Search results for: water security
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 11111

Search results for: water security

10421 Possible Risks for Online Orders in the Furniture Industry - Customer and Entrepreneur Perspective

Authors: Justyna Żywiołek, Marek Matulewski

Abstract:

Data, is information processed by enterprises for primary and secondary purposes as processes. Thanks to processing, the sales process takes place; in the case of the surveyed companies, sales take place online. However, this indirect form of contact with the customer causes many problems for both customers and furniture manufacturers. The article presents solutions that would solve problems related to the analysis of data and information in the order fulfillment process sent to post-warranty service. The article also presents an analysis of threats to the security of this information, both for customers and the enterprise.

Keywords: ordering furniture online, information security, furniture industry, enterprise security, risk analysis

Procedia PDF Downloads 45
10420 Modelling Water Usage for Farming

Authors: Ozgu Turgut

Abstract:

Water scarcity is a problem for many regions which requires immediate action, and solutions cannot be postponed for a long time. It is known that farming consumes a significant portion of usable water. Although in recent years, the efforts to make the transition to dripping or spring watering systems instead of using surface watering started to pay off. It is also known that this transition is not necessarily translated into an increase in the capacity dedicated to other water consumption channels such as city water or power usage. In order to control and allocate the water resource more purposefully, new watering systems have to be used with monitoring abilities that can limit the usage capacity for each farm. In this study, a decision support model which relies on a bi-objective stochastic linear optimization is proposed, which takes crop yield and price volatility into account. The model generates annual planting plans as well as water usage limits for each farmer in the region while taking the total value (i.e., profit) of the overall harvest. The mathematical model is solved using the L-shaped method optimally. The decision support model can be especially useful for regional administrations to plan next year's planting and water incomes and expenses. That is why not only a single optimum but also a set of representative solutions from the Pareto set is generated with the proposed approach.

Keywords: decision support, farming, water, tactical planning, optimization, stochastic, pareto

Procedia PDF Downloads 68
10419 Civilian and Military Responses to Domestic Security Threats: A Cross-Case Analysis of Belgium, France, and the United Kingdom

Authors: John Hardy

Abstract:

The domestic security environment in Europe has changed dramatically in recent years. Since January 2015, a significant number of domestic security threats that emerged in Europe were located in Belgium, France and the United Kingdom. While some threats were detected in the planning phase, many also resulted in terrorist attacks. Authorities in all three countries instituted special or emergency measures to provide additional security to their populations. Each country combined an additional policing presence with a specific military operation to contribute to a comprehensive security response to domestic threats. This study presents a cross-case analysis of three countries’ civilian and military responses to domestic security threats in Europe. Each case study features a unique approach to combining civilian and military capabilities in similar domestic security operations during the same time period and threat environment. The research design focuses on five variables relevant to the relationship between civilian and military roles in each security response. These are the distinction between policing and military roles, the legal framework for the domestic deployment of military forces, prior experience in civil-military coordination, the institutional framework for threat assessments, and the level of public support for the domestic use of military forces. These variables examine the influence of domestic social, political, and legal factors on the design of combined civil-military operations in response to domestic security threats. Each case study focuses on a specific operation: Operation Vigilant Guard in Belgium, Operation Sentinel in France, and Operation Temperer in the United Kingdom. The results demonstrate that the level of distinction between policing and military roles and the existence of a clear and robust legal framework for the domestic use force by military personnel significantly influence the design and implementation of civilian and military roles in domestic security operations. The findings of this study indicate that Belgium, France and the United Kingdom experienced different design and implementation challenges for their domestic security operations. Belgium and France initially had less-developed legal frameworks for deploying the military in domestic security operations than the United Kingdom. This was offset by public support for enacting emergency measures and the strength of existing civil-military coordination mechanisms. The United Kingdom had a well-developed legal framework for integrating civilian and military capabilities in domestic security operations. However, its experiences in Ireland also made the government more sensitive to public perceptions regarding the domestic deployment of military forces.

Keywords: counter-terrorism, democracy, homeland security, intelligence, militarization, policing

Procedia PDF Downloads 140
10418 Secret Security Smart Lock Using Artificial Intelligence Hybrid Algorithm

Authors: Vahid Bayrami Rad

Abstract:

Ever since humans developed a collective way of life to the development of urbanization, the concern of security has always been considered one of the most important challenges of life. To protect property, locks have always been a practical tool. With the advancement of technology, the form of locks has changed from mechanical to electric. One of the most widely used fields of using artificial intelligence is its application in the technology of surveillance security systems. Currently, the technologies used in smart anti-theft door handles are one of the most potential fields for using artificial intelligence. Artificial intelligence has the possibility to learn, calculate, interpret and process by analyzing data with the help of algorithms and mathematical models and make smart decisions. We will use Arduino board to process data.

