indian Institutes of Technology and the Birla Institute of Technology and Science - Pilani were listed among the top 20 science and technology schools in Asia by the Asia Week. The school of Business situated in Hyderabad was ranked number 12 in Globe MBA ranking by the Financial Times of London in 2010 while the All India Institute of Medical Sciences has been recognized as a global leader in medical research and treatment. But at the same time, because of vast expansion, the system bears several weaknesses. The Indian higher education system in many parts of the country is in the state of disrepair. In almost half the districts in the country higher education enrollment are very low. Almost two third of total universities and 90% of colleges are rated below average on quality parameters. This can be attributed to the under prepared faculty, unwieldy governance and other obstacles to innovation and improvement that could prohibit India from meeting its national education goals. The opportunities in Indian higher education system are widely ranged. The national institutions are training their products to compete at global level and make them capable to grab opportunities worldwide. The state universities and colleges with their limited resources are giving the products that are capable enough to secure career opportunities and hold responsible positions in various government and private sectors with in the country. This is further creating opportunities for the weaker section of the society to join the main stream. There are several factors which can be defined as threats to Indian higher education system. It is a matter of great concern and needs proper attention. Some important factors are -Conservative society, particularly for women education; -Lack of transparency, -Taking higher education as a means of business

Keywords: Indian higher education system, SWOT analysis, university grants commission, Indian institutes of technology

Procedia PDF Downloads 870
1156 An Overview of Heating and Cooling Techniques Used in Green Buildings

Authors: Umesh Kumar Soni, Suresh Kumar Soni, S. R. Awasthi

Abstract:

Worldwide biggest difficulties are climate change, future availability of fossil fuels, and economical feasibility of renewable energy. They force us to use to a greater extent renewable energy and develop suitable hybrid renewable systems. Building heating/cooling consumes significant amount of energy. It can be conserved by use of proper heating/cooling techniques. This paper reviews and critically analyzes various active, passive and hybrid heating/cooling techniques used in green buildings.

Keywords: natural ventilation, energy conservation, hybrid ventilation techniques, climate change

Procedia PDF Downloads 585
1155 Strategies to Accelerate Indonesian Halal Food Export to the Japan Market

Authors: Ferry Syarifuddin

Abstract:

The potential for growth in the Japanese halal industry is promising, especially for the export of processed food products, due to the significant increase in the Muslim population over the past decade. Japan is also the second largest destination for processed food export from developing countries. However, there has been a decline in the export of processed food from Indonesia, a Muslim-majority developing country, to Japan, dropping from $350 million in 2019 to $119 million in 2023. To address this issue, this study aims to assess the strengths, weaknesses, opportunities, and threats (SWOT) of Indonesian halal processed food products export to the Japanese market, investigate successful strategies employed by other countries and recommend the most prioritized strategy for exporting Indonesian halal processed food products to the Japan market. Our findings identify collaborating with Japan's food industry associations and trade organizations as the key strategy for successful export to the Japanese market.

Keywords: ANP-SWOT, export strategy, halal product, Japan market

Procedia PDF Downloads 26
1154 A Mixed Approach to Assess Information System Risk, Operational Risk, and Congolese Microfinance Institutions Performance

Authors: Alfred Kamate Siviri, Angelus Mafikiri Tsongo, Jean Robert Kala Kamdjoug

Abstract:

Digitalization and information systems well organized have been selected as relevant measures to mitigate operational risks within organizations. Unfortunately, information system comes with new threats that can cause severe damage and quick organization lockout. This study aims to measure perceived information system risks and their effects on operational risks within the microfinance institution in D.R. Congo. Also, the factors influencing the operational risk are identified, and the link between operational risk with other risks and performance is to be assessed. The study proposes a research model drawn on the combination of Resources-Based-View, dynamic capabilities, the agency theory, the Information System Security Model, and social theories of risk. Therefore, we suggest adopting a mixed methods research with the sole aim of increasing the literature that already exists on perceived operational risk assessment and its link with other risk and performance, a focus on IT risk.

