Search results for: coastal and marine tourism threats
1116 Context Aware Anomaly Behavior Analysis for Smart Home Systems
Authors: Zhiwen Pan, Jesus Pacheco, Salim Hariri, Yiqiang Chen, Bozhi Liu
Abstract:
The Internet of Things (IoT) will lead to the development of advanced Smart Home services that are pervasive, cost-effective, and can be accessed by home occupants from anywhere and at any time. However, advanced smart home applications will introduce grand security challenges due to the increase in the attack surface. Current approaches do not handle cybersecurity from a holistic point of view; hence, a systematic cybersecurity mechanism needs to be adopted when designing smart home applications. In this paper, we present a generic intrusion detection methodology to detect and mitigate the anomaly behaviors happened in Smart Home Systems (SHS). By utilizing our Smart Home Context Data Structure, the heterogeneous information and services acquired from SHS are mapped in context attributes which can describe the context of smart home operation precisely and accurately. Runtime models for describing usage patterns of home assets are developed based on characterization functions. A threat-aware action management methodology, used to efficiently mitigate anomaly behaviors, is proposed at the end. Our preliminary experimental results show that our methodology can be used to detect and mitigate known and unknown threats, as well as to protect SHS premises and services.Keywords: Internet of Things, network security, context awareness, intrusion detection
Procedia PDF Downloads 1911115 Numerical Simulation of the Flow around Wing-In-Ground Effect (WIG) Craft
Authors: A. Elbatran, Y. Ahmed, A. Radwan, M. Ishak
Abstract:
The use of WIG craft is representing an ambitious technology that will support in reducing time, effort, and money of the conventional marine transportation in the future. This paper investigates the aerodynamic characteristic of compound wing-in-ground effect (WIG) craft model. Drag coefficient, lift coefficient and Lift and drag ratio were studied numerically with respect to the ground clearance and the wing angle of attack. The modifications of the wing has been done in order to investigate the most suitable wing configuration that can increase the wing lift-to-drag ratio at low ground clearance. A numerical investigation was carried out in this research work using finite volume Reynolds-Averaged Navier-Stokes Equations (RANSE) code ANSYS CFX, Validation was carried out by using experiments. The experimental and the numerical results concluded that the lift to drag ratio decreased with the increasing of the ground clearance.Keywords: drag Coefficient, ground clearance, navier-stokes, WIG
Procedia PDF Downloads 3801114 Investigating Real Ship Accidents with Descriptive Analysis in Turkey
Authors: İsmail Karaca, Ömer Söner
Abstract:
The use of advanced methods has been increasing day by day in the maritime sector, which is one of the sectors least affected by the COVID-19 pandemic. It is aimed to minimize accidents, especially by using advanced methods in the investigation of marine accidents. This research aimed to conduct an exploratory statistical analysis of particular ship accidents in the Transport Safety Investigation Center of Turkey database. 46 ship accidents, which occurred between 2010-2018, have been selected from the database. In addition to the availability of a reliable and comprehensive database, taking advantage of the robust statistical models for investigation is critical to improving the safety of ships. Thus, descriptive analysis has been used in the research to identify causes and conditional factors related to different types of ship accidents. The research outcomes underline the fact that environmental factors and day and night ratio have great influence on ship safety.Keywords: descriptive analysis, maritime industry, maritime safety, ship accident statistics
Procedia PDF Downloads 1391113 Review of Friction Stir Welding of Dissimilar 5000 and 6000 Series Aluminum Alloy Plates
Authors: K. Subbaiah
Abstract:
Friction stir welding is a solid state welding process. Friction stir welding process eliminates the defects found in fusion welding processes. It is environmentally friend process. 5000 and 6000 series aluminum alloys are widely used in the transportation industries. The Al-Mg-Mn (5000) and Al-Mg-Si (6000) alloys are preferably offer best combination of use in Marine construction. The medium strength and high corrosion resistant 5000 series alloys are the aluminum alloys, which are found maximum utility in the world. In this review, the tool pin profile, process parameters such as hardness, yield strength and tensile strength, and microstructural evolution of friction stir welding of Al-Mg alloys 5000 Series and 6000 series have been discussed.Keywords: 5000 series and 6000 series Al alloys, friction stir welding, tool pin profile, microstructure and properties
Procedia PDF Downloads 4661112 Possibility of Agritourism Development for Sustainable Rural Development in Sri Lanka
Authors: Prasansha Kumari
Abstract:
Agritourism is a growing industry in many parts of the world. At present, agritourism is promoted by most of the countries in the world aiming at sustainable rural development. This study intends to identify and analyze the potential for agritourism development in Sri Lanka with special reference to five farming areas in Kegalle district. SWOT analysis used to identify the possibility of agritourism in this areas. The study rival that there are several opportunities to the development of agritourism while identified the main threat and weakness for developing agritourism in the study areas. The opportunities related to a number of tourist attraction places and increase the demand for agritourism. The main problems related to infrastructure facilities, large farming lands, knowledge and skill of farmers, government support, credits and financial assistance, attitude of young generation and environmental impact.Keywords: agritourism, sustainable rural development, farming, tourism
Procedia PDF Downloads 2751111 Perceptions of Cybersecurity in Government Organizations: Case Study of Bhutan
Authors: Pema Choejey, David Murray, Chun Che Fung
Abstract:
Bhutan is becoming increasingly dependent on Information and Communications Technologies (ICTs), especially the Internet for performing the daily activities of governments, businesses, and individuals. Consequently, information systems and networks are becoming more exposed and vulnerable to cybersecurity threats. This paper highlights the findings of the survey study carried out to understand the perceptions of cybersecurity implementation among government organizations in Bhutan. About 280 ICT personnel were surveyed about the effectiveness of cybersecurity implementation in their organizations. A questionnaire based on a 5 point Likert scale was used to assess the perceptions of respondents. The questions were asked on cybersecurity practices such as cybersecurity policies, awareness and training, and risk management. The survey results show that less than 50% of respondents believe that the cybersecurity implementation is effective: cybersecurity policy (40%), risk management (23%), training and awareness (28%), system development life cycle (34%); incident management (26%), and communications and operational management (40%). The findings suggest that many of the cybersecurity practices are inadequately implemented and therefore, there exist a gap in achieving a required cybersecurity posture. This study recommends government organizations to establish a comprehensive cybersecurity program with emphasis on cybersecurity policy, risk management, and awareness and training. In addition, the research study has practical implications to both government and private organizations for implementing and managing cybersecurity.Keywords: awareness and training, cybersecurity policy, risk management, security risks
Procedia PDF Downloads 3451110 Long Waves Inundating through and around an Array of Circular Cylinders
Authors: Christian Klettner, Ian Eames, Tristan Robinson
Abstract:
Tsunami is characterised by their very long time periods and can have devastating consequences when these inundate through built-up coastal regions as in the 2004 Indian Ocean and 2011 Tohoku Tsunami. This work aims to investigate the effect of these long waves on the flow through and around a group of buildings, which are abstracted to circular cylinders. The research approach used in this study was using experiments and numerical simulations. Large-scale experiments were carried out at HR Wallingford. The novelty of these experiments is (I) the number of bodies present (up to 64), (II) the long wavelength of the input waves (80 seconds) and (III) the width of the tank (4m) which gives the unique opportunity to investigate three length scales, namely the diameter of the building, the diameter of the array and the width of the tank. To complement the experiments, dam break flow past the same arrays is investigated using three-dimensional numerical simulations in OpenFOAM. Dam break flow was chosen as it is often used as a surrogate for the tsunami in previous research and is used here as there are well defined initial conditions and high quality previous experimental data for the case of a single cylinder is available. The focus of this work is to better understand the effect of the solid void fraction on the force and flow through and around the array. New qualitative and quantitative diagnostics are developed and tested to analyse the complex coupled interaction between the cylinders.Keywords: computational fluid dynamics, tsunami, forces, complex geometry
Procedia PDF Downloads 1951109 A Distributed Cryptographically Generated Address Computing Algorithm for Secure Neighbor Discovery Protocol in IPv6
Authors: M. Moslehpour, S. Khorsandi
Abstract:
Due to shortage in IPv4 addresses, transition to IPv6 has gained significant momentum in recent years. Like Address Resolution Protocol (ARP) in IPv4, Neighbor Discovery Protocol (NDP) provides some functions like address resolution in IPv6. Besides functionality of NDP, it is vulnerable to some attacks. To mitigate these attacks, Internet Protocol Security (IPsec) was introduced, but it was not efficient due to its limitation. Therefore, SEND protocol is proposed to automatic protection of auto-configuration process. It is secure neighbor discovery and address resolution process. To defend against threats on NDP’s integrity and identity, Cryptographically Generated Address (CGA) and asymmetric cryptography are used by SEND. Besides advantages of SEND, its disadvantages like the computation process of CGA algorithm and sequentially of CGA generation algorithm are considerable. In this paper, we parallel this process between network resources in order to improve it. In addition, we compare the CGA generation time in self-computing and distributed-computing process. We focus on the impact of the malicious nodes on the CGA generation time in the network. According to the result, although malicious nodes participate in the generation process, CGA generation time is less than when it is computed in a one-way. By Trust Management System, detecting and insulating malicious nodes is easier.Keywords: NDP, IPsec, SEND, CGA, modifier, malicious node, self-computing, distributed-computing
Procedia PDF Downloads 2781108 Quantum Cryptography: Classical Cryptography Algorithms’ Vulnerability State as Quantum Computing Advances
Authors: Tydra Preyear, Victor Clincy
Abstract:
Quantum computing presents many computational advantages over classical computing methods due to the utilization of quantum mechanics. The capability of this computing infrastructure poses threats to standard cryptographic systems such as RSA and AES, which are designed for classical computing environments. This paper discusses the impact that quantum computing has on cryptography, while focusing on the evolution from classical cryptographic concepts to quantum and post-quantum cryptographic concepts. Standard Cryptography is essential for securing data by utilizing encryption and decryption methods, and these methods face vulnerability problems due to the advancement of quantum computing. In order to counter these vulnerabilities, the methods that are proposed are quantum cryptography and post-quantum cryptography. Quantum cryptography uses principles such as the uncertainty principle and photon polarization in order to provide secure data transmission. In addition, the concept of Quantum key distribution is introduced to ensure more secure communication channels by distributing cryptographic keys. There is the emergence of post-quantum cryptography which is used for improving cryptographic algorithms in order to be more secure from attacks by classical and quantum computers. Throughout this exploration, the paper mentions the critical role of the advancement of cryptographic methods to keep data integrity and privacy safe from quantum computing concepts. Future research directions that would be discussed would be more effective cryptographic methods through the advancement of technology.Keywords: quantum computing, quantum cryptography, cryptography, data integrity and privacy
Procedia PDF Downloads 261107 The World Heritage List: A Big Data Spatial Econometrics Approach to Sites Promoting the Brand
Authors: David Wuepper, Marc Patry
Abstract:
UNESCO’s World Heritage program requests the inscribed locations to promote the World Heritage brand by clearly presenting information about it on-site. Based on feedback from over 319,000 visitors at 791 locations, we create an index that shows how much the World Heritage sites actually brand themselves as such. We find great heterogeneity throughout the list and explain this econometrically mostly with the economic benefit for the sites but also with cultural brand preferences, which are highest in Asia, followed by Europe and North America. We also find a positive relationship between World Heritage branding and conservation status and a U-shaped relationship between visitor numbers and WH branding. Based on our findings, we recommend to make clear World Heritage branding mandatory for all sites.Keywords: UNESCO World Heritage, collective brand, cultural tourism, heritage conservation, brand equity, spatial econometrics
Procedia PDF Downloads 5881106 Onboard Heat, Pressure and Boil-Off Gas Treatment for Stacked NGH Tank Containers
Authors: Hee Jin Kang
Abstract:
Despite numerous studies on the reserves and availability of natural gas hydrates, the technology of transporting natural gas hydrates in large quantities to sea has not been put into practical use. Several natural gas hydrate transport technologies presented by the International Maritime Organization (IMO) are under preparation for commercialization. Among them, NGH tank container concept modularized transportation unit to prevent sintering effect during sea transportation. The natural gas hydrate can be vaporized in a certain part during the transportation. Unprocessed BOG increases the pressure inside the tank. Also, there is a risk of fire if you export the BOG out of the tank without proper handling. Therefore, in this study, we have studied the concept of technology to properly process BOG to modularize natural gas hydrate and to transport it to sea for long distance. The study is expected to contribute to the practical use of NGH tank container, which is a modular transport concept proposed to solve the sintering problem that occurs when transporting natural gas hydrate in the form of bulk cargo.Keywords: Natural gas hydrate, tank container, marine transportation, boil-off gas