Keywords: arduino board, artificial intelligence, image processing, solenoid lock

Procedia PDF Downloads 65
10417 Securing Web Servers by the Intrusion Detection System (IDS)

Authors: Yousef Farhaoui

Abstract:

An IDS is a tool which is used to improve the level of security. We present in this paper different architectures of IDS. We will also discuss measures that define the effectiveness of IDS and the very recent works of standardization and homogenization of IDS. At the end, we propose a new model of IDS called BiIDS (IDS Based on the two principles of detection) for securing web servers and applications by the Intrusion Detection System (IDS).

Keywords: intrusion detection, architectures, characteristic, tools, security, web server

Procedia PDF Downloads 411
10416 Freshwater Recovering and Water Pollution Controlling Technology

Authors: Habtamu Abdisa

Abstract:

In nature, water may not be free from contaminants due to its polar nature. But, more than this, the environmental water is highly polluted by manmade activities from industrial, agricultural, recreation, shipping, and domestic sites, thereby increasing the shortage of freshwater for designated purposes. Therefore, in the face of water scarcity, human beings are enforced to look at all the existing opportunities to get an adequate amount of freshwater resources. The most probable water resource is wastewater, from which the water can be recovered to serve designated purposes (for industrial, agricultural, drinking, and other domestic uses). Present-day, the most preferable method for recovering water from different wastewater streams for re-use is membrane technology. This paper looks at the progressive development of membrane technology in wastewater treatment. The applications of pressure-driven membrane separation technology (microfiltration, ultrafiltration, nano-filtration, reverse osmosis, and tissue purification) and no pressure membrane separation technology (semipermeable membrane, liquefiedfilm, and electro-dialysis) and also ion-exchange were reviewed. More than all, the technology for converting environmental water pollutants into energy is of considerable attention. Finally, recommendations for future research relating to the application of membrane technology in wastewater treatment were made. Also, further research recommendation about membrane fouling and cleaning was made.

Keywords: environmental pollution, membrane technology, water quality, wastewater

Procedia PDF Downloads 93
10415 Occurence And Management Of Coliform Bacteria On Tomatoes

Authors: Cho Achidi

Abstract:

Tomato is a crucial food crop significantly contributes to global food and nutrition security. However, postharvest losses severely limit its role. Therefore, it is necessary to develop sustainable strategies to minimize these losses and improve the shelf-life of tomato fruits. One of the major concerns is bacterial infections, particularly by faecal coliform bacteria, which can cause food poisoning and illnesses like diarrhoea and dysentery. This study seeks to identify the presence of coliform bacteria on tomato fruits in fields and markets in Muea, Buea Municipality. The study also evaluated different management strategies to reduce the bacterial incidence and load on tomato fruits. A total of 200 fruits were sampled for both the coliform survey and shelf-life analysis. Ten farmers and traders provided samples, including asymptomatic and symptomatic tomato fruits. The samples designated for shelf-life analysis were treated with Aquatab, warm water, lemon, and onion. The results indicated that out of the 80 symptomatic samples collected, 12.5% contained faecal and total coliform species. Among the ten farms sampled, 14% were infected with coliform bacteria, with the highest infestation rate of 60% recorded in field 4. Furthermore, 15% of the asymptomatic tomato fruits were found to be infected by coliform bacteria. Regarding the management strategies, Aquatabs exhibited the highest efficacy in reducing the incidence of coliform bacteria on tomato fruits, followed by onion and lemon extracts. Although hot water treatment effectively removed bacteria from the fruits, damaging the cell wall negatively affected their shelf-life. Overall, this study emphasizes the severity of coliform bacterial pathogens in the Muea area, particularly their occurrence on asymptomatic tomatoes, which poses a significant concern for plant quarantine services. It also demonstrates potential options for mitigating this bacterial challenge.

Keywords: tomato, shelf-life analysis, food and nutrition security, coliform bbacteria

Procedia PDF Downloads 62
10414 Water Absorption Studies on Natural Fiber Reinforced Polymer Composites

Authors: G. L. Devnani, Shishir Sinha

Abstract:

In the recent years, researchers have drawn their focus on natural fibers reinforced composite materials because of their excellent properties like low cost, lower weight, better tensile and flexural strengths, biodegradability etc. There is little concern however that when these materials are put in moist conditions for long duration, their mechanical properties degrade. Therefore, in order to take maximum advantage of these novel materials, one should have a complete understanding of their moisture or water absorption phenomena. Various fiber surface treatment methods like alkaline treatment, acetylation etc. have also been suggested for reduction in water absorption of these composites. In the present study, a detailed review is done for water absorption behavior of natural fiber reinforced polymer composites, and experiments also have been performed on these composites with varying the parameters like fiber loading etc. for understanding the water absorption kinetics. Various surface treatment methods also performed to reduce the water absorption behavior of these materials and effort is made to develop a proper understanding of water absorption mechanism mathematically and experimentally for full potential utilization of natural fiber reinforced polymer composite materials.

