Search results for: water security
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 11263

Search results for: water security

10573 Outcome-Based Water Resources Management in the Gash River Basin, Eastern Sudan

Authors: Muna Mohamed Omer Mirghani

Abstract:

This paper responds to one of the key national development strategies and a typical challenge in the Gash Basin as well as in different parts of Sudan, namely managing water scarcity in view of climate change impacts in minor water systems sustaining over 50% of the Sudan population. While now focusing on the Gash river basin, the ultimate aim is to replicate the same approach in similar water systems in central and west Sudan. The key objective of the paper is the identification of outcome-based water governance interventions in Gash Basin, guided by the global Sustainable Development Goal six (SDG 6 on water and sanitation) and the Sudan water resource policy framework. The paper concluded that improved water resources management of the Gash Basin is a prerequisite for ensuring desired policy outcomes of groundwater use and flood risk management purposes. Analysis of various water governance dimensions in the Gash indicated that the operationalization of a Basin-level institutional reform is critically focused on informed actors and adapted practices through knowledge and technologies along with the technical data and capacity needed to make that. Adapting the devolved Institutional structure at state level is recommended to strengthen the Gash basin regulatory function and improve compliance of groundwater users.

Keywords: water governance, Gash Basin, integrated groundwater management, Sudan

Procedia PDF Downloads 179
10572 Secret Security Smart Lock Using Artificial Intelligence Hybrid Algorithm

Authors: Vahid Bayrami Rad

Abstract:

Ever since humans developed a collective way of life to the development of urbanization, the concern of security has always been considered one of the most important challenges of life. To protect property, locks have always been a practical tool. With the advancement of technology, the form of locks has changed from mechanical to electric. One of the most widely used fields of using artificial intelligence is its application in the technology of surveillance security systems. Currently, the technologies used in smart anti-theft door handles are one of the most potential fields for using artificial intelligence. Artificial intelligence has the possibility to learn, calculate, interpret and process by analyzing data with the help of algorithms and mathematical models and make smart decisions. We will use Arduino board to process data.

Keywords: arduino board, artificial intelligence, image processing, solenoid lock

Procedia PDF Downloads 70
10571 Gender Responsiveness of Water, Sanitation Policies and Legal Frameworks at Makerere University

Authors: Harriet Kebirungi, Majaliwa Jackson-Gilbert Mwanjalolo, S. Livingstone Luboobi, Richard Joseph Kimwaga, Consolata Kabonesa

Abstract:

This paper assessed gender responsiveness of water and sanitation policies and legal frameworks at Makerere University, Uganda. The objectives of the study were to i) examine the gender responsiveness of water and sanitation related policies and frameworks implemented at Makerere University; and ii) assess the challenges faced by the University in customizing national water and sanitation policies and legal frameworks into University policies. A cross-sectional gender-focused study design was adopted. A checklist was developed to analyze national water and sanitation policies and legal frameworks and University based policies. In addition, primary data was obtained from Key informants at the Ministry of Water and Environment and Makerere University. A gender responsive five-step analytical framework was used to analyze the collected data. Key findings indicated that the policies did not adequately address issues of gender, water and sanitation and the policies were gender neutral consistently. The national policy formulation process was found to be gender blind and not backed by situation analysis of different stakeholders including higher education institutions like Universities. At Makerere University, due to lack of customized and gender responsive water and sanitation policy and implementation framework, there were gender differences and deficiencies in access to and utilization of water and sanitation facilities. The University should take advantage of existing expertise within them to customize existing national water policies and gender, and water and sanitation sub-sector strategy. This will help the University to design gender responsive, culturally acceptable and environmental friendly water and sanitation systems that provide adequate water and sanitation facilities that address the needs and interests of male and female students.

Keywords: gender, Makerere University, policies, water, sanitation

Procedia PDF Downloads 405
10570 Intelligent Technology for Real-Time Monitor and Data Analysis of the Aquaculture Toxic Water Concentration

Authors: Chin-Yuan Hsieh, Wei-Chun Lu, Yu-Hong Zeng

Abstract:

The situation of a group of fish die is frequently found due to the fish disease caused by the deterioration of aquaculture water quality. The toxic ammonia is produced by animals as a byproduct of protein. The system is designed by the smart sensor technology and developed by the mathematical model to monitor the water parameters 24 hours a day and predict the relationship among twelve water quality parameters for monitoring the water quality in aquaculture. All data measured are stored in cloud server. In productive ponds, the daytime pH may be high enough to be lethal to the fish. The sudden change of the aquaculture conditions often results in the increase of PH value of water, lack of oxygen dissolving content, water quality deterioration and yield reduction. From the real measurement, the system can send the message to user’s smartphone successfully on the bad conditions of water quality. From the data comparisons between measurement and model simulation in fish aquaculture site, the difference of parameters is less than 2% and the correlation coefficient is at least 98.34%. The solubility rate of oxygen decreases exponentially with the elevation of water temperature. The correlation coefficient is 98.98%.

