Search results for: critical information infrastructure
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 16473

Search results for: critical information infrastructure

15723 Water Management in Mexico City and Its Metropolitan Area

Authors: Raquel Salazar Moreno, Uwe Schmidt, Efrén Fitz Rodríguez, Dennis Dannehl, Abraham Rojano Aguilar, Irineo López Cruz, Gilberto Navas Gómez

Abstract:

As urban areas expand, strategic and protected water reserves become more critical. In this study we investigate the water problems in Mexico City and its Metropolitan area. This region faces a complex water problem that concerns not only Mexican boundaries but also international level because is one of the biggest human concentrations in the World. The current water shortage situation raises the necessity of importing surface and groundwater from the Cutzamala River and from the Alto Rio Lerma System respectively. Water management is the real issue in this region, because waste water generation is more than aquifer overexploitation, and surface water loss in the rainfall period is greater than water imported from other regions. However, the possible solutions of the water supply schemes are complicated, there is a need to look for alternatives socially acceptable and environmentally desirable, considering first the possible solutions on the demand side. Also, it is necessary more investment in water treatment plants and hydraulic infrastructure to ensure water supply and decrease the environmental problems in the area. More studies need to be done related to water efficiency in the three sectors.

Keywords: megacities, aquifer overexploitation, environmental problems, vulnerability

Procedia PDF Downloads 257
15722 Construction and Optimization of Green Infrastructure Network in Mountainous Counties Based on Morphological Spatial Pattern Analysis and Minimum Cumulative Resistance Models: A Case Study of Shapingba District, Chongqing

Authors: Yuning Guan

Abstract:

Under the background of rapid urbanization, mountainous counties need to break through mountain barriers for urban expansion due to undulating topography, resulting in ecological problems such as landscape fragmentation and reduced biodiversity. Green infrastructure networks are constructed to alleviate the contradiction between urban expansion and ecological protection, promoting the healthy and sustainable development of urban ecosystems. This study applies the MSPA model, the MCR model and Linkage Mapper Tools to identify eco-sources and eco-corridors in the Shapingba District of Chongqing and combined with landscape connectivity assessment and circuit theory to delineate the importance levels to extract ecological pinch point areas on the corridors. The results show that: (1) 20 ecological sources are identified, with a total area of 126.47 km², accounting for 31.88% of the study area, and showing a pattern of ‘one core, three corridors, multi-point distribution’. (2) 37 ecological corridors are formed in the area, with a total length of 62.52km, with a ‘more in the west, less in the east’ pattern. (3) 42 ecological pinch points are extracted, accounting for 25.85% of the length of the corridors, which are mainly distributed in the eastern new area. Accordingly, this study proposes optimization strategies for sub-area protection of ecological sources, grade-level construction of ecological corridors, and precise restoration of ecological pinch points.

Keywords: green infrastructure network, morphological spatial pattern, minimal cumulative resistance, mountainous counties, circuit theory, shapingba district

Procedia PDF Downloads 40
15721 The Quality of Accounting Information of Private Companies in the Czech Republic

Authors: Kateřina Struhařová

Abstract:

The paper gives the evidence of quality of accounting information of Czech private companies. In general the private companies in the Czech Republic do not see the benefits of providing accounting information of high quality. Based on the research of financial statements of entrepreneurs and companies in Zlin region it was confirmed that the quality of accounting information differs among the private entities and that the major impact on the accounting information quality has the fact if the financial statements are audited as well as the size of the entity. Also the foreign shareholders and lenders have some impact on the accounting information quality.

Keywords: accounting information quality, financial statements, Czech Republic, private companies

Procedia PDF Downloads 300
15720 Lessons-Learned in a Post-Alliance Framework

Authors: Olubukola Olumuyiwa Tokede, Dominic D. Ahiaga-Dagbui, John Morrison

Abstract:

The project environment in construction has been widely criticised for its inability to learn from experience effectively. As each project is bespoke, learning is ephemeral, as it is often confined within its bounds and seldom assimilated with others that are being delivered in the project environment. To engender learning across construction projects, collaborative contractual arrangements, such as alliancing and partnering, have been embraced to aid the transferability of lessons across projects. These cooperative arrangements, however, tend to be costly, and hence construction organisations could revert to less expensive traditional procurement approaches after successful collaborative project delivery. This research, therefore, seeks to assess the lessons-learned in a post-alliance contractual framework. Using a case-study approach, we examine the experiences of a public sector authority who engaged a project facilitator to foster learning during the delivery of a significant piece of critical infrastructure. It was found that the facilitator enabled optimal learning outcomes in post-alliance contractual frameworks by attenuating the otherwise adversarial relationship between clients and contractors. Further research will seek to assess the effectiveness of different knowledge-brokering agencies in construction projects.