Keywords: alkaline treatment, composites, natural fiber, water absorption

Procedia PDF Downloads 282
10413 Study of Some Physiochemical Properties of Ain Kaam Water Lagoon and Assessing Their Suitability for Human Use and Irrigation

Authors: Keri Alhadi Ighwela

Abstract:

In this research some physiochemical properties represented by temperature, pH, total hardness (TH), electrical conductivity (EC), total dissolved solids (TDS), chloride and hardness of calcium (Ca-H) and magnesium (Mg-H) were measured in the water of Ain Kaam Zliten in Libya (South side of the lagoon). A comparison of water quality with the values adopted internationally was accomplished to demonstrate the suitability for human and irrigation use. The experimental results showed that the values of pH and EC of the studied for water samples did not exceed the allowed range for drinking water. While TDS, TH, (Mg-H) and chloride values have exceeded the acceptable limit for drinking water internationally, calcium (Ca-H) results have shown a decrease in values of all samples except the first sample which record a marginal increase.

Keywords: physiochemical properties, Ain Kaam lagoon, Zliten, Libya

Procedia PDF Downloads 345
10412 Rejuvenating the Water Edge: An Urban Design Initiative for Waterways. Case: Kottayam – Chenganassery, Kerala

Authors: Aswathy Rajagopal

Abstract:

Many research agendas addressed interesting questions concerning the extent and character of water transport and many others looked at various phenomenon of urban waterfront development. The paper explore to highlight the importance of Inland Water Transportation(IWT) and the need for further development of IWT regulatory framework and for synergy between the inland navigation institutions both at policy and expert levels by taking the Backwater system of Kerala, India as the demonstration site. The author seeks to highlight the hurdles faced in integrating water transportation, the interchange between water and land and the waterfront development. The aim of the research is to look at the tools and methods that can be applied for waterfront regeneration and end with suggestions for policies and design considerations to guide the physical development along the proposed Kottayam –Chenganassery arterial waterway.

Keywords: waterways, inland water transportation (IWT), urban policy, waterfront development, Kerala backwaters

Procedia PDF Downloads 44
10411 Application of Chemical Tests for the Inhibition of Scaling From Hamma Hard Waters

Authors: Samira Ghizellaoui, Manel Boumagoura

Abstract:

Calcium carbonate precipitation is a widespread problem, especially in hard water systems. The main water supply that supplies the city of Constantine with drinking water is underground water called Hamma water. This water has a very high hardness of around 590 mg/L CaCO₃. This leads to the formation of scale, consisting mainly of calcium carbonate, which can be responsible for the clogging of valves and the deterioration of equipment (water heaters, washing machines and encrustations in the pipes). Plant extracts used as scale inhibitors have attracted the attention of several researchers. In recent years, green inhibitors have attracted great interest because they are biodegradable, non-toxic and do not affect the environment. The aim of our work is to evaluate the effectiveness of a chemical antiscale treatment in the presence of three green inhibitors: gallicacid; quercetin; alginate, and three mixtures: (gallic acid-quercetin); (quercetin-alginate); (gallic acid-alginate). The results show that the inhibitory effect is manifested from an addition of 1mg/L of gallic acid, 10 mg/L of quercetin, 0.2 mg/L of alginate, 0.4mg/L of (gallic acid-quercetin), 2mg/L of (quercetin-alginate) and 0.4 mg/L of (gallic acid-alginate). On the other hand, 100 mg/L (Drinking water standard) of Ca2+is reached for partial softening at 4 mg/L of gallic acid, 40 mg/L of quercetin, 0.6mg/L of alginate, 4mg/L of (gallic acid-quercetin), 10mg/L of (quercetin-alginate) and 1.6 mg/L of (gallic acid-alginate).

Keywords: water, scaling, calcium carbonate, green inhibitor

Procedia PDF Downloads 63
10410 Variations in Water Supply and Quality in Selected Groundwater Sources in a Part of Southwest Nigeria

Authors: Samuel Olajide Babawale, O. O. Ogunkoya

Abstract:

The study mapped selected wells in Inisa town, Osun state, in the guinea savanna region of southwest Nigeria, and determined the water quality considering certain elements. It also assessed the variation in the elevation of the water table surface to depth of the wells in the months of August and November. This is with a view to determine the level of contamination of the water with respect to land use and anthropogenic activities, and also to determine the variation that occurs in the quantity of well water in the rainy season and the start of the dry season. Results show a random pattern of the distribution of the mapped wells and shows that there is a shallow water table in the study area. The temporal changes in the elevation show that there are no significant variations in the depth of the water table surface over the period of study implying that there is a sufficient amount of water available to the town all year round. It also shows a high concentration of sodium in the water sample analyzed compared to other elements that were considered, which include iron, copper, calcium, and lead. This is attributed majorly to anthropogenic activities through the disposal of waste in landfill sites. There is a low concentration of lead which is a good indication of a reduced level of pollution.