Keywords: aquaculture, sensor, ammonia, dissolved oxygen

Procedia PDF Downloads 284
10569 Dietary Diversification and Nutritional Education: A Strategy to Improve Child Food Security Status in the Rural Mozambique

Authors: Rodriguez Diego, Del Valle Martin, Hargreaves Matias, Riveros Jose Luis

Abstract:

Nutrient deficiencies due to a diet low in quantitative and qualitative terms, are prevalent throughout the developing world, especially in sub-Saharan Africa. Children and women of childbearing age are especially vulnerable. Limited availability, access and intake of animal foods at home and lack of knowledge about their value in the diet and the role they play in health, contribute to poor diet quality. Poor bioavailability of micronutrients in diets based on foods high in fiber and phytates, the low content of some micronutrients in these foods are further factors to consider. Goats are deeply embedded in almost every Sub-Saharan African rural culture, generally kept for their milk, meat, hair or leather. Goats have played an important role in African social life, especially in food security. Goat meat has good properties for human wellbeing, with a special role in lower income households. It has a high-quality protein (20 protein g/100 meat g) including all essential amino acids, good unsaturated/satured fatty acids relationship, and it is an important B-vitamin source with high micronutrients bioavailability. Mozambique has major food security problems, with poor food access and utilization, undiversified diets, chronic poverty and child malnutrition. Our objective was to design a nutritional intervention based on a dietary diversification, nutritional education, cultural beliefs and local resources, aimed to strengthen food security of children at Barrio Broma village (15°43'58.78"S; 32°46'7.27"E) in Chitima, Mozambique. Two surveys were conducted first of socio-productive local databases and then to 100 rural households about livelihoods, food diversity and anthropometric measurements in children under 5 years. Our results indicate that the main economic activity is goat production, based on a native breed with two deliveries per year in the absence of any management. Adult goats weighted 27.2±10.5 kg and raised a height of 63.5±3.8 cm. Data showed high levels of poverty, with a food diversity score of 2.3 (0-12 points), where only 30% of households consume protein and 13% iron, zinc, and B12 vitamin. The main constraints to food security were poor access to water and low income to buy food. Our dietary intervention was based on improving diet quality by increasing the access to dried goat meat, fresh vegetables, and legumes, and its utilization by a nutritional education program. This proposal was based on local culture and living conditions characterized by the absence of electricity power and drinkable water. The drying process proposed would secure the food maintenance under local conditions guaranteeing food safety for a longer period. Additionally, an ancient local drying technique was rescued and used. Moreover, this kind of dietary intervention would be the most efficient way to improve the infant nutrition by delivering macro and micronutrients on time to these vulnerable populations.

Keywords: child malnutrition, dietary diversification, food security, goat meat

Procedia PDF Downloads 304
10568 Securing Web Servers by the Intrusion Detection System (IDS)

Authors: Yousef Farhaoui

Abstract:

An IDS is a tool which is used to improve the level of security. We present in this paper different architectures of IDS. We will also discuss measures that define the effectiveness of IDS and the very recent works of standardization and homogenization of IDS. At the end, we propose a new model of IDS called BiIDS (IDS Based on the two principles of detection) for securing web servers and applications by the Intrusion Detection System (IDS).

Keywords: intrusion detection, architectures, characteristic, tools, security, web server

Procedia PDF Downloads 419
10567 The Prospect of Producing Hydrogen by Electrolysis of Idle Discharges of Water from Reservoirs and Recycling of Waste-Gas Condensates

Authors: Inom Sh. Normatov, Nurmakhmad Shermatov, Rajabali Barotov, Rano Eshankulova

Abstract:

The results of the studies for the hydrogen production by the application of water electrolysis and plasma-chemical processing of gas condensate-waste of natural gas production methods are presented. Thin coating covers the electrode surfaces in the process of water electrolysis. Therefore, water for electrolysis was first exposed to electrosedimentation. The threshold voltage is shifted to a lower value compared with the use of electrodes made of stainless steel. At electrolysis of electrosedimented water by use of electrodes from stainless steel, a significant amount of hydrogen is formed. Pyrolysis of gas condensates in the atmosphere of a nitrogen was followed by the formation of acetylene (3-7 vol.%), ethylene (4-8 vol.%), and pyrolysis carbon (10-15 wt.%).

Keywords: electrolyze, gascondensate, hydrogen, pyrolysis

Procedia PDF Downloads 311
10566 Assessment of the Effects of Water Harvesting Technology on Downstream Water Availability Using SWAT Model

Authors: Ayalkibet Mekonnen, Adane Abebe

Abstract:

In hydrological cycle there are many water-related human interventions that modify the natural systems. Rainwater harvesting is one such intervention that involves harnessing of water in the upstream. Water harvesting used in upstream prevents water runoff on downstream mainly disturbance on biodiversity and ecosystems. The main objectives of the study are to assess the effects of water harvesting technologies on downstream water availability in the Woreda. To address the above problem, SWAT model, cost-benefit ratio and optimal control approach was used to analyse the hydrological and socioeconomic impact and tradeoffs on water availability of the community, respectively. The downstream impacts of increasing water consumption in the upstream rain-fed areas of the Bilate and Shala Catchment are simulated using the semi-distributed SWAT model. The two land use scenarios tested at sub basin levels (1) conventional land use represents the current land use practice (Agri-CON) and (2) in-field rainwater harvesting (IRWH), improving soil water availability through rainwater harvesting land use scenario. The simulated water balance results showed that the highest peak mean monthly direct flow obtained from Agri-CON land use (127.1 m3/ha), followed by Agri-IRWH land use (11.5 mm) and LULC 2005 (90.1 m3/ha). The Agri-IRWH scenario reduced direct flow by 10% compared to Agri-CON and more groundwater flow contributed by Agri-IRWH (190 m3/ha) than Agri-CON (125 m3/ha). The overall result suggests that the water yield of the Woreda may not be negatively affected by the Agri-IRWH land use scenario. The technology in the Woreda benefited positively having an average benefit cost ratio of 4.2. Water harvesting for domestic use was not optimal that the value of the water per demand harvested was less than the amount of water needed. Storage tanks, series of check dams, gravel filled dams are an alternative solutions for water harvesting.