Keywords: facilitation, knowledge-brokering, learning, projects

Procedia PDF Downloads 134
15719 River Catchment’s Demography and the Dynamics of Access to Clean Water in the Rural South Africa

Authors: Yiseyon Sunday Hosu, Motebang Dominic Vincent Nakin, Elphina N. Cishe

Abstract:

Universal access to clean and safe drinking water and basic sanitation is one of the targets of the 6th Sustainable Development Goals (SDGs). This paper explores the evidence-based indicators of Water Rights Acts (2013) among households in the rural communities in the Mthatha River catchment of OR Tambo District Municipality of South Africa. Daily access to minimum 25 litres/person and the factors influencing clean water access were investigated in the catchment. A total number of 420 households were surveyed in the upper, peri-urban, lower and coastal regions of Mthatha Rivier catchment. Descriptive and logistic regression analyses were conducted on the data collected from the households to elicit vital information on domestic water security among rural community dwellers. The results show that approximately 68 percent of total households surveyed have access to the required minimum 25 litre/person/day, with 66.3 percent in upper region, 76 per cent in the peri-urban, 1.1 percent in the lower and 2.3 percent in the coastal regions. Only 30 percent among the total surveyed households had access to piped water either in the house or public taps. The logistic regression showed that access to clean water was influenced by lack of water infrastructure, proximity to urban regions, daily flow of pipe-borne water, household size and distance to public taps. This paper recommends that viable integrated rural community-based water infrastructure provision strategies between NGOs and local authority and the promotion of point of use (POU) technologies to enhance better access to clean water.

Keywords: domestic water, household technology, water security, rural community

Procedia PDF Downloads 352
15718 Construction Engineering and Cocoa Agriculture: A Synergistic Approach for Improved Livelihoods of Farmers

Authors: Felix Darko-Amoah, Daniel Acquah

Abstract:

In contemporary ecosystems for developing countries like Ghana, the need to explore innovative solutions for sustainable livelihoods of farmers is more important than ever. With Ghana’s population growing steadily and the demand for food, fiber and shelter increasing, it is imperative that the construction industry and agriculture come together to address the challenges faced by farmers in the country. In order to enhance the livelihoods of cocoa farmers in Ghana, this paper provides an innovative strategy that aims to integrate the areas of civil engineering and cash crop agriculture. This study focuses on cocoa cultivation in poorer nations, where farmers confront a variety of difficulties include restricted access to financing, subpar infrastructure, and insufficient support services. We seek to improve farmers' access to financing, improve infrastructure, and provide support services that are essential to their success by combining the fields of building engineering and cocoa production. The findings of the study are beneficial to cocoa producers, community extension agents, and construction engineers. In order to accomplish our objectives, we conducted 307 of field investigations in particular cocoa growing communities in the Western Region of Ghana. Several studies have shown that there is a lack of adequate infrastructure and financing, leading to low yields, subpar beans, and low farmer profitability in developing nations like Ghana. Our goal is to give farmers access to better infrastructure, better financing, and support services that are crucial to their success through the fusion of construction engineering and cocoa production. Based on data gathered from the field investigations, the results show that the employment of appropriate technology and methods for developing structures, roads, and other infrastructure in rural regions is one of the essential components of this strategy. For instance, we find that using affordable, environmentally friendly materials like bamboo, rammed earth, and mud bricks can assist to cut expenditures while also protecting the environment. By applying simple relational techniques to the data gathered, the results also show that construction engineers are crucial in planning and building infrastructure that is appropriate for the local environment and circumstances and resilient to natural disasters like floods. Thus, the convergence of construction engineering and cash crop cultivation is another crucial component of the agriculture-construction interplay. For instance, farmers can receive financial assistance to buy essential inputs, such as seeds, fertilizer, and tools, as well as training in proper farming methods. Moreover, extension services can be offered to assist farmers in marketing their crops and enhancing their livelihoods and revenue. In conclusion, our analysis of responses from the 307 participants depicts that the combination of construction engineering and cash crop agriculture offers an innovative approach to improving farmers' livelihoods in cocoa farming communities in Ghana. In conclusion, by inculcating the findings of this study into core decision-making, policymakers can help farmers build sustainable and profitable livelihoods by addressing challenges such as limited access to financing, poor infrastructure, and inadequate support services.

Keywords: cocoa agriculture, construction engineering, farm buildings and equipment, improved livelihoods of farmers

Procedia PDF Downloads 88
15717 Reforms in China's Vaccine Administration: Vulnerabilities, Legislative Progresses and the Systemic View of Vaccine Administration Law

Authors: Lin Tang, Xiaoxia Guo, Lingling Zhang

Abstract:

Recent vaccine scandals overshadowed China’s accomplishment of public health, triggering discussions on the causes of vaccine incidents. Through legal interpretation of selected vaccine incidents and analysis of systemic vulnerabilities in vaccine circulation and lot release, a panoramic review of legislative progresses in the vaccine administration sheds the light on this debate. In essence, it is the combination of the lagging legal system and the absence of information technology infrastructure in the process of vaccine administration reform that has led to the recurrence of vaccine incidents. These findings have significant implications for further improvement of vaccine administration and China’s participation in global healthcare.

Keywords: legislation, lot release, public health, reform, vaccine administration, vaccine circulation

Procedia PDF Downloads 147
15716 The Impact of Information and Communication Technology on the Performance of Office Technology Managers

Authors: Sunusi Tijjani

Abstract:

Information and communication technology is an indispensable tool in the performance of office technology managers. Today's offices are automated and equipped with modern office machines that enhances and improve the work of office managers. However, today's office technology managers can process, evaluate, manage and communicate all forms of information using technological devices. Information and Communication Technology is viewed as the process of processing, storing ad dissemination information while office technology managers are trained professional who can effectively operate modern office machines, perform administrative duties and attend meetings to take dawn minute of meetings. This paper examines the importance of information and communication technology toward enhancing the work of office managers. It also stresses the importance of information and communication technology toward proper and accurate record management.

Keywords: communication, information, technology, managers

Procedia PDF Downloads 478
15715 Effect of the Mould Rotational Speed on the Quality of Centrifugal Castings

Authors: M. A. El-Sayed, S. A. Aziz

Abstract:

Centrifugal casting is a standard casting technique for the manufacture of hollow, intricate and sound castings without the use of cores. The molten metal or alloy poured into the rotating mold forms a hollow casting as the centrifugal forces lift the liquid along the mold inner surface. The rotational speed of the die was suggested to greatly affect the manner in which the molten metal flows within the mould and consequently the probability of the formation of a uniform cylinder. In this work the flow of the liquid metal at various speeds and its effect during casting were studied. The results suggested that there was a critical range for the speed, within which the produced castings exhibited best uniformity and maximum mechanical properties. When a mould was rotated at speeds below or beyond the critical range defects were found in the final castings, which affected the uniformity and significantly lowered the mechanical properties.

Keywords: centrifugal casting, rotational speed, critical speed range, mechanical properties

Procedia PDF Downloads 442
15714 The Power of Inferences and Assumptions: Using a Humanities Education Approach to Help Students Learn to Think Critically

Authors: Randall E. Osborne

Abstract:

A four-step ‘humanities’ thought model has been used in an interdisciplinary course for almost two decades and has been proven to aid in student abilities to become more inclusive in their world view. Lack of tolerance for ambiguity can interfere with this progression so we developed an assignment that seems to have assisted students in developing more tolerance for ambiguity and, therefore, opened them up to make more progress on the critical thought model. A four-step critical thought model (built from a humanities education approach) is used in an interdisciplinary course on prejudice, discrimination, and hate in an effort to minimize egocentrism and promote sociocentrism in college students. A fundamental barrier to this progression is a lack of tolerance for ambiguity. The approach to the course is built on the assumption that Tolerance for Ambiguity (characterized by a dislike of uncertain, ambiguous or situations in which expected behaviors are uncertain, will like serve as a barrier (if tolerance is low) or facilitator (if tolerance is high) of active ‘engagement’ with assignments. Given that active engagement with course assignments would be necessary to promote an increase in critical thought and the degree of multicultural attitude change, tolerance for ambiguity inhibits critical thinking and, ultimately multicultural attitude change. As expected, those students showing the least amount of decrease (or even an increase) in intolerance across the semester, earned lower grades in the course than those students who showed a significant decrease in intolerance, t(1,19) = 4.659, p < .001. Students who demonstrated the most change in their Tolerance for Ambiguity (showed an increasing ability to tolerate ambiguity) earned the highest grades in the course. This is, especially, significant because faculty did not know student scores on this measure until after all assignments had been graded and course grades assigned. An assignment designed to assist students in making their assumption and inferences processes visible so they could be explored, was implemented with the goal of this exploration then promoting more tolerance for ambiguity, which, as already outlined, promotes critical thought. The assignment offers students two options and then requires them to explore what they have learned about inferences and/or assumptions This presentation outlines the assignment and demonstrates the humanities model, what students learn from particular assignments and how it fosters a change in Tolerance for Ambiguity which, serves as the foundational component of critical thinking.

Keywords: critical thinking, humanities education, sociocentrism, tolerance for ambiguity

Procedia PDF Downloads 270
15713 Radical Technological Innovation - Comparison of a Critical Success Factors Framework with Existing Literature

Authors: Florian Wohlfeil, Orestis Terzidis, Louisa Hellmann

Abstract:

Radical technological innovations enable companies to reach strong market positions and are thus desirable. On the other hand, the innovation process is related to significant costs and risks. Hence, the knowledge of the factors that influence success is crucial for technology driven companies. In a previous study, we have developed a conceptual framework of 25 Critical Success Factors for radical technological innovations and mapped them to four main categories: Technology, Organization, Market, and Process. We refer to it as the Technology-Organization-Market-Process (TOMP) framework. Taking the TOMP framework as a reference model, we conducted a structured and focused literature review of eleven standard books on the topic of radical technological innovation. With this approach, we aim to evaluate, expand, and clarify the set of Critical Success Factors detailed in the TOMP framework. Overall, the set of factors and their allocation to the main categories of the TOMP framework could be confirmed. However, the factor organizational home is not emphasized and discussed in most of the reviewed literature. On the other hand, an additional factor that has not been part of the TOMP framework is described to be important – strategy fit. Furthermore, the factors strategic alliances and platform strategy appear in the literature but in a different context compared to the reference model.

Keywords: Critical Success Factors, radical technological innovation, TOMP framework, innovation process

Procedia PDF Downloads 655
15712 Arabic Light Stemmer for Better Search Accuracy

Authors: Sahar Khedr, Dina Sayed, Ayman Hanafy

Abstract:

Arabic is one of the most ancient and critical languages in the world. It has over than 250 million Arabic native speakers and more than twenty countries having Arabic as one of its official languages. In the past decade, we have witnessed a rapid evolution in smart devices, social network and technology sector which led to the need to provide tools and libraries that properly tackle the Arabic language in different domains. Stemming is one of the most crucial linguistic fundamentals. It is used in many applications especially in information extraction and text mining fields. The motivation behind this work is to enhance the Arabic light stemmer to serve the data mining industry and leverage it in an open source community. The presented implementation works on enhancing the Arabic light stemmer by utilizing and enhancing an algorithm that provides an extension for a new set of rules and patterns accompanied by adjusted procedure. This study has proven a significant enhancement for better search accuracy with an average 10% improvement in comparison with previous works.

Keywords: Arabic data mining, Arabic Information extraction, Arabic Light stemmer, Arabic stemmer

Procedia PDF Downloads 304
15711 RSU Aggregated Message Delivery for VANET

Authors: Auxeeliya Jesudoss, Ashraph Sulaiman, Ratnakar Kotnana

Abstract:

V2V communication brings up several questions of scalability issues although message sharing in vehicular ad-hoc networks comprises of both Vehicle-to-Vehicle communications (V2V) and Vehicle to Infrastructure communication (V2I). It is not an easy task for a vehicle to verify all signatures of the messages sent by its neighboring vehicles in a timely manner, without resulting in message loss. Moreover, the communication overhead of a vehicle to authenticate another vehicle would increase together with the security of the system. Another issue to be addressed is the continuous mobility of vehicles which requires at least some information on the node’s own position to be revealed to the neighboring vehicles. This may facilitate the attacker to congregate information on a node’s position or its mobility patterns. In order to tackle these issues, this paper introduces a RSU aggregated message deliverance scheme called RAMeD. With RAMeD, roadside units (RSUs) are responsible for verifying the identity of the vehicles entering in its range, collect messages from genuine vehicles and to aggregate similar messages into groups before sending them to all the vehicles in its communication range. This aggregation will tremendously improve the rate of message delivery and reduce the message lose ratio by avoiding similar messages being sent to the vehicles redundantly. The proposed protocol is analyzed extensively to evaluate its merits and efficiency for vehicular communication.

Keywords: vehicular ad-hoc networks, V2V, V2I, VANET communication, scalability, message aggregation

Procedia PDF Downloads 405
15710 The Critical Success Factors for Effective ICT Governance in Malaysian Public Sector: A Delphi Study

Authors: Rosida A. Razak, Mohamad Shanudin Zakaria

Abstract:

The fundamental issues in ICT Governance (ICTG) implementation for Malaysian Public Sector (MPS) is how ICT be applied to support improvements in productivity, management effectiveness and the quality of services offered to its citizens. Our main concern is to develop and adopt a common definition and framework to illustrate how ICTG can be used to better align ICT with government’s operations and strategic focus. In particular, we want to identify and categorize factors that drive a successful ICTG process. This paper presents the results of an exploratory study to identify, validate and refine such Critical Success Factors (CSFs) and confirmed seven CSFs and nineteen sub-factors as influential factors that fit MPS after further validated and refined. The Delphi method applied in validation and refining process before being endorsed as appropriate for MPS. The identified CSFs reflect the focus areas that need to be considered strategically to strengthen ICT Governance implementation and ensure business success.

Keywords: IT governance, critical success factors, productivity, CSFs

Procedia PDF Downloads 272
15709 Degradation of Hydrocarbons by Surfactants and Biosurfactants

Authors: Samira Ferhat, Redha Alouaoui, Leila Trifi, Abdelmalek Badis

Abstract:

The objective of this work is the use of natural surfactant (biosurfactant) and synthetic (sodium dodecyl sulfate and tween 80) for environmental application. In fact the solubility of the polycyclic hydrocarbon (naphthalene) and the desorption of the heavy metals in the presence of surfactants. The microorganisms selected in this work are bacterial strain (Bacillus licheniformis) for the production of biosurfactant for use in this study. In the first part of this study, we evaluated the effectiveness of surfactants solubilization certain hydrocarbons few soluble in water such as polyaromatic (case naphthalene). Tests have shown that from the critical micelle concentration, decontamination is performed. The second part presents the results on the desorption of heavy metals (for copper) by the three surfactants, using concentrations above the critical micelle concentration. The comparison between the desorption of copper by the three surfactants, it is shown that the biosurfactant is more effective than tween 80 and sodium dodecyl sulfate.

Keywords: surfactants, biosurfactant, naphthalene, copper, critical micelle concentration, solubilization, desorption

Procedia PDF Downloads 391
15708 Integrating the Modbus SCADA Communication Protocol with Elliptic Curve Cryptography

Authors: Despoina Chochtoula, Aristidis Ilias, Yannis Stamatiou

Abstract:

Modbus is a protocol that enables the communication among devices which are connected to the same network. This protocol is, often, deployed in connecting sensor and monitoring units to central supervisory servers in Supervisory Control and Data Acquisition, or SCADA, systems. These systems monitor critical infrastructures, such as factories, power generation stations, nuclear power reactors etc. in order to detect malfunctions and ignite alerts and corrective actions. However, due to their criticality, SCADA systems are vulnerable to attacks that range from simple eavesdropping on operation parameters, exchanged messages, and valuable infrastructure information to malicious modification of vital infrastructure data towards infliction of damage. Thus, the SCADA research community has been active over strengthening SCADA systems with suitable data protection mechanisms based, to a large extend, on cryptographic methods for data encryption, device authentication, and message integrity protection. However, due to the limited computation power of many SCADA sensor and embedded devices, the usual public key cryptographic methods are not appropriate due to their high computational requirements. As an alternative, Elliptic Curve Cryptography has been proposed, which requires smaller key sizes and, thus, less demanding cryptographic operations. Until now, however, no such implementation has been proposed in the SCADA literature, to the best of our knowledge. In order to fill this gap, our methodology was focused on integrating Modbus, a frequently used SCADA communication protocol, with Elliptic Curve based cryptography and develop a server/client application to demonstrate the proof of concept. For the implementation we deployed two C language libraries, which were suitably modify in order to be successfully integrated: libmodbus (https://github.com/stephane/libmodbus) and ecc-lib https://www.ceid.upatras.gr/webpages/faculty/zaro/software/ecc-lib/). The first library provides a C implementation of the Modbus/TCP protocol while the second one offers the functionality to develop cryptographic protocols based on Elliptic Curve Cryptography. These two libraries were combined, after suitable modifications and enhancements, in order to give a modified version of the Modbus/TCP protocol focusing on the security of the data exchanged among the devices and the supervisory servers. The mechanisms we implemented include key generation, key exchange/sharing, message authentication, data integrity check, and encryption/decryption of data. The key generation and key exchange protocols were implemented with the use of Elliptic Curve Cryptography primitives. The keys established by each device are saved in their local memory and are retained during the whole communication session and are used in encrypting and decrypting exchanged messages as well as certifying entities and the integrity of the messages. Finally, the modified library was compiled for the Android environment in order to run the server application as an Android app. The client program runs on a regular computer. The communication between these two entities is an example of the successful establishment of an Elliptic Curve Cryptography based, secure Modbus wireless communication session between a portable device acting as a supervisor station and a monitoring computer. Our first performance measurements are, also, very promising and demonstrate the feasibility of embedding Elliptic Curve Cryptography into SCADA systems, filling in a gap in the relevant scientific literature.

Keywords: elliptic curve cryptography, ICT security, modbus protocol, SCADA, TCP/IP protocol

Procedia PDF Downloads 259
15707 Resilient Strategic Approach Towards Environmental Pollution and Infrastructural Misappropriation in Niger Delta Region: A Bibliometric Analysis

Authors: Anyia Nduka, Aslan Bin Amad Senin

Abstract:

Environmental degradation and infrastructure abuse in the Niger Delta have received increasing attention over the last two decades in several sectors, like strategic management, societal impacts, etc. Resilience strategy in human capital development and technology has inspired the formulation and implementation of strategies, policies, or activities to mitigate risks while taking advantage of opportunities to respond to crisis management. This research hopes to add to the debate on the resilient strategic model in the Niger Delta region, which is plagued with environmental and infrastructure mismanagement. It further proposes a conceptual framework of robust strategy and open technology model on bibliometric analysis. This article is intended to be a starting point for an in-depth discussion of the factors that lead to these mismanagements. Four factors were discovered for a resilient strategy leading to a more efficient and effective management procedure.

Keywords: resilience strategy, infrastructural mismanagement, human capital development., strategic management

Procedia PDF Downloads 81
15706 Role of Academic Library in/for Information Literacy

Authors: Veena Rani

Abstract:

This paper presents the role of academic library in information literacy in the present time. Information is the very important aspect for the growth of any country. In this context information literacy is an essential tool in the development of various fields. Academic library is an essential part of university as well as of an institution. In Academic library we can include university library, college library as well as school library. Academic libraries are playing an important role for information literacy. Academic libraries provide excellent services for the benefit of students, teachers, researchers, and all those who are interested in education. All over the world many of the schemes, policies and services provide for information literacy.

Keywords: information literacy, academic library, tool literacy, higher education

Procedia PDF Downloads 360
15705 Developing a Viral Artifact to Improve Employees’ Security Behavior

Authors: Stefan Bauer, Josef Frysak

Abstract:

According to the scientific information management literature, the improper use of information technology (e.g. personal computers) by employees are one main cause for operational and information security loss events. Therefore, organizations implement information security awareness programs to increase employees’ awareness to further prevention of loss events. However, in many cases these information security awareness programs consist of conventional delivery methods like posters, leaflets, or internal messages to make employees aware of information security policies. We assume that a viral information security awareness video might be more effective medium than conventional methods commonly used by organizations. The purpose of this research is to develop a viral video artifact to improve employee security behavior concerning information technology.

Keywords: information security awareness, delivery methods, viral videos, employee security behavior

Procedia PDF Downloads 539
15704 Investigating the Road Maintenance Performance in Developing Countries

Authors: Jamaa Salih, Francis Edum-Fotwe, Andrew Price

Abstract:

One of the most critical aspects of the management of road infrastructure is the type and scale of maintenance systems adopted and the consequences of their inadequacy. The performance of road maintenance systems can be assessed by a number of important indicators such as: cost, safety, environmental impact, and level of complaints by users. A review of practice reveals that insufficient level of expenditure or poor management of the road network often has serious consequences for the economic and social life of a country in terms of vehicle operating costs (VOC), travel time costs, accident costs and environmental impact. Despite an increase in the attention paid by global road agencies to the environmental and the road users’ satisfaction, the overwhelming evidence from the available literature agree on the lack of similar levels of attention for the two factors in many developing countries. While many sources agree that the road maintenance backlog is caused by either the shortage of expenditures or lack of proper management or both, it appears that managing the available assets particularly in the developing countries is the main issue. To address this subject, this paper will concentrate on exposing the various issues related to this field.

Keywords: environmental impact, performance indicators, road maintenance, users’ satisfaction

Procedia PDF Downloads 354
15703 Artificial Neural Network Based Model for Detecting Attacks in Smart Grid Cloud

Authors: Sandeep Mehmi, Harsh Verma, A. L. Sangal

Abstract:

Ever since the idea of using computing services as commodity that can be delivered like other utilities e.g. electric and telephone has been floated, the scientific fraternity has diverted their research towards a new area called utility computing. New paradigms like cluster computing and grid computing came into existence while edging closer to utility computing. With the advent of internet the demand of anytime, anywhere access of the resources that could be provisioned dynamically as a service, gave rise to the next generation computing paradigm known as cloud computing. Today, cloud computing has become one of the most aggressively growing computer paradigm, resulting in growing rate of applications in area of IT outsourcing. Besides catering the computational and storage demands, cloud computing has economically benefitted almost all the fields, education, research, entertainment, medical, banking, military operations, weather forecasting, business and finance to name a few. Smart grid is another discipline that direly needs to be benefitted from the cloud computing advantages. Smart grid system is a new technology that has revolutionized the power sector by automating the transmission and distribution system and integration of smart devices. Cloud based smart grid can fulfill the storage requirement of unstructured and uncorrelated data generated by smart sensors as well as computational needs for self-healing, load balancing and demand response features. But, security issues such as confidentiality, integrity, availability, accountability and privacy need to be resolved for the development of smart grid cloud. In recent years, a number of intrusion prevention techniques have been proposed in the cloud, but hackers/intruders still manage to bypass the security of the cloud. Therefore, precise intrusion detection systems need to be developed in order to secure the critical information infrastructure like smart grid cloud. Considering the success of artificial neural networks in building robust intrusion detection, this research proposes an artificial neural network based model for detecting attacks in smart grid cloud.

Keywords: artificial neural networks, cloud computing, intrusion detection systems, security issues, smart grid

Procedia PDF Downloads 315
15702 Health and Climate Changes: "Ippocrate" a New Alert System to Monitor and Identify High Risk

Authors: A. Calabrese, V. F. Uricchio, D. di Noia, S. Favale, C. Caiati, G. P. Maggi, G. Donvito, D. Diacono, S. Tangaro, A. Italiano, E. Riezzo, M. Zippitelli, M. Toriello, E. Celiberti, D. Festa, A. Colaianni

Abstract:

Climate change has a severe impact on human health. There is a vast literature demonstrating temperature increase is causally related to cardiovascular problem and represents a high risk for human health, but there are not study that improve a solution. In this work, it is studied how the clime influenced the human parameter through the analysis of climatic conditions in an area of the Apulia Region: Capurso Municipality. At the same time, medical personnel involved identified a set of variables useful to define an index describing health condition. These scientific studies are the base of an innovative alert system, IPPOCRATE, whose aim is to asses climate risk and share information to population at risk to support prevention and mitigation actions. IPPOCRATE is an e-health system, it is designed to provide technological support to analysis of health risk related to climate and provide tools for prevention and management of critical events. It is the first integrated system of prevention of human risk caused by climate change. IPPOCRATE calculates risk weighting meteorological data with the vulnerability of monitored subjects and uses mobile and cloud technologies to acquire and share information on different data channels. It is composed of four components: Multichannel Hub. Multichannel Hub is the ICT infrastructure used to feed IPPOCRATE cloud with a different type of data coming from remote monitoring devices, or imported from meteorological databases. Such data are ingested, transformed and elaborated in order to be dispatched towards mobile app and VoIP phone systems. IPPOCRATE Multichannel Hub uses open communication protocols to create a set of APIs useful to interface IPPOCRATE with 3rd party applications. Internally, it uses non-relational paradigm to create flexible and highly scalable database. WeHeart and Smart Application The wearable device WeHeart is equipped with sensors designed to measure following biometric variables: heart rate, systolic blood pressure and diastolic blood pressure, blood oxygen saturation, body temperature and blood glucose for diabetic subjects. WeHeart is designed to be easy of use and non-invasive. For data acquisition, users need only to wear it and connect it to Smart Application by Bluetooth protocol. Easy Box was designed to take advantage from new technologies related to e-health care. EasyBox allows user to fully exploit all IPPOCRATE features. Its name, Easy Box, reveals its purpose of container for various devices that may be included depending on user needs. Territorial Registry is the IPPOCRATE web module reserved to medical personnel for monitoring, research and analysis activities. Territorial Registry allows to access to all information gathered by IPPOCRATE using GIS system in order to execute spatial analysis combining geographical data (climatological information and monitored data) with information regarding the clinical history of users and their personal details. Territorial Registry was designed for different type of users: control rooms managed by wide area health facilities, single health care center or single doctor. Territorial registry manages such hierarchy diversifying the access to system functionalities. IPPOCRATE is the first e-Health system focused on climate risk prevention.

Keywords: climate change, health risk, new technological system

Procedia PDF Downloads 866
15701 Smart Grids in Morocco: An Outline of the Recent Developments, Key Drivers, and Recommendations for Better Implementation

Authors: Mohamed Laamim, Abdelilah Rochd, Aboubakr Benazzouz, Abderrahim El Fadili

Abstract:

Smart grids have recently sparked a lot of interest in the energy sector as they allow for the modernization and digitization of the existing power infrastructure. Smart grids have several advantages in terms of reducing the environmental impact of generating power from fossil fuels due to their capacity to integrate large amounts of distributed energy resources. On the other hand, smart grid technologies necessitate many field investigations and requirements. This paper focuses on the major difficulties that governments face around the world and compares them to the situation in Morocco. Also presented in this study are the current works and projects being developed to improve the penetration of smart grid technologies into the electrical system. Furthermore, the findings of this study will be useful to promote the smart grid revolution in Morocco, as well as to construct a strong foundation and develop future needs for better penetration of technologies that aid in the integration of smart grid features.

Keywords: smart grids, microgrids, virtual power plants, digital twin, distributed energy resources, vehicle-to-grid, advanced metering infrastructure.

Procedia PDF Downloads 130
15700 Observation of Critical Sliding Velocity

Authors: Visar Baxhuku, Halil Demolli, Alishukri Shkodra

Abstract:

This paper presents the monitoring of vehicle movement, namely the developing of speed of vehicles during movement in a certain twist. The basic geometry data of twist are measured with the purpose of calculating the slide in border speed. During the research, measuring developed speed of passenger vehicles for the real conditions of the road surface, dry road with average damage, was realised. After setting values, the analysis was done in function security of movement in twist.

Keywords: critical sliding velocity, moving velocity, curve, passenger vehicles

Procedia PDF Downloads 409
15699 Analyze and Improve Project Delivery Time Enhancing Business Management System of Review and Approval Process for Project Design Submittals

Authors: Abdulaziz Alnajem, Amit Sharma

Abstract:

Business Case: Project delivery and enhancing activities' completion in the shortest possible time is critical during execution to proceed with the subsequent phases of Procurement, C & C phases of Contracts to have the required Production facilities/Infrastructure in place to achieve the Company strategic objective of 4.0 MBOPD oil production. SOR (Statement of requirement): Design and Engineering phase of Projects execution takes a long time. It is observed that, in most of the cases, company has crossed the Project Design Submittals review time as per the Contract/Company Standards, resulting into delays in projects completion, and cost impact to the company. Study Scope: Scope of the study covers the process from date of first submission of D & E documents by the contractor to final approval by the controlling team to proceed with the procurement of materials. This scope covers projects handled by the company’s project management teams and includes only the internal review process by the company.

Keywords: business management system, project management, oil and gas, analysis, improvement, design, delays

Procedia PDF Downloads 212
15698 An Explanatory Study into the Information-Seeking Behaviour of Egyptian Beggars

Authors: Essam Mansour

Abstract:

The key purpose of this study is to provide first-hand information about beggars in Egypt, especially from the perspective of their information seeking behaviour including their information needs. The researcher tries to investigate the information-seeking behaviour of Egyptian beggars with regard to their thoughts, perceptions, motivations, attitudes, habits, preferences as well as challenges that may impede their use of information. The research methods used were an adapted form of snowball sampling of a heterogeneous demographic group of participants in the beggary activity in Egypt. This sampling was used to select focus groups to explore a range of relevant issues. Data on the demographic characteristics of the Egyptian beggars showed that they tend to be men, mostly with no formal education, with an average age around 30s, labeled as low-income persons, mostly single and mostly Muslims. A large number of Egyptian beggars were seeking for information to meet their basic needs as well as their daily needs, although some of them were not able to identify their information needs clearly. The information-seeking behaviour profile of a very large number of Egyptian beggars indicated a preference for informal sources of information over formal ones to solve different problems and meet the challenges they face during their beggary activity depending on assistive devices, such as mobile phones. The high degree of illiteracy and the lack of awareness about the basic rights of information as well as information needs were the most important problems Egyptian beggars face during accessing information. The study recommended further research to be conducted about the role of the library in the education of beggars. It also recommended that beggars’ awareness about their information rights should be promoted through educational programs that help them value the role of information in their life.

Keywords: user studies, information-seeking behaviour, information needs, information sources, beggars, Egypt

Procedia PDF Downloads 314
15697 Application of Ground-Penetrating Radar in Environmental Hazards

Authors: Kambiz Teimour Najad

Abstract:

The basic methodology of GPR involves the use of a transmitting antenna to send electromagnetic waves into the subsurface, which then bounce back to the surface and are detected by a receiving antenna. The transmitter and receiver antennas are typically placed on the ground surface and moved across the area of interest to create a profile of the subsurface. The GPR system consists of a control unit that powers the antennas and records the data, as well as a display unit that shows the results of the survey. The control unit sends a pulse of electromagnetic energy into the ground, which propagates through the soil or rock until it encounters a change in material or structure. When the electromagnetic wave encounters a buried object or structure, some of the energy is reflected back to the surface and detected by the receiving antenna. The GPR data is then processed using specialized software that analyzes the amplitude and travel time of the reflected waves. By interpreting the data, GPR can provide information on the depth, location, and nature of subsurface features and structures. GPR has several advantages over other geophysical survey methods, including its ability to provide high-resolution images of the subsurface and its non-invasive nature, which minimizes disruption to the site. However, the effectiveness of GPR depends on several factors, including the type of soil or rock, the depth of the features being investigated, and the frequency of the electromagnetic waves used. In environmental hazard assessments, GPR can be used to detect buried structures, such as underground storage tanks, pipelines, or utilities, which may pose a risk of contamination to the surrounding soil or groundwater. GPR can also be used to assess soil stability by identifying areas of subsurface voids or sinkholes, which can lead to the collapse of the surface. Additionally, GPR can be used to map the extent and movement of groundwater contamination, which is critical in designing effective remediation strategies. the methodology of GPR in environmental hazard assessments involves the use of electromagnetic waves to create high of the subsurface, which are then analyzed to provide information on the depth, location, and nature of subsurface features and structures. This information is critical in identifying and mitigating environmental hazards, and the non-invasive nature of GPR makes it a valuable tool in this field.

Keywords: GPR, hazard, landslide, rock fall, contamination

Procedia PDF Downloads 75
15696 ACO-TS: an ACO-based Algorithm for Optimizing Cloud Task Scheduling

Authors: Fahad Y. Al-dawish

Abstract:

The current trend by a large number of organizations and individuals to use cloud computing. Many consider it a significant shift in the field of computing. Cloud computing are distributed and parallel systems consisting of a collection of interconnected physical and virtual machines. With increasing request and profit of cloud computing infrastructure, diverse computing processes can be executed on cloud environment. Many organizations and individuals around the world depend on the cloud computing environments infrastructure to carry their applications, platform, and infrastructure. One of the major and essential issues in this environment related to allocating incoming tasks to suitable virtual machine (cloud task scheduling). Cloud task scheduling is classified as optimization problem, and there are several meta-heuristic algorithms have been anticipated to solve and optimize this problem. Good task scheduler should execute its scheduling technique on altering environment and the types of incoming task set. In this research project a cloud task scheduling methodology based on ant colony optimization ACO algorithm, we call it ACO-TS Ant Colony Optimization for Task Scheduling has been proposed and compared with different scheduling algorithms (Random, First Come First Serve FCFS, and Fastest Processor to the Largest Task First FPLTF). Ant Colony Optimization (ACO) is random optimization search method that will be used for assigning incoming tasks to available virtual machines VMs. The main role of proposed algorithm is to minimizing the makespan of certain tasks set and maximizing resource utilization by balance the load among virtual machines. The proposed scheduling algorithm was evaluated by using Cloudsim toolkit framework. Finally after analyzing and evaluating the performance of experimental results we find that the proposed algorithm ACO-TS perform better than Random, FCFS, and FPLTF algorithms in each of the makespaan and resource utilization.

Keywords: cloud Task scheduling, ant colony optimization (ACO), cloudsim, cloud computing

Procedia PDF Downloads 418
15695 Policy Compliance in Information Security

Authors: R. Manjula, Kaustav Bagchi, Sushant Ramesh, Anush Baskaran

Abstract:

In the past century, the emergence of information technology has had a significant positive impact on human life. While companies tend to be more involved in the completion of projects, the turn of the century has seen importance being given to investment in information security policies. These policies are essential to protect important data from adversaries, and thus following these policies has become one of the most important attributes revolving around information security models. In this research, we have focussed on the factors affecting information security policy compliance in two models : The theory of planned behaviour and the integration of the social bond theory and the involvement theory into a single model. Finally, we have given a proposal of where these theories would be successful.

Keywords: information technology, information security, involvement theory, policies, social bond theory

Procedia PDF Downloads 367
15694 Research and Development of Net-Centric Information Sharing Platform

Authors: Wang Xiaoqing, Fang Youyuan, Zheng Yanxing, Gu Tianyang, Zong Jianjian, Tong Jinrong

Abstract:

Compared with traditional distributed environment, the net-centric environment brings on more demanding challenges for information sharing with the characteristics of ultra-large scale and strong distribution, dynamic, autonomy, heterogeneity, redundancy. This paper realizes an information sharing model and a series of core services, through which provides an open, flexible and scalable information sharing platform.

Keywords: net-centric environment, information sharing, metadata registry and catalog, cross-domain data access control

Procedia PDF Downloads 561