Keywords: anthropogenic activities, land use, temporal changes, water quality

Procedia PDF Downloads 130
10409 Bitplanes Image Encryption/Decryption Using Edge Map (SSPCE Method) and Arnold Transform

Authors: Ali A. Ukasha

Abstract:

Data security needed in data transmission, storage, and communication to ensure the security. The single step parallel contour extraction (SSPCE) method is used to create the edge map as a key image from the different Gray level/Binary image. Performing the X-OR operation between the key image and each bit plane of the original image for image pixel values change purpose. The Arnold transform used to changes the locations of image pixels as image scrambling process. Experiments have demonstrated that proposed algorithm can fully encrypt 2D Gary level image and completely reconstructed without any distortion. Also shown that the analyzed algorithm have extremely large security against some attacks like salt & pepper and JPEG compression. Its proof that the Gray level image can be protected with a higher security level. The presented method has easy hardware implementation and suitable for multimedia protection in real time applications such as wireless networks and mobile phone services.

Keywords: SSPCE method, image compression, salt and peppers attacks, bitplanes decomposition, Arnold transform, lossless image encryption

Procedia PDF Downloads 493
10408 Optimal Design of Storm Water Networks Using Simulation-Optimization Technique

Authors: Dibakar Chakrabarty, Mebada Suiting

Abstract:

Rapid urbanization coupled with changes in land use pattern results in increasing peak discharge and shortening of catchment time of concentration. The consequence is floods, which often inundate roads and inhabited areas of cities and towns. Management of storm water resulting from rainfall has, therefore, become an important issue for the municipal bodies. Proper management of storm water obviously includes adequate design of storm water drainage networks. The design of storm water network is a costly exercise. Least cost design of storm water networks assumes significance, particularly when the fund available is limited. Optimal design of a storm water system is a difficult task as it involves the design of various components, like, open or closed conduits, storage units, pumps etc. In this paper, a methodology for least cost design of storm water drainage systems is proposed. The methodology proposed in this study consists of coupling a storm water simulator with an optimization method. The simulator used in this study is EPA’s storm water management model (SWMM), which is linked with Genetic Algorithm (GA) optimization method. The model proposed here is a mixed integer nonlinear optimization formulation, which takes care of minimizing the sectional areas of the open conduits of storm water networks, while satisfactorily conveying the runoff resulting from rainfall to the network outlet. Performance evaluations of the developed model show that the proposed method can be used for cost effective design of open conduit based storm water networks.

Keywords: genetic algorithm (GA), optimal design, simulation-optimization, storm water network, SWMM

Procedia PDF Downloads 245
10407 Effects of Air Pollution on Dew Water: A Case Study of Ado-Ekiti, Nigeria

Authors: M. Sanmi Awopetu, Olugbenga Aribisala, Olabisi O. Ologuntoye, S. Olumuyi Akindele

Abstract:

Human existence vis-à-vis its environment is more and more getting a threatened sequel to air pollution occasioned majorly by human coupled with natural activities. Earth is getting warmer; ozone layer is getting depleted, acid rain is being experienced, all as a result of air pollution. This study seeks to investigate the effect of air pollution on dew water. Thirty-one (31) samples of dew water were collected in four locations in Ado- Ekiti, Ekiti State Nigeria. Analytical studies of the dew water samples were carried out to determine the pH, Total Dissolved Solids (TDS) and Electrical Conductivity (EC) in order to determine whether the dew water is polluted or not. There is no documented world standard for dew water quality. However, the standard for normal rain water which is pH between 5.0-5.6 and acid rain pH between 4.0-4.4 was adopted for this study. The pH of dew water samples collected and analyzed ranged between 5.5 and 7.9 in Olokun Ado-Ekiti while other samples fell in between this range. In Government Reserved Area (GRA), Ajilosun and EKSU school area, the pH ranged between 6.4 and 7.9 while EC fell in between 0.0 and 0.9 mS/cm which shows that the observed zones are polluted. Everyone has a role to play in order to reduce the pollutants being released into the atmosphere. There is a need to develop an international standard for dew water quality.

Keywords: dew, air pollution, total dissolved solids, electrical conductivity, Ado-Ekiti

Procedia PDF Downloads 187
10406 Preserving Privacy in Workflow Delegation Models

Authors: Noha Nagy, Hoda Mokhtar, Mohamed El Sherkawi

Abstract:

The popularity of workflow delegation models and the increasing number of workflow provenance-aware systems motivate the need for finding more strict delegation models. Such models combine different approaches for enhanced security and respecting workflow privacy. Although modern enterprises seek conformance to workflow constraints to ensure correctness of their work, these constraints pose a threat to security, because these constraints can be good seeds for attacking privacy even in secure models. This paper introduces a comprehensive Workflow Delegation Model (WFDM) that utilizes provenance and workflow constraints to prevent malicious delegate from attacking workflow privacy as well as extending the delegation functionalities. In addition, we argue the need for exploiting workflow constraints to improve workflow security models.