Procedia PDF Downloads 3391105 User’s Susceptibility Factors to Malware Attacks: A Systematic Literature Review
Authors: Awad A. Younis, Elise Stronberg, Shifa Noor
Abstract:
Malware attacks due to end-user vulnerabilities have been noticeably increased in the past few years. Investigating the factors that make an end-user vulnerable to those attacks is critical because they can be utilized to set up proactive strategies such as awareness and education to mitigate the impacts of those attacks. Some existing studies investigated demographic, behavioral, and cultural factors that make an end-user susceptible to malware attacks. However, it has been challenging to draw more general conclusions from individual studies due to the varieties in the type of end-users and different types of malware. Therefore, we conducted a systematic literature review (SLR) of the existing research for end-user susceptibility factors to malware attacks. The results showed while some demographic factors are mostly associated with malware infection regardless of the end users' type, age, and gender are not consistent among the same and different types of end-users. Besides, the association of culture and personality factors with malware infection are consistent in most of the selected studies and for all type of end-users. Moreover, malware infection varies based on age, geographic location, and host types. We propose that future studies should carefully take into consideration the type of end-users because different end users may be exposed to different threats or be targeted based on their user domains’ characteristics. Additionally, as different types of malware use different tactics to trick end-users, taking the malware types into consideration is important.Keywords: cybersecurity, malware, end-users, demographics, personality, culture, systematic literature review
Procedia PDF Downloads 2301104 Capability of Marine Macroalgae Chaetomorpha linum for Wastewater Phytoremediation and Biofuel Recovery
Authors: Zhipeng Chen, Lingfeng Wang, Shuang Qiu, Shijian Ge
Abstract:
Macroalgae are larger in size compared with microalgae; hence, they imposed lower separation and drying costs. To explore the potential for enhancing cultivation conditions in macroalgae Chaetomorpha linum (C. linum)-based bioreactor for nutrient recovery from municipal wastewaters and examine the biochemical composition of the macroalgae for the potential downstream production of biofuels, screening experiments were performed. This study suggested that C. linum grew well on primary (PW), secondary (SW), and centrate wastewater (CW). A step feeding approach was shown to significantly enhance biomass productivity when grown on 10% CW; meanwhile, nitrogen and phosphorus removal efficiencies increased to 86.8 ± 1.1% and 92.6 ± 0.2%, respectively. The CO₂-supplemented SW cultures were 1.20 times more productive than the corresponding controls without CO₂ supplementation. These findings demonstrate that C. linum could represent a promising and efficient wastewater treatment alternative which could also provide a feedstock for downstream processing to biofuels.Keywords: biofuel production, macroalgae, nutrient removal, wastewater
Procedia PDF Downloads 1651103 Performance Analysis of Traffic Classification with Machine Learning
Authors: Htay Htay Yi, Zin May Aye
Abstract:
Network security is role of the ICT environment because malicious users are continually growing that realm of education, business, and then related with ICT. The network security contravention is typically described and examined centrally based on a security event management system. The firewalls, Intrusion Detection System (IDS), and Intrusion Prevention System are becoming essential to monitor or prevent of potential violations, incidents attack, and imminent threats. In this system, the firewall rules are set only for where the system policies are needed. Dataset deployed in this system are derived from the testbed environment. The traffic as in DoS and PortScan traffics are applied in the testbed with firewall and IDS implementation. The network traffics are classified as normal or attacks in the existing testbed environment based on six machine learning classification methods applied in the system. It is required to be tested to get datasets and applied for DoS and PortScan. The dataset is based on CICIDS2017 and some features have been added. This system tested 26 features from the applied dataset. The system is to reduce false positive rates and to improve accuracy in the implemented testbed design. The system also proves good performance by selecting important features and comparing existing a dataset by machine learning classifiers.Keywords: false negative rate, intrusion detection system, machine learning methods, performance
Procedia PDF Downloads 1181102 Informative, Inclusive and Transparent Planning Methods for Sustainable Heritage Management
Authors: Mathilde Kirkegaard
Abstract:
The paper will focus on management of heritage that integrates the local community, and argue towards an obligation to integrate this social aspect in heritage management. By broadening the understanding of heritage, a sustainable heritage management takes its departure in more than a continual conservation of the physicality of heritage. The social aspect, or the local community, is in many govern heritage management situations being overlooked and it is not managed through community based urban planning methods, e.g.: citizen-inclusion, a transparent process, informative and inviting initiatives, etc. Historical sites are often being described by embracing terms such as “ours” and “us”: “our history” and “a history that is part of us”. Heritage is not something static, it is a link between the life that has been lived in the historical frames, and the life that is defining it today. This view on heritage is rooted in the strive to ensure that heritage sites, besides securing the national historical interest, have a value for those people who are affected by it: living in it or visiting it. Antigua Guatemala is a UNESCO-defined heritage site and this site is being ‘threatened’ by tourism, habitation and recreation. In other words: ‘the use’ of the site is considered a threat of the preservation of the heritage. Contradictory the same types of use (tourism and habitation) can also be considered development ability, and perhaps even a sustainable management solution. ‘The use’ of heritage is interlinked with the perspective that heritage sites ought to have a value for people today. In other words, the heritage sites should be comprised of a contemporary substance. Heritage is entwined in its context of physical structures and the social layer. A synergy between the use of heritage and the knowledge about the heritage can generate a sustainable preservation solution. The paper will exemplify this symbiosis with different examples of a heritage management that is centred around a local community inclusion. The inclusive method is not new in architectural planning and it refers to a top-down and bottom-up balance in decision making. It can be endeavoured through designs of an inclusive nature. Catalyst architecture is a planning method that strives to move the process of design solutions into the public space. Through process-orientated designs, or catalyst designs, the community can gain an insight into the process or be invited to participate in the process. A balance between bottom-up and top-down in the development process of a heritage site can, in relation to management measures, be understood to generate a socially sustainable solution. The ownership and engagement that can be created among the local community, along with the use that ultimately can gain an economic benefit, can delegate the maintenance and preservation. Informative, inclusive and transparent planning methods can generate a heritage management that is long-term due to the collective understanding and effort. This method handles sustainable management on two levels: the current preservation necessities and the long-term management, while ensuring a value for people today.Keywords: community, intangible, inclusion, planning
Procedia PDF Downloads 1181101 ADA Tool for Satellite InSAR-Based Ground Displacement Analysis: The Granada Region
Authors: M. Cuevas-González, O. Monserrat, A. Barra, C. Reyes-Carmona, R.M. Mateos, J. P. Galve, R. Sarro, M. Cantalejo, E. Peña, M. Martínez-Corbella, J. A. Luque, J. M. Azañón, A. Millares, M. Béjar, J. A. Navarro, L. Solari
Abstract:
Geohazard prone areas require continuous monitoring to detect risks, understand the phenomena occurring in those regions and prevent disasters. Satellite interferometry (InSAR) has come to be a trustworthy technique for ground movement detection and monitoring in the last few years. InSAR based techniques allow to process large areas providing high number of displacement measurements at low cost. However, the results provided by such techniques are usually not easy to interpret by non-experienced users hampering its use for decision makers. This work presents a set of tools developed in the framework of different projects (Momit, Safety, U-Geohaz, Riskcoast) and an example of their use in the Granada Coastal area (Spain) is shown. The ADA (Active Displacement Areas) tool have been developed with the aim of easing the management, use and interpretation of InSAR based results. It provides a semi-automatic extraction of the most significant ADAs through the application ADAFinder tool. This tool aims to support the exploitation of the European Ground Motion Service (EU-GMS), which will provide consistent, regular and reliable information regarding natural and anthropogenic ground motion phenomena all over Europe.Keywords: ground displacements, InSAR, natural hazards, satellite imagery
Procedia PDF Downloads 2191100 Biofilm Is Facilitator for Microplastic Ingestion in Green Mussel Perna Viridis
Authors: Yixuan Wang, A. C. Y. Wong, J. M. Y. Chiu, S. G. Cheung
Abstract:
After being released into the ocean, microplastics (MPs) are quickly colonized by microbes. The biofilm that forms on MPs alters their characteristics and perplexes users, including filter-feeders, some of whom choose to eat MPs that have biofilm. It has been proposed that filter feeders like mussels and other bivalves could serve as bioindicators of MP pollution. Mussels are considered selective feeders with particle sorting capability. Two sizes (27-32 µm and 90-106 µm), shapes (microspheres and microfibers), and types (polyethylene, polystyrene and polyester) of MPs were available for the green mussel, Perna viridis, at three concentrations (100 P/ml, 1000 P/ml and 10,000 P/ml). These MPs were incubated in the sea for 0, 3 or 14 days for biofilm development. The presence of the biofilm significantly affected the ingestion of MPs, and the mussels preferred MPs with biofilm, with a higher preference observed for biofilm with a longer incubation period. Additionally, the ingestion rate varied with the interaction between the concentration, size and form of MPs. The findings are discussed in relation to the possibility that mussels serve as MP bioindicators.Keywords: marine miroplastics, biofilm, bioindicator, green mussel perna viridis
Procedia PDF Downloads 601099 Legal Regulation of Personal Information Data Transmission Risk Assessment: A Case Study of the EU’s DPIA
Authors: Cai Qianyi
Abstract:
In the midst of global digital revolution, the flow of data poses security threats that call China's existing legislative framework for protecting personal information into question. As a preliminary procedure for risk analysis and prevention, the risk assessment of personal data transmission lacks detailed guidelines for support. Existing provisions reveal unclear responsibilities for network operators and weakened rights for data subjects. Furthermore, the regulatory system's weak operability and a lack of industry self-regulation heighten data transmission hazards. This paper aims to compare the regulatory pathways for data information transmission risks between China and Europe from a legal framework and content perspective. It draws on the “Data Protection Impact Assessment Guidelines” to empower multiple stakeholders, including data processors, controllers, and subjects, while also defining obligations. In conclusion, this paper intends to solve China's digital security shortcomings by developing a more mature regulatory framework and industry self-regulation mechanisms, resulting in a win-win situation for personal data protection and the development of the digital economy.Keywords: personal information data transmission, risk assessment, DPIA, internet service provider, personal information data transimission, risk assessment
Procedia PDF Downloads 611098 Design of a Customized Freshly-Made Fruit Salad and Juices Vending Machine
Authors: María Laura Guevara Campos
Abstract:
The increasing number of vending machines makes it easy for people to find them more frequently in stores, universities, workplaces, and even hospitals. These machines usually offer products with high contents of sugar and fat, which, if consumed regularly, can result in serious health threats, as overweight and obesity. Additionally, the energy consumption of these machines tends to be high, which has an impact on the environment as well. In order to promote the consumption of healthy food, a vending machine was designed to give the customer the opportunity to choose between a customized fruit salad and a customized fruit juice, both of them prepared instantly with the ingredients selected by the customer. The main parameters considered to design the machine were: the storage of the preferred fruits in a salad and/or in a juice according to a survey, the size of the machine, the use of ecologic recipients, and the overall energy consumption. The methodology used for the design was the one proposed by the German Association of Engineers for mechatronics systems, which breaks the design process in several stages, from the elaboration of a list of requirements through the establishment of the working principles and the design concepts to the final design of the machine, which was done in a 3D modelling software. Finally, with the design of this machine, the aim is to contribute to the development and implementation of healthier vending machines that offer freshly-made products, which is not being widely attended at present.Keywords: design, design methodology, mechatronics systems, vending machines
Procedia PDF Downloads 1331097 Exploring the Influence of Wind on Wildfire Behavior in China: A Data-Driven Study Using Machine Learning and Remote Sensing
Authors: Rida Kanwal, Wang Yuhui, Song Weiguo
Abstract:
Wildfires are one of the most prominent threats to ecosystems, human health, and economic activities, with wind acting as a critical driving factor. This study combines machine learning (ML) and remote sensing (RS) to assess the effects of wind on wildfires in Chongqing Province from August 16-23, 2022. Landsat 8 satellite images were used to estimate the difference normalized burn ratio (dNBR), representing prefire and postfire vegetation conditions. Wind data was analyzed through geographic information system (GIS) mapping. Correlation analysis between wind speed and fire radiative power (FRP) revealed a significant relationship. An autoregressive integrated moving average (ARIMA) model was developed for wind forecasting, and linear regression was applied to determine the effect of wind speed on FRP. The results identified high wind speed as a key factor contributing to the surge in FRP. Wind-rose plots showed winds blowing to the northwest (NW), aligning with the wildfire spread. This model was further validated with data from other provinces across China. This study integrated ML, RS, and GIS to analyze wildfire behavior, providing effective strategies for prediction and management.Keywords: wildfires, machine learning, remote sensing, wind speed, GIS, wildfire behavior
Procedia PDF Downloads 201096 Effects of PAHs on Blood Thyroidal Hormones of Liza klunzingeri in the Northern Part of Hormuz Strait (Persian Gulf)
Authors: Fateme Afkhami, Mohsen Ehsanpour, Maryam Ehsanpour, Majid Afkhami
Abstract:
This study was conducted to determine the effects of polycyclic aromatic hydrocarbons (PAHs) on thyroidal hormones of Liza klunzingeri and to monitor marine pollution from northern part of Hormuz strait (Persian Gulf). Results showed the highest total PAHs levels (268.56 µg/kg) were in the fish samples and the lowest are obtained from water samples (3.12 µg/kg). Also, highest of PAHs levels in fish, sediment and water were found in St3. There was a positive correlation between T3 and T4, with PAHs results. T4 had a significant positive correlation (P<0.05).Keywords: PAHs, thyroidal hormones, Liza klunzingeri, Hormuz Strait, Persian Gulf
Procedia PDF Downloads 7031095 Mass Pheromone Trapping on Red Palm Weevil, Rhynchophorus ferrugineus (Coleoptera: Curculionidae) in Oil Palm Plantations of Terengganu
Authors: Wahizatul Afzan Azmi, Nur Ain Farhah Ros Saidon Khudri, Mohamad Haris Hussain, Tse Seng Chuah
Abstract:
Malaysia houses a broad range of palm trees species and some of these palm trees are very crucial for the country’s social and economic development, especially the oil palm trees. However, the destructive pest of the various palms species, Rhynchophorus ferrugineus (Coleoptera: Curculionidae) or known as Red Palm Weevil (RPW) was first detected in Terengganu in 2007. Recently, the pattern of infestation has move from coastal lines toward inland areas. After the coconut plantations, it is presumed that the RPW will be a serious threat to the oil palm plantations in Malaysia. Thus, this study was carried out to detect the presence and distribution of Red Palm Weevil (RPW) in selected oil palm plantations of Terengganu. A total of 42 traps were installed in the three oil palm plantations in Terengganu and were inspected every week for two months. Oil palm plantation A collected significantly higher adults RPW compared to the other locations. Generally, females of RPW were significantly higher than male individuals. Females were collected more as the synthetic aggregation pheromone used, ferrugineol was synthesized from the male aggregation pheromone of adult RPW. Oil palm plantation A collected the highest number of RPW might be due to the abundance of soft part in the host plant as the oil palm trees age ranged between 6 to 10 years old. As a conclusion, RPW presence was detected in some oil palm plantations of Terengganu and immediate action is crucially needed before it is too late.Keywords: red palm weevil, pest, oil palm, pheromone
Procedia PDF Downloads 2111094 Pueblos Mágicos in Mexico: The Loss of Intangible Cultural Heritage and Cultural Tourism
Authors: Claudia Rodriguez-Espinosa, Erika Elizabeth Pérez Múzquiz
Abstract:
Since the creation of the “Pueblos Mágicos” program in 2001, a series of social and cultural events had directly affected the heritage conservation of the 121 registered localities until 2018, when the federal government terminated the program. Many studies have been carried out that seek to analyze from different perspectives and disciplines the consequences that these appointments have generated in the “Pueblos Mágicos.” Multidisciplinary groups such as the one headed by Carmen Valverde and Liliana López Levi, have brought together specialists from all over the Mexican Republic to create a set of diagnoses of most of these settlements, and although each one has unique specificities, there is a constant in most of them that has to do with the loss of cultural heritage and that is related to transculturality. There are several factors identified that have fostered a cultural loss, as a direct reflection of the economic crisis that prevails in Mexico. It is important to remember that the origin of this program had as its main objective to promote the growth and development of local economies since one of the conditions for entering the program is that they have less than 20,000 inhabitants. With this goal in mind, one of the first actions that many “Pueblos Mágicos” carried out was to improve or create an infrastructure to receive both national and foreign tourists since this was practically non-existent. Creating hotels, restaurants, cafes, training certified tour guides, among other actions, have led to one of the great problems they face: globalization. Although by itself it is not bad, its impact in many cases has been negative for heritage conservation. The entry into and contact with new cultures has led to the undervaluation of cultural traditions, their transformation and even their total loss. This work seeks to present specific cases of transformation and loss of cultural heritage, as well as