Keywords: Democratic Republic Congo, information system risk, microfinance performance, operational risk

Procedia PDF Downloads 202
1153 Recovery of Cd (II) and Pb (II) under the Effect of Temperature with the Synthetic Zeolite NaA

Authors: Karima Menad, Ahmed Feddag

Abstract:

In this study, large crystals of the zeolite NaA were synthesized by hydrothermal way. By following this zeolite was used to recover two heavy metals that are allowing the most dangerous toxic, lead and cadmium. The synthesized zeolite was analyzed by XRD and SEM aims to verify its purity and its good morphology; after it was undergoing ion exchange operations by aqueous solution with lead and cadmium in two salts Pb(CH3COOH)2 and CdCl2 at different concentrations. The exchange was carried out under the effect of two temperatures (25 °C and 60 °C). The contents of Pb++, Cd++ and Na+ were analyzed by atomic absorption and the results are given in the form of exchange rates. At the end the samples are analyzed by XRD exchanged to confirm their conservation of their zeolite framework. It is found that the exchange rate increases with the increase of initial concentration and the best results are found for the temperature of 60 °C.

Keywords: exchange rate, ion exchange, LTA zeolite, zeolite NaA

Procedia PDF Downloads 390
1152 The Lethal Autonomy and Military Targeting Process

Authors: Serdal Akyüz, Halit Turan, Mehmet Öztürk

Abstract:

The future security environment will have new battlefield and enemies. The boundaries of battlefield and the identity of enemies cannot be noticed easily. The politicians may not want to lose their soldiers in very risky operations. This approach will pave the way for smart machines like war robots and new drones. These machines will have the decision-making ability and act simultaneously. This ability can change the military targeting process. Military targeting process (MTP) benefits from a wide scope of lethal and non-lethal weapons to reach an intended end-state. This process is now managed by people but in the future smart machines can do it by themselves. At first sight, this development seems useful for humanity owing to decrease the casualties in war. Using robots -which can decide, detect, deliver and asses without human support- for homeland security and against terrorist has very crucial risks and threats. Besides, it can decrease the havoc but also increase the collateral damages. This paper examines the current use of smart war machines, military targeting process and presents a new approach to MTP from lethal autonomy concept's point of view.

Keywords: the autonomous weapon systems, the lethal autonomy, military targeting process (MTP)

Procedia PDF Downloads 410
1151 Blockchain in Saudi E-Government: A Systematic Literature Review

Authors: Haitham Assiri, Priyadarsi Nanda

Abstract:

The world is gradually entering the fourth industrial revolution. E-Government services are scaling government operations across the globe. However, as promising as an e-Government system would be, it is also susceptible to malicious attacks if not properly secured. This study found out that, in Saudi Arabia, the e-Government website, Yesser is vulnerable to external attacks. Obviously, this can lead to a breach of data integrity and privacy. In this paper, a Systematic Literature Review was conducted to explore possible ways the Kingdom of Saudi Arabia can take necessary measures to strengthen its e-Government system using Blockchain. Blockchain is one of the emerging technologies shaping the world through its applications in finance, elections, healthcare, etc. It secures systems and brings more transparency. A total of 28 papers were selected for this SLR, and 19 of the papers significantly showed that blockchain could enhance the security and privacy of Saudi’s e-government system. Other papers also concluded that blockchain is effective, albeit with the integration of other technologies like IoT, AI and big data. These papers have been analysed to sieve out the findings and set the stage for future research into the subject.

Keywords: blockchain, data integrity, e-government, security threats

Procedia PDF Downloads 227
1150 Cloud-Based Mobile-to-Mobile Computation Offloading

Authors: Ebrahim Alrashed, Yousef Rafique

Abstract:

Mobile devices have drastically changed the way we do things on the move. They are being extremely relied on to perform tasks that are analogous to desktop computer capability. There has been a rapid increase of computational power on these devices; however, battery technology is still the bottleneck of evolution. The primary modern approach day approach to tackle this issue is offloading computation to the cloud, proving to be latency expensive and requiring high network bandwidth. In this paper, we explore efforts to perform barter-based mobile-to-mobile offloading. We present define a protocol and present an architecture to facilitate the development of such a system. We further highlight the deployment and security challenges.

Keywords: computational offloading, power conservation, cloud, sandboxing

Procedia PDF Downloads 370
1149 The Economic Implications of Cryptocurrency and Its Potential to Disrupt Traditional Financial Systems as a Store of Value

Authors: G. L. Rithika, Arvind B. S., Akash R., Ananda Vinayak, Hema M. S.

Abstract:

Cryptocurrencies were first launched in the year 2009 and have been a great asset to own. Cryptocurrencies are a representation of a completely distinct decentralization model for money. They also contribute to the elimination of currency monopolies and the liberation of money from control. The fact that no government agency can determine a coin's value or flow is what cryptocurrency advocates believe makes them safe and secure. The aim of this paper is to analyze the economic implications of cryptocurrency and how it would disrupt traditional financial systems. This paper analyses the growth of Cryptocurrency over the years and the potential threats of cryptocurrency to financial systems. Our analysis shows that although the DeFi design, like the traditional financial system, may have the ability to lower transaction costs, there are multiple layers where rents might build up because of endogenous competition limitations. The permissionless and anonymous design of DeFi poses issues for ensuring tax compliance, anti-money laundering laws and regulations, and preventing financial misconduct.