Keywords: workflow delegation models, secure workflow, workflow privacy, workflow provenance

Procedia PDF Downloads 329
10405 Analyzing Environmental Emotive Triggers in Terrorist Propaganda

Authors: Travis Morris

Abstract:

The purpose of this study is to measure the intersection of environmental security entities in terrorist propaganda. To the best of author’s knowledge, this is the first study of its kind to examine this intersection within terrorist propaganda. Rosoka, natural language processing software and frame analysis are used to advance our understanding of how environmental frames function as emotive triggers. Violent jihadi demagogues use frames to suggest violent and non-violent solutions to their grievances. Emotive triggers are framed in a way to leverage individual and collective attitudes in psychological warfare. A comparative research design is used because of the differences and similarities that exist between two variants of violent jihadi propaganda that target western audiences. Analysis is based on salience and network text analysis, which generates violent jihadi semantic networks. Findings indicate that environmental frames are used as emotive triggers across both data sets, but also as tactical and information data points. A significant finding is that certain core environmental emotive triggers like “water,” “soil,” and “trees” are significantly salient at the aggregate level across both data sets. All environmental entities can be classified into two categories, symbolic and literal. Importantly, this research illustrates how demagogues use environmental emotive triggers in cyber space from a subcultural perspective to mobilize target audiences to their ideology and praxis. Understanding the anatomy of propaganda construction is necessary in order to generate effective counter narratives in information operations. This research advances an additional method to inform practitioners and policy makers of how environmental security and propaganda intersect.

Keywords: propaganda analysis, emotive triggers environmental security, frames

Procedia PDF Downloads 136
10404 An Innovative Use of Flow Columns in Electrocoagulation Reactor to Control Water Temperature

Authors: Khalid S. Hashim, Andy Shaw, Rafid Alkhaddar, David Phipps, Ortoneda Pedrola

Abstract:

Temperature is an essential parameter in the electrocoagulation process (EC) as it governs the solubility of electrodes and the precipitates and the collision rate of particles in water being treated. Although it has been about 100 years since the EC technology was invented and applied in water and wastewater treatment, the effects of temperature on the its performance were insufficiently investigated. Thus, the present project aims to fill this gap by an innovative use of perforated flow columns in the designing of a new EC reactor (ECR1). The new reactor (ECR1) consisted of a Perspex made cylinder container supplied with a flow column consisted of perorated discoid electrodes that made from aluminium. The flow column has been installed vertically, half submerged in the water being treated, inside a plastic cylinder. The unsubmerged part of the flow column works as a radiator for the water being treated. In order to investigate the performance of ECR1; water samples with different initial temperatures (15, 20, 25, 30, and 35 °C) to the ECR1 for 20 min. Temperature of effluent water samples were measured using Hanna meter (Model: HI 98130). The obtained results demonstrated that the ECR1 reduced water temperature from 35, 30, and 25 °C to 24.6, 23.8, and 21.8 °C respectively. While low water temperature, 15 °C, increased slowly to reach 19.1 °C after 15 minutes and kept the same level till the end of the treatment period. At the same time, water sample with initial temperature of 20 °C showed almost a steady level of temperature along the treatment process, where the temperature increased negligibly from 20 to 20.1 °C after 20 minutes of treatment. In conclusion, ECR1 is able to control the temperature of water being treated around the room temperature even when the initial temperature was high (35 °C) or low (15 °C).

Keywords: electrocoagulation, flow column, treatment, water temperature

Procedia PDF Downloads 426
10403 Implementation of Achterbahn-128 for Images Encryption and Decryption

Authors: Aissa Belmeguenai, Khaled Mansouri

Abstract:

In this work, an efficient implementation of Achterbahn-128 for images encryption and decryption was introduced. The implementation for this simulated project is written by MATLAB.7.5. At first two different original images are used for validate the proposed design. Then our developed program was used to transform the original images data into image digits file. Finally, we used our implemented program to encrypt and decrypt images data. Several tests are done for proving the design performance including visual tests and security analysis; we discuss the security analysis of the proposed image encryption scheme including some important ones like key sensitivity analysis, key space analysis, and statistical attacks.

