Search results for: water security
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 10980

Search results for: water security

10830 Study on Practice of Improving Water Quality in Urban Rivers by Diverting Clean Water

Authors: Manjie Li, Xiangju Cheng, Yongcan Chen

Abstract:

With rapid development of industrialization and urbanization, water environmental deterioration is widespread in majority of urban rivers, which seriously affects city image and life satisfaction of residents. As an emergency measure to improve water quality, clean water diversion is introduced for water environmental management. Lubao River and Southwest River, two urban rivers in typical plain tidal river network, are identified as technically and economically feasible for the application of clean water diversion. One-dimensional hydrodynamic-water quality model is developed to simulate temporal and spatial variations of water level and water quality, with satisfactory accuracy. The mathematical model after calibration is applied to investigate hydrodynamic and water quality variations in rivers as well as determine the optimum operation scheme of water diversion. Assessment system is developed for evaluation of positive and negative effects of water diversion, demonstrating the effectiveness of clean water diversion and the necessity of pollution reduction.

Keywords: assessment system, clean water diversion, hydrodynamic-water quality model, tidal river network, urban rivers, water environment improvement

Procedia PDF Downloads 265
10829 The Effect of Water Droplets Size in Fire Fighting Systems

Authors: Tassadit Tabouche

Abstract:

Water sprays pattern, and water droplets size (different droplets diameter) are a key factors in the success of the suppression by water spray. The effects of the two important factors are investigated in this study. However, the fire extinguishing mechanism in such devices is not well understood due to the complexity of the physical and chemical interactions between water spray and fire plume. in this study, 3D, unsteady, two phase flow CFD simulation approach is introduced to provide a quantitative analysis of the complex interactions occurring between water spray and fire plume. Lagrangian Discrete Phase Model (DPM) was used for water droplets and a global one-step reaction mechanism in combustion model was used for fire plume.

Keywords: droplets, water spray, water droplets size, 3D

Procedia PDF Downloads 513
10828 Enhancing Human Security Through Conmprehensive Counter-terrorism Measures

Authors: Alhaji Khuzaima Mohammed Osman, Zaeem Sheikh Abdul Wadudi Haruna

Abstract:

This article aims to explore the crucial link between counter-terrorism efforts and the preservation of human security. As acts of terrorism continue to pose significant threats to societies worldwide, it is imperative to develop effective strategies that mitigate risks while safeguarding the rights and well-being of individuals. This paper discusses key aspects of counter-terrorism and human security, emphasizing the need for a comprehensive approach that integrates intelligence, prevention, response, and resilience-building measures. By highlighting successful case studies and lessons learned, this article provides valuable insights for policymakers, law enforcement agencies, and practitioners in their quest to address terrorism and foster human security.

Keywords: human security, risk mitigation, terrorist activities, civil liberties

Procedia PDF Downloads 73
10827 Greywater Water Reuse in South Africa

Authors: Onyeka Nkwonta, Christopher Iheukwumere

Abstract:

It is a waste to irrigate with great quantities of drinking water when plants thrive on used water containing small bits of compost. Unlike a lot of ecological stopgap measures, greywater reuse is a part of the fundamental solution to many ecological problems and will probably remain essentially unchanged in the distant future. Water is abused and wasted by both the wealthy and the poor. Education about water conservation is also needed. This study gives an outline of the sources of grey water in our home and provides a process of creating awareness on the importance of re-using grey water in our home, in order to achieve the 7th aim of the millennium development goals by 2015, which is ensuring environmental sustainability.

Keywords: tickling filter, education, grey water, environmental sustainability

Procedia PDF Downloads 354
10826 Contrasting The Water Consumption Estimation Methods

Authors: Etienne Alain Feukeu, L. W. Snyman

Abstract:

Water scarcity is becoming a real issue nowadays. Most countries in the world are facing it in their own way based on their own geographical coordinate and condition. Many countries are facing a challenge of a growing water demand as a result of not only an increased population, economic growth, but also as a pressure of the population dynamic and urbanization. In view to mitigate some of this related problem, an accurate method of water estimation and future prediction, forecast is essential to guarantee not only the sufficient quantity, but also a good water distribution and management system. Beside the fact that several works have been undertaken to address this concern, there is still a considerable disparity between different methods and standard used for water prediction and estimation. Hence this work contrast and compare two well-defined and established methods from two countries (USA and South Africa) to demonstrate the inconsistency when different method and standards are used interchangeably.