Keywords: cryptocurrencies, bitcoin, blockchain technology, traditional financial systems, decentralisation, regulatory framework

Procedia PDF Downloads 25
1148 Overview of Development of a Digital Platform for Building Critical Infrastructure Protection Systems in Smart Industries

Authors: Bruno Vilić Belina, Ivan Župan

Abstract:

Smart industry concepts and digital transformation are very popular in many industries. They develop their own digital platforms, which have an important role in innovations and transactions. The main idea of smart industry digital platforms is central data collection, industrial data integration, and data usage for smart applications and services. This paper presents the development of a digital platform for building critical infrastructure protection systems in smart industries. Different service contraction modalities in service level agreements (SLAs), customer relationship management (CRM) relations, trends, and changes in business architectures (especially process business architecture) for the purpose of developing infrastructural production and distribution networks, information infrastructure meta-models and generic processes by critical infrastructure owner demanded by critical infrastructure law, satisfying cybersecurity requirements and taking into account hybrid threats are researched.

Keywords: cybersecurity, critical infrastructure, smart industries, digital platform

Procedia PDF Downloads 85
1147 Development of Terrorist Threat Prediction Model in Indonesia by Using Bayesian Network

Authors: Hilya Mudrika Arini, Nur Aini Masruroh, Budi Hartono

Abstract:

There are more than 20 terrorist threats from 2002 to 2012 in Indonesia. Despite of this fact, preventive solution through studies in the field of national security in Indonesia has not been conducted comprehensively. This study aims to provide a preventive solution by developing prediction model of the terrorist threat in Indonesia by using Bayesian network. There are eight stages to build the model, started from literature review, build and verify Bayesian belief network to what-if scenario. In order to build the model, four experts from different perspectives are utilized. This study finds several significant findings. First, news and the readiness of terrorist group are the most influent factor. Second, according to several scenarios of the news portion, it can be concluded that the higher positive news proportion, the higher probability of terrorist threat will occur. Therefore, the preventive solution to reduce the terrorist threat in Indonesia based on the model is by keeping the positive news portion to a maximum of 38%.

Keywords: Bayesian network, decision analysis, national security system, text mining

Procedia PDF Downloads 376
1146 Annular Axi-Symmetric Stagnation Flow of Electrically Conducting Fluid on a Moving Cylinder in the Presence of Axial Magnetic Field

Authors: Deva Kanta Phukan

Abstract:

An attempt is made where an electrically conducting fluid is injected from a fixed outer cylindrical casing onto an inner moving cylindrical rod. A magnetic field is applied parallel to the axis of the cylindrical rod. The basic governing set of partial differential equations for conservation of mass and momentum are reduced to a set of non-linear ordinary differential equation by introducing similarity transformation, which are integrated numerically. A perturbation solution for the case of large magnetic parameter is derived for constant Reynolds number.

Keywords: annular axi-symmetric stagnation flow, conducting fluid, magnetic field, moving cylinder

Procedia PDF Downloads 381
1145 A Physical Theory of Information vs. a Mathematical Theory of Communication

Authors: Manouchehr Amiri

Abstract:

This article introduces a general notion of physical bit information that is compatible with the basics of quantum mechanics and incorporates the Shannon entropy as a special case. This notion of physical information leads to the Binary data matrix model (BDM), which predicts the basic results of quantum mechanics, general relativity, and black hole thermodynamics. The compatibility of the model with holographic, information conservation, and Landauer’s principles are investigated. After deriving the “Bit Information principle” as a consequence of BDM, the fundamental equations of Planck, De Broglie, Beckenstein, and mass-energy equivalence are derived.

