Search results for: conservation threats
1071 Impact of Global Climate Change on Economy of Pakistan: How to Ensure Sustainable Food and Energy Production
Authors: Sabahat Zahra
Abstract:
The purpose of this research is to present the changing global environment and its potential impacts on sustainable food and energy production at global level, particularly in Pakistan. The food and energy related-economic sector has been subjected to negative consequences due to recent extreme changes in weather conditions, particularly in developing countries. Besides continuous modifications in weather, population is also increasing by time, therefore it is necessary to take special steps and start effective initiatives to cope with the challenges of food and energy security to fight hunger and for economic stability of country. Severe increase in temperature and heat waves has also negative impacts on food production as well as energy sustainability. Energy (in terms of electricity) consumption has grown up than the production potential of the country as a consequence of increasing warm weather. Ultimately prices gone up when there is more consumption than production. Therefore, all these aspects of climate change are interrelated with socio-economic issues. There is a need to develop long-term policies on regional and national levels for maintainable economic growth. This research presents a framework-plan and recommendations for implementation needed to mitigate the potential threats due to global climate change sustainable food and energy production under climate change in the country.Keywords: climate changes, energy security, food security, global climate change
Procedia PDF Downloads 3501070 Africa as Endemically a War Continent: Explaining the Changing Pattern of Armed Conflicts in Africa
Authors: Kenneth Azaigba
Abstract:
The history of post-colonial African States has been dubbed a history of endemic warfare in existing literature. Indeed, Africa political environment is characterized by a multiplicity of threats to peace and security. Africa's leading drivers of conflict include abundant (especially mineral) resources, personal rule and attendant political authoritarianism, manipulation of identity politics across ethnicity, marginalization of communities, as well as electoral mal-practices resulting in contested legitimacy and resultant violence. However, the character of armed conflicts in Africa is changing. This paper attempts to reconstruct the trajectory of armed conflicts in Africa and explain the changing pattern of armed conflict. The paper contends that large scale political violence in Africa is on the decline rendering the endemic thesis an inappropriate paradigm in explaining political conflicts in Africa. The paper also posits that though small scale conflicts are springing up and exhibiting trans-border dimensions, these patterns of armed conflicts are not peculiar to Africa but emerging waves of global conflicts. The paper explains that the shift in the scale of warfare in Africa is a function of a multiplicity of post-cold war global contradictions. Inclusive governance, social justice and economic security are articulated as workable panaceas for mitigating warfare in Africa.Keywords: Africa, conflicts, pattern, war
Procedia PDF Downloads 3871069 A Feasibility Study of Replacing High Pressure Mercury Vapor and Sodium Vapor Lamp Street Lighting Bulbs with LEDs in Turkish Republic of Northern Cyprus
Authors: Olusola Olorunfemi Bamisile, Mustafa Dagbasi, Serkan Abbasoglu
Abstract:
Feasibility of an Energy Audit program is the main aim of this paper. LEDs are used to replace Sodium Vapor lamps and High Pressured Mercury Vapor lamps that are currently used for the street lighting system in Turkish Republic of Northern Cyprus. 44% of the fossil fuels imported into Turkish Republic of Northern Cyprus are used for electricity generation which makes the reduction in the consumption of electricity very important. This project will save as much as 40,206,210 kWh on site annually and 121,837,000 kWh can be saved from source. The economic environmental and fossil fuels saving of this project is also evaluated.Keywords: energy conservation management, LEDs, sodium vapor, high pressure mercury vapor, life cycle costing
Procedia PDF Downloads 4661068 Dam Break Model Using Navier-Stokes Equation
Authors: Alireza Lohrasbi, Alireza Lavaei, Mohammadali M. Shahlaei
Abstract:
The liquid flow and the free surface shape during the initial stage of dam breaking are investigated. A numerical scheme is developed to predict the wave of an unsteady, incompressible viscous flow with free surface. The method involves a two dimensional finite element (2D), in a vertical plan. The Naiver-Stokes equations for conservation of momentum and mass for Newtonian fluids, continuity equation, and full nonlinear kinematic free-surface equation were used as the governing equations. The mapping developed to solve highly deformed free surface problems common in waves formed during wave propagation, transforms the run up model from the physical domain to a computational domain with Arbitrary Lagrangian Eulerian (ALE) finite element modeling technique.Keywords: dam break, Naiver-Stokes equations, free-surface flows, Arbitrary Lagrangian-Eulerian
Procedia PDF Downloads 3371067 Context Aware Anomaly Behavior Analysis for Smart Home Systems
Authors: Zhiwen Pan, Jesus Pacheco, Salim Hariri, Yiqiang Chen, Bozhi Liu
Abstract:
The Internet of Things (IoT) will lead to the development of advanced Smart Home services that are pervasive, cost-effective, and can be accessed by home occupants from anywhere and at any time. However, advanced smart home applications will introduce grand security challenges due to the increase in the attack surface. Current approaches do not handle cybersecurity from a holistic point of view; hence, a systematic cybersecurity mechanism needs to be adopted when designing smart home applications. In this paper, we present a generic intrusion detection methodology to detect and mitigate the anomaly behaviors happened in Smart Home Systems (SHS). By utilizing our Smart Home Context Data Structure, the heterogeneous information and services acquired from SHS are mapped in context attributes which can describe the context of smart home operation precisely and accurately. Runtime models for describing usage patterns of home assets are developed based on characterization functions. A threat-aware action management methodology, used to efficiently mitigate anomaly behaviors, is proposed at the end. Our preliminary experimental results show that our methodology can be used to detect and mitigate known and unknown threats, as well as to protect SHS premises and services.Keywords: Internet of Things, network security, context awareness, intrusion detection