Keywords: water scarcity, water estimation, water prediction, water forecast.

Procedia PDF Downloads 186
10825 Future Outlook and Current Situation for Security of Gas Supply in Eastern Baltic Region

Authors: Ando Leppiman, Kati Kõrbe Kaare, Ott Koppel

Abstract:

The growing demand for gas has rekindled a debate on gas security of supply due to supply interruptions, increasing gas prices, transportation and distribution bottlenecks and a growing reliance on imports over longer distances. Security of supply is defined mostly as an infrastructure package to satisfy N-1 criteria. In case of Estonia, Finland, Latvia, and Lithuania all the gas infrastructure is built to supply natural gas only from one single supplier, Russia. In 2012, almost 100% of natural gas to the Eastern Baltic Region was supplied by Gazprom. under such circumstances infrastructure N-1 criteria does not guarantee security of supply. In the Eastern Baltic Region, the assessment of risk of gas supply disruption has been worked out by applying the method of risk scenarios. There are various risks to be tackled in Eastern Baltic States in terms of improving security of supply, such as single supplier risk, physical infrastructure risk, regulatory gap, fair price, and competition. The objective of this paper is to evaluate the energy security of the Eastern Baltic Region within the framework of the European Union’s policies and to make recommendations on how to better guarantee the energy security of the region.

Keywords: security of supply, supply routes for natural gas, energy balance, diversified supply options, common regulative package

Procedia PDF Downloads 245
10824 Implementing Zero-Trust Security with Passwordless Authentication Gateways for Privacy-Oriented Organizations Using Keycloak

Authors: Andrei Bogdan Stanescu, Laura Diaconescu

Abstract:

With the increasing concerns about data breaches and privacy violations, organizations seek robust security measures to protect sensitive information. This research paper highlights the importance of implementing the Zero-Trust Security methodology using Passwordless Authentication Gateways that leverage Keycloak, an open-source Identity and Access Management (IAM) software, as a solution to address the security challenges these organizations face. The paper presents the successful implementation and deployment of such a solution in a mid-size, privacy-oriented organization. The implementation resulted in significant security improvements, reducing the risk of unauthorized access and potential data breaches. Moreover, user feedback indicated enhanced convenience and streamlined authentication experiences. The results of this study bring solid contributions in the field of cybersecurity and provide practical insights for organizations aiming to strengthen their security practices.

Keywords: identity and access management, passwordless authentication, privacy, zero-trust security

Procedia PDF Downloads 78
10823 Threat Analysis: A Technical Review on Risk Assessment and Management of National Testing Service (NTS)

Authors: Beenish Urooj, Ubaid Ullah, Sidra Riasat

Abstract:

National Testing Service-Pakistan (NTS) is an agency in Pakistan that conducts student success appraisal examinations. In this research paper, we must present a security model for the NTS organization. The security model will depict certain security countermeasures for a better defense against certain types of breaches and system malware. We will provide a security roadmap, which will help the company to execute its further goals to maintain security standards and policies. We also covered multiple aspects in securing the environment of the organization. We introduced the processes, architecture, data classification, auditing approaches, survey responses, data handling, and also training and awareness of risk for the company. The primary contribution is the Risk Survey, based on the maturity model meant to assess and examine employee training and knowledge of risks in the company's activities.

Keywords: NTS, risk assessment, threat factors, security, services

Procedia PDF Downloads 60
10822 Stackelberg Security Game for Optimizing Security of Federated Internet of Things Platform Instances

Authors: Violeta Damjanovic-Behrendt

Abstract:

This paper presents an approach for optimal cyber security decisions to protect instances of a federated Internet of Things (IoT) platform in the cloud. The presented solution implements the repeated Stackelberg Security Game (SSG) and a model called Stochastic Human behaviour model with AttRactiveness and Probability weighting (SHARP). SHARP employs the Subjective Utility Quantal Response (SUQR) for formulating a subjective utility function, which is based on the evaluations of alternative solutions during decision-making. We augment the repeated SSG (including SHARP and SUQR) with a reinforced learning algorithm called Naïve Q-Learning. Naïve Q-Learning belongs to the category of active and model-free Machine Learning (ML) techniques in which the agent (either the defender or the attacker) attempts to find an optimal security solution. In this way, we combine GT and ML algorithms for discovering optimal cyber security policies. The proposed security optimization components will be validated in a collaborative cloud platform that is based on the Industrial Internet Reference Architecture (IIRA) and its recently published security model.

Keywords: security, internet of things, cloud computing, stackelberg game, machine learning, naive q-learning

Procedia PDF Downloads 343
10821 Exploring the Dark Side of IT Security: Delphi Study on Business’ Influencing Factors

Authors: Tizian Matschak, Ilja Nastjuk, Stephan Kühnel, Simon Trang

Abstract:

We argue that besides well-known primary effects of information security controls (ISCs), namely confidentiality, integrity, and availability, ISCs can also have secondary effects. For example, while IT can add business value through impacts on business processes, ISCs can be a barrier and distort the relationship between IT and organizational value through the impact on business processes. By applying the Delphi method with 28 experts, we derived 27 business process influence dimensions of ISCs. Defining and understanding these mechanisms can change the common understanding of the cost-benefit valuation of IT security investments and support managers' effective and efficient decision-making.

Keywords: business process dimensions, dark side of information security, Delphi study, IT security controls

Procedia PDF Downloads 100
10820 An Overview of Privacy and Security Issues in Social Networks

Authors: Mohamad Ibrahim Al Ladan

Abstract:

Social networks, such as Facebook, Myspace, LinkedIn, Google+, and Twitter have experienced exponential growth and a remarkable adoption rate in recent years. They provide attractive means of online social interactions and communications with family, friends, and colleagues from around the corner or across the globe, and they have become an important part of daily digital interactions for more than one and a half billion users around the world. The various personal information sharing practices that social network providers encourage have led to their success as innovative social interaction platforms. However, these practices have resulted in ample concerns with respect to privacy and security from different stakeholders. Addressing these privacy and security concerns in social networks is a must for these networks to be sustainable. Existing security and privacy tools may not be enough to address existing concerns. Some guidelines should be followed to protect users from the existing risks. In this paper, we have investigated and discussed the various privacy and security issues and concerns pertaining to social networks. Moreover, we have classified these privacy and security issues and presented a thorough discussion of the implications of these issues and concerns on the future of the social networks. In addition, we have presented a set of guidelines as precaution measures that users can consider to address these issues and concerns.

Keywords: social networks privacy issues, social networks security issues, social networks privacy precautions measures, social networks security precautions measures

Procedia PDF Downloads 284
10819 Wheat (Triticum Aestivum) Yield Improved with Irrigation Scheduling under Salinity

Authors: Taramani Yadav, Gajender Kumar, R.K. Yadav, H.S. Jat

Abstract:

Soil Salinity and irrigation water salinity is critical threat to enhance agricultural food production to full fill the demand of billion plus people worldwide. Salt affected soils covers 6.73 Mha in India and ~1000 Mha area around the world. Irrigation scheduling of saline water is the way to ensure food security in salt affected areas. Research experiment was conducted at ICAR-Central Soil Salinity Research Institute, Experimental Farm, Nain, Haryana, India with 36 treatment combinations in double split plot design. Three sets of treatments consisted of (i) three regimes of irrigation viz., 60, 80 and 100% (I1, I2 and I3, respectively) of crop ETc (crop evapotranspiration at identified respective stages) in main plot; (ii) four levels of irrigation water salinity (sub plot treatments) viz., 2, 4, 8 and 12 dS m-1 (iii) applications of two PBRs along with control (without PBRs) i.e. salicylic acid (G1; 1 mM) and thiourea (G2; 500 ppm) as sub-sub plot treatments. Grain yield of wheat (Triticum aestivum) was increased with less amount of high salt loaded irrigation water at the same level of salinity (2 dS m-1), the trend was I3>I2>I1 at 2 dS m-1 with 8.10 and 17.07% increase at 80 and 100% ETc, respectively compared to 60% ETc. But contrary results were obtained by increasing amount of irrigation water at same level of highest salinity (12 dS m-1) showing following trend; I1>I2>I3 at 12 dS m-1 with 9.35 and 12.26% increase at 80 and 60% ETc compared to 100% ETc. Enhancement in grain yield of wheat (Triticum aestivum) is not need to increase amount of irrigation water under saline condition, with salty irrigation water less amount of irrigation water gave the maximum wheat (Triticum aestivum) grain yield.

Keywords: Irrigation, Salinity, Wheat, Yield

Procedia PDF Downloads 155
10818 Water Quality Assessment of Owu Falls for Water Use Classification

Authors: Modupe O. Jimoh

Abstract:

Waterfalls create an ambient environment for tourism and relaxation. They are also potential sources for water supply. Owu waterfall located at Isin Local Government, Kwara state, Nigeria is the highest waterfall in the West African region, yet none of its potential usefulness has been fully exploited. Water samples were taken from two sections of the fall and were analyzed for various water quality parameters. The results obtained include pH (6.71 ± 0.1), Biochemical oxygen demand (4.2 ± 0.5 mg/l), Chemical oxygen demand (3.07 ± 0.01 mg/l), Dissolved oxygen (6.59 ± 0.6 mg/l), Turbidity (4.43 ± 0.11 NTU), Total dissolved solids (8.2 ± 0.09 mg/l), Total suspended solids (18.25 ± 0.5 mg/l), Chloride ion (0.48 ± 0.08 mg/l), Calcium ion (0.82 ± 0.02 mg/l)), Magnesium ion (0.63 ± 0.03 mg/l) and Nitrate ion (1.25 ± 0.01 mg/l). The results were compared to the World Health Organisations standard for drinking water and the Nigerian standard for drinking water. From the comparison, it can be deduced that due to the Biochemical oxygen demand value, the water is not suitable for drinking unless it undergoes treatment. However, it is suitable for other classes of water usage.

Keywords: Owu falls, waterfall, water quality, water quality parameters, water use

Procedia PDF Downloads 163
10817 Information Security Dilemma: Employees' Behaviour on Three-Dimensions to Failure

Authors: Dyana Zainudin, Atta Ur-Rahman, Thaier Hamed

Abstract:

This paper explains about human nature concept as to understand the significance of information security in employees’ mentality including leaders in an organisation. By studying on a theory concept of the latest Von Solms fourth waves, information security governance basically refers to the concept of a set of methods, techniques and tools that responsible for protecting resources of a computer system to ensure service availability, confidentiality and integrity of information. However, today’s information security dilemma relates to the acceptance of employees mentality. The major causes are a lack of communication and commitment. These types of management in an organisation are labelled as immoral/amoral management which effects on information security compliance. A recovery action is taken based on ‘learn a lesson from incident events’ rather than prevention. Therefore, the paper critically analysed the Von Solms fourth waves’ theory with current human events and its correlation by studying secondary data and also from qualitative analysis among employees in public sectors. ‘Three-dimensions to failure’ of information security dilemma are explained as deny, don’t know and don’t care. These three-dimensions are the most common vulnerable behaviour owned by employees. Therefore, by avoiding the three-dimensions to failure may improve the vulnerable behaviour of employees which is often related to immoral/amoral management.

Keywords: information security management system, information security behaviour, information security governance, information security culture

Procedia PDF Downloads 192
10816 The Burden and the Consequences of Waste Management in Nigeria: Geophysical Approach

Authors: Joseph Omeiza Alao

Abstract:

The wobbly state of waste management and the high level of environmental irresponsibility is a threat to environmental security, which invariably endangered public health, regional groundwater systems and atmospheric condition. The dumping of waste materials in water bodies and gutters and the frequent burning of waste materials heaped at dumpsites as well depict the highest level of environmental indiscipline. These unruly human factors have compelled this study to apply four different techniques for environmental impact assessment and the possible public health risks of poor waste management in Nigeria. The techniques include a geophysical survey (resistivity data acquisition), dispatched questionnaire surveys, physiochemical water analysis and a physical survey of several dumpsites. While the resistivity data indicates high-level dumpsite leachate invading the ground soil down to the water table, the physiochemical water analysis depicts high content of BOD (401 – 711) mg/l, COD (731 – 1312) mg/l, TDS (419 – 1871) mg/l and heavy metals (0.014 – 1.971) mg/l present in the regional groundwater systems, which have altered the chemistry of the regional groundwater. The resistivity data shows that the overburdened soil layer overlaying the regional groundwater systems was very low (4.5 Ωm – 151 Ωm) as against the existing data (180 Ωm – 3500 Ωm). However, the physical surveys and the dispatched questionnaire surveys explore the depth of environmental irresponsibility among the citizen. While the imprints of gross environmental indiscipline may be absolutely irreversible, adequate knowledge of the environmental implications of careless waste disposal. After a critical examination of the current waste management strategies in Nigeria, the study suggests a future direction for environmental security and sustainability. Several influential regional factors, such as geology, climatic conditions, and hydrology, were also discussed.

Keywords: groundwater, environmental indiscipline, waste management, water analysis, leachate plumes, public health

Procedia PDF Downloads 59
10815 Cloud Computing Security for Multi-Cloud Service Providers: Controls and Techniques in Our Modern Threat Landscape

Authors: Sandesh Achar

Abstract:

Cloud computing security is a broad term that covers a variety of security concerns for organizations that use cloud services. Multi-cloud service providers must consider several factors when addressing security for their customers, including identity and access management, data at rest and in transit, egress and ingress traffic control, vulnerability and threat management, and auditing. This paper explores each of these aspects of cloud security in detail and provides recommendations for best practices for multi-cloud service providers. It also discusses the challenges inherent in securing a multi-cloud environment and offers solutions for overcoming these challenges. By the end of this paper, readers should have a good understanding of the various security concerns associated with multi-cloud environments in the context of today’s modern cyber threats and how to address them.

Keywords: multi-cloud service, system organization control, data loss prevention, identity and access management

Procedia PDF Downloads 85
10814 A Security Study for Smart Metering Systems

Authors: Musaab Hasan, Farkhund Iqbal, Patrick C. K. Hung, Benjamin C. M. Fung, Laura Rafferty

Abstract:

In modern societies, the smart cities concept raised simultaneously with the projection towards adopting smart devices. A smart grid is an essential part of any smart city as both consumers and power utility companies benefit from the features provided by the power grid. In addition to advanced features presented by smart grids, there may also be a risk when the grids are exposed to malicious acts such as security attacks performed by terrorists. Considering advanced security measures in the design of smart meters could reduce these risks. This paper presents a security study for smart metering systems with a prototype implementation of the user interfaces for future works.

Keywords: security design, smart city, smart meter, smart grid, smart metering system

Procedia PDF Downloads 316
10813 Averting Food Crisis in Nigeria and Beyond, Activities of the National Food Security Programme

Authors: Musa M. Umar, S. G. Ado

Abstract:

The paper examines the activities of the National Programme for food security (NPFS) for averting food insecurity in Nigeria and beyond. The components of the NPFS include site development, outreach, community development and management support. On each site, core activities comprise crop productivity, production diversification and agro-processing. The outreach activities consist of inputs and commodity marketing, rural finance, strengthening research-extension-farmers-inputs linkages, health and nutrition and expansion of site activities. The community development activities include small-scale rural infrastructure, micro-earth dams and community forestry. The overall benefits include food security, improved productivity, marketing and processing, enhanced land and water use, increased animal production and fish catches, improved nutrition, reduction in post-harvest losses and value addition, improved rural infrastructure and diversification of production leading to improved livelihood. The NPFS would poster sustained development of small-holder agricultural and income generation.

Keywords: food-security, community development, post-harvest, production

Procedia PDF Downloads 343
10812 Sharing Experience in Authentic Learning for Mobile Security

Authors: Kai Qian, Lixin Tao

Abstract:

Mobile devices such as smartphones are getting more and more popular in our daily lives. The security vulnerability and threat attacks become a very emerging and important research and education topic in computing security discipline. There is a need to have an innovative mobile security hands-on laboratory to provide students with real world relevant mobile threat analysis and protection experience. This paper presents an authentic teaching and learning mobile security approach with smartphone devices which covers most important mobile threats in most aspects of mobile security. Each lab focuses on one type of mobile threats, such as mobile messaging threat, and conveys the threat analysis and protection in multiple ways, including lectures and tutorials, multimedia or app-based demonstration for threats analysis, and mobile app development for threat protections. This authentic learning approach is affordable and easily-adoptable which immerse students in a real world relevant learning environment with real devices. This approach can also be applied to many other mobile related courses such as mobile Java programming, database, network, and any security relevant courses so that can learn concepts and principles better with the hands-on authentic learning experience.

Keywords: mobile computing, Android, network, security, labware

Procedia PDF Downloads 390
10811 Environmental Refugees in Africa: A Case Study of Sahel Region

Authors: Ahlem Setrallah

Abstract:

Environment has become a phenomenon directly linked to security in recent decades. This security aspect of environment is justified by the challenges that environment problems can have on human life and thus security especially within the scope of human security that is based mainly on the individual rather than on the state. Because Africa is not safe from the global warming and all its consequences on environment, this continent has witnessed many crises related to environment and that have had direct impact on security in Africa. One of those crises is environmental displacement or immigration which was caused by natural disasters like draught, desertification and food shortage to name but a few. This paper aims at shedding light at some important cases in the Africa focusing mainly on the Sahel region. The main research questions that we are trying to answer are the following: 1-What is the relationship between environment and forced immigration in the Sahel region? 2-What is the impact of environmental immigration on Security in the region? 3-How have the states in this region reacted to this crisis? 4-Is the measures taken by those states adequate or not? 5- How to remedy for the limitations of those measures? The paper is based on case study methodology as a way to better understand the relationship between security and environment using library research for data collection and analysis. This paper aims also at presenting some suggesting regarding possible ways of reducing the negative impact of environmental immigration.

Keywords: environment, refugees, Sahel region, security

Procedia PDF Downloads 453
10810 Ecological-Economics Evaluation of Water Treatment Systems

Authors: Hwasuk Jung, Seoi Lee, Dongchoon Ryou, Pyungjong Yoo, Seokmo Lee

Abstract:

The Nakdong River being used as drinking water sources for Pusan metropolitan city has the vulnerability of water management due to the fact that industrial areas are located in the upper Nakdong River. Most citizens of Busan think that the water quality of Nakdong River is not good, so they boil or use home filter to drink tap water, which causes unnecessary individual costs to Busan citizens. We need to diversify water intake to reduce the cost and to change the weak water source. Under this background, this study was carried out for the environmental accounting of Namgang dam water treatment system compared to Nakdong River water treatment system by using emergy analysis method to help making reasonable decision. Emergy analysis method evaluates quantitatively both natural environment and human economic activities as an equal unit of measure. The emergy transformity of Namgang dam’s water was 1.16 times larger than that of Nakdong River’s water. Namgang Dam’s water shows larger emergy transformity than that of Nakdong River’s water due to its good water quality. The emergy used in making 1 m3 tap water from Namgang dam water treatment system was 1.26 times larger than that of Nakdong River water treatment system. Namgang dam water treatment system shows larger emergy input than that of Nakdong river water treatment system due to its construction cost of new pipeline for intaking Namgang daw water. If the Won used in making 1 m3 tap water from Nakdong river water treatment system is 1, Namgang dam water treatment system used 1.66. If the Em-won used in making 1 m3 tap water from Nakdong river water treatment system is 1, Namgang dam water treatment system used 1.26. The cost-benefit ratio of Em-won was smaller than that of Won. When we use emergy analysis, which considers the benefit of a natural environment such as good water quality of Namgang dam, Namgang dam water treatment system could be a good alternative for diversifying intake source.

Keywords: emergy, emergy transformity, Em-won, water treatment system

Procedia PDF Downloads 286
10809 The Acceptance of E-Assessment Considering Security Perspective: Work in Progress

Authors: Kavitha Thamadharan, Nurazean Maarop

Abstract:

The implementation of e-assessment as tool to support the process of teaching and learning in university has become a popular technological means in universities. E-Assessment provides many advantages to the users especially the flexibility in teaching and learning. The e-assessment system has the capability to improve its quality of delivering education. However, there still exists a drawback in terms of security which limits the user acceptance of the online learning system. Even though there are studies providing solutions for identified security threats in e-learning usage, there is no particular model which addresses the factors that influences the acceptance of e-assessment system by lecturers from security perspective. The aim of this study is to explore security aspects of e-assessment in regard to the acceptance of the technology. As a result a conceptual model of secure acceptance of e-assessment is proposed. Both human and security factors are considered in formulation of this conceptual model. In order to increase understanding of critical issues related to the subject of this study, interpretive approach involving convergent mixed method research method is proposed to be used to execute the research. This study will be useful in providing more insightful understanding regarding the factors that influence the user acceptance of e-assessment system from security perspective.

Keywords: secure technology acceptance, e-assessment security, e-assessment, education technology

Procedia PDF Downloads 448
10808 Engaging with Security and State from a Gendered Lens in the South Asian Context: Indian State’s Construction of Internal Security and State Responses

Authors: Pooja Bakshi

Abstract:

In the following paper, an attempt would be made to engage with the relationship between the state and the imperatives of security from a gendered lens. This will be juxtaposed with the feminist engagement with International Law. Theorizations from the literature on South Asian politics and Global politics would be applied to the manner in which the Indian state has defined and proposed to deal with concerns of internal security pertaining to the ‘Left Wing Extremism’ in 2010-2011. It would be argued that the state needs to be disaggregated into the legislature, executive and the judiciary; since there are times when some institutional parts of the state provide space for progressive democratic engagement whilst other institutions don’t. The specific contours of violence faced by women and children at the hands of the state, in the above-mentioned discourse would also be examined. In the end, implications of the security state discourse on debates in International Law would be elaborated.

Keywords: feminist engagement, human rights, state response to left extremism, security studies in South Asia

Procedia PDF Downloads 484
10807 Water Self Sufficient: Creating a Sustainable Water System Based on Urban Harvest Approach in La Serena, Chile

Authors: Zulfikar Dinar Wahidayat Putra

Abstract:

Water scarcity become a major challenge in an arid area. One of the arid areas is La Serena city in the Northern Chile which become a case study of this paper. Based on that, this paper tries to identify a sustainable water system by using urban harvest approach as a method to achieve water self-sufficiency for a neighborhood area in the La Serena city. By using the method, it is possible to create sustainable water system in the neighborhood area by reducing up to 38% of water demand and 94% of wastewater production even though water self-sufficient cannot be fully achieved, because of its dependency to the drinking water supply from water treatment plant of La Serena city.

Keywords: arid area, sustainable water system, urban harvest approach, self-sufficiency

Procedia PDF Downloads 254
10806 Technical and Economical Feasibility Analysis of Solar Water Pumping System - Case Study in Iran

Authors: A. Gharib, M. Moradi

Abstract:

The technical analysis of using solar energy and electricity for water pumping in the Khuzestan province in Iran is investigated. For this purpose, the ecological conditions such as the weather data, air clearness and sunshine hours are analyzed. The nature of groundwater in the region was examined in terms of depth, static and dynamic head, water pumping rate. Three configurations for solar water pumping system were studied in this thesis; AC solar water pumping with a storage battery, AC solar water pumping with a storage tank, and DC direct solar water pumping.

Keywords: technical and economic feasibility, solar energy, photovoltaic systems, solar water pumping system

Procedia PDF Downloads 553
10805 Pollution-Sources, Controls, and Impact Analysis

Authors: Aditi Acharya

Abstract:

Environmental pollution is threatening the environmental and human health in the most drastic way. This paper provides insight about the affects of environmental pollution in the perspective of water pollution. Sewage in drinking water, the increasing contamination of water bodies and water resources and the human beings are the major contributors, increasing the harsh activities of pollution. The research presents information about the sources of pollution, its impacts and control activities to be undertaken to make our environment free from water pollution.

Keywords: environmental pollution, water pollution, nanotechnology, nanomaterials

Procedia PDF Downloads 352
10804 The Application of Nuclear Energy for Sustainable Agriculture and Food Security: A Review

Authors: Gholamreza Farrokhi, Behzad Sani

Abstract:

The goals of sustainable agricultural are development, improved nutrition, and food security. Sustainable agriculture must be developed that will meet today’s needs for food and other products, as well as preserving the vital natural resource base that will allow future generations to meet their needs. Sustainable development requires international cooperation and the effective use of technology. Access to sustainable sources of food will remain a preeminent challenge in the decades to come. Based upon current practice and consumption, agricultural production will have to increase by about 70% by 2050 to meet demand. Nuclear techniques are used in developing countries to increase production sustainably by breeding improved crops, enhancing livestock reproduction and nutrition, as well as controlling animal and plant pests and diseases. Post-harvest losses can be reduced and safety increased with nuclear technology. Soil can be evaluated with nuclear techniques to conserve and improve soil productivity and water management.

Keywords: food safety, food security, nuclear techniques, sustainable agriculture, sustainable future

Procedia PDF Downloads 345
10803 An Exploration of Anti-Terrorism Laws in Nigeria

Authors: Sani Mohammed Adam

Abstract:

This work seeks to review the security challenges facing Nigeria and explore the relevance of laws and policies in tackling the menace. The work looks at the adequacy of available legislations and the functionality of relevant institutions such as the Armed Forces, the Nigeria Police Force, the State Security Service, the Defence Intelligence Agency and the Nigerian Intelligence Agency etc. Comparisons would be made with other jurisdictions, such as inter alia, the Homeland Security in the USA and Counter Terrorism Laws of the United Kingdom. Recommendations would be made on how to strengthen both institutions and laws to curtail the growth of Terrorism in Nigeria.

Keywords: legislations, Nigeria, security, terrorism

Procedia PDF Downloads 665
10802 Evaluation of the Potability Qualities of Pretreated Distilled Water Produced from Biomass Fuelled Water Distiller

Authors: E. I. Oluwasola, J. A. V. Famurewa, R. Aboloma, K. Adesina

Abstract:

Water samples with pretreatment and without pretreatment were obtained from locally constructed biomass fuelled stainless steel water distiller. The water samples were subjected to Microbial, Physicochemical and Minerals analyses for comparison with NAFDAC and WHO Standards for potable water. The results of the physicochemical and microbiological properties of the raw water(A), and the two distilled water samples (B; distill water without pretreatment) and (C; distill water with pretreatment) showed reduction in most of the quality parameters evaluated in the distilled water samples to the level that conforms to the W.H.O standards for drinking water however, lower values were obtained for the pretreated distilled water sample. The values of 0.0016mg/l, 0.0052mg/l and 0.0528mg/l for the arsenic, chromium and lead content respectively in the raw water were within the permissible limit specified by WHO however; the values of cadmium (0.067mg/l) and mercury (0.0287mg/l) are above the maximum tolerable for drinking water thus, making the raw water unsafe for human consumption. Similarly, the high total plate count (278cfu /ml) and coliform count (1100/100ml) indicate that the raw water is potentially harmful while the distilled water samples showed nil coliform count and low total plate count (35cfu/ml,18cfu/ml) for B and C respectively making the distilled water microbiologically safer for human consumption.

Keywords: biomass, distillation, mineral, potable, physicochemical

Procedia PDF Downloads 482
10801 Innovative Method for Treating Oil-Produced Water with Low Operating Cost

Authors: Maha Salman, Gada Al-Nuwaibit, Ahmed Al-Haji, Saleh Al-Haddad, Abbas Al-Mesri, Mansour Al-Rugeeb

Abstract:

The high salinity of oil-produced water and its complicated chemical composition, makes designing a suitable treatment system for oil-produced water is extremely difficult and costly. On the current study, a new innovative method was proposed to treat the complicated oil-produced water through a simple mixing with brine stream produced from waste water treatment plant. The proposal will investigate the scaling potential of oil-produce water, seawater and the selected brine water (BW) produced from Sulaibiya waste water treatment and reclamation plant (SWWTRP) before and after the mixing with oil-produced water, and will calculate the scaling potential of all expected precipitated salts using different conversion and different % of mixing to optimize the % of mixing between the oil-produced water and the selected stream. The result shows a great, feasible and economic solution to treat oil produced with a very low capital cost.

Keywords: brine water, oil-produced water, scaling potential, Sulaibiyah waste water and reclaminatin plant

Procedia PDF Downloads 432