Keywords: water harvesting, SWAT model, land use scenario, Agri-CON, Agri-IRWH, trade off, benefit cost ratio

Procedia PDF Downloads 333
10565 Modified Evaluation of the Hydro-Mechanical Dependency of the Water Coefficient of Permeability of a Clayey Sand with a Novel Permeameter for Unsaturated Soils

Authors: G. Adelian, A. Mirzaii, S. S. Yasrobi

Abstract:

This paper represents data of an extensive experimental laboratory testing program for the measurement of the water coefficient of permeability of clayey sand in different hydraulic and mechanical boundary conditions. A novel permeameter was designed and constructed for the experimental testing program, suitable for the study of flow in unsaturated soils in different hydraulic and mechanical loading conditions. In this work, the effect of hydraulic hysteresis, net isotropic confining stress, water flow condition, and sample dimensions are evaluated on the water coefficient of permeability of understudying soil. The experimental results showed a hysteretic variation for the water coefficient of permeability versus matrix suction and degree of saturation, with higher values in drying portions of the SWCC. The measurement of the water permeability in different applied net isotropic stress also signified that the water coefficient of permeability increased within the increment of net isotropic consolidation stress. The water coefficient of permeability also appeared to be independent of different applied flow heads, water flow condition, and sample dimensions.

Keywords: water permeability, unsaturated soils, hydraulic hysteresis, void ratio, matrix suction, degree of saturation

Procedia PDF Downloads 527
10564 Bitplanes Image Encryption/Decryption Using Edge Map (SSPCE Method) and Arnold Transform

Authors: Ali A. Ukasha

Abstract:

Data security needed in data transmission, storage, and communication to ensure the security. The single step parallel contour extraction (SSPCE) method is used to create the edge map as a key image from the different Gray level/Binary image. Performing the X-OR operation between the key image and each bit plane of the original image for image pixel values change purpose. The Arnold transform used to changes the locations of image pixels as image scrambling process. Experiments have demonstrated that proposed algorithm can fully encrypt 2D Gary level image and completely reconstructed without any distortion. Also shown that the analyzed algorithm have extremely large security against some attacks like salt & pepper and JPEG compression. Its proof that the Gray level image can be protected with a higher security level. The presented method has easy hardware implementation and suitable for multimedia protection in real time applications such as wireless networks and mobile phone services.

Keywords: SSPCE method, image compression, salt and peppers attacks, bitplanes decomposition, Arnold transform, lossless image encryption

Procedia PDF Downloads 500
10563 Calculating Approach of Thermal Conductivity of 8 YSZ in Different Relative Humidities Corresponding to Low Water Contents

Authors: Yun Chol Kang, Myong Nam Kong, Nam Chol Yu, Jin Sim Kim, Un Yong Paek, Song Ho Kim

Abstract:

This study focuses on the calculating approach of the thermal conductivity of 8 mol% yttria-stabilized zirconia (8YSZ) in different relative humidity corresponding to low water contents. When water content in 8YSZ is low, water droplets can accumulate in the neck regions. We assume that spherical water droplets are randomly located in the neck regions formed by grains and surrounded by the pores. Based on this, a new hypothetical pore constituted by air and water is proposed using the microstructural modeling. We consider 8YSZ is a two-phase material constituted by the solid region and the hypothetical pore region where the water droplets are penetrated in the pores, randomly. The results showed that the thermal conductivity of the hypothetical pore is calculated using the parallel resistance for low water contents, and the effective thermal conductivity of 8YSZ material constituted by solid and hypothetical pore in different relative humidities using EMPT. When the numbers of water layers on the surface of 8YSZ are less than 1.5, the proposed approach gives a good interpretation of the experimental results. When the theoretical value of the number of water layers on 8YSZ surface is 1, the water content is not enough to cover the internal solid surface completely. The proposed approach gives a better interpretation of the experimental results in different relative humidities that numbers of water layers on the surface of 8YSZ are less than 1.5.