Procedia PDF Downloads 1911066 Trends in Conservation and Inheritance of Musical Culture of Ethnic Groups: A Case Study of the Akha Music in Chiang Rai Province, Thailand
Authors: Nutthan Inkhong, Sutthiphong Ruangchante
Abstract:
Chiang Rai province is located at the northern border of Thailand. Most of the geography there is the northern continental highlands, and the population has many types of inhabitants, including Thai people, immigrants and ethnic groups such as Akha, Lahu, Lisu, Yao, etc. Most of these ethnic groups migrated from neighbouring countries such as Myanmar, Laos, China, etc. and settled in the mountains. Each ethnic group has their unique traditions, culture, and ways of life, including the musical culture that the ancestors of each ethnic group brought with them. In the present, the Akha have the largest population in the region and still live together in numerous villages in many districts. Thus, Akha musical culture still appears in the community traditions and cultural events of Chiang Rai province regularly. This article presents the situations of Akha musical culture in the present and the predictions for the future. The study method involves the analysis of music information and the related social contexts, which were collected from the fieldwork of ethnomusicological methodology by in-depth interviews, observations, audio and visual recordings, and related documents. The results found that the important persons who are related with Akha musical culture include (1) a musical instrument maker (lives in Mae Chan district) who produces various Akha musical instruments, including gourd mouth organs, Akha drums, two-way flutes, three-hole flutes, Jew’s harps (the sound of teenage love), buffalo horns (the sound symbol of hunting) and bird call instruments (the imitation of bird sounds), (2) a folk philosopher (lives in Mae Pha Luang district) who can teach music to the new generation of Akha people as well as lecture and demonstrate music to academics and tourists, and (3) a community leader (lives in Mae Chan district) who conserves Akha performances, singing and music through various activities of the students in an informal school. Because of the changes to the social contexts and ways of life of the Akha people, such as the educational system, religion, social media, etc., including the popularity of both Thai and international popular music among the new generation of Akha people, changes to and the fading away of Akha musical culture in the future may likely occur. Therefore, the conservation and inheritance of Akha music is an issue that should be resolved quickly. This primary study leads to the next step of the ethnomusicological work and plays a part in preventing or reducing the problems impacting Akha musical culture survival by the recording of Akha music in all of its dimensions, such as producing musical instruments, playing musical instruments, analysis of tuning systems, recording Akha music as musical notation using symbols, researching related social contexts, etc. and the transcription of this information to create lessons that can be returned to the Akha community.Keywords: Akha music, Chiang Rai, ethnic music in Thailand, ethnomusicology
Procedia PDF Downloads 1611065 Vieira Da Silva's Tiles at Universidade Federal Rural Do Rio de Janeiro: A Conservation and Restoration Project
Authors: Adriana Anselmo Oliveira
Abstract:
The present project showcases a tile work from the Franco-Portuguese artist Maria Helena Vieira da Silva (1908-1992). It is a set of 8 panels composed of figurative and geometric tiles, with extra tiles framing nearby doors and windows in a study room in the (UFRRJ, Universidade Federal Rural do Rio de Janeiro). The aforementioned work was created between 1942 and 1943, during the artist's 6 year exile in the Brazilian city. This one-of-a-kind tileset was designed and made by Vieira da Silva between 1942 and 1943. Over the years, several units were lost, which led to their replacement in the nineties. However, these replacements don't do justice to the original work of art. In 2007, a project was initiated to fully repair and maintain the set. Three panels are removed and restored, but the project is halted. To this day, the three fully restored panels remain in boxes. In 2016 a new restoration project is submitted by the (Faculdade de Belas Artes da Universidade de Lisboa) in collaboration with de (Fundacão Árpád Szenes-Vieira da Silva). There are many varied opinions on restoring and conserving older pieces of art, however, we have the moral duty to safeguard the original materials used by the artist along with the artists original vision and also to care for the future generations of students who will use the space in which the tile-work was inserted. Many tiles have been replaced by white tiles, tiles with a divergent colour pallet and technique, and in a few cases, the incorrect place or way around. These many factors make it increasingly difficult to maintain the artists original vision and destroy and chance of coherence within the artwork itself. The conservative technician cannot make new images to fill the empty spaces or mark the remaining images with their own creative input. with reliable photographic documentation that can provide us with the necessary vision to allow us to proceed with an accurate reconstruction, we have the obligation to proceed and return the piece of art to its true form, as in its current state, it is impossible to maintain its original glory. Using the information we have, we must find a way to differentiate the original tiles from the reconstructions in order to recreate and reclaim the original message from the artist. The objective of this project is to understand the significance of tiles in Vieira da Silva's art as well as the influence they had on the artist's pictorial language since the colour definition on tile work is vastly different from the painting process as the materials change during their merger. Another primary goal is to understand what the previous interventions achieved besides increasing the artworks durability. The main objective is to submit a proposal that can salvage the artist's visual intention and supports it for posteriority. In summary, this proposal goes further than the usual conservative interventions as it intends to recreate the original artistic worth, prioritising the aesthetics and keeping its soul alive.Keywords: Vieira da Silva, tiles, conservation, restoration
Procedia PDF Downloads 1551064 Potential Use of Spore-Forming Biosurfactant Producing Bacteria in Oil-Pollution Bioremediation
Authors: S. N. Al-Bahry, Y. M. Al-Wahaibi, S. J. Joshi, E. A. Elshafie, A. S. Al-Bimani
Abstract:
Oman is one of the oil producing countries in the Arabian Peninsula and the Gulf region. About 30-40 % of oil produced from the Gulf is transported globally along the seacoast of Oman. Oil pollution from normal tanker operations, ballast water, illegal discharges and accidental spills are always serious threats to terrestrial and marine habitats. Due to Oman’s geographical location at arid region where the temperature ranges between high 40s and low 50s Celsius in summers with low annual rainfall, the main source of fresh water is desalinated sea and brackish water. Oil pollution, therefore, pose a major threat to drinking water. Biosurfactants are secondary metabolites produced by microorganisms in hydrophobic environments to release nutrients from solid surfaces, such as oil. In this study, indigenous oil degrading thermophilic spore forming bacteria were isolated from oil fields contaminated soil. The isolates were identified using MALDI-TOF biotyper and 16s RNA. Their growth conditions were optimized for the production of biosurfactant. Surface tension, interfacial tensions and microbial oil biodegradation capabilities were tested. Some thermophilic bacteria degraded either completely or partially heavy crude oil (API 10-15) within 48h suggesting their high potential in oil spill bioremediation and avoiding the commonly used physical and chemical methods which usually lead to other environmental pollution.Keywords: bacteria, bioremediation, biosurfactant, crude-oil-pollution
Procedia PDF Downloads 4281063 Perceptions of Cybersecurity in Government Organizations: Case Study of Bhutan
Authors: Pema Choejey, David Murray, Chun Che Fung
Abstract:
Bhutan is becoming increasingly dependent on Information and Communications Technologies (ICTs), especially the Internet for performing the daily activities of governments, businesses, and individuals. Consequently, information systems and networks are becoming more exposed and vulnerable to cybersecurity threats. This paper highlights the findings of the survey study carried out to understand the perceptions of cybersecurity implementation among government organizations in Bhutan. About 280 ICT personnel were surveyed about the effectiveness of cybersecurity implementation in their organizations. A questionnaire based on a 5 point Likert scale was used to assess the perceptions of respondents. The questions were asked on cybersecurity practices such as cybersecurity policies, awareness and training, and risk management. The survey results show that less than 50% of respondents believe that the cybersecurity implementation is effective: cybersecurity policy (40%), risk management (23%), training and awareness (28%), system development life cycle (34%); incident management (26%), and communications and operational management (40%). The findings suggest that many of the cybersecurity practices are inadequately implemented and therefore, there exist a gap in achieving a required cybersecurity posture. This study recommends government organizations to establish a comprehensive cybersecurity program with emphasis on cybersecurity policy, risk management, and awareness and training. In addition, the research study has practical implications to both government and private organizations for implementing and managing cybersecurity.Keywords: awareness and training, cybersecurity policy, risk management, security risks
Procedia PDF Downloads 3451062 A Distributed Cryptographically Generated Address Computing Algorithm for Secure Neighbor Discovery Protocol in IPv6
Authors: M. Moslehpour, S. Khorsandi
Abstract:
Due to shortage in IPv4 addresses, transition to IPv6 has gained significant momentum in recent years. Like Address Resolution Protocol (ARP) in IPv4, Neighbor Discovery Protocol (NDP) provides some functions like address resolution in IPv6. Besides functionality of NDP, it is vulnerable to some attacks. To mitigate these attacks, Internet Protocol Security (IPsec) was introduced, but it was not efficient due to its limitation. Therefore, SEND protocol is proposed to automatic protection of auto-configuration process. It is secure neighbor discovery and address resolution process. To defend against threats on NDP’s integrity and identity, Cryptographically Generated Address (CGA) and asymmetric cryptography are used by SEND. Besides advantages of SEND, its disadvantages like the computation process of CGA algorithm and sequentially of CGA generation algorithm are considerable. In this paper, we parallel this process between network resources in order to improve it. In addition, we compare the CGA generation time in self-computing and distributed-computing process. We focus on the impact of the malicious nodes on the CGA generation time in the network. According to the result, although malicious nodes participate in the generation process, CGA generation time is less than when it is computed in a one-way. By Trust Management System, detecting and insulating malicious nodes is easier.Keywords: NDP, IPsec, SEND, CGA, modifier, malicious node, self-computing, distributed-computing
Procedia PDF Downloads 2781061 Quantum Cryptography: Classical Cryptography Algorithms’ Vulnerability State as Quantum Computing Advances
Authors: Tydra Preyear, Victor Clincy
Abstract:
Quantum computing presents many computational advantages over classical computing methods due to the utilization of quantum mechanics. The capability of this computing infrastructure poses threats to standard cryptographic systems such as RSA and AES, which are designed for classical computing environments. This paper discusses the impact that quantum computing has on cryptography, while focusing on the evolution from classical cryptographic concepts to quantum and post-quantum cryptographic concepts. Standard Cryptography is essential for securing data by utilizing encryption and decryption methods, and these methods face vulnerability problems due to the advancement of quantum computing. In order to counter these vulnerabilities, the methods that are proposed are quantum cryptography and post-quantum cryptography. Quantum cryptography uses principles such as the uncertainty principle and photon polarization in order to provide secure data transmission. In addition, the concept of Quantum key distribution is introduced to ensure more secure communication channels by distributing cryptographic keys. There is the emergence of post-quantum cryptography which is used for improving cryptographic algorithms in order to be more secure from attacks by classical and quantum computers. Throughout this exploration, the paper mentions the critical role of the advancement of cryptographic methods to keep data integrity and privacy safe from quantum computing concepts. Future research directions that would be discussed would be more effective cryptographic methods through the advancement of technology.Keywords: quantum computing, quantum cryptography, cryptography, data integrity and privacy
Procedia PDF Downloads 261060 Medicinal Plant Resources and Conservation of Nallamalais, Forest Range, Eastern Ghats, India
Authors: S. K. M. Basha
Abstract:
Nallamalas one of the centres of Plant Diversity (CPD) (WWF&IUCN,1995) is located in the central eastern Ghats between latitudes 15.20’-16.30’N and Longitude 78.30-80.10E in Andhra Pradesh, extended to an area of 7640 Sq.Km. No Comprehensive work available for RET Plants in the study area, therefore the objective of the present paper is to document the RET Medicinal Plants of Nallamalias and their uses by the local people of the area. In India, one of the major resources to know about the number of plant species and their medicinal values is the groups who are habituated in near and deep forests. The most common groups in south Indian forests are Yanadis and Yerukulas. These two groups of people are residing in the forest, which is located very far from the modern society, towns and cities. They are following traditional methods obtained from their forefathers in all respects, including medication. They are the only source to know many medicinal plants in the areas where they reside and are also important to record the medicinal properties of various plant species which are not reported. The new reports may help in drug industry in order to develop pharmaceutical herbal medicine for human health. In the present study, nearly 150 rare species have been found to be used for various ailments. Out of these 23 species are critically endangered, over 25 are vulnerable and around 22 comes under the category of near threatened. Some important species like Christella dentate, Careya arborea are used for curing cough and cold. Piper attnuatum, piper nigrum are used for curing skin disease. Ipomoea mauritiana is used against male impotency.Glycosmis cochinensis, Entada perseatha are used as contraceptives. The roots of Andrographis nallamalayana and Acrocephalus indicus are used for leucorrhoea. While the stem barks of Gyrocarpus americanus is given orally for spider bite. Piper hymenophyllum leaves mixed with turmeric and gingerly oil is used externally for mouth ulcers in cattle. Piper nigrum fruits are used for skin diseases. Vernonia anthelmentica seeds are used for indigestion. It was widely distributed in this hills. Due to over exploitation this species was in declined condition. Sterculia urens which is a sorce of gum for tribal, due to over exploitation this species declaimed in these hills. Hence, there is an urgent need to conserve the medicinal plants and prevent their exploitation and extinction with the help of tribals. There is a need to adopt sustainable utilization, cultivation and micro propagation techniques. Medicinal plants are as potent and effective today as they were thousands of years ago. They are natures wonderful gift to mankind and are involved in India as a very rich ancient heritage of traditional systems medicine i.e., ayurveda, siddha and unani. Unfortunately, these traditions have been largely eroded because of lack of support and recognition as well as rapid destruction of natural habitats which has led to shrinkage of medicinal plants therefore the conservation of medicinal plants and the revitalization of local health traditions has been taken up on priority basis.Keywords: RET plants CPD, IUCN, nallamalas, yanadis, yerukulas
Procedia PDF Downloads 2501059 National Strategy for Swedish Wildlife Management
Authors: Maria Hornell, Marcus Ohman
Abstract:
Nature, and the society it is a part of, is under constant change. The landscape, climate and game populations vary over time, as well as society's priorities and the way it uses the land where wildlife may proliferate. Sweden currently has historically large wildlife populations which are a resource for the benefit and joy of many people. Wildlife may also be seen as a problem as it may cause damage in contradiction to other human interests. The Swedish Environmental Protection Agency introduces a new long-term strategy for national wildlife management. The strategy envisions a wildlife management in balance. It focuses on wildlife values in a broad sense including outdoor recreation and tourism as well as conservation of biodiversity. It is fundamental that these values should be open and accessible for the major part of the population. For that to be possible new ways to manage, mitigate and prevent damages and other problems that wildlife causes need to be developed. The strategy describes a roadmap for the development and strengthening of Sweden's wildlife management until 2020. It aims at being applicable for those authorities and stakeholders with interest in wildlife management being a guide for their own strategies, goals, and activities.Keywords: wildlife management, strategy, Sweden, SEPA
Procedia PDF Downloads 2171058 User’s Susceptibility Factors to Malware Attacks: A Systematic Literature Review
Authors: Awad A. Younis, Elise Stronberg, Shifa Noor
Abstract:
Malware attacks due to end-user vulnerabilities have been noticeably increased in the past few years. Investigating the factors that make an end-user vulnerable to those attacks is critical because they can be utilized to set up proactive strategies such as awareness and education to mitigate the impacts of those attacks. Some existing studies investigated demographic, behavioral, and cultural factors that make an end-user susceptible to malware attacks. However, it has been challenging to draw more general conclusions from individual studies due to the varieties in the type of end-users and different types of malware. Therefore, we conducted a systematic literature review (SLR) of the existing research for end-user susceptibility factors to malware attacks. The results showed while some demographic factors are mostly associated with malware infection regardless of the end users' type, age, and gender are not consistent among the same and different types of end-users. Besides, the association of culture and personality factors with malware infection are consistent in most of the selected studies and for all type of end-users. Moreover, malware infection varies based on age, geographic location, and host types. We propose that future studies should carefully take into consideration the type of end-users because different end users may be exposed to different threats or be targeted based on their user domains’ characteristics. Additionally, as different types of malware use different tactics to trick end-users, taking the malware types into consideration is important.Keywords: cybersecurity, malware, end-users, demographics, personality, culture, systematic literature review
Procedia PDF Downloads 2301057 A Topological Study of an Urban Street Network and Its Use in Heritage Areas
Authors: Jose L. Oliver, Taras Agryzkov, Leandro Tortosa, Jose F. Vicent, Javier Santacruz
Abstract:
This paper aims to demonstrate how a topological study of an urban street network can be used as a tool to be applied to some heritage conservation areas in a city. In the last decades, we find different kinds of approaches in the discipline of Architecture and Urbanism based in the so-called Sciences of Complexity. In this context, this paper uses mathematics from the Network Theory. Hence, it proposes a methodology based in obtaining information from a graph, which is created from a network of urban streets. Then, it is used an algorithm that establishes a ranking of importance of the nodes of that network, from its topological point of view. The results are applied to a heritage area in a particular city, confronting the data obtained from the mathematical model, with the ones from the field work in the case study. As a result of this process, we may conclude the necessity of implementing some actions in the area, and where those actions would be more effective for the whole heritage site.Keywords: graphs, heritage cities, spatial analysis, urban networks
Procedia PDF Downloads 3961056 Performance Analysis of Traffic Classification with Machine Learning
Authors: Htay Htay Yi, Zin May Aye
Abstract:
Network security is role of the ICT environment because malicious users are continually growing that realm of education, business, and then related with ICT. The network security contravention is typically described and examined centrally based on a security event management system. The firewalls, Intrusion Detection System (IDS), and Intrusion Prevention System are becoming essential to monitor or prevent of potential violations, incidents attack, and imminent threats. In this system, the firewall rules are set only for where the system policies are needed. Dataset deployed in this system are derived from the testbed environment. The traffic as in DoS and PortScan traffics are applied in the testbed with firewall and IDS implementation. The network traffics are classified as normal or attacks in the existing testbed environment based on six machine learning classification methods applied in the system. It is required to be tested to get datasets and applied for DoS and PortScan. The dataset is based on CICIDS2017 and some features have been added. This system tested 26 features from the applied dataset. The system is to reduce false positive rates and to improve accuracy in the implemented testbed design. The system also proves good performance by selecting important features and comparing existing a dataset by machine learning classifiers.Keywords: false negative rate, intrusion detection system, machine learning methods, performance
Procedia PDF Downloads 1181055 Legal Regulation of Personal Information Data Transmission Risk Assessment: A Case Study of the EU’s DPIA
Authors: Cai Qianyi
Abstract:
In the midst of global digital revolution, the flow of data poses security threats that call China's existing legislative framework for protecting personal information into question. As a preliminary procedure for risk analysis and prevention, the risk assessment of personal data transmission lacks detailed guidelines for support. Existing provisions reveal unclear responsibilities for network operators and weakened rights for data subjects. Furthermore, the regulatory system's weak operability and a lack of industry self-regulation heighten data transmission hazards. This paper aims to compare the regulatory pathways for data information transmission risks between China and Europe from a legal framework and content perspective. It draws on the “Data Protection Impact Assessment Guidelines” to empower multiple stakeholders, including data processors, controllers, and subjects, while also defining obligations. In conclusion, this paper intends to solve China's digital security shortcomings by developing a more mature regulatory framework and industry self-regulation mechanisms, resulting in a win-win situation for personal data protection and the development of the digital economy.Keywords: personal information data transmission, risk assessment, DPIA, internet service provider, personal information data transimission, risk assessment
Procedia PDF Downloads 611054 Design of a Customized Freshly-Made Fruit Salad and Juices Vending Machine
Authors: María Laura Guevara Campos
Abstract:
The increasing number of vending machines makes it easy for people to find them more frequently in stores, universities, workplaces, and even hospitals. These machines usually offer products with high contents of sugar and fat, which, if consumed regularly, can result in serious health threats, as overweight and obesity. Additionally, the energy consumption of these machines tends to be high, which has an impact on the environment as well. In order to promote the consumption of healthy food, a vending machine was designed to give the customer the opportunity to choose between a customized fruit salad and a customized fruit juice, both of them prepared instantly with the ingredients selected by the customer. The main parameters considered to design the machine were: the storage of the preferred fruits in a salad and/or in a juice according to a survey, the size of the machine, the use of ecologic recipients, and the overall energy consumption. The methodology used for the design was the one proposed by the German Association of Engineers for mechatronics systems, which breaks the design process in several stages, from the elaboration of a list of requirements through the establishment of the working principles and the design concepts to the final design of the machine, which was done in a 3D modelling software. Finally, with the design of this machine, the aim is to contribute to the development and implementation of healthier vending machines that offer freshly-made products, which is not being widely attended at present.Keywords: design, design methodology, mechatronics systems, vending machines
Procedia PDF Downloads 1331053 Exploring the Influence of Wind on Wildfire Behavior in China: A Data-Driven Study Using Machine Learning and Remote Sensing
Authors: Rida Kanwal, Wang Yuhui, Song Weiguo
Abstract:
Wildfires are one of the most prominent threats to ecosystems, human health, and economic activities, with wind acting as a critical driving factor. This study combines machine learning (ML) and remote sensing (RS) to assess the effects of wind on wildfires in Chongqing Province from August 16-23, 2022. Landsat 8 satellite images were used to estimate the difference normalized burn ratio (dNBR), representing prefire and postfire vegetation conditions. Wind data was analyzed through geographic information system (GIS) mapping. Correlation analysis between wind speed and fire radiative power (FRP) revealed a significant relationship. An autoregressive integrated moving average (ARIMA) model was developed for wind forecasting, and linear regression was applied to determine the effect of wind speed on FRP. The results identified high wind speed as a key factor contributing to the surge in FRP. Wind-rose plots showed winds blowing to the northwest (NW), aligning with the wildfire spread. This model was further validated with data from other provinces across China. This study integrated ML, RS, and GIS to analyze wildfire behavior, providing effective strategies for prediction and management.Keywords: wildfires, machine learning, remote sensing, wind speed, GIS, wildfire behavior
Procedia PDF Downloads 201052 The Impact of Job Meaningfulness on the Relationships between Job Autonomy, Supportive Organizational Climate, and Job Satisfaction
Authors: Sashank Nyapati, Laura Lorente-Prieto, Maria Peiro
Abstract:
The general objective of this study is to analyse the mediating role of meaningfulness in the relationships between job autonomy and job satisfaction and supportive organizational climate and job satisfaction. Theories such as the Job Characteristics Model, Conservation of Resources theory, as well as the Job Demands-Resources theory were used as theoretical framework. Data was obtained from the 5th European Working Conditions Survey (EWCS), and sample was composed of 1005 and 1000 workers from Spain and Portugal respectively. The analysis was conducted using the SOBEL Macro for SPSS (A multiple regression mediation model) developed by Preacher and Hayes in 2003. Results indicated that Meaningfulness partially mediates both the Job Autonomy-Job Satisfaction as well as the Supportive Organizational Climate-Job Satisfaction relationships. However, the percentages are large enough to draw substantial conclusions, especially that Job Meaningfulness plays an essential – if indirect – role in the amount of Satisfaction that one experiences at work. Some theoretical and practical implications are discussed.Keywords: meaningfulness, job autonomy, supportive organizational climate, job satisfaction
Procedia PDF Downloads 5361051 Challenge of Net-Zero Carbon Construction and Measurement of Energy Consumption and Carbon Emission Reduction to Climate Change, Economy and Job Growths in Hong Kong and Australia
Authors: Kwok Tak Kit
Abstract:
Under the Paris Agreement 2015, the countries committed to address and combat the climate change and its negative impacts and agree to the target of reducing the global greenhouse gas (GHG) emission substantially by limiting the global temperature to 20C above the pre-industrial level in this century. A internationally Submit named “ 26th United Nations Climate Conference” (COP26) was held in Glasgow in 2021 with all committed countries agreed to the finalize the outstanding element in Paris Agreement and Glasgow Climate Pact to keep 1.50C. In this paper, we will focus on the basic approach of waste strategy, recycling policy, circular economy strategy, net-zero strategy and sustainability strategy and the importance of the elements which affect the carbon emission, waste generation and energy conservation will be further reviewed with recommendation for future study.Keywords: net-zero carbon, climate change, carbon emission, energy consumption
Procedia PDF Downloads 1841050 Ensuring Uniform Energy Consumption in Non-Deterministic Wireless Sensor Network to Protract Networks Lifetime
Authors: Vrince Vimal, Madhav J. Nigam
Abstract:
Wireless sensor networks have enticed much of the spotlight from researchers all around the world, owing to its extensive applicability in agricultural, industrial and military fields. Energy conservation node deployment stratagems play a notable role for active implementation of Wireless Sensor Networks. Clustering is the approach in wireless sensor networks which improves energy efficiency in the network. The clustering algorithm needs to have an optimum size and number of clusters, as clustering, if not implemented properly, cannot effectively increase the life of the network. In this paper, an algorithm has been proposed to address connectivity issues with the aim of ensuring the uniform energy consumption of nodes in every part of the network. The results obtained after simulation showed that the proposed algorithm has an edge over existing algorithms in terms of throughput and networks lifetime.Keywords: Wireless Sensor network (WSN), Random Deployment, Clustering, Isolated Nodes, Networks Lifetime
Procedia PDF Downloads 3361049 Reducing Environmental Impact of Olive Oil Production in Sakaka City Using Combined Chemical, Physical, and Biological Treatment
Authors: Abdullah Alhajoj, Bassam Alowaiesh
Abstract:
This work aims to reduce the risks of discharging olive mill waste directly to the environment without treatment in Sakaka City, KSA. The organic loads expressed by chemical oxygen demand (COD) and biological oxygen demand (BOD) of the produced wastewater (OMWW) as well as the solid waste (OMW) were evaluated. The wastes emitted from the three-phase centrifuge decanters was found to be higher than that emitted from the two-phase centrifuge decanters. The olive mill wastewater (OMWW) was treated using advanced oxidation combined with filtration treatment. The results indicated that the concentration of COD, BOD, TSS, oil and grease and phenol was reduced by using complex sand filtration from 72150, 21660 10256, 36430, and 1470 mg/l to 980, 421, 58, 68, and 0.35 mg/l for three-phase OMWW and from 150562, 17955, 15325, 19658 and 2153 mg/l to 1050, 501, 29, 0.75, and 0.29 mg/l, respectively. While, by using modified trickling filter (packed with the neck of waste plastic bottles the concentration of the previously mentioned parameters was reduced to 1190, 570, 55, 0.85, and 0.3 mg/l, respectively. This work supports the application of such treatment technique for reducing the environmental threats of olive mill waste effluents in Saudi Arabia.Keywords: two-phase, three-phase, olive mill, olive oil, waste treatment, filtration, advanced oxidation, waste plastic bottles
Procedia PDF Downloads 1531048 Performances Analysis of the Pressure and Production of an Oil Zone by Simulation of the Flow of a Fluid through the Porous Media
Authors: Makhlouf Mourad, Medkour Mihoub, Bouchher Omar, Messabih Sidi Mohamed, Benrachedi Khaled
Abstract:
This work is the modeling and simulation of fluid flow (liquid) through porous media. This type of flow occurs in many situations of interest in applied sciences and engineering, fluid (oil) consists of several individual substances in pure, single-phase flow is incompressible and isothermal. The porous medium is isotropic, homogeneous optionally, with the rectangular format and the flow is two-dimensional. Modeling of hydrodynamic phenomena incorporates Darcy's law and the equation of mass conservation. Correlations are used to model the density and viscosity of the fluid. A finite volume code is used in the discretization of differential equations. The nonlinearity is treated by Newton's method with relaxation coefficient. The results of the simulation of the pressure and the mobility of liquid flowing through porous media are presented, analyzed, and illustrated.Keywords: Darcy equation, middle porous, continuity equation, Peng Robinson equation, mobility
Procedia PDF Downloads 2181047 Community-based Mapping as a Planning Tool; Examples from Pakistan
Authors: Noman Ahmed, Fariha Tahseen
Abstract:
Since several decades, unplanned urbanization and rapid growth of informal settlements have evolved and increased in size and number. Large cities such as Karachi have been impacted with sprawl and rising share of unplanned settlements where poor communities reside. Threats of eviction, deteriorating law and order situation, lack of essential amenities and infrastructure, extortion and bullying from local and non-local musclemen and feeble response of government agencies towards their development needs are some predicaments. Non-governmental organizations (NGOs) have caused important interventions in such locations. Appraisal of the community-based mapping as a tool in supporting the development work in less privileged areas in Karachi has been the objective of this research. The Orangi Pilot Project (OPP), under the leadership of its slain director Perween Rahman had a significant role to play in developing and extending this approach in low income locations in Karachi and beyond. The paper investigates the application of mapping in the process of peri urban land invasion causing rapid transformation of traditional settlements in Karachi. Mixed methodology components comprising literature review, archival research, and unstructured interviews with key informants and case studies have been used.Keywords: squatters (katchi abadis), land grabbing, community empowerment, housing rights, mapping, infrastructure development
Procedia PDF Downloads 3151046 On the Use of Machine Learning for Tamper Detection
Authors: Basel Halak, Christian Hall, Syed Abdul Father, Nelson Chow Wai Kit, Ruwaydah Widaad Raymode
Abstract:
The attack surface on computing devices is becoming very sophisticated, driven by the sheer increase of interconnected devices, reaching 50B in 2025, which makes it easier for adversaries to have direct access and perform well-known physical attacks. The impact of increased security vulnerability of electronic systems is exacerbated for devices that are part of the critical infrastructure or those used in military applications, where the likelihood of being targeted is very high. This continuously evolving landscape of security threats calls for a new generation of defense methods that are equally effective and adaptive. This paper proposes an intelligent defense mechanism to protect from physical tampering, it consists of a tamper detection system enhanced with machine learning capabilities, which allows it to recognize normal operating conditions, classify known physical attacks and identify new types of malicious behaviors. A prototype of the proposed system has been implemented, and its functionality has been successfully verified for two types of normal operating conditions and further four forms of physical attacks. In addition, a systematic threat modeling analysis and security validation was carried out, which indicated the proposed solution provides better protection against including information leakage, loss of data, and disruption of operation.Keywords: anti-tamper, hardware, machine learning, physical security, embedded devices, ioT
Procedia PDF Downloads 1531045 Transcending or Going beyond the Concept of Race
Authors: Ovett Nwosimiri
Abstract:
Historically the concept of race has played a significant part in the existence of African philosophy. Race, as part of the historical events, has been used as a reason for colonization. In recent years, there has been a numerous work on the concept of race. Some philosophers have devoted their time to the discourse of race and to understand the ascription of the race. These philosophers have dedicated their time and energy to the concept of race. Philosophers, like Joshua Glasgow, W. E. B. Du Bois, Lucius Outlaw, Kwame Anthony Appiah, Naomi Zack, Emmanuel C. Eze and many others took up the task to explain the concept of race, and also to explain in their view whether the concept of race should be conserved or eliminated. According to the eliminativists, the concept of race should be eliminated. According to the conservationists, the concept of race should be conserved. The aim of this paper is to look at the possibility of transcending the concept of race. In order to do this, the paper will briefly explain Joshua Glasgow’ idea theory of ‘racial reconstructionism’, and it will propose a theory of ‘racial transcendentalism’ as a way of transcending the concept of race. The paper will argue that we should see the concept of race as a concept that has a future beyond the mere meaning and ideas that call for its elimination or conservation.Keywords: conservationists, eliminativists, race, transcending
Procedia PDF Downloads 3531044 “Context” Thinking of Contemporary Urban History Space under the Basis of Enlightenment of Chinese Traditional Cultural Philology: Taking West Expansion Plan of Tianyi Pavilion as An Example
Abstract:
Facing the understanding problem of update and preservation of urban history space under background of rapid Chinese urbanization, so at first there is a need to dig the philosophic principles of “antithesis” and “unification” which are contained in the traditional Chinese literature known as “antithesis” and do the job of planning translation by personal understanding in order to form understanding and value systems of dialectical urban history space under the foundation of “antithesis”. Then we could put forward a “context” concept for urban history space under the foregoing basis. After that, we will take the update and preservation of Ningbo Tianyi Pavilion’s historical district as an example to discuss problems related to understanding of urban history area under the basis of Chinese tradition culture, improvement of value system, construction of urban trait space and Chinese “localization” of planning theory.Keywords: antithesis, traditional values, city renewal and conservation, the “context” of city history space
Procedia PDF Downloads 4481043 WHSS: A Platform for Designing Water Harvesting Systems for Multiple Purposes
Authors: Ignacio Sanchez Cohen, Aurelio Pedroza Sandoval, Ricardo Trejo Calzada
Abstract:
Water harvesting systems (WHS) has become the unique alternative that farmers in dry areas accounts for surviving dry periods. Nevertheless, technicians, agronomists, and users, in general, have to cope with the difficulty of finding suitable technology for optimal design of WHS. In this paper, we describe a user-friendly computer program that uses readily available information for the design of multiple WHS depending upon the water final use (agriculture, household, conservation, etc). The application (APP) itself contains several links to help the user complete the input requirements. It is not a prerequisite to have any computer skills for the use of the APP. Outputs of the APP are the dimensions of the WHS named terraces, micro-catchments, cisterns, and small household cisterns for roof water catchment. The APP also provides guidance on crops for backyard agriculture. We believe that this tool may guide users to better optimize WHS for multiple purposes and to widen the possibility of copping with dry spells in arid lands.Keywords: rainfall-catchment, models, computer aid, arid lands
Procedia PDF Downloads 1771042 Restoration and Conservation of Historical Textiles Using Covalently Immobilized Enzymes on Nanoparticles
Authors: Mohamed Elbehery
Abstract:
Historical textiles in the burial environment or in museums are exposed to many types of stains and dirt that are associated with historical textiles by multiple chemical bonds that cause damage to historical textiles. The cleaning process must be carried out with great care, with no irreversible damage, and sediments removed without affecting the original material of the surface being cleaned. Science and technology continue to provide innovative systems in the bio-cleaning process (using pure enzymes) of historical textiles and artistic surfaces. Lipase and α-amylase were immobilized on nanoparticles of alginate/κ-carrageenan nanoparticle complex and used in historical textiles cleaning. Preparation of nanoparticles, activation, and enzymes immobilization were characterized. Optimization of loading time and units of the two enzymes were done. It was found that, the optimum time and units of amylase were 4 hrs and 25U, respectively. While, the optimum time and units of lipase were 3 hrs and 15U, respectively. The methods used to examine the fibers using a scanning electron microscope equipped with an X-ray energy dispersal unit: SEM with EDX unit.Keywords: nanoparticles, enzymes, immobilization, textiles
Procedia PDF Downloads 99