Keywords: physical theory of information, binary data matrix model, Shannon information theory, bit information principle

Procedia PDF Downloads 141
1144 The Nexus between Climate Change and Criminality: The Nigerian Experience

Authors: Dagaci Aliyu Manbe, Anthony Abah Ebonyi

Abstract:

The increase in global temperatures is worsened by frequent natural events and human activities. Climate change has taken a prominent space in the global discourse on crime and criminality. Compared to when the subject centred around the discussion on the depletion of the ozone layer and global warming, today, the narrative revolves around the implications of changes in weather and climatic conditions in relations to violent crimes or conflict that traverse vast social, economic, and political spaces in different countries. Global warming and climate change refer to an increase in average global temperatures in the Earth’s near-surface air and oceans, which occurs due to human activities such as deforestation and the burning of fossil fuel such as gas flaring. The trend is projected to continue, if unchecked. This paper seeks to explore the nexus between climate change and criminality in Nigeria. It further examines the main ecological changes that predispose conflict dynamics of security threats factored by climate change to peaceful co-existence in Nigeria. It concludes with some recommendations on the way forward.

Keywords: conflict, climate change, criminality, global warning, peace

Procedia PDF Downloads 155
1143 Sustainable Tourism Development: Assessment of Egyptian Sustainable Resorts

Authors: Riham A. Ragheb

Abstract:

Tourism can do a great deal of good in destinations, whether it be by bringing economic benefits to local communities, helping with conservation efforts or in placing a value on aspects of cultural heritage. As responsive travelers, we must all try to do more of the good and less of the negative. This is simply description of the sustainable tourism. This paper aims to set some criteria of successful sustainable tourism development and then through these criteria analyzing the development of some resorts in Egypt known as sustainable resorts. Hence, a comprehensive improvement of the touristic areas is certainly needed to ensure a successful sustainable tourism development radiated the sense of uniformity and coherence. Egypt can benefit from these criteria to develop its resorts in order to preserve and revitalize its unique natural character and achieve mixed uses and tourism development.

Keywords: Egypt, resorts, sustainable tourism, tourism development

Procedia PDF Downloads 430
1142 Assessing the Effectiveness of Machine Learning Algorithms for Cyber Threat Intelligence Discovery from the Darknet

Authors: Azene Zenebe

Abstract:

Deep learning is a subset of machine learning which incorporates techniques for the construction of artificial neural networks and found to be useful for modeling complex problems with large dataset. Deep learning requires a very high power computational and longer time for training. By aggregating computing power, high performance computer (HPC) has emerged as an approach to resolving advanced problems and performing data-driven research activities. Cyber threat intelligence (CIT) is actionable information or insight an organization or individual uses to understand the threats that have, will, or are currently targeting the organization. Results of review of literature will be presented along with results of experimental study that compares the performance of tree-based and function-base machine learning including deep learning algorithms using secondary dataset collected from darknet.

Keywords: deep-learning, cyber security, cyber threat modeling, tree-based machine learning, function-based machine learning, data science

Procedia PDF Downloads 134
1141 Effect of Slag Application to Soil Chemical Properties and Rice Yield on Acid Sulphate Soils with Different Pyrite Depth

Authors: Richardo Y. E. Sihotang, Atang Sutandi, Joshua Ginting

Abstract:

The expansion of marginal soil such as acid sulphate soils for the development of staple crops, including rice was unavoidable. However, acid sulphate soils were less suitable for rice field due to the low fertility and the threats of pyrite oxidation. An experiment using Randomized Complete Block Design was designed to investigate the effect of slag in stabilizing soil reaction (pH), improving soil fertility and rice yield. Experiments were conducted in two locations with different pyrite depth. The results showed that slag application was able to decrease the exchangeable Al and available iron (Fe) as well as increase the soil pH, available-P, soil exchangeable Ca2+, Mg2+, and K+. Furthermore, the slag application increased the plant nutrient uptakes, particularly N, P, K, followed by the increasing of rice yield significantly. Nutrients availability, nutrient uptake, and rice yield were higher in the shallow pyrite soil instead of the deep pyrite soil. In addition, slag application was economically feasible due to the ability to reduce standard fertilizer requirements.

Keywords: acid sulphate soils, available nutrients, pyrite, slag

Procedia PDF Downloads 281
1140 Preparation of Ag-Doped and MOFs Coupled-LaFeO₃ Nanosheet for Electrochemical CO₂ Conversion

Authors: Iltaf Khan, Munzir H. Suliman, Muhammad Usman

Abstract:

The rapid growth of modern industries has led to increased energy demand and worsened fossil fuel depletion, resulting in global warming, while organic pollutants pose significant threats to aquatic environments due to their stability, insolubleness, and non-biodegradability. So, scientists are investigating high-performance materials to resolve these issues. In this study, we prepared LaFeO₃ nanosheets (LFONS) employing a solvothermal method via a soft template such as polyvinylpyrrolidone (PVP). The LFONS have good performance regarding surface area and charge separation as compared to LaFeO₃ nanoparticles (LFONP). To improve the efficiency of LFONS, it was further modified with Ag and ZIF-67 and utilized for CO₂ conversion. Herein, the results confirm that Ag-doped and ZIF-67 coupled LFONS (ZIF-67/Ag-LFONS) exhibit superior performance compared to pristine LFONP. In addition, the stability tests confirm that our optimal sample is the most active and stable one among various nanocomposites. Ultimately, our studies will open a new pave for cost-effective, eco-friendly, and electroactive nanomaterials for CO₂ conversion.