Keywords: Achterbahn-128, stream cipher, image encryption, security analysis

Procedia PDF Downloads 527
10402 Facial Recognition Technology in Institutions of Higher Learning: Exploring the Use in Kenya

Authors: Samuel Mwangi, Josephine K. Mule

Abstract:

Access control as a security technique regulates who or what can access resources. It is a fundamental concept in security that minimizes risks to the institutions that use access control. Regulating access to institutions of higher learning is key to ensure only authorized personnel and students are allowed into the institutions. The use of biometrics has been criticized due to the setup and maintenance costs, hygiene concerns, and trepidations regarding data privacy, among other apprehensions. Facial recognition is arguably a fast and accurate way of validating identity in order to guard protected areas. It guarantees that only authorized individuals gain access to secure locations while requiring far less personal information whilst providing an additional layer of security beyond keys, fobs, or identity cards. This exploratory study sought to investigate the use of facial recognition in controlling access in institutions of higher learning in Kenya. The sample population was drawn from both private and public higher learning institutions. The data is based on responses from staff and students. Questionnaires were used for data collection and follow up interviews conducted to understand responses from the questionnaires. 80% of the sampled population indicated that there were many security breaches by unauthorized people, with some resulting in terror attacks. These security breaches were attributed to stolen identity cases, where staff or student identity cards were stolen and used by criminals to access the institutions. These unauthorized accesses have resulted in losses to the institutions, including reputational damages. The findings indicate that security breaches are a major problem in institutions of higher learning in Kenya. Consequently, access control would be beneficial if employed to curb security breaches. We suggest the use of facial recognition technology, given its uniqueness in identifying users and its non-repudiation capabilities.

Keywords: facial recognition, access control, technology, learning

Procedia PDF Downloads 122
10401 Effect of Monsoon on Ground Water Quality and Contamination: A Case Study of Narsapur-Mogalthur Mandals, West Godavari District, Andhra Pradesh, India

Authors: M. S. V. K. V. Prasad, G. Siva Praveena, P. V. V. Prasada Rao

Abstract:

It is known that the groundwater quality is very important parameter because it is the main factor determining its suitability for drinking, agricultural and industrial purposes. Water Quality Index (WQI) has been calculated for ground water samples taken from Narsapur-Mogalthur mandals, West Godavari district, Andhra Pradesh, India, from 10 different locations in the pre-monsoon season as well as post monsoon. The water samples were analyzed for pH, Electrical Conductivity (EC), Total Dissolved Solids (TDS), Total Hardness (TH), major cations like calcium, magnesium, sodium, potassium and anions like chloride, nitrate and sulphate in the laboratory using the standard methods given by the American Public Health Association (APHA). The overall quality of water in the study area is somewhat good for all constituents. Drinking water at almost all the locations was found to be slightly contaminated, except a few locations during the year 2014. It was found that some effective measures are urgently required for water quality management in this region.

Keywords: Water Quality Index, Physico-chemical parameters, Quality rating, monsoon

Procedia PDF Downloads 330
10400 The Role of Climate-Smart Agriculture in the Contribution of Small-Scale Farming towards Ensuring Food Security in South Africa

Authors: Victor O. Abegunde, Melusi Sibanda

Abstract:

There is need for a great deal of attention on small-scale agriculture for livelihood and food security because of the expanding global population. Small-scale agriculture has been identified as a major driving force of agricultural and rural development. However, the high dependence of the sector on natural and climatic resources has made small-scale farmers highly vulnerable to the adverse impact of climatic change thereby necessitating the need for embracing practices or concepts that will help absorb shocks from changes in climatic condition. This study examines the strategic position of small-scale farming in South African agriculture and in ensuring food security in the country, the vulnerability of small-scale agriculture to climate change and the potential of the concept of climate-smart agriculture to tackle the challenge of climate change. The study carried out a systematic review of peer-reviewed literature touching small-scale agriculture, climate change, food security and climate-smart agriculture, employing the realist review method. Findings revealed that increased productivity in the small-scale agricultural sector has a great potential of improving the food security of households in South Africa and reducing dependence on food purchase in a context of high food price inflation. Findings, however, also revealed that climate change affects small-scale subsistence farmers in terms of productivity, food security and family income, categorizing the impact on smallholder livelihoods into three major groups; biological processes, environmental and physical processes and impact on health. Analysis of the literature consistently showed that climate-smart agriculture integrates the benefits of adaptation and resilience to climate change, mitigation, and food security. As a result, farming households adopting climate-smart agriculture will be better off than their counterparts who do not. This study concludes that climate-smart agriculture could be a very good bridge linking small-scale agricultural sector and agricultural productivity and development which could bring about the much needed food security.

Keywords: climate change, climate-smart agriculture, food security, small-scale

Procedia PDF Downloads 235
10399 Evaluation of Corrosion Behaviour of Austenitic Steel 08Cr18Ni10Ti Exposed to Supercritical Water

Authors: Monika Šípová, Daniela Marušáková, Claudia Aparicio

Abstract:

New sources and ways of producing energy are still seeking, and one of the sustainable ways is Generation IV nuclear reactors. The supercritical water-cooled reactor is one of the six nuclear reactors of Generation IV, and as a consequence of the development of light water, reactors seem to be the most perspective. Thus, materials usually used in light water reactors are also tested under the expected operating conditions of the supercritical water-cooled reactor. Austenitic stainless steel 08Cr18Ni10Ti is widely used in the eastern types of light water nuclear power plants. Therefore, specimens of 08Cr18Ni10Ti were exposed to conditions close to the pseudo-critical point of water and high-temperature supercritical water. The description and evaluation of the corrosion behaviour of austenitic stainless steel have been done based on the results of X-ray diffraction in combination with energy dispersive spectroscopy and electron backscatter diffraction. Thus, significant differences have been found in the structure and composition of oxides formed depending on the temperature of exposure. The high temperature of supercritical water resulted in localised form of corrosion in contrast to the thin oxide layer of 1 µm present on the surface of specimens exposed close to the pseudo-critical point of water. The obtained results are important for further research as the supercritical water can be successfully used as a coolant for small modular reactors, which are currently of interest.

Keywords: localised corrosion, supercritical water, stainless steel, electron backscatter diffraction

Procedia PDF Downloads 73
10398 Evaluation of Health Risk Degree Arising from Heavy Metals Present in Drinking Water

Authors: Alma Shehu, Majlinda Vasjari, Sonila Duka, Loreta Vallja, Nevila Broli

Abstract:

Humans consume drinking water from several sources, including tap water, bottled water, natural springs, filtered tap water, etc. The quality of drinking water is crucial for human survival given the fact that the consumption of contaminated drinking water is related to many diseases and deaths all over the world. This study represents the investigation of the quality and health risks of different types of drinking waters being consumed by the population in Albania, arising from heavy metals content. Investigated water included industrialized water, tap water, and spring water. In total, 20 samples were analyzed for the content of Pb, Cd, Cr, Ni, Cu, Fe, Zn, Al, and Mn. Determination of each metal concentration in selected samples was conducted by atomic absorption spectroscopy method with electrothermal atomization, GFAAS. Water quality was evaluated by comparing the obtained metals concentrations with the recommended maximum limits, according to the European Directive (98/83/EC) and Guidelines for Drinking Water Quality (WHO, 2017). Metal Index (MI) was used to assess the overall water quality due to heavy metals content. Health risk assessment was conducted based on the recommendations of the USEPA (1996), human health risk assessment, via ingestion. Results of this investigation showed that Al, Ni, Fe, and Cu were the metals found in higher concentrations while Cd exhibited the lowest concentration. Among the analyzed metals, Al (one sample) and Ni (in five samples) exceeded the maximum allowed limit. Based on the pollution metal index, it was concluded that the overall quality of Glina bottled water can be considered as toxic to humans, while the quality of bottled water (Trebeshina) was classified as moderately toxic. Values of health risk quotient (HQ) varied between 1x10⁻⁶-1.3x10⁻¹, following the order Ni > Cd > Pb > Cu > Al > Fe > Zn > Mn. All the values were lower than 1, which suggests that the analyzed samples exhibit no health risk for humans.

Keywords: drinking water, health risk assessment, heavy metals, pollution index

Procedia PDF Downloads 128
10397 Optimization and Retrofitting for an Egyptian Refinery Water Network

Authors: Mohamed Mousa

Abstract:

Sacristies in the supply of freshwater, strict regulations on discharging wastewater and the support to encourage sustainable development by water minimization techniques leads to raise the interest of water reusing, regeneration, and recycling. Water is considered a vital element in chemical industries. In this study, an optimization model will be developed to determine the optimal design of refinery’s water network system via source interceptor sink that involves several network alternatives, then a Mixed-Integer Non-Linear programming (MINLP) was used to obtain the optimal network superstructure based on flowrates, the concentration of contaminants, etc. The main objective of the model is to reduce the fixed cost of piping installation interconnections, reducing the operating cots of all streams within the refiner’s water network, and minimize the concentration of pollutants to comply with the environmental regulations. A real case study for one of the Egyptian refineries was studied by GAMS / BARON global optimization platform, and the water network had been retrofitted and optimized, leading to saving around 195 m³/ hr. of freshwater with a total reduction reaches to 26 %.

Keywords: freshwater minimization, modelling, GAMS, BARON, water network design, wastewater reudction

Procedia PDF Downloads 227
10396 Detection and Tracking for the Protection of the Elderly and Socially Vulnerable People in the Video Surveillance System

Authors: Mobarok Hossain Bhuyain

Abstract:

Video surveillance processing has attracted various security fields transforming it into one of the leading research fields. Today's demand for detection and tracking of human mobility for security is very useful for human security, such as in crowded areas. Accordingly, video surveillance technology has seen a rapid advancement in recent years, with algorithms analyzing the behavior of people under surveillance automatically. The main motivation of this research focuses on the detection and tracking of the elderly and socially vulnerable people in crowded areas. Degenerate people are a major health concern, especially for elderly people and socially vulnerable people. One major disadvantage of video surveillance is the need for continuous monitoring, especially in crowded areas. To assist the security monitoring live surveillance video, image processing, and artificial intelligence methods can be used to automatically send warning signals to the monitoring officers about elderly people and socially vulnerable people.

Keywords: human detection, target tracking, neural network, particle filter

Procedia PDF Downloads 159
10395 Environmental Implications of Groundwater Quality in Irrigated Agriculture in Kebbi State, Nigeria

Authors: O. I. Ojo, W. B. R. Graham, I. W. Pishiria

Abstract:

The quality of groundwater used for irrigation in Kebbi State, northwestern Nigeria was evaluated. Open-well, tube-well and borehole water samples were collected from various locations in the State. The water samples analyzed had pH values below the normal range for irrigation water and very low to moderate salinity (electrical conductivity 0.05-0.82 dS.m-1). The adjusted sodium adsorption ratio values in all the samples were also very low (<0.2), indicating very low sodicity hazards. However, irrigation water of very low salinity (<0.2dS.m-1) and low SAR can lead to problems of infiltration into soils. The Ca: Mg ratio (<1) in most of the samples may lead to Ca deficiency in soils after long term use. The nitrate concentration in most of the samples was high ranging from 4.5 to >50mg/L.

Keywords: ground water quality, irrigation, characteristics, soil drainage, salinity, Fadama

Procedia PDF Downloads 281
10394 Automatic Extraction of Water Bodies Using Whole-R Method

Authors: Nikhat Nawaz, S. Srinivasulu, P. Kesava Rao

Abstract:

Feature extraction plays an important role in many remote sensing applications. Automatic extraction of water bodies is of great significance in many remote sensing applications like change detection, image retrieval etc. This paper presents a procedure for automatic extraction of water information from remote sensing images. The algorithm uses the relative location of R-colour component of the chromaticity diagram. This method is then integrated with the effectiveness of the spatial scale transformation of whole method. The whole method is based on water index fitted from spectral library. Experimental results demonstrate the improved accuracy and effectiveness of the integrated method for automatic extraction of water bodies.

Keywords: feature extraction, remote sensing, image retrieval, chromaticity, water index, spectral library, integrated method

Procedia PDF Downloads 379
10393 Rural Water Supply Services in India: Developing a Composite Summary Score

Authors: Mimi Roy, Sriroop Chaudhuri

Abstract:

Sustainable water supply is among the basic needs for human development, especially in the rural areas of the developing nations where safe water supply and basic sanitation infrastructure is direly needed. In light of the above, we propose a simple methodology to develop a composite water sustainability index (WSI) to assess the collective performance of the existing rural water supply services (RWSS) in India over time. The WSI will be computed by summarizing the details of all the different varieties of water supply schemes presently available in India comprising of 40 liters per capita per day (lpcd), 55 lpcd, and piped water supply (PWS) per household. The WSI will be computed annually, between 2010 and 2016, to elucidate changes in holistic RWSS performances. Results will be integrated within a robust geospatial framework to identify the ‘hotspots’ (states/districts) which have persistent issues over adequate RWSS coverage and warrant spatially-optimized policy reforms in future to address sustainable human development. Dataset will be obtained from the National Rural Drinking Water Program (NRDWP), operating under the aegis of the Ministry of Drinking Water and Sanitation (MoDWS), at state/district/block levels to offer the authorities a cross-sectional view of RWSS at different levels of administrative hierarchy. Due to simplistic design, complemented by spatio-temporal cartograms, similar approaches can also be adopted in other parts of the world where RWSS need a thorough appraisal.

Keywords: rural water supply services, piped water supply, sustainability, composite index, spatial, drinking water

Procedia PDF Downloads 293
10392 Secure Cryptographic Operations on SIM Card for Mobile Financial Services

Authors: Kerem Ok, Serafettin Senturk, Serdar Aktas, Cem Cevikbas

Abstract:

Mobile technology is very popular nowadays and it provides a digital world where users can experience many value-added services. Service Providers are also eager to offer diverse value-added services to users such as digital identity, mobile financial services and so on. In this context, the security of data storage in smartphones and the security of communication between the smartphone and service provider are critical for the success of these services. In order to provide the required security functions, the SIM card is one acceptable alternative. Since SIM cards include a Secure Element, they are able to store sensitive data, create cryptographically secure keys, encrypt and decrypt data. In this paper, we design and implement a SIM and a smartphone framework that uses a SIM card for secure key generation, key storage, data encryption, data decryption and digital signing for mobile financial services. Our frameworks show that the SIM card can be used as a controlled Secure Element to provide required security functions for popular e-services such as mobile financial services.

Keywords: SIM card, mobile financial services, cryptography, secure data storage

Procedia PDF Downloads 304