Keywords: 8YSZ, microstructure, thermal conductivity, relative humidity

Procedia PDF Downloads 90
10562 Evaluating the Impact of Future Scenarios on Water Availability and Demand Based on Stakeholders Prioritized Water Management Options in the Upper Awash Basin, Ethiopia

Authors: Adey Nigatu Mersha, Ilyas Masih, Charlotte de Fraiture, Tena Alamirew

Abstract:

Conflicts over water are increasing mainly as a result of water scarcity in response to higher water demand and climatic variability. There is often not enough water to meet all demands for different uses. Thus, decisions have to be made as to how the available resources can be managed and utilized. Correspondingly water allocation goals, practically national water policy goals, need to be revised accordingly as the pressure on water increases from time to time. A case study is conducted in the Upper Awash Basin, Ethiopia, to assess and evaluate prioritized comprehensive water demand management options based on the framework of integrated water resources management in account of stakeholders’ knowledge and preferences as well as practical prominence within the Upper Awash Basin. Two categories of alternative management options based on policy analysis and stakeholders' consultation were evaluated against the business-as-usual scenario by using WEAP21 model as an analytical tool. Strong effects on future (unmet) demands are observed with major socio-economic assumptions and forthcoming water development plans. Water management within the basin will get more complex with further abstraction which may lead to an irreversible damage to the ecosystem. It is further confirmed through this particular study that efforts to maintain users’ preferences alone cannot insure economically viable and environmentally sound development and vice versa. There is always a tradeoff between these factors. Hence, all of these facets must be analyzed separately, related with each other in equal footing, and ultimately taken up in decision making in order for the whole system to function properly.

Keywords: water demand, water availability, WEAP21, scenarios

Procedia PDF Downloads 281
10561 Preserving Privacy in Workflow Delegation Models

Authors: Noha Nagy, Hoda Mokhtar, Mohamed El Sherkawi

Abstract:

The popularity of workflow delegation models and the increasing number of workflow provenance-aware systems motivate the need for finding more strict delegation models. Such models combine different approaches for enhanced security and respecting workflow privacy. Although modern enterprises seek conformance to workflow constraints to ensure correctness of their work, these constraints pose a threat to security, because these constraints can be good seeds for attacking privacy even in secure models. This paper introduces a comprehensive Workflow Delegation Model (WFDM) that utilizes provenance and workflow constraints to prevent malicious delegate from attacking workflow privacy as well as extending the delegation functionalities. In addition, we argue the need for exploiting workflow constraints to improve workflow security models.

Keywords: workflow delegation models, secure workflow, workflow privacy, workflow provenance

Procedia PDF Downloads 332
10560 Implementation of Achterbahn-128 for Images Encryption and Decryption

Authors: Aissa Belmeguenai, Khaled Mansouri

Abstract:

In this work, an efficient implementation of Achterbahn-128 for images encryption and decryption was introduced. The implementation for this simulated project is written by MATLAB.7.5. At first two different original images are used for validate the proposed design. Then our developed program was used to transform the original images data into image digits file. Finally, we used our implemented program to encrypt and decrypt images data. Several tests are done for proving the design performance including visual tests and security analysis; we discuss the security analysis of the proposed image encryption scheme including some important ones like key sensitivity analysis, key space analysis, and statistical attacks.

Keywords: Achterbahn-128, stream cipher, image encryption, security analysis

Procedia PDF Downloads 532
10559 Socio-Economic Modelling Approaches Linked to Water Quality: A Review

Authors: Aurelia Samuel

Abstract:

Socio-economic modelling approaches linked to water management have contributed to impact assessments of agricultural policies and management practices on water quality at catchment level. With an increasing interest in informing water management policy that considers complex links between socioeconomic factors, climate change, agricultural production, and water quality, several models have been developed and applied in the literature to capture these relationships. This paper offers an overview of socio-economic approaches that have been incorporated within an integrated framework. It also highlights how data gaps on socio-economic factors have been addressed using forecasting techniques. Findings of the review show that while integrated frameworks have the potential to account for complexities within dynamic systems, they generally do not provide direct, measurable financial impact of socio-economic factors on biophysical water parameters that affect water quality. The paper concludes with a recommendation that modelling framework is kept simple to make it more transparent and easier to capture the most important relationship.

Keywords: financial impact, integrated framework, socio-economic modelling, water quality

Procedia PDF Downloads 151
10558 Facial Recognition Technology in Institutions of Higher Learning: Exploring the Use in Kenya

Authors: Samuel Mwangi, Josephine K. Mule

Abstract:

Access control as a security technique regulates who or what can access resources. It is a fundamental concept in security that minimizes risks to the institutions that use access control. Regulating access to institutions of higher learning is key to ensure only authorized personnel and students are allowed into the institutions. The use of biometrics has been criticized due to the setup and maintenance costs, hygiene concerns, and trepidations regarding data privacy, among other apprehensions. Facial recognition is arguably a fast and accurate way of validating identity in order to guard protected areas. It guarantees that only authorized individuals gain access to secure locations while requiring far less personal information whilst providing an additional layer of security beyond keys, fobs, or identity cards. This exploratory study sought to investigate the use of facial recognition in controlling access in institutions of higher learning in Kenya. The sample population was drawn from both private and public higher learning institutions. The data is based on responses from staff and students. Questionnaires were used for data collection and follow up interviews conducted to understand responses from the questionnaires. 80% of the sampled population indicated that there were many security breaches by unauthorized people, with some resulting in terror attacks. These security breaches were attributed to stolen identity cases, where staff or student identity cards were stolen and used by criminals to access the institutions. These unauthorized accesses have resulted in losses to the institutions, including reputational damages. The findings indicate that security breaches are a major problem in institutions of higher learning in Kenya. Consequently, access control would be beneficial if employed to curb security breaches. We suggest the use of facial recognition technology, given its uniqueness in identifying users and its non-repudiation capabilities.

Keywords: facial recognition, access control, technology, learning

Procedia PDF Downloads 127
10557 Occurence And Management Of Coliform Bacteria On Tomatoes

Authors: Cho Achidi

Abstract:

Tomato is a crucial food crop significantly contributes to global food and nutrition security. However, postharvest losses severely limit its role. Therefore, it is necessary to develop sustainable strategies to minimize these losses and improve the shelf-life of tomato fruits. One of the major concerns is bacterial infections, particularly by faecal coliform bacteria, which can cause food poisoning and illnesses like diarrhoea and dysentery. This study seeks to identify the presence of coliform bacteria on tomato fruits in fields and markets in Muea, Buea Municipality. The study also evaluated different management strategies to reduce the bacterial incidence and load on tomato fruits. A total of 200 fruits were sampled for both the coliform survey and shelf-life analysis. Ten farmers and traders provided samples, including asymptomatic and symptomatic tomato fruits. The samples designated for shelf-life analysis were treated with Aquatab, warm water, lemon, and onion. The results indicated that out of the 80 symptomatic samples collected, 12.5% contained faecal and total coliform species. Among the ten farms sampled, 14% were infected with coliform bacteria, with the highest infestation rate of 60% recorded in field 4. Furthermore, 15% of the asymptomatic tomato fruits were found to be infected by coliform bacteria. Regarding the management strategies, Aquatabs exhibited the highest efficacy in reducing the incidence of coliform bacteria on tomato fruits, followed by onion and lemon extracts. Although hot water treatment effectively removed bacteria from the fruits, damaging the cell wall negatively affected their shelf-life. Overall, this study emphasizes the severity of coliform bacterial pathogens in the Muea area, particularly their occurrence on asymptomatic tomatoes, which poses a significant concern for plant quarantine services. It also demonstrates potential options for mitigating this bacterial challenge.

Keywords: tomato, shelf-life analysis, food and nutrition security, coliform bbacteria

Procedia PDF Downloads 67
10556 The Role of Climate-Smart Agriculture in the Contribution of Small-Scale Farming towards Ensuring Food Security in South Africa

Authors: Victor O. Abegunde, Melusi Sibanda

Abstract:

There is need for a great deal of attention on small-scale agriculture for livelihood and food security because of the expanding global population. Small-scale agriculture has been identified as a major driving force of agricultural and rural development. However, the high dependence of the sector on natural and climatic resources has made small-scale farmers highly vulnerable to the adverse impact of climatic change thereby necessitating the need for embracing practices or concepts that will help absorb shocks from changes in climatic condition. This study examines the strategic position of small-scale farming in South African agriculture and in ensuring food security in the country, the vulnerability of small-scale agriculture to climate change and the potential of the concept of climate-smart agriculture to tackle the challenge of climate change. The study carried out a systematic review of peer-reviewed literature touching small-scale agriculture, climate change, food security and climate-smart agriculture, employing the realist review method. Findings revealed that increased productivity in the small-scale agricultural sector has a great potential of improving the food security of households in South Africa and reducing dependence on food purchase in a context of high food price inflation. Findings, however, also revealed that climate change affects small-scale subsistence farmers in terms of productivity, food security and family income, categorizing the impact on smallholder livelihoods into three major groups; biological processes, environmental and physical processes and impact on health. Analysis of the literature consistently showed that climate-smart agriculture integrates the benefits of adaptation and resilience to climate change, mitigation, and food security. As a result, farming households adopting climate-smart agriculture will be better off than their counterparts who do not. This study concludes that climate-smart agriculture could be a very good bridge linking small-scale agricultural sector and agricultural productivity and development which could bring about the much needed food security.

Keywords: climate change, climate-smart agriculture, food security, small-scale

Procedia PDF Downloads 241
10555 Water-Controlled Fracturing with Fuzzy-Ball Fluid in Tight Gas Reservoirs of Deep Coal Measures in Sulige

Authors: Xiangchun Wang, Lihui Zheng, Maozong Gan, Peng Zhang, Tong Wu, An Chang

Abstract:

The deep coal measure tight gas reservoir in Sulige is usually reformed by fracturing, because the reservoir thickness is small, the water layers can be easily communicated during fracturing, which will lead to water production of gas wells and lower production of gas wells. Therefore, it is necessary to control water during fracturing in deep coal measure tight gas reservoir. Using fuzzy-ball fluid to control water fracturing can not only increase the output but also reduce the water output. The fuzzy-ball fluid was prepared indoors to carry out evaluation experiments. The fuzzy ball fluid was mixed in equal volume with the pre-fluid and formation water to test its compatibility. The core displacement device was used to test the gas and water breaking through the matrix and fractured cores blocked by fuzzy-ball fluid. The breakthrough pressure of the plunger tests its water blocking performance. The experimental results show that there is no precipitation after the fuzzy-ball fluid is mixed with the pad fluid and the formation water, respectively. The breakthrough pressure gradients of gas and water after the fuzzy-ball fluid plugged the cracks were 0.02MPa/cm and 0.04MPa/cm, respectively, and the breakthrough pressure gradients of gas and water after the matrix was plugged were 0.03MPa/cm and 0.2MPa/cm, respectively, which meet the requirements of field operation. Two wells A and B in the Sulige Gas Field were used on site to implement water control fracturing. After the pre-fluid was injected into the two wells, 50m3 of fuzzy-ball fluid was pumped to plug the water. The construction went smoothly. After water control and fracturing, the average daily output in 161 days was increased by 13.71% and 6.99% compared with that of adjacent wells in the same layer. The adjacent wells were bubbled for 3 times and 63 times respectively, while there was no effusion in A and B construction wells. The results show that fuzzy-ball fluid is a water plugging material suitable for water control fracturing in tight gas wells, and its water control mechanism can also provide a new idea for the development of water control fracturing materials.

Keywords: coal seam, deep layer, fracking, fuzzy-ball fluid, reservoir reconstruction

Procedia PDF Downloads 230
10554 Analyzing Environmental Emotive Triggers in Terrorist Propaganda

Authors: Travis Morris

Abstract:

The purpose of this study is to measure the intersection of environmental security entities in terrorist propaganda. To the best of author’s knowledge, this is the first study of its kind to examine this intersection within terrorist propaganda. Rosoka, natural language processing software and frame analysis are used to advance our understanding of how environmental frames function as emotive triggers. Violent jihadi demagogues use frames to suggest violent and non-violent solutions to their grievances. Emotive triggers are framed in a way to leverage individual and collective attitudes in psychological warfare. A comparative research design is used because of the differences and similarities that exist between two variants of violent jihadi propaganda that target western audiences. Analysis is based on salience and network text analysis, which generates violent jihadi semantic networks. Findings indicate that environmental frames are used as emotive triggers across both data sets, but also as tactical and information data points. A significant finding is that certain core environmental emotive triggers like “water,” “soil,” and “trees” are significantly salient at the aggregate level across both data sets. All environmental entities can be classified into two categories, symbolic and literal. Importantly, this research illustrates how demagogues use environmental emotive triggers in cyber space from a subcultural perspective to mobilize target audiences to their ideology and praxis. Understanding the anatomy of propaganda construction is necessary in order to generate effective counter narratives in information operations. This research advances an additional method to inform practitioners and policy makers of how environmental security and propaganda intersect.

Keywords: propaganda analysis, emotive triggers environmental security, frames

Procedia PDF Downloads 140
10553 Detection and Tracking for the Protection of the Elderly and Socially Vulnerable People in the Video Surveillance System

Authors: Mobarok Hossain Bhuyain

Abstract:

Video surveillance processing has attracted various security fields transforming it into one of the leading research fields. Today's demand for detection and tracking of human mobility for security is very useful for human security, such as in crowded areas. Accordingly, video surveillance technology has seen a rapid advancement in recent years, with algorithms analyzing the behavior of people under surveillance automatically. The main motivation of this research focuses on the detection and tracking of the elderly and socially vulnerable people in crowded areas. Degenerate people are a major health concern, especially for elderly people and socially vulnerable people. One major disadvantage of video surveillance is the need for continuous monitoring, especially in crowded areas. To assist the security monitoring live surveillance video, image processing, and artificial intelligence methods can be used to automatically send warning signals to the monitoring officers about elderly people and socially vulnerable people.

Keywords: human detection, target tracking, neural network, particle filter

Procedia PDF Downloads 166
10552 Secure Cryptographic Operations on SIM Card for Mobile Financial Services

Authors: Kerem Ok, Serafettin Senturk, Serdar Aktas, Cem Cevikbas

Abstract:

Mobile technology is very popular nowadays and it provides a digital world where users can experience many value-added services. Service Providers are also eager to offer diverse value-added services to users such as digital identity, mobile financial services and so on. In this context, the security of data storage in smartphones and the security of communication between the smartphone and service provider are critical for the success of these services. In order to provide the required security functions, the SIM card is one acceptable alternative. Since SIM cards include a Secure Element, they are able to store sensitive data, create cryptographically secure keys, encrypt and decrypt data. In this paper, we design and implement a SIM and a smartphone framework that uses a SIM card for secure key generation, key storage, data encryption, data decryption and digital signing for mobile financial services. Our frameworks show that the SIM card can be used as a controlled Secure Element to provide required security functions for popular e-services such as mobile financial services.

Keywords: SIM card, mobile financial services, cryptography, secure data storage

Procedia PDF Downloads 312
10551 Impact of Activated Carbon and Magnetic Field in Slow Sand Filter on Water Purification for Rural Dwellers

Authors: Baiyeri R. M, Oloriegbe Y. A., Saad A. O., Yusuf, K. O.

Abstract:

Most farmers that produce food crops in Nigeria live in rural areas where potable water is not available. The farmers in some areas have problem of water borne diseases which could affect their health and could lead to death. This study was conducted to determine the impact of incorporating Granular Activated Carbon(GAC) and Magnetic Field(MF) in Slow Sand Filter(SSF) on the purification of water for rural dwellers. The SSF was developed using PVC pipe with diameter 152.4 mm and 1100 mm long, with layers of fine sand with size 0.25 mm and 350 mm depth, followed by GAC 10 mm size and 100 mm depth, fine sand 0.25mm with 500 mm depth and gravel grain size 10-14 mm and 100 mm depth. The SSF was kept moist for 21 days for biofilm layer (schmutzdecke) to fully develop, which is essential for trapping bacteria. Two SSFs fabricated consist of SSF+GAC as Filter 1, SSF+GAC+MF as Filter 2 and Control (Raw water without passing through filter. Water samples were collected from the filter and analyzed. The flow rate of Filter was 25 litres/h Total bacteria counts(TBC) for Filter 1 and Filter 2 and control were 2.4, 4.6 and 8.1 cfu/mg, respectively. Total coliform count for Filter 1 and Filter 2 and control were 1.7, 3.0 and 6.4 cfu/100mL, respectively. The filters reduced water hardness, turbidity, lead, copper, electrical conductivity and TBC by 53.13-73.44% but increased pH from 5.8 to 7.1-7.3. SSF is recommended for water purification in the rural areas.

Keywords: magnetised water, sow sand filter, portable water, activated carbon

Procedia PDF Downloads 135
10550 Modelling Water Usage for Farming

Authors: Ozgu Turgut

Abstract:

Water scarcity is a problem for many regions which requires immediate action, and solutions cannot be postponed for a long time. It is known that farming consumes a significant portion of usable water. Although in recent years, the efforts to make the transition to dripping or spring watering systems instead of using surface watering started to pay off. It is also known that this transition is not necessarily translated into an increase in the capacity dedicated to other water consumption channels such as city water or power usage. In order to control and allocate the water resource more purposefully, new watering systems have to be used with monitoring abilities that can limit the usage capacity for each farm. In this study, a decision support model which relies on a bi-objective stochastic linear optimization is proposed, which takes crop yield and price volatility into account. The model generates annual planting plans as well as water usage limits for each farmer in the region while taking the total value (i.e., profit) of the overall harvest. The mathematical model is solved using the L-shaped method optimally. The decision support model can be especially useful for regional administrations to plan next year's planting and water incomes and expenses. That is why not only a single optimum but also a set of representative solutions from the Pareto set is generated with the proposed approach.

Keywords: decision support, farming, water, tactical planning, optimization, stochastic, pareto

Procedia PDF Downloads 74
10549 The Connection Between the International Law and the Legal Consultation on the Social Media

Authors: Amir Farouk Ahmed Ali Hussin

Abstract:

Social media, such as Facebook, LinkedIn and Ex-Twitter have experienced exponential growth and a remarkable adoption rate in recent years. They give fantastic means of online social interactions and communications with family, friends, and colleagues from around the corner or across the globe, and they have become an important part of daily digital interactions for more than one and a half billion users around the world. The personal information sharing practices that social network providers encourage have led to their success as innovative social interaction platforms. Moreover, these practices have outcome in concerns with respect to privacy and security from different stakeholders. Guiding these privacy and security concerns in social networks is a must for these networks to be sustainable. Real security and privacy tools may not be enough to address existing concerns. Some points should be followed to protect users from the existing risks. In this research, we have checked the various privacy and security issues and concerns pertaining to social media. However, we have classified these privacy and security issues and presented a thorough discussion of the effects of these issues and concerns on the future of the social networks. In addition, we have presented a set of points as precaution measures that users can consider to address these issues.

Keywords: international legal, consultation mix, legal research, small and medium-sized enterprises, strategic International law, strategy alignment, house of laws, deployment, production strategy, legal strategy, business strategy

Procedia PDF Downloads 64
10548 Influence of Security on Fan Attendance during Nigeria Professional Football League Matches

Authors: B. O. Diyaolu

Abstract:

The stadium transcends a field of play to cultural heritage of a club especially when there is security of life and property and a conducive environment with exciting media facilities, CCTV and adequate field of play. Football fans love watching their clubs’ matches especially when nothing discourages their presence in the stadium. This study investigated the influence of security on fans’ attendance during Nigeria Professional Football League matches. Descriptive survey research design was used and the population consists of all Nigeria Professional Football League fans. Simple random sampling technique was used to pick a state from the six geo-political zones. 600 respondents comprising male and female fans were sampled from the ten selected vendors’ stands in each selected state. A structured questionnaire on Security and Fan attendance scale (SFAS) was used. The instrument consists of two sections. Section A seeks information on demographic data of the respondents, while section B was used to elicit information on security and fans’ attendance. The modified instrument which consists of 20 items has a reliability coefficient of 0.73. The hypothesis was tested at 0.05 significance level. The completed questionnaire was collated, coded and analyzed using descriptive statistics of frequency counts and percentage and inferential statistics of chi-square (X2). Findings of this study revealed that adequate security significantly influences fan attendance during Nigeria Professional Football League matches. There is no sport that can develop if the facilities in use are inadequate. Improving the condition of the stadium in Nigeria is paramount to the development of the Nigeria Professional Football League. All stakeholders in the organization of the League must put into consideration the need to improve the standard of the stadium as it will help to increase the attendance of fans during matches. Only the standard ones should be used during matches.

Keywords: adequate security, fans attendance, football fans, football stadium, Nigeria professional football league

Procedia PDF Downloads 117
10547 From Plate to Self-Perception: Unravelling the Interplay Between Food Security and Self-Esteem Among Malaysian University Students

Authors: Amiraa Ali Mansor, Haslinda Abdullah, Angela Chan Nguk Fong, Norhaida Hanim Binti Ahmad Tajudin, Asnarulkhadi Abu Samah

Abstract:

Obesity has risen sharply over the past three decades, posing a grave public health concern globally. In Malaysia, it has also emerged as a significant health threat. While the second Sustainable Development Goal, "Zero Hunger", aims to ensure equitable access to nutritious food for all, a key challenge lies in addressing food insecurity. Food insecurity not only pertains to the quantity but also the quality of food, with both dimensions playing a pivotal role in health outcomes. To date, much of the research on food security has focused on household levels. There remains a research gap concerning university students, a population transitioning to independence from parental support and grappling with limited resources. This study seeks to bridge this gap by extending the Food Security Theory to incorporate the psychological dimension of self-esteem. Using a quantitative approach, data was collected from 452 public university students in Malaysia through a cross-sectional research design and a multi-stage cluster sampling technique. The anticipated findings will provide novel insights by linking food security with self-esteem. Such insights have implications for healthcare policy and the framing of preventive strategies against obesity. It is hoped that this research will not only contribute to the academic discourse on Food Security Theory but also serve as a foundation for refining national health policies and programs aimed at fostering a healthier lifestyle.

Keywords: obesity, food security, body image, self-esteem

Procedia PDF Downloads 78
10546 Freshwater Recovering and Water Pollution Controlling Technology

Authors: Habtamu Abdisa

Abstract:

In nature, water may not be free from contaminants due to its polar nature. But, more than this, the environmental water is highly polluted by manmade activities from industrial, agricultural, recreation, shipping, and domestic sites, thereby increasing the shortage of freshwater for designated purposes. Therefore, in the face of water scarcity, human beings are enforced to look at all the existing opportunities to get an adequate amount of freshwater resources. The most probable water resource is wastewater, from which the water can be recovered to serve designated purposes (for industrial, agricultural, drinking, and other domestic uses). Present-day, the most preferable method for recovering water from different wastewater streams for re-use is membrane technology. This paper looks at the progressive development of membrane technology in wastewater treatment. The applications of pressure-driven membrane separation technology (microfiltration, ultrafiltration, nano-filtration, reverse osmosis, and tissue purification) and no pressure membrane separation technology (semipermeable membrane, liquefiedfilm, and electro-dialysis) and also ion-exchange were reviewed. More than all, the technology for converting environmental water pollutants into energy is of considerable attention. Finally, recommendations for future research relating to the application of membrane technology in wastewater treatment were made. Also, further research recommendation about membrane fouling and cleaning was made.

Keywords: environmental pollution, membrane technology, water quality, wastewater

Procedia PDF Downloads 97
10545 Water Absorption Studies on Natural Fiber Reinforced Polymer Composites

Authors: G. L. Devnani, Shishir Sinha

Abstract:

In the recent years, researchers have drawn their focus on natural fibers reinforced composite materials because of their excellent properties like low cost, lower weight, better tensile and flexural strengths, biodegradability etc. There is little concern however that when these materials are put in moist conditions for long duration, their mechanical properties degrade. Therefore, in order to take maximum advantage of these novel materials, one should have a complete understanding of their moisture or water absorption phenomena. Various fiber surface treatment methods like alkaline treatment, acetylation etc. have also been suggested for reduction in water absorption of these composites. In the present study, a detailed review is done for water absorption behavior of natural fiber reinforced polymer composites, and experiments also have been performed on these composites with varying the parameters like fiber loading etc. for understanding the water absorption kinetics. Various surface treatment methods also performed to reduce the water absorption behavior of these materials and effort is made to develop a proper understanding of water absorption mechanism mathematically and experimentally for full potential utilization of natural fiber reinforced polymer composite materials.

Keywords: alkaline treatment, composites, natural fiber, water absorption

Procedia PDF Downloads 289
10544 Study of Some Physiochemical Properties of Ain Kaam Water Lagoon and Assessing Their Suitability for Human Use and Irrigation

Authors: Keri Alhadi Ighwela

Abstract:

In this research some physiochemical properties represented by temperature, pH, total hardness (TH), electrical conductivity (EC), total dissolved solids (TDS), chloride and hardness of calcium (Ca-H) and magnesium (Mg-H) were measured in the water of Ain Kaam Zliten in Libya (South side of the lagoon). A comparison of water quality with the values adopted internationally was accomplished to demonstrate the suitability for human and irrigation use. The experimental results showed that the values of pH and EC of the studied for water samples did not exceed the allowed range for drinking water. While TDS, TH, (Mg-H) and chloride values have exceeded the acceptable limit for drinking water internationally, calcium (Ca-H) results have shown a decrease in values of all samples except the first sample which record a marginal increase.

Keywords: physiochemical properties, Ain Kaam lagoon, Zliten, Libya

Procedia PDF Downloads 349