Keywords: LaFeO₃ nanosheets, Ag incorporation, MOFs coupling, CO₂ conversion

Procedia PDF Downloads 30
1139 Challenges and Proposed Solutions Toward Successful Dealing with E-Waste in Kuwait

Authors: Salem Alajmi, Bader Altaweel

Abstract:

Kuwait, like many parts of the world, has started facing the dangerous growth of electrical and electronic wastes. This growth has been noted last two decades, coming along with the development of mobile phones, computers, TVs, as well as other electronic devices and electrical equipment. Kuwait is already among the highest global producers of electronic waste (E-waste) in kg per capita. Furthermore, Kuwait is among the global countries that set high-level future targets in renewable energy projects. Accumulation of this electronic waste, as well as accelerated renewable energy projects, will lead to the increase of future threats to the country. In this research, factors that lead to the increase the e-waste in Kuwait are presented. Also, the current situations of dealing with e-waste in the country as well as current challenges are examined. The impact of renewable energy projects on future E-wastes accumulation is considered. Moreover, this research proposes the best strategies and practices toward successfully dealing with the waste of electronic devices and renewable energy technologies.

Keywords: Kuwait, e-waste, extended producer responsibility, environment, recycle, recovery

Procedia PDF Downloads 152
1138 An Empirical Study of Determinants Influencing Telemedicine Services Acceptance by Healthcare Professionals: Case of Selected Hospitals in Ghana

Authors: Jonathan Kissi, Baozhen Dai, Wisdom W. K. Pomegbe, Abdul-Basit Kassim

Abstract:

Protecting patient’s digital information is a growing concern for healthcare institutions as people nowadays perpetually live their lives through telemedicine services. These telemedicine services have been confronted with several determinants that hinder their successful implementations, especially in developing countries. Identifying such determinants that influence the acceptance of telemedicine services is also a problem for healthcare professionals. Despite the tremendous increase in telemedicine services, its adoption, and use has been quite slow in some healthcare settings. Generally, it is accepted in today’s globalizing world that the success of telemedicine services relies on users’ satisfaction. Satisfying health professionals and patients are one of the crucial objectives of telemedicine success. This study seeks to investigate the determinants that influence health professionals’ intention to utilize telemedicine services in clinical activities in a sub-Saharan African country in West Africa (Ghana). A hybridized model comprising of health adoption models, including technology acceptance theory, diffusion of innovation theory, and protection of motivation theory, were used to investigate these quandaries. The study was carried out in four government health institutions that apply and regulate telemedicine services in their clinical activities. A structured questionnaire was developed and used for data collection. Purposive and convenience sampling methods were used in the selection of healthcare professionals from different medical fields for the study. The collected data were analyzed based on structural equation modeling (SEM) approach. All selected constructs showed a significant relationship with health professional’s behavioral intention in the direction expected from prior literature including perceived usefulness, perceived ease of use, management strategies, financial sustainability, communication channels, patients security threat, patients privacy risk, self efficacy, actual service use, user satisfaction, and telemedicine services systems securities threat. Surprisingly, user characteristics and response efficacy of health professionals were not significant in the hybridized model. The findings and insights from this research show that health professionals are pragmatic when making choices for technology applications and also their willingness to use telemedicine services. They are, however, anxious about its threats and coping appraisals. The identified significant constructs in the study may help to increase efficiency, quality of services, quality patient care delivery, and satisfactory user satisfaction among healthcare professionals. The implantation and effective utilization of telemedicine services in the selected hospitals will aid as a strategy to eradicate hardships in healthcare services delivery. The service will help attain universal health access coverage to all populace. This study contributes to empirical knowledge by identifying the vital factors influencing health professionals’ behavioral intentions to adopt telemedicine services. The study will also help stakeholders of healthcare to formulate better policies towards telemedicine service usage.

Keywords: telemedicine service, perceived usefulness, perceived ease of use, management strategies, security threats

Procedia PDF Downloads 120