Search results for: water security
10130 Treatment of Acid Mine Drainage with Modified Fly Ash
Authors: Sukla Saha, Alok Sinha
Abstract:
Acid mine drainage (AMD) is the generation of acidic water from active as well as abandoned mines. AMD generates due to the oxidation of pyrites present in the rock in mining areas. Sulfur oxidizing bacteria such as Thiobacillus ferrooxidans acts as a catalyst in this oxidation process. The characteristics of AMD is extreme low pH (2-3) with elevated concentration of different heavy metals such as Fe, Al, Zn, Mn, Cu and Co and anions such sulfate and chloride. AMD contaminate the ground water as well as surface water which leads to the degradation of water quality. Moreover, it carries detrimental effect for aquatic organism and degrade the environment. In the present study, AMD is treated with fly ash, modified with alkaline agent (NaOH). This modified fly ash (MFA) was experimentally proven as a very effective neutralizing agent for the treatment of AMD. It was observed that pH of treated AMD raised to 9.22 from 1.51 with 100g/L of MFA dose. Approximately, 99% removal of Fe, Al, Mn, Cu and Co took place with the same MFA dose. The treated water comply with the effluent discharge standard of (IS: 2490-1981).Keywords: acid mine drainage, heavy metals, modified fly ash, neutralization
Procedia PDF Downloads 14910129 Tag Impersonation Attack on Ultra-lightweight Radio Frequency Identification Authentication Scheme (ESRAS)
Authors: Reham Al-Zahrani, Noura Aleisa
Abstract:
The proliferation of Radio Frequency Identification (RFID) technology has raised concerns about system security, particularly regarding tag impersonation attacks. Regarding RFID systems, an appropriate authentication protocol must resist active and passive attacks. A tag impersonation occurs when an adversary's tag is used to fool an authenticating reader into believing it is a legitimate tag. This paper analyzed the security of the efficient, secure, and practical ultra-lightweight RFID Authentication Scheme (ESRAS). Then, the paper presents a comprehensive analysis of the Efficient, Secure, and Practical Ultra-Lightweight RFID Authentication Scheme (ESRAS) in the context of radio frequency identification (RFID) systems that employed the Scyther tool to examine the protocol's security against a tag impersonation attack.Keywords: RFID, impersonation attack, authentication, ultra-lightweight protocols
Procedia PDF Downloads 6310128 An Alternative Institutional Design for Efficient Management of Nepalese Irrigation Systems
Authors: Tirtha Raj Dhakal, Brian Davidson, Bob Farquharson
Abstract:
Institutional design is important if water resources are to be managed efficiently. In Nepal, the supply of water in both farmer- and agency-managed irrigation systems is inefficient because of the weak institutional frameworks. This type of inefficiency is linked with collective problems such as non-excludability of irrigation water, inadequate recognition of property rights and externalities. Irrigation scheme surveys from Nepal as well as existing literature revealed that the Nepalese irrigation sector is facing many issues such as low cost recovery, inadequate maintenance of the schemes and inefficient allocation and utilization of irrigation water. The institutional practices currently in place also fail to create/force any incentives for farmers to use water efficiently and to pay for its use. This, thus, compels the need of refined institutional framework that can address the collective problems and improve irrigation efficiency.Keywords: agency-managed, cost recovery, farmer-managed, institutional design
Procedia PDF Downloads 42410127 Geoelectical Resistivity Method in Aquifer Characterization at Opic Estate, Isheri-Osun River Basin, South Western Nigeria
Authors: B. R. Faleye, M. I. Titocan, M. P. Ibitola
Abstract:
Investigation was carried out at Opic Estate in Isheri-Osun River Basin environment using Electrical Resistivity method to study saltwater intrusion into a fresh water aquifer system from the proximal estuarine water body. The investigation is aimed at aquifer characterisation using electrical resistivity method in order to provide the depth to which fresh water fit for both domestic and industrial consumption. The 2D Electrical Resistivity and Vertical Electrical Resistivity techniques alongside Laboratory analysis of water samples obtained from the boreholes were adopted. Three traverses were investigated using Wenner and Pole-Dipole array with multi-electrode system consisting of 84 electrodes and a spread of 581 m, 664 m and 830 m were attained on the traverses. The main lithologies represented in the study area are Sand, Clay and Clayey Sand of which Sand constitutes the aquifer in the study area. Vertical Electrical Sounding data obtained at different lateral distance on the traverses have indicated that the water in the aquifer in the subsurface is brackish. Brackish water is represented by lowelectrical resistivity value signature while fresh water is characterized by relatively high electrical resistivity and in some regionfresh water is existent at depth greater than 200 m. Results of laboratory analysis of samples showed that the pH, Salinity, Total Dissolved Solid and Conductivity indicated existence of water with poor quality, indicating that salinity, TDS and Conductivity is higher in the Northern part of the study area. The 2D electrical resistivity and Vertical Electrical Sounding methods indicate that fresh water region is at ≥200m depth. Aquifers not fit for domestic use in the study area occur downwards to about 200 m in depth. In conclusion, it is recommended that wells should be sunkbeyond 220 m for the possible procurement of portable fresh water.Keywords: 2D electrical resistivity, aquifer, brackish water, lithologies
Procedia PDF Downloads 42810126 The Issues of Irrigation and Drainage in Kebbi State and Their Effective Solution for a Sustainable Agriculture in Kebbi State, Nigeria
Authors: Mumtaz Ahmed Sohag, Ishaq Ahmed Sohag
Abstract:
Kebbi State, located in the Nort-West of Nigeria, is rich in water resources as the major rivers viz. Niger and Rima irrigate a vast majority of land. Besides, there is significant amount of groundwater, which farmers use for agriculture purpose. The groundwater is also a major source of agricultural and domestic water as wells are installed in almost all parts of the region. Although Kebbi State is rich in water, however, there are some pertinent issues which are hampering its agricultural productivity. The low lands (locally called Fadama), has spread out to a vast area. It is inundated every year during the rainy season which lasts from June to September every year. The farmers grow rice during the rainy season when water is standing. They cannot do further agricultural activity for almost two months due to high standing water. This has resulted in widespread waterlogging problem. Besides, the impact of climate change is resulting in rapid variation in river/stream flows. The information about water bodies regarding the availability of water for agricultural and other uses and the behavior of rivers at different flows is seldom available. Furthermore, sediment load (suspended and bedload) is not measured due to which land erosion cannot be countered effectively. This study, carried out in seven different irrigation regions of Kebbi state, found that diversion structures need to be constructed at some strategic locations for the supply of surface water to the farmers. The water table needs to be lowered through an effective drainage system. The monitoring of water bodies is crucial for sound data to help efficient regulation and management of water. Construction of embankments is necessary to control frequent floods in the rivers of Niger and Rima. Furthermore, farmers need capacity and awareness for participatory irrigation management.Keywords: water bodies, floods, agriculture, waterlogging
Procedia PDF Downloads 23710125 National Security Threat and Fear of Rising Islamic Extremism in Bangladesh due to Influx of Rohingya Refugees
Authors: Afsana Afsar Tuly
Abstract:
The Rohingyas are a group of minority Muslimsin Myanmar who witnessed series of persecution, violence, and torture from Burmese military since 1948. In 2017, around 700,000 Rohingyas fled to the neighboring country Bangladesh and took shelter as refugees after facing clashes with Myanmar security forces. The number increased to 1.8 million in 2020, creating one of the largest refugee crises of recent times. This research focuses on the vulnerability and poverty faced by Rohingyas in refugee camps and how thelack of long-term solution and silence from international communitycan pose national security threat and increasing Islamic extremism in Bangladesh. Islamic religious and terrorist groups have used the Rohingyas position as stateless people to influence them into speaking against the secular government of Bangladesh. There has been increasing crime rates and formation of different rebel groups in refugee camps, causing clashes with Bangladeshi police and authority. Human trafficking, illegal drug dealings, prostitution, and other illicit activities have continuously gone up in the southeastern part of Bangladesh. Some economic, social, and environmental factors are studied and analyzed to show the change in Bangladesh between 2017 and 2020.Keywords: national security threat, islamic extremism, rohingya refugees, refugee studies, Bangladesh, myanmar
Procedia PDF Downloads 14210124 Cryptography Based Authentication Methods
Authors: Mohammad A. Alia, Abdelfatah Aref Tamimi, Omaima N. A. Al-Allaf
Abstract:
This paper reviews a comparison study on the most common used authentication methods. Some of these methods are actually based on cryptography. In this study, we show the main cryptographic services. Also, this study presents a specific discussion about authentication service, since the authentication service is classified into several categorizes according to their methods. However, this study gives more about the real life example for each of the authentication methods. It talks about the simplest authentication methods as well about the available biometric authentication methods such as voice, iris, fingerprint, and face authentication.Keywords: information security, cryptography, system access control, authentication, network security
Procedia PDF Downloads 46810123 A Study on the Influence of Aswan High Dam Reservoir Loading on Earthquake Activity
Authors: Sayed Abdallah Mohamed Dahy
Abstract:
Aswan High Dam Reservoir extends for 500 km along the Nile River; it is a vast reservoir in southern Egypt and northern Sudan. It was created as a result of the construction of the Aswan High Dam between 1958 and 1970; about 95% of the main water resources for Egypt are from it. The purpose of this study is to discuss and understand the effect of the fluctuation of the water level in the reservoir on natural and human-induced environmental like earthquakes in the Aswan area, Egypt. In summary, the correlation between the temporal variations of earthquake activity and water level changes in the Aswan reservoir from 1982 to 2014 are investigated and analyzed. This analysis confirms a weak relation between the fluctuation of the water level and earthquake activity in the area around Aswan reservoir. The result suggests that the seismicity in the area becomes active during a period when the water level is decreasing from the maximum to the minimum. Behavior of the water level in this reservoir characterized by a special manner that is the unloading season extends to July or August, and the loading season starts to reach its maximum in October or November every year. Finally, daily rate of change in the water level did not show any direct relation with the size of the earthquakes, hence, it is not possible to be used as a single tool for prediction.Keywords: Aswan high dam reservoir, earthquake activity, environmental, Egypt
Procedia PDF Downloads 37710122 A Study to Examine the Use of Traditional Agricultural Practices to Fight the Effects of Climate Change
Authors: Rushva Parihar, Anushka Barua
Abstract:
The negative repercussions of a warming planet are already visible, with biodiversity loss, water scarcity, and extreme weather events becoming ever so frequent. The agriculture sector is perhaps the most impacted, and modern agriculture has failed to defend farmers from the effects of climate change. This, coupled with the added pressure of higher demands for food production caused due to population growth, has only compounded the impact. Traditional agricultural practices that are routed in indigenous knowledge have long safeguarded the delicate balance of the ecosystem through sustainable production techniques. This paper uses secondary data to explore these traditional processes (like Beejamrita, Jeevamrita, sheep penning, earthen bunding, and others) from around the world that have been developed over centuries and focuses on how they can be used to tackle contemporary issues arising from climate change (such as nutrient and water loss, soil degradation, increased incidences of pests). Finally, the resulting framework has been applied to the context of Indian agriculture as a means to combat climate change and improve food security, all while encouraging documentation and transfer of local knowledge as a shared resource among farmers.Keywords: sustainable food systems, traditional agricultural practices, climate smart agriculture, climate change, indigenous knowledge
Procedia PDF Downloads 12510121 Production Value, Constraints, and Opportunities in East African Freshwater Fisheries: Systematic Review
Authors: Alamrew Eyayu, Abebe Getahun, James Last Keyombe
Abstract:
Demand for fish continued to grow worldwide while production from capture fisheries has decreased. In the Eastern African Region (EAR), the open-access nature of capture fisheries has resulted in illegal fishing. Within communities engaged in fishing, small-scale fisheries support food security strategies and sustain livelihoods. Despite the role of fisheries in EAR, inland fisheries are vulnerable to loss, and management solutions authorized for inland fisheries are inadequate. This review investigates production potential, challenges, opportunities, and management of inland fisheries in the EAR. It is therefore expected that in aquaculture promising areas, the EAR will turn to depend more on aquaculture to meet the extended needs and supply gaps created as a result of capture fisheries shortfalls. However, aquaculture is still in its infant stage in the region, and there exists no adequate aquaculture policy framework and funds in some EAR (e.g., Ethiopia, Somalia). Stakeholders at all levels should entertain the importance of fishery-based activities for food security in EAR. As a result, easily implemented and community-oriented fisheries legislative documents need to be prepared for advancing sustainable fisheries management. Legislative documents might consider techniques of continual catch statistics (consider small water bodies as much as possible) of inland fisheries and enforcing existing laws to manage illegal fishing activities to accustom sustainable development of inland capture fisheries.Keywords: aquaculture, capture fisheries, East Africa, fisheries management
Procedia PDF Downloads 2410120 Long Term Changes of Water Quality in Latvia
Authors: Maris Klavins, Valery Rodinov
Abstract:
The aim of this study was to analyze long term changes of surface water quality in Latvia, spatial variability of water chemical composition, possible impacts of different pollution sources as well as to analyze the measures to protect national water resources - river basin management. Within this study, the concentrations of major water ingredients and microelements in major rivers and lakes of Latvia have been determined. Metal concentrations in river and lake waters were compared with water chemical composition. The mean concentrations of trace metals in inland waters of Latvia are appreciably lower than the estimated world averages for river waters and close to or lower than background values, unless regional impacts determined by local geochemistry. This may be explained by a comparatively lower level of anthropogenic load. In the same time in several places, direct anthropogenic impacts are evident, regarding influences of point sources both transboundary transport impacts. Also, different processes related to pollution of surface waters in Latvia have been analyzed. At first the analysis of changes and composition of pollutant emissions in Latvia has been realized, and the obtained results were compared with actual composition of atmospheric precipitation and their changes in time.Keywords: water quality, trend analysis, pollution, human impact
Procedia PDF Downloads 26610119 A Performance Analysis Study of an Active Solar Still Integrating Fin at the Basin Plate
Authors: O. Ansari, H. Hafs, A. Bah, M. Asbik, M. Malha, M. Bakhouya
Abstract:
Water is one of the most important and vulnerable natural resources due to human activities and climate change. Water-level continues declining year after year and it is primarily caused by sustained, extensive, and traditional usage methods. Improving water utilization becomes an urgent issue in order satisfy the increasing population needs. Desalination of seawater or brackish water could help in increasing water potential. However, a cost-effective desalination process is required. The most appropriate method for performing this desalination is solar-driven distillation, given its simplicity, low cost and especially the availability of the solar energy source. The main objective of this paper is to demonstrate the influence of coupling integrated basin plate by fins with preheating by solar collector on the performance of solar still. The energy balance equations for the various elements of the solar still are introduced. A numerical example is used to show the efficiency of the proposed solution.Keywords: active solar still, desalination, fins, solar collector
Procedia PDF Downloads 21510118 Optimal Operation of a Photovoltaic Induction Motor Drive Water Pumping System
Authors: Nelson K. Lujara
Abstract:
The performance characteristics of a photovoltaic induction motor drive water pumping system with and without maximum power tracker is analyzed and presented. The analysis is done through determination and assessment of critical loss components in the system using computer aided design (CAD) tools for optimal operation of the system. The results can be used to formulate a well-calibrated computer aided design package of photovoltaic water pumping systems based on the induction motor drive. The results allow the design engineer to pre-determine the flow rate and efficiency of the system to suit particular application.Keywords: photovoltaic, water pumping, losses, induction motor
Procedia PDF Downloads 29910117 Performance Evaluation of Fingerprint, Auto-Pin and Password-Based Security Systems in Cloud Computing Environment
Authors: Emmanuel Ogala
Abstract:
Cloud computing has been envisioned as the next-generation architecture of Information Technology (IT) enterprise. In contrast to traditional solutions where IT services are under physical, logical and personnel controls, cloud computing moves the application software and databases to the large data centres, where the management of the data and services may not be fully trustworthy. This is due to the fact that the systems are opened to the whole world and as people tries to have access into the system, many people also are there trying day-in day-out on having unauthorized access into the system. This research contributes to the improvement of cloud computing security for better operation. The work is motivated by two problems: first, the observed easy access to cloud computing resources and complexity of attacks to vital cloud computing data system NIC requires that dynamic security mechanism evolves to stay capable of preventing illegitimate access. Second; lack of good methodology for performance test and evaluation of biometric security algorithms for securing records in cloud computing environment. The aim of this research was to evaluate the performance of an integrated security system (ISS) for securing exams records in cloud computing environment. In this research, we designed and implemented an ISS consisting of three security mechanisms of biometric (fingerprint), auto-PIN and password into one stream of access control and used for securing examination records in Kogi State University, Anyigba. Conclusively, the system we built has been able to overcome guessing abilities of hackers who guesses people password or pin. We are certain about this because the added security system (fingerprint) needs the presence of the user of the software before a login access can be granted. This is based on the placement of his finger on the fingerprint biometrics scanner for capturing and verification purpose for user’s authenticity confirmation. The study adopted the conceptual of quantitative design. Object oriented and design methodology was adopted. In the analysis and design, PHP, HTML5, CSS, Visual Studio Java Script, and web 2.0 technologies were used to implement the model of ISS for cloud computing environment. Note; PHP, HTML5, CSS were used in conjunction with visual Studio front end engine design tools and MySQL + Access 7.0 were used for the backend engine and Java Script was used for object arrangement and also validation of user input for security check. Finally, the performance of the developed framework was evaluated by comparing with two other existing security systems (Auto-PIN and password) within the school and the results showed that the developed approach (fingerprint) allows overcoming the two main weaknesses of the existing systems and will work perfectly well if fully implemented.Keywords: performance evaluation, fingerprint, auto-pin, password-based, security systems, cloud computing environment
Procedia PDF Downloads 13910116 Improving Security Features of Traditional Automated Teller Machines-Based Banking Services via Fingerprint Biometrics Scheme
Authors: Anthony I. Otuonye, Juliet N. Odii, Perpetual N. Ibe
Abstract:
The obvious challenges faced by most commercial bank customers while using the services of ATMs (Automated Teller Machines) across developing countries have triggered the need for an improved system with better security features. Current ATM systems are password-based, and research has proved the vulnerabilities of these systems to heinous attacks and manipulations. We have discovered by research that the security of current ATM-assisted banking services in most developing countries of the world is easily broken and maneuvered by fraudsters, majorly because it is quite difficult for these systems to identify an impostor with privileged access as against the authentic bank account owner. Again, PIN (Personal Identification Number) code passwords are easily guessed, just to mention a few of such obvious limitations of traditional ATM operations. In this research work also, we have developed a system of fingerprint biometrics with PIN code Authentication that seeks to improve the security features of traditional ATM installations as well as other Banking Services. The aim is to ensure better security at all ATM installations and raise the confidence of bank customers. It is hoped that our system will overcome most of the challenges of the current password-based ATM operation if properly applied. The researchers made use of the OOADM (Object-Oriented Analysis and Design Methodology), a software development methodology that assures proper system design using modern design diagrams. Implementation and coding were carried out using Visual Studio 2010 together with other software tools. Results obtained show a working system that provides two levels of security at the client’s side using a fingerprint biometric scheme combined with the existing 4-digit PIN code to guarantee the confidence of bank customers across developing countries.Keywords: fingerprint biometrics, banking operations, verification, ATMs, PIN code
Procedia PDF Downloads 4110115 Evaluation of Agricultural Drought Impact in the Crop Productivity of East Gojjam Zone
Authors: Walelgn Dilnesa Cherie, Fasikaw Atanaw Zimale, Bekalu W. Asres
Abstract:
The most catastrophic condition for agricultural production is a drought event, which is also one of the most hydro-metrological-related hazards. According to the combined susceptibility of plants to meteorological and hydrological conditions, agricultural drought is defined as the magnitude, severity, and duration of a drought that affects crop production. The accurate and timely assessment of agricultural drought can lead to the development of risk management strategies, appropriate proactive mechanisms for the protection of farmers, and the improvement of food security. The evaluation of agricultural drought in the East Gojjam zone was the primary subject of this study. To identify the agricultural drought, soil moisture anomalies, soil moisture deficit indices, and Normalized Difference Vegetation Indices (NDVI) are used. The measured welting point, field capacity, and soil moisture were utilized to validate the soil water deficit indices computed from the satellite data. The soil moisture and soil water deficit indices in 2013 in all woredas were minimum; this makes vegetation stress also in all woredas. The soil moisture content decreased in 2013/2014/2019, and 2021 in Dejen, 2014, and 2019 in Awobel Woreda. The max/ min values of NDVI in 2013 are minimum; it dominantly shows vegetation stress and an observed agricultural drought that happened in all woredas. The validation process of satellite and in-situ soil moisture and soil water deficit indices shows a good agreement with a value of R²=0.87 and 0.56, respectively. The study area becomes drought detected region, so government officials, policymakers, and environmentalists pay attention to the protection of drought effects.Keywords: NDVI, agricultural drought, SWDI, soil moisture
Procedia PDF Downloads 8310114 Annual Water Level Simulation Using Support Vector Machine
Authors: Maryam Khalilzadeh Poshtegal, Seyed Ahmad Mirbagheri, Mojtaba Noury
Abstract:
In this paper, by application of the input yearly data of rainfall, temperature and flow to the Urmia Lake, the simulation of water level fluctuation were applied by means of three models. According to the climate change investigation the fluctuation of lakes water level are of high interest. This study investigate data-driven models, support vector machines (SVM), SVM method which is a new regression procedure in water resources are applied to the yearly level data of Lake Urmia that is the biggest and the hyper saline lake in Iran. The evaluated lake levels are found to be in good correlation with the observed values. The results of SVM simulation show better accuracy and implementation. The mean square errors, mean absolute relative errors and determination coefficient statistics are used as comparison criteria.Keywords: simulation, water level fluctuation, urmia lake, support vector machine
Procedia PDF Downloads 36510113 Temporal Effects on Chemical Composition of Treated Wastewater and Borehole Water Used for Irrigation in Limpopo Province, South Africa
Authors: Pholosho M. Kgopa, Phatu W. Mashela, Alen Manyevere
Abstract:
Increasing incidents of drought spells in most Sub-Saharan Africa call for using alternative sources of water for irrigation in arid and semi-arid regions. A study was conducted to investigate chemical composition of borehole and treated wastewater from different sampling disposal sites at University of Limpopo Experimental Farm (ULEF). A 4 × 5 factorial experiment, with the borehole as a reference sampling site and three other sampling sites along the wastewater disposal system was conducted over five months. Water samples were collected at four sites namely, (a) exit from Pond 16 into the furrow, (b) entry into night-dam, (c) exit from night dam to irrigated fields and (d) exit from borehole to irrigated fields. Water samples were collected in the middle of each month, starting from July to November 2016. Samples were analysed for pH, EC, Ca, Mg, Na, K, Al, B, Zn, Cu, Cr, Pb, Cd and As. The site × time interactions were highly significant for Ca, Mg, Zn, Cu, Cr, Pb, Cd, and As variables, but not for Na and K. Sampling site was highly significant on all variables, with sampling period not significant for K and Na. Relative to water from the borehole, Na concentration in wastewater samples from the night-dam exit, night-dam entry and Pond16 exit were lower by 69, 34 and 55%, respectively. Relative to borehole water, Al was higher in wastewater sampling sites. In conclusion, both sampling site and period affected the chemical composition of treated wastewater.Keywords: irrigation water quality, spatial effects, temporal effects, water reuse, water scarcity
Procedia PDF Downloads 23810112 On the Use of Machine Learning for Tamper Detection
Authors: Basel Halak, Christian Hall, Syed Abdul Father, Nelson Chow Wai Kit, Ruwaydah Widaad Raymode
Abstract:
The attack surface on computing devices is becoming very sophisticated, driven by the sheer increase of interconnected devices, reaching 50B in 2025, which makes it easier for adversaries to have direct access and perform well-known physical attacks. The impact of increased security vulnerability of electronic systems is exacerbated for devices that are part of the critical infrastructure or those used in military applications, where the likelihood of being targeted is very high. This continuously evolving landscape of security threats calls for a new generation of defense methods that are equally effective and adaptive. This paper proposes an intelligent defense mechanism to protect from physical tampering, it consists of a tamper detection system enhanced with machine learning capabilities, which allows it to recognize normal operating conditions, classify known physical attacks and identify new types of malicious behaviors. A prototype of the proposed system has been implemented, and its functionality has been successfully verified for two types of normal operating conditions and further four forms of physical attacks. In addition, a systematic threat modeling analysis and security validation was carried out, which indicated the proposed solution provides better protection against including information leakage, loss of data, and disruption of operation.Keywords: anti-tamper, hardware, machine learning, physical security, embedded devices, ioT
Procedia PDF Downloads 15110111 Governance, Risk Management, and Compliance Factors Influencing the Adoption of Cloud Computing in Australia
Authors: Tim Nedyalkov
Abstract:
A business decision to move to the cloud brings fundamental changes in how an organization develops and delivers its Information Technology solutions. The accelerated pace of digital transformation across businesses and government agencies increases the reliance on cloud-based services. They are collecting, managing, and retaining large amounts of data in cloud environments makes information security and data privacy protection essential. It becomes even more important to understand what key factors drive successful cloud adoption following the commencement of the Privacy Amendment Notifiable Data Breaches (NDB) Act 2017 in Australia as the regulatory changes impact many organizations and industries. This quantitative correlational research investigated the governance, risk management, and compliance factors contributing to cloud security success. The factors influence the adoption of cloud computing within an organizational context after the commencement of the NDB scheme. The results and findings demonstrated that corporate information security policies, data storage location, management understanding of data governance responsibilities, and regular compliance assessments are the factors influencing cloud computing adoption. The research has implications for organizations, future researchers, practitioners, policymakers, and cloud computing providers to meet the rapidly changing regulatory and compliance requirements.Keywords: cloud compliance, cloud security, data governance, privacy protection
Procedia PDF Downloads 11610110 Intrusion Detection in Cloud Computing Using Machine Learning
Authors: Faiza Babur Khan, Sohail Asghar
Abstract:
With an emergence of distributed environment, cloud computing is proving to be the most stimulating computing paradigm shift in computer technology, resulting in spectacular expansion in IT industry. Many companies have augmented their technical infrastructure by adopting cloud resource sharing architecture. Cloud computing has opened doors to unlimited opportunities from application to platform availability, expandable storage and provision of computing environment. However, from a security viewpoint, an added risk level is introduced from clouds, weakening the protection mechanisms, and hardening the availability of privacy, data security and on demand service. Issues of trust, confidentiality, and integrity are elevated due to multitenant resource sharing architecture of cloud. Trust or reliability of cloud refers to its capability of providing the needed services precisely and unfailingly. Confidentiality is the ability of the architecture to ensure authorization of the relevant party to access its private data. It also guarantees integrity to protect the data from being fabricated by an unauthorized user. So in order to assure provision of secured cloud, a roadmap or model is obligatory to analyze a security problem, design mitigation strategies, and evaluate solutions. The aim of the paper is twofold; first to enlighten the factors which make cloud security critical along with alleviation strategies and secondly to propose an intrusion detection model that identifies the attackers in a preventive way using machine learning Random Forest classifier with an accuracy of 99.8%. This model uses less number of features. A comparison with other classifiers is also presented.Keywords: cloud security, threats, machine learning, random forest, classification
Procedia PDF Downloads 31910109 Real-Time Optimisation and Minimal Energy Use for Water and Environment Efficient Irrigation
Authors: Kanya L. Khatri, Ashfaque A. Memon, Rod J. Smith, Shamas Bilal
Abstract:
The viability and sustainability of crop production is currently threatened by increasing water scarcity. Water scarcity problems can be addressed through improved water productivity and the options usually presumed in this context are efficient water use and conversion of surface irrigation to pressurized systems. By replacing furrow irrigation with drip or centre pivot systems, the water efficiency can be improved by up to 30 to 45%. However, the installation and application of pumps and pipes, and the associated fuels needed for these alternatives increase energy consumption and cause significant greenhouse gas emissions. Hence, a balance between the improvement in water use and the potential increase in energy consumption is required keeping in view adverse impact of increased carbon emissions on the environment. When surface water is used, pressurized systems increase energy consumption substantially, by between 65% to 75%, and produce greenhouse gas emissions around 1.75 times higher than that of gravity based irrigation. With gravity based surface irrigation methods the energy consumption is assumed to be negligible. This study has shown that a novel real-time infiltration model REIP has enabled implementation of real-time optimization and control of surface irrigation and surface irrigation with real-time optimization has potential to bring significant improvements in irrigation performance along with substantial water savings of 2.92 ML/ha which is almost equivalent to that given by pressurized systems. Thus real-time optimization and control offers a modern, environment friendly and water efficient system with close to zero increase in energy consumption and minimal greenhouse gas emissions.Keywords: pressurised irrigation, carbon emissions, real-time, environmentally-friendly, REIP
Procedia PDF Downloads 50110108 Blockchain’s Feasibility in Military Data Networks
Authors: Brenden M. Shutt, Lubjana Beshaj, Paul L. Goethals, Ambrose Kam
Abstract:
Communication security is of particular interest to military data networks. A relatively novel approach to network security is blockchain, a cryptographically secured distribution ledger with a decentralized consensus mechanism for data transaction processing. Recent advances in blockchain technology have proposed new techniques for both data validation and trust management, as well as different frameworks for managing dataflow. The purpose of this work is to test the feasibility of different blockchain architectures as applied to military command and control networks. Various architectures are tested through discrete-event simulation and the feasibility is determined based upon a blockchain design’s ability to maintain long-term stable performance at industry standards of throughput, network latency, and security. This work proposes a consortium blockchain architecture with a computationally inexpensive consensus mechanism, one that leverages a Proof-of-Identity (PoI) concept and a reputation management mechanism.Keywords: blockchain, consensus mechanism, discrete-event simulation, fog computing
Procedia PDF Downloads 13710107 Provision of Basic Water and Sanitation Services in South Africa through the Municipal Infrastructure Grant Programme
Authors: Elkington Sibusiso Mnguni
Abstract:
Although South Africa has made good progress in providing basic water and sanitation services to its citizens, there is still a large section of the population that has no access to these services. This paper reviews the performance of the government’s municipal infrastructure grant programme in providing basic water and sanitation services which are part of the constitutional requirements to the citizens. The method used to gather data and information was a desk top study which sought to review the progress made in rolling out the programme. The successes and challenges were highlighted and possible solutions were identified that can accelerate the elimination of the remaining backlogs and improve the level of service to the citizens. Currently, approximately 6.5 million citizens are without access to basic water services and approximately 10 million are without access to basic sanitation services.Keywords: grant, municipal infrastructure, sanitation, services, water
Procedia PDF Downloads 14110106 The New Approach to Airport Emergency Plans
Authors: Jakub Kraus, Vladimír Plos, Peter Vittek
Abstract:
This article deals with a new approach to the airport emergency plans, which are the basic documents and manuals for dealing with events with impact on safety or security. The article describes the identified parts in which the current airport emergency plans do not fulfill their role and which should therefore be considered in the creation of corrective measures. All these issues have been identified at airports in the Czech Republic and confirmed at airports in neighboring countries.Keywords: airport emergency plan, aviation safety, aviation security, comprehensive management system
Procedia PDF Downloads 50910105 How Manufacturing Firm Manages Information Security: Need Pull and Technology Push Perspective
Authors: Geuna Kim, Sanghyun Kim
Abstract:
This study investigates various factors that may influence the ISM process, including the organization’s internal needs and external pressure, and examines the role of regulatory pressure in ISM development and performance. The 105 sets of data collected in a survey were tested against the research model using SEM. The results indicate that NP and TP had positive effects on the ISM process, except for perceived benefits. Regulatory pressure had a positive effect on the relationship between ISM awareness and ISM development and performance.Keywords: information security management, need pull, technology push, regulatory pressure
Procedia PDF Downloads 29310104 Removal of Samarium in Environmental Water Samples by Modified Yeast Cells
Authors: Homayon Ahmad Panahi, Seyed Mehdi Seyed Nejad, Elham Moniri
Abstract:
A novel bio-adsorbent is fabricated by attaching a cibacron blue to yeast cells. The modified bio-sorbent has been characterized by some techniques like Fourier transform infrared spectroscopy (FT-IR) and elemental analysis (CHN) and applied for the preconcentration and determination of samarium from aqueous water samples. The best pH value for adsorption of the brilliant crecyle blue by yeast cells- cibacron blue was 7. The sorption capacity of modified biosorbent was 18.5 mg. g⁻¹. A recovery of 95.3% was obtained for Sm(III) when eluted with 0.5 M nitric acid. The method was applied for Sm(III) preconcentration and determination in river water sample.Keywords: samarium, solid phase extraction, yeast cells, water sample, removal
Procedia PDF Downloads 25210103 Interaction of Water Stress and VA Mycorrhizal Inoculation on Green Bean under Different P Levels
Authors: Shahram Baghban Cirus, Parisa Alizadeh Oskuie
Abstract:
In a greenhouse experiment, green bean were inoculated with three levels of phosphorus (P1, P2, P3, respectively 0, 50, 100 kgP/h) and four levels of water stress(Fc1, Fc2, Fc3 ,Fc4, respectively 0.8Fc, 0.7Fc, 0.6Fc, 0.5Fc) and one species of VA mycorrhiza (Glomus versiform) or left uninocolated as control plants in the steril soil. AM colonization significantly stimulated plant growth, leaf area, shoot, and pod dry weight but water stress significantly decreased colonization, pod and shoot dry weight, and shoot P. The use P levels significantly increased leaf area, shoot, and pod dry weight, pods length, and colonization.Keywords: green bean, plant growth, VA mycorrhiza, water-stress
Procedia PDF Downloads 35110102 Low Temperature Biological Treatment of Chemical Oxygen Demand for Agricultural Water Reuse Application Using Robust Biocatalysts
Authors: Vedansh Gupta, Allyson Lutz, Ameen Razavi, Fatemeh Shirazi
Abstract:
The agriculture industry is especially vulnerable to forecasted water shortages. In the fresh and fresh-cut produce sector, conventional flume-based washing with recirculation exhibits high water demand. This leads to a large water footprint and possible cross-contamination of pathogens. These can be alleviated through advanced water reuse processes, such as membrane technologies including reverse osmosis (RO). Water reuse technologies effectively remove dissolved constituents but can easily foul without pre-treatment. Biological treatment is effective for the removal of organic compounds responsible for fouling, but not at the low temperatures encountered at most produce processing facilities. This study showed that the Microvi MicroNiche Engineering (MNE) technology effectively removes organic compounds (> 80%) at low temperatures (6-8 °C) from wash water. The MNE technology uses synthetic microorganism-material composites with negligible solids production, making it advantageously situated as an effective bio-pretreatment for RO. A preliminary technoeconomic analysis showed 60-80% savings in operation and maintenance costs (OPEX) when using the Microvi MNE technology for organics removal. This study and the accompanying economic analysis indicated that the proposed technology process will substantially reduce the cost barrier for adopting water reuse practices, thereby contributing to increased food safety and furthering sustainable water reuse processes across the agricultural industry.Keywords: biological pre-treatment, innovative technology, vegetable processing, water reuse, agriculture, reverse osmosis, MNE biocatalysts
Procedia PDF Downloads 12710101 Study of Environmental Impact
Authors: Houmame Benbouali
Abstract:
The risks, in general, exist in any project; one can hardly carry out a project without taking risks. The hydraulic works are rather complex projects in their design, realization and exploitation, and are often subjected at the multiple risks being able to influence with their good performance, and can have an negative impact on their environment. The present study was carried out to quote the impacts caused by purification plant STEP Chlef on the environment, it aims has studies the environmental impacts during construction and when designing this STEP, it is divided into two parts: The first part results from a research task bibliographer which contain three chapters (-cleansing of water worn-general information on water worn-proceed of purification of waste water). The second part is an experimental part which is divided into four chapters (detailed state initial-description of the station of purification-evaluation of the impacts of the project analyzes measurements and recommendations).Keywords: treatment plant, waste water, waste water treatment, environmental impact
Procedia PDF Downloads 508