Search results for: transformation and security challenges
8773 Water Quality of Cengkareng Drain in Maritime Security Perspective
Authors: Febri Ramadhan, Sigid Hariyadi, Niken Tunjung Murti Pratiwi, Budiman Djoko Said
Abstract:
The scope about maritime security copes all of the problems emanating from maritime domain. Those problems can give such threats to national security of the state. One of threats taking place nowadays in maritime domain is about pollution. Pollution coming from many sources may increase water-borne disease risk that can cause the instability of national security. Pollution coming from many sources may increase water-borne disease risk. Hence the pollution makes an improper condition of environments for humans and others biota dwelling in the waters. One of the tools that can determine about pollution is by measuring about the water quality of its waters. In this case, what brings the waste and pollutants is there an activity of tidal waves introducing substances or energy into the natural environment. Cengkareng Drain is one of the water channels which is affected by tidal waves. Cengkareng Drain was become an observation area to examine the relation between water quality and tide waves. This research was conducted monthly from July to November 2015. Sampling of water was conducted every ebb and tide in every observation. Pollution index showed that the level of pollution on Cengkareng drain was moderately polluted, with the score about 7.7-8.6. Based on the results of t-test and analysis of similarity, the characteristic of water quality on rising tide does not significantly differ from the characteristic of water quality on ebbing tide. Therefore, we need a proper management as a means to control the pollutants in order to make good maritime security strategy.Keywords: maritime security, Cengkareng drain, water quality, tidal waves
Procedia PDF Downloads 2168772 Accelerating Decision-Making in Oil and Gas Wells: 'A Digital Transformation Journey for Rapid and Precise Insights from Well History Data'
Authors: Linung Kresno Adikusumo, Ivan Ramos Sampe Immanuel, Liston Sitanggang
Abstract:
An excellent, well work program in the oil and gas industry can have numerous positive business impacts, contributing to operational efficiency, increased production, enhanced safety, and improved financial performance. In summary, an excellent, well work program not only ensures the immediate success of specific projects but also has a broader positive impact on the overall business performance and reputation of the oil and gas company. It positions the company for long-term success in a competitive and dynamic industry. Nevertheless, a number of challenges were encountered when developing a good work program, such as the poor quality and lack of integration of well documentation, the incompleteness of the well history, and the low accessibility of well documentation. As a result, the well work program was delivered less accurately, plus well damage was managed slowly. Our solution implementing digital technology by developing a web-based database and application not only solves those issues but also provides an easy-to-access report and user-friendly display for management as well as engineers to analyze the report’s content. This application aims to revolutionize the documentation of well history in the field of oil and gas exploration and production. The current lack of a streamlined and comprehensive system for capturing, organizing, and accessing well-related data presents challenges in maintaining accurate and up-to-date records. Our innovative solution introduces a user-friendly and efficient platform designed to capture well history documentation seamlessly.Keywords: digital, drilling, well work, application
Procedia PDF Downloads 768771 Naturalization of Aliens in Consideration of Turkish Constitutional Law: Recent Governmental Practices
Authors: Zeynep Ozkan, Cigdem Serra Uzunpinar
Abstract:
Citizenship is a legal bond that binds a person to a certain state. How constitutions define ‘the citizen’ and how they regulate the elements of citizenship have great importance in terms of individuals’ duties before the state as well as the rights they own. Especially in multi-segmented societies that contain foreign elements, it becomes necessary to examinate the institution of naturalization in terms of individuals’ duty of constitutional citizenship. The meaning of citizenship in Turkey has transformed due to the changes in practices of naturalization, in parallel to receiving huge amount of immagrants with the recent Syrian Crisis, the change in the governmental system and facing economic crisis. This transformation took place in the way of a diversion from the states’ initial motive of building the bond of citizenship with the aim of founding/sustaining political unity. Hence, rising of the economic and political motives in naturalization practices are in question, instead of objective and subjective criterias, that are traditionally used on defining the notion of nation. In this study, firstly the regime of citizenship and the legal regime of aliens in Turkish legislation will be given place. Then, the transformation, that the notion of constitutional citizenship underwent, will be studied, especially on the basis of governmental practices of naturalization. The assessment will be made in the context of legal institutions brought with the new governmental system as a result of recent constitutional amendment.Keywords: constitutional citizenship, naturalization, naturalization practices in Turkish legal system, transformation of the notion of constitutional citizenship
Procedia PDF Downloads 1188770 Design and Implementation of Wireless Syncronized AI System for Security
Authors: Saradha Priya
Abstract:
Developing virtual human is very important to meet the challenges occurred in many applications where human find difficult or risky to perform the task. A robot is a machine that can perform a task automatically or with guidance. Robotics is generally a combination of artificial intelligence and physical machines (motors). Computational intelligence involves the programmed instructions. This project proposes a robotic vehicle that has a camera, PIR sensor and text command based movement. It is specially designed to perform surveillance and other few tasks in the most efficient way. Serial communication has been occurred between a remote Base Station, GUI Application, and PC.Keywords: Zigbee, camera, pirsensor, wireless transmission, DC motor
Procedia PDF Downloads 3498769 Linkages between Climate Change, Agricultural Productivity, Food Security and Economic Growth
Authors: Jihène Khalifa
Abstract:
This study analyzed the relationships between Tunisia’s economic growth, food security, agricultural productivity, and climate change using the ARDL model for the period from 1990 to 2022. The ARDL model reveals a positive correlation between economic growth and lagged agricultural productivity. Additionally, the vector autoregressive (VAR) model highlights the beneficial impact of lagged agricultural productivity on economic growth and the negative effect of rainfall on economic growth. Granger causality analysis identifies unidirectional relationships from economic growth to agricultural productivity, crop production, food security, and temperature variations, as well as from temperature variations to crop production. Furthermore, a bidirectional causality is established between crop production and food security. The study underscores the impact of climate change on crop production and suggests the need for adaptive strategies to mitigate these climate effects.Keywords: economic growth, climate change, agriculture, ARDL, Granger causality, VAR
Procedia PDF Downloads 318768 The Effect of Sustainable Land Management Technologies on Food Security of Farming Households in Kwara State, Nigeria
Authors: Shehu A. Salau, Robiu O. Aliu, Nofiu B. Nofiu
Abstract:
Nigeria is among countries of the world confronted with food insecurity problem. The agricultural production systems that produces food for the teaming population is not endurable. Attention is thus being given to alternative approaches of intensification such as the use of Sustainable Land Management (SLM) technologies. Thus, this study assessed the effect of SLM technologies on food security of farming households in Kwara State, Nigeria. A-three stage sampling technique was used to select a sample of 200 farming households for this study. Descriptive statistics, Shriar index, Likert scale, food security index and logistic regression were employed for the analysis. The result indicated that majority (41%) of the household heads were between the ages of 51 and 70 years with an average of 60.5 years. Food security index revealed that 35% and 65% of the households were food secure and food insecure respectively. The logistic regression showed that SLM technologies, estimated income, household size, gender and age of the household heads were the critical determinants of food security among farming households. The most effective coping strategies adopted by households geared towards lessening the effects of food insecurity are reduced quality of food consumed, employed off-farm jobs to raise household income and diversion of money budgeted for other uses to purchase foods. Governments should encourage the adoption and use of SLM technologies at all levels. Policies and strategies that reduce household size should be enthusiastically pursued to reduce food insecurity.Keywords: agricultural practices, coping strategies, farming households, food security, SLM technologies, logistic regression
Procedia PDF Downloads 1738767 Effect of Nano/Micro Alumina Matrix on Alumina-Cubic Boron Nitride Composites Consolidated by Spark Plasma Sintering
Authors: A. S. Hakeem, B. Ahmed, M. Ehsan, A. Ibrahim, H. M. Irshad, T. Laoui
Abstract:
Alumina (Al2O3) - cubic boron nitride (cBN) ceramic composites were sintered by spark plasma sintering (SPS) using α-Al2O3 particle sizes; 150 µm, 150 nm and cBN particle size of 42 µm. Alumina-cBN composites containing 10, 20 and 30wt% cBN with and without Ni coated were sintering at an elevated temperature of 1400°C at a constant uniaxial pressure of 50 MPa. The effect of matrix particle size, cBN and Ni content on mechanical properties and thermal properties, i.e., thermal conductivity, diffusivity, expansion, densification, phase transformation, microstructure, hardness and toughness of the Al2O3-cBN/(Ni) composites under specific sintering conditions were investigated. The highest relative densification of 150 nm-Al2O3 containing 30wt% cBN (Ni coated) composite was 99% at TSPS = 1400°C. In case of 150 µm- Al2O3 compositions, the phase transformation of cBN to hBN were observed, and the relative densification decreased. Thermal conductivity depicts maximum value in case of 150 nm- Al2O3-30wt% cBN-Ni composition. The Vickers hardness of this composition at TSPS = 1400°C also showed the highest value of 29 GPa.Keywords: alumina composite, cubic boron nitride, mechanical properties, phase transformation, Spark plasma sintering
Procedia PDF Downloads 3438766 Progress, Challenges, and Prospects of Non-Conventional Feed Resources for Livestock Production in Sub-Saharan Africa: A Review
Authors: Clyde Haruzivi, Olusegun Oyebade Ikusika, Thando Conference Mpendulo
Abstract:
Feed scarcity, increasing demand for animal products due to the growing human population, competition for conventional feed resources for humans and animal production, and ever-increasing prices of these feed resources are major constraints to the livestock industry in Sub-Saharan Africa. As a result, the industry is suffering immensely as the cost of production is high, hence the reduced returns. Most affected are the communal and resource-limited farmers who cannot afford the cost of conventional feed resources to supplement feeds, especially in arid and semi-arid areas where the available feed resources are not adequate for maintenance and production. This has tasked researchers and animal scientists to focus on the potential of non-conventional feed resources (NCFRs). Non-conventional feed resources could fill the gap through reduced competition, cost of feed, increased supply, increased profits, and independency as farmers will be utilizing locally available feed resources. Identifying available non-conventional feed resources is vital as it creates possibilities for novel feed industries and markets and implements methods of using these feedstuffs to improve livestock production and livelihoods in Sub-Saharan Africa. Hence, this research work analyses the progress, challenges, and prospects of some non-conventional feed resources in Sub-Saharan Africa.Keywords: non-conventional, feed resources, livestock production, food security, Sub-Saharan
Procedia PDF Downloads 1148765 Secure Automatic Key SMS Encryption Scheme Using Hybrid Cryptosystem: An Approach for One Time Password Security Enhancement
Authors: Pratama R. Yunia, Firmansyah, I., Ariani, Ulfa R. Maharani, Fikri M. Al
Abstract:
Nowadays, notwithstanding that the role of SMS as a means of communication has been largely replaced by online applications such as WhatsApp, Telegram, and others, the fact that SMS is still used for certain and important communication needs is indisputable. Among them is for sending one time password (OTP) as an authentication media for various online applications ranging from chatting, shopping to online banking applications. However, the usage of SMS does not pretty much guarantee the security of transmitted messages. As a matter of fact, the transmitted messages between BTS is still in the form of plaintext, making it extremely vulnerable to eavesdropping, especially if the message is confidential, for instance, the OTP. One solution to overcome this problem is to use an SMS application which provides security services for each transmitted message. Responding to this problem, in this study, an automatic key SMS encryption scheme was designed as a means to secure SMS communication. The proposed scheme allows SMS sending, which is automatically encrypted with keys that are constantly changing (automatic key update), automatic key exchange, and automatic key generation. In terms of the security method, the proposed scheme applies cryptographic techniques with a hybrid cryptosystem mechanism. Proofing the proposed scheme, a client to client SMS encryption application was developed using Java platform with AES-256 as encryption algorithm, RSA-768 as public and private key generator and SHA-256 for message hashing function. The result of this study is a secure automatic key SMS encryption scheme using hybrid cryptosystem which can guarantee the security of every transmitted message, so as to become a reliable solution in sending confidential messages through SMS although it still has weaknesses in terms of processing time.Keywords: encryption scheme, hybrid cryptosystem, one time password, SMS security
Procedia PDF Downloads 1288764 Intuition in Negotiation within Ghanaian Social Contexts: Exploring Female Leadership Strategies for Conflict Transformation
Authors: Nadia Naadu Nartey, Esther A.O.G. Tetteh
Abstract:
Male negotiator representations and the appreciation of masculine traits in negotiation contexts dominate negotiation research in the field of conflict management and resolution. This study switched focus to pay attention to rarely examined gendered criteria and social contexts in negotiation research by investigating how intuition has been used in negotiations by female leaders toward conflict transformation in Ghanaian social contexts. Using the theoretical lenses of Klein’s Recognition-Primed Decisions (RPD) and Unconscious Information Processing (UIP) models, this study employs narrative inquiry in qualitative research. Semi-structured interviews of five (5) female leaders of Ghanaian social contexts in the United States (US) revealed that the use of intuition is necessary for effective negotiation outcomes due to its primal focus on relationship-building toward transforming conflicts. The knowledge added to the body of research by this study is summed up in the study’s conceptual framework. Female leaders, in negotiation situations where there are conflicting parties, prioritize the greater need for stronger relationships and win-win outcomes. The participant female leaders in negotiation contexts utilize their intuition as a bonding mechanism by effectively timing their actions, using an appropriate communication tone, emphasizing relationship building, and drawing from experience to make sound situational judgments (as in assessing a situation in the RPD model). Female leaders’ use of intuition in negotiations then translates to creating a force that bridges the gap between the conflicting parties. That force is noticed as conflict transformation that manifests as a reduction in anger and a promotion of trust and mutual understanding toward strengthening relationships. Future studies can expand the scope of the findings of this research by conducting a comparative analysis between male and female leaders on their use of intuition in negotiations in Ghanaian contexts.Keywords: intuition, negotiation, conflict transformation, female leaders, ghanaian social contexts
Procedia PDF Downloads 128763 A Review on the Perception of Beşiktaş Public Square
Authors: Neslinur Hizli, Berrak Kirbaş Akyürek
Abstract:
Beşiktaş, one of the historical coastal district of İstanbul, is on the very edge of the radical transformation because of an approaching ‘Beşiktaş Public Square Project’. At this juncture, due its location, presence on the coast, population density and distance to the other centers of the city, the decisions to be taken are critical to whole Istanbul that will be majorly affected from this transformation. As the new project aims to pedestrianize the area by placing the vehicular traffic under the ground, Beşiktaş and its square will change from top to bottom. Among those considerations, through the advantages and disadvantages the perception of the existing conditions of the Beşiktaş play significant role. The motive of this paper is the lack of determination and clarity on the cognition of the Square. After brief analysis on the historical transformation of the area, prominent studies on the criteria of public square are revised. Through cognitive mapping methodology, characteristics of the Square and the public space in general find a place to discuss from individual views. This study aims to discuss and review Beşiktaş Public Square from perspective, mind and behavior of the users. Cognitive map study with thirty subjects (30) is evaluated and categorized upon the five elements that Kevin Lynch defined as the images of the city. The results obtained digitized and represented with tables and graphs. Findings of the research underline the crucial issues on the approaching change in Beşiktaş. Thus, this study may help to develop comprehensive ideas and new suggestions on the Square.Keywords: Beşiktaş public square, cognitive map, perception, public space
Procedia PDF Downloads 2678762 The Evaluation of Transformational Leadership Characteristics and Behaviors in Air Forces
Authors: Cuma Şimşek
Abstract:
Nowadays our globalized world is in a very rapid and sophisticated change. In the information age, notion of ‘information’ has begun to spread faster than ever also in this age, changes and transformation has gained tremendous momentum with technology boom. This continuous change and transformation, increased the competition between existing organizations and corporations. Besides, the organizations which show resistance to change has been put out of action in this competitive environment. It is not possible to sustain the existence of organizations without adapting to change and transformation by isolating itself from developments. As a consequence of improved communication and dialog possibilities by means of increasing knowledge level, there has been made a change of scene in administrative mentality, style and activation, especially in 21th century. Leaders emerge as the most important factor in this process of perception and success. At the same time it is not enough to adapt the alteration with conventional leadership abilities and behaviors. In parallel with alteration, new types of leadership are coming up. The optimal leadership type for our era and a trending topic "Transformational Leadership" is in great demand now. In this research, current situation of the Air Forces which use high-technology weapons efficiently, operates in an environment full of threats and is analyzed. It is evaluated that in order to be ready for war continuously and adjusting itself to changing terms of warfare atmosphere , Air Forces need ‘transformational leaders’ who are innovative, foreseeing and having a vision so that they can develop new methods and strategies for complex problems. Because it is the Air Force which is responsible for being the deterrent force of its country.Keywords: transformational, change, air force, leadership
Procedia PDF Downloads 4428761 MSG Image Encryption Based on AES and RSA Algorithms "MSG Image Security"
Authors: Boukhatem Mohammed Belkaid, Lahdir Mourad
Abstract:
In this paper, we propose a new encryption system for security issues meteorological images from Meteosat Second Generation (MSG), which generates 12 images every 15 minutes. The hybrid encryption scheme is based on AES and RSA algorithms to validate the three security services are authentication, integrity and confidentiality. Privacy is ensured by AES, authenticity is ensured by the RSA algorithm. Integrity is assured by the basic function of the correlation between adjacent pixels. Our system generates a unique password every 15 minutes that will be used to encrypt each frame of the MSG meteorological basis to strengthen and ensure his safety. Several metrics have been used for various tests of our analysis. For the integrity test, we noticed the efficiencies of our system and how the imprint cryptographic changes at reception if a change affects the image in the transmission channel.Keywords: AES, RSA, integrity, confidentiality, authentication, satellite MSG, encryption, decryption, key, correlation
Procedia PDF Downloads 3838760 Comparison of Authentication Methods in Internet of Things Technology
Authors: Hafizah Che Hasan, Fateen Nazwa Yusof, Maslina Daud
Abstract:
Internet of Things (IoT) is a powerful industry system, which end-devices are interconnected and automated, allowing the devices to analyze data and execute actions based on the analysis. The IoT technology leverages the technology of Radio-Frequency Identification (RFID) and Wireless Sensor Network (WSN), including mobile and sensor. These technologies contribute to the evolution of IoT. However, due to more devices are connected each other in the Internet, and data from various sources exchanged between things, confidentiality of the data becomes a major concern. This paper focuses on one of the major challenges in IoT; authentication, in order to preserve data integrity and confidentiality are in place. A few solutions are reviewed based on papers from the last few years. One of the proposed solutions is securing the communication between IoT devices and cloud servers with Elliptic Curve Cryptograhpy (ECC) based mutual authentication protocol. This solution focuses on Hyper Text Transfer Protocol (HTTP) cookies as security parameter. Next proposed solution is using keyed-hash scheme protocol to enable IoT devices to authenticate each other without the presence of a central control server. Another proposed solution uses Physical Unclonable Function (PUF) based mutual authentication protocol. It emphasizes on tamper resistant and resource-efficient technology, which equals a 3-way handshake security protocol.Keywords: Internet of Things (IoT), authentication, PUF ECC, keyed-hash scheme protocol
Procedia PDF Downloads 2648759 Barriers That Special Education Teachers Faced When Working with Students with Intellectual Disabilities in an Inclusion Schools
Authors: Faris Algahtani
Abstract:
Every child has a right to education. This is one of the laws in the constitution and it empowers every child to access knowledge but it does not, however, allocate special interest to the rights of education for children with disabilities. It also does not address the challenges that teachers of such children face while trying to educate them. This study was conducted at government schools of Saudi Arabia. As the teaching profession is the most valuable profession and deserves to have its challenges tackled. This paper explores the challenges that teachers face as they try to teach students who have intellectual disabilities (ID). It looks at the daily challenges of a teacher who has to teach both children with disabilities and those without. The literature review shed light on the various aspects of mainstream education from the classroom to the outside environment to the teachers involved in mainstream education. The study employed qualitative methods in which Focus Group Discussions were utilized and Twenty (N=20) special education teachers were randomly sampled from primary schools through 6 groups of teachers from 6 different schools were interviewed through semi-structured interviews with the aim of drawing collective perceptions rather than personal perceptions about the challenges. The study found that most teachers had similar perceptions about the challenges that teachers face as they educate students with intellectual disabilities. The study recommends that The Ministry of Education should consider increasing the availability of special needs courses, workshops and conference for special education teachers.Keywords: intellectual disabilities, inclusion, mainstream schools, disabilities, special education teachers
Procedia PDF Downloads 1358758 A Hybrid Watermarking Scheme Using Discrete and Discrete Stationary Wavelet Transformation For Color Images
Authors: Bülent Kantar, Numan Ünaldı
Abstract:
This paper presents a new method which includes robust and invisible digital watermarking on images that is colored. Colored images are used as watermark. Frequency region is used for digital watermarking. Discrete wavelet transform and discrete stationary wavelet transform are used for frequency region transformation. Low, medium and high frequency coefficients are obtained by applying the two-level discrete wavelet transform to the original image. Low frequency coefficients are obtained by applying one level discrete stationary wavelet transform separately to all frequency coefficient of the two-level discrete wavelet transformation of the original image. For every low frequency coefficient obtained from one level discrete stationary wavelet transformation, watermarks are added. Watermarks are added to all frequency coefficients of two-level discrete wavelet transform. Totally, four watermarks are added to original image. In order to get back the watermark, the original and watermarked images are applied with two-level discrete wavelet transform and one level discrete stationary wavelet transform. The watermark is obtained from difference of the discrete stationary wavelet transform of the low frequency coefficients. A total of four watermarks are obtained from all frequency of two-level discrete wavelet transform. Obtained watermark results are compared with real watermark results, and a similarity result is obtained. A watermark is obtained from the highest similarity values. Proposed methods of watermarking are tested against attacks of the geometric and image processing. The results show that proposed watermarking method is robust and invisible. All features of frequencies of two level discrete wavelet transform watermarking are combined to get back the watermark from the watermarked image. Watermarks have been added to the image by converting the binary image. These operations provide us with better results in getting back the watermark from watermarked image by attacking of the geometric and image processing.Keywords: watermarking, DWT, DSWT, copy right protection, RGB
Procedia PDF Downloads 5368757 Rhetoric and Renarrative Structure of Digital Images in Trans-Media
Abstract:
The misreading theory of Harold Bloom provides a new diachronic perspective as an approach to the consistency between rhetoric of digital technology, dynamic movement of digital images and uncertain meaning of text. Reinterpreting the diachroneity of 'intertextuality' in the context of misreading theory extended the range of the 'intermediality' of transmedia to the intense tension between digital images and symbolic images throughout history of images. With the analogy between six categories of revisionary ratios and six steps of digital transformation, digital rhetoric might be illustrated as a linear process reflecting dynamic, intensive relations between digital moving images and original static images. Finally, it was concluded that two-way framework of the rhetoric of transformation of digital images and reversed served as a renarrative structure to revive static images by reconnecting them with digital moving images.Keywords: rhetoric, digital art, intermediality, misreading theory
Procedia PDF Downloads 2568756 Institutional Transformation in a Finnish University of Applied Sciences
Authors: Perttu Heino
Abstract:
Universities of applied sciences (UASs) were introduced as part of the Finnish higher education system in the early 1990’s. Research, development and innovation (RDI) were mentioned in the legislation on UASs from the very beginning, but very little attention was paid to it in the early years of UASs due to reasons that are easy to understand. Required changes in the organization of the UAS and its educational offering were a big challenge, and it took several years to get things in order. There were RDI projects already then, but their number was low and there was no systematical coordination or management of those activities. In this paper, the institutional transformation of UASs is discussed based on how Tampere University of Applied Sciences has transformed during the years from a traditional tertiary level school to a modern higher education institution with a strong RDI activity, characterized by lively university-industry interaction and tight integration to education.Keywords: research, development, management, practices
Procedia PDF Downloads 368755 How to Applicate Knowledge Management in Security Environment within the Scope of Optimum Balance Model
Authors: Hakan Erol, Altan Elibol, Ömer Eryılmaz, Mehmet Şimşek
Abstract:
Organizations aim to manage information in a most possible effective way for sustainment and development. In doing so, they apply various procedures and methods. The very same situation is valid for each service of Armed Forces. During long-lasting endeavors such as shaping and maintaining security environment, supporting and securing peace, knowledge management is a crucial asset. Optimum Balance Model aims to promote the system from a decisive point to a higher decisive point. In this context, this paper analyses the application of optimum balance model to knowledge management in Armed Forces and tries to find answer to the question how Optimum Balance Model is integrated in knowledge management.Keywords: optimum balance model, knowledge management, security environment, supporting peace
Procedia PDF Downloads 3988754 Dissolved Black Carbon Accelerates the Photo-Degradation of Polystyrene Microplastics
Authors: Qin Ou, Yanghui Xu, Xintu Wang, Kim Maren Lompe, Gang Liu, Jan Peter Van Der Hoek
Abstract:
Microplastics (MPs) can undergo the photooxidation process under ultraviolet (UV) exposure, which determines their transformation and fate in environments. The presence of dissolved organic matter (DOM) can interact with MPs and take participate in the photo-degradation of MPs. As an important DOM component, dissolved black carbon (DBC), widely distributed in aquatic environments, can accelerate or inhibit the sunlight-driven photo-transformation of environmental pollutants. However, the role and underlying mechanism of DBC in the photooxidation of MPs are not clear. Herein, the DBC (< 0.45 µm) was extracted from wood biochar and fractionated by molecular weight (i.e., <3 KDa, 3 KDa−30 KDa, 30 KDa−0.45 µm). The effects of DBC chemical composition (i.e., molecular weight and chemical structure) in DBC-mediated photo-transformation of polystyrene (PS) MPs were investigated. The results showed that DBC initially inhibited the photo-degradation of MPs due to light shielding. Under UV exposure for 6−24 h, the presence of 5 mg/L DBC decreased the carbonyl index of MPs compared to the control. This inhibitory effect of DBC was found to decrease with increasing irradiation time. Notably, DBC initially decreased but then increased the hydroxyl index with aging time, suggesting that the role of DBC may shift from inhibition to acceleration. In terms of the different DBC fractions, the results showed that the smallest fraction of DBC (<3 KDa) significantly accelerated the photooxidation of PS MPs since it acted as reactive oxygen species (ROS) generators, especially in promoting the production of ¹O₂ and ³DBC* and •OH. With the increase in molecular weight, the acceleration effect of DBC on the degradation of MPs was decreased due to the increase of light shielding and possible decrease of photosensitization ability. This study thoroughly investigated the critical role of DBC chemical composition in the photooxidation process, which helps to assess the duration of aging and transformation of MPs during long-term weathering in natural waters.Keywords: microplastics, photo-degradation, dissolved black carbon, molecular weight, photosensitization
Procedia PDF Downloads 788753 Challenges for Tourism Development in Algeria: Perspectives of Algerian Tourism Suppliers
Authors: Nour-Elhouda Lecheheb
Abstract:
Despite substantial tourism potentials, the Algerian tourism industry has faced a number of challenges, including the government heavy dependence on the energy sector, negative perception in the West, and a lack of effective resource management and marketing. This paper attempts to discuss the challenges hindering the development of the Algerian tourism industry from the perspective of the official tourism suppliers in Algeria both in the public and private sectors. A total of 10 semi-structured interviews were conducted during a field-trip to Algiers, Algeria, in September 2019. From the analysis of the interviews, it is evident that the Algerian tourism suppliers face a number of challenges mainly the country’s negative image in the West and a significant lack of political and financial support to contest this negative image effectively and sufficiently.Keywords: Algerian tourism, destination development, destination image, tourism suppliers
Procedia PDF Downloads 2588752 A Risk-Based Comprehensive Framework for the Assessment of the Security of Multi-Modal Transport Systems
Authors: Mireille Elhajj, Washington Ochieng, Deeph Chana
Abstract:
The challenges of the rapid growth in the demand for transport has traditionally been seen within the context of the problems of congestion, air quality, climate change, safety, and affordability. However, there are increasing threats including those related to crime such as cyber-attacks that threaten the security of the transport of people and goods. To the best of the authors’ knowledge, this paper presents for the first time, a comprehensive framework for the assessment of the current and future security issues of multi-modal transport systems. The approach or method proposed is based on a structured framework starting with a detailed specification of the transport asset map (transport system architecture), followed by the identification of vulnerabilities. The asset map and vulnerabilities are used to identify the various approaches for exploitation of the vulnerabilities, leading to the creation of a set of threat scenarios. The threat scenarios are then transformed into risks and their categories, and include insights for their mitigation. The consideration of the mitigation space is holistic and includes the formulation of appropriate policies and tactics and/or technical interventions. The quality of the framework is ensured through a structured and logical process that identifies the stakeholders, reviews the relevant documents including policies and identifies gaps, incorporates targeted surveys to augment the reviews, and uses subject matter experts for validation. The approach to categorising security risks is an extension of the current methods that are typically employed. Specifically, the partitioning of risks into either physical or cyber categories is too limited for developing mitigation policies and tactics/interventions for transport systems where an interplay between physical and cyber processes is very often the norm. This interplay is rapidly taking on increasing significance for security as the emergence of cyber-physical technologies, are shaping the future of all transport modes. Examples include: Connected Autonomous Vehicles (CAVs) in road transport; the European Rail Traffic Management System (ERTMS) in rail transport; Automatic Identification System (AIS) in maritime transport; advanced Communications, Navigation and Surveillance (CNS) technologies in air transport; and the Internet of Things (IoT). The framework adopts a risk categorisation scheme that considers risks as falling within the following threat→impact relationships: Physical→Physical, Cyber→Cyber, Cyber→Physical, and Physical→Cyber). Thus the framework enables a more complete risk picture to be developed for today’s transport systems and, more importantly, is readily extendable to account for emerging trends in the sector that will define future transport systems. The framework facilitates the audit and retro-fitting of mitigations in current transport operations and the analysis of security management options for the next generation of Transport enabling strategic aspirations such as systems with security-by-design and co-design of safety and security to be achieved. An initial application of the framework to transport systems has shown that intra-modal consideration of security measures is sub-optimal and that a holistic and multi-modal approach that also addresses the intersections/transition points of such networks is required as their vulnerability is high. This is in-line with traveler-centric transport service provision, widely accepted as the future of mobility services. In summary, a risk-based framework is proposed for use by the stakeholders to comprehensively and holistically assess the security of transport systems. It requires a detailed understanding of the transport architecture to enable a detailed vulnerabilities analysis to be undertaken, creates threat scenarios and transforms them into risks which form the basis for the formulation of interventions.Keywords: mitigations, risk, transport, security, vulnerabilities
Procedia PDF Downloads 1658751 Assessing Indicators, Challenges and Benefits of Sustainable Procurement in Construction Projects
Authors: Taha Anjamrooz, Sareh Rajabi, Salwa Bheiry
Abstract:
Procurement is a key process in construction project management. The present construction procurement practices have been extensively analyzed for disregarding sustainability in the project life cycle. Currently, there is a gap of information on status-quo of sustainable procurement in construction field. Thus, the aim of this study is to review sustainable procurement practices in the construction field. Disregard of three sustainability pillars is one of the major drawbacks of present construction procurement practices. Sustainable procurement is a developing idea that can enhance procurement practices and improve the sustainability performance of the construction projects. At present, sustainable procurement is still not entirely used in the construction projects. A comprehensive literature review indicated that the construction industry is still not entirely informed about the benefits and challenges of using sustainable procurement, and about important indicators that play major impacts on those benefits and challenges. This study assesses the major indicator, benefits and challenges encountered in applying sustainable procurement in the construction industry. In addition, this study investigates understanding of construction professionals on the benefits and challenges of utilizing sustainable procurement for construction projects through selected indicators that are categorized according to society and community needs.Keywords: sustainability, sustainable development, sustainable procurement, procurement, construction industry
Procedia PDF Downloads 1948750 Modelling of Phase Transformation Kinetics in Post Heat-Treated Resistance Spot Weld of AISI 1010 Mild Steel
Authors: B. V. Feujofack Kemda, N. Barka, M. Jahazi, D. Osmani
Abstract:
Automobile manufacturers are constantly seeking means to reduce the weight of car bodies. The usage of several steel grades in auto body assembling has been found to be a good technique to enlighten vehicles weight. This few years, the usage of dual phase (DP) steels, transformation induced plasticity (TRIP) steels and boron steels in some parts of the auto body have become a necessity because of their lightweight. However, these steels are martensitic, when they undergo a fast heat treatment, the resultant microstructure is essential, made of martensite. Resistance spot welding (RSW), one of the most used techniques in assembling auto bodies, becomes problematic in the case of these steels. RSW being indeed a process were steel is heated and cooled in a very short period of time, the resulting weld nugget is mostly fully martensitic, especially in the case of DP, TRIP and boron steels but that also holds for plain carbon steels as AISI 1010 grade which is extensively used in auto body inner parts. Martensite in its turn must be avoided as most as possible when welding steel because it is the principal source of brittleness and it weakens weld nugget. Thus, this work aims to find a mean to reduce martensite fraction in weld nugget when using RSW for assembling. The prediction of phase transformation kinetics during RSW has been done. That phase transformation kinetics prediction has been made possible through the modelling of the whole welding process, and a technique called post weld heat treatment (PWHT) have been applied in order to reduce martensite fraction in the weld nugget. Simulation has been performed for AISI 1010 grade, and results show that the application of PWHT leads to the formation of not only martensite but also ferrite, bainite and pearlite during the cooling of weld nugget. Welding experiments have been done in parallel and micrographic analyses show the presence of several phases in the weld nugget. Experimental weld geometry and phase proportions are in good agreement with simulation results, showing here the validity of the model.Keywords: resistance spot welding, AISI 1010, modeling, post weld heat treatment, phase transformation, kinetics
Procedia PDF Downloads 1188749 Democracy and Security Challenge in Nigeria, 1999, Till Date
Authors: Abdulsalami M. Deji
Abstract:
Prolonged military incursion in Nigeria politics which favored the oligarchy brought agitation for democratic rule it exacerbated ethnicity integration of minority for fear of domination. The advent of democracy ushered in new breath of life to Nigerians from the shackle of military oppression to democratic governance. Democratic rule became a mirage as a result of prevalent insecurity in Nigeria; effort to bring lasting peace to all sections of the country had not yielded positive result till date. In the process of struggling for democracy among ethnic groups in Nigeria, they had instituted various militia groups defending the interest of their identity due to unequal distribution of wealth by military junta. When democracy came on board, these various militia groups became demons hunting democratic institutions. Quest by the successful government to find lasting solution has proved abortive. The security of politics which guaranteed stability is not visible in Nigeria, what we have now is politics of security. The unrest in Nigeria today has cripple socio-political and economy of the nation; the growth of economy favored elites without meaningful impact on the common man. This paper focus on the effects of democracy on Nigerians and, how security under democratic rule has hindered dividends of democracy since 1999-till date and way forward. The source is strictly base on secondary source from textbook, newspapers, internet, and journals.Keywords: democracy, interest, militia, security
Procedia PDF Downloads 3358748 Transformation of the Business Model in an Occupational Health Care Company Embedded in an Emerging Personal Data Ecosystem: A Case Study in Finland
Authors: Tero Huhtala, Minna Pikkarainen, Saila Saraniemi
Abstract:
Information technology has long been used as an enabler of exchange for goods and services. Services are evolving from generic to personalized, and the reverse use of customer data has been discussed in both academia and industry for the past few years. This article presents the results of an empirical case study in the area of preventive health care services. The primary data were gathered in workshops, in which future personal data-based services were conceptualized by analyzing future scenarios from a business perspective. The aim of this study is to understand business model transformation in emerging personal data ecosystems. The work was done as a case study in the context of occupational healthcare. The results have implications to theory and practice, indicating that adopting personal data management principles requires transformation of the business model, which, if successfully managed, may provide access to more resources, potential to offer better value, and additional customer channels. These advantages correlate with the broadening of the business ecosystem. Expanding the scope of this study to include more actors would improve the validity of the research. The results draw from existing literature and are based on findings from a case study and the economic properties of the healthcare industry in Finland.Keywords: ecosystem, business model, personal data, preventive healthcare
Procedia PDF Downloads 2498747 Influence of Genotype, Explant, and Hormone Treatment on Agrobacterium-Transformation Success in Salix Callus Culture
Authors: Lukas J. Evans, Danilo D. Fernando
Abstract:
Shrub willows (Salix spp.) have many characteristics which make them suitable for a variety of applications such as riparian zone buffers, environmental contaminant sequestration, living snow fences, and biofuel production. In some cases, these functions are limited due to physical or financial obstacles associated with the number of individuals needed to reasonably satisfy that purpose. One way to increase the efficiency of willows is to bioengineer them with the genetic improvements suitable for the desired use. To accomplish this goal, an optimized in vitro transformation protocol via Agrobacterium tumefaciens is necessary to reliably express genes of interest. Therefore, the aim of this study is to observe the influence of tissue culture with different willow cultivars, hormones, and explants on the percentage of calli expressing reporter gene green florescent protein (GFP) to find ideal transformation conditions. Each callus was produced from 1 month old open-pollinated seedlings of three Salix miyabeana cultivars (‘SX61’, ‘WT1’, and ‘WT2’) from three different explants (lamina, petiole, and internodes). Explants were cultured for 1 month on an MS media with different concentrations of 6-Benzylaminopurine (BAP) and 1-Naphthaleneacetic acid (NAA) (No hormones, 1 mg⁻¹L BAP only, 3 mg⁻¹L NAA only, 1 mg⁻¹L BAP and 3 mg⁻¹L NAA, and 3 mg⁻¹L BAP and 1 mg⁻¹L NAA) to produce a callus. Samples were then treated with Agrobacterium tumefaciens at an OD600 of 0.6-0.8 to insert the transgene GFP for 30 minutes, co-cultivated for 72 hours, and selected on the same media type they were cultured on with added 7.5 mg⁻¹L of Hygromycin for 1 week before GFP visualization under a UV dissecting scope. Percentage of GFP expressing calli as well as the average number of fluorescing GFP units per callus were recorded and results were evaluated through an ANOVA test (α = 0.05). The WT1 internode-derived calli on media with 3 mg-1L NAA+1 mg⁻¹L BAP and mg⁻¹L BAP alone produced a significantly higher percentage of GFP expressing calli than each other group (19.1% and 19.4%, respectively). Additionally, The WT1 internode group cultured with 3 mg⁻¹L NAA+1 mg⁻¹L BAP produced an average of 2.89 GFP units per callus while the group cultivated with 1 mg⁻¹L BAP produced an average of 0.84 GFP units per callus. In conclusion, genotype, explant choice, and hormones all play a significant role in increasing successful transformation in willows. Future studies to produce whole callus GFP expression and subsequent plantlet regeneration are necessary for a complete willow transformation protocol.Keywords: agrobacterium, callus, Salix, tissue culture
Procedia PDF Downloads 1238746 Directing the Forensic Investigation of a Catastrophic Structure Collapse: The Jacksonville Parking Garage Collapse
Authors: William C. Bracken
Abstract:
This paper discusses the forensic investigation of a fatality-involved catastrophic structure collapse and the special challenges faced when tasked with directing such an effort. While this paper discusses the investigation’s findings and the outcome of the event; this paper’s primary focus is on the challenges faced directing a forensic investigation that requires coordinating with governmental oversight while also having to accommodate multiple parties’ investigative teams. In particular the challenges discussed within this paper included maintaining on-site safety and operations while accommodating outside investigator’s interests. In addition this paper discusses unique challenges that one may face such as what to do about unethical conduct of interested party’s investigative teams, “off the record” sharing of information, and clandestinely transmitted evidence.Keywords: catastrophic structure collapse, collapse investigation, Jacksonville parking garage collapse, forensic investigation
Procedia PDF Downloads 3598745 An Investigation of Challenges in Implementing Sustainable Supply Chain Management for Construction Industry in Thailand by Interpretive Structural Model Approach
Authors: Shaolan Zou, Kullapa Soratana
Abstract:
Construction industry faces tremendous challenges in sustainability issue in recent years. Building materials, generally, are non-recyclable with short service life time, leading to economic loss. Building sites also cause social issues, e.g. noise, hazardous substances, and particulate matters. Sustainable supply chain management (SSCM) has been recognized as an appropriate method to balance three pillars of sustainability: environment, economy, and society. However, most of construction companies cannot successfully adopt SSCM due to numerous challenges. In this study, a list of challenges in implementing SSCM was collected from peer-reviewed literature on sustainable implementation. A building materials company in Thailand, which has successfully adopted SSCM for almost two decades and established the sustainable development committee since 1995, was used as a case study. Management-level representatives in sustainability department of the company were interviewed, mainly, to examine which challenges on the list complies with the company’s condition when adopting SSCM. The interview result was analyzed by interpretive structural model (ISM) with sustainability experts’ opinions to identify top 5 influential challenges. The results could assist a building construction company in assigning appropriate strategies to overcome most influential barriers, as well as in using as a reference or guidance for other construction companies adopting SSCM.Keywords: sustainable supply chain management, challenges, construction industry, interpretive structural model
Procedia PDF Downloads 1818744 Reflections on Opportunities and Challenges for Systems Engineering
Authors: Ali E. Abbas
Abstract:
This paper summarizes some of the discussions that occurred in a workshop in West Virginia, U.S.A which was sponsored by the National Science Foundation (NSF) in February 2016. The goal of the workshop was to explore the opportunities and challenges for applying systems engineering in large enterprises, and some of the issues that still persist. The main topics of the discussion included challenges with elaboration and abstraction in large systems, interfacing physical and social systems, and the need for axiomatic frameworks for large enterprises. We summarize these main points of discussion drawing parallels with decision making in organizations to instigate research in these discussion areas.Keywords: decision analysis, systems engineering, framing, value creation
Procedia PDF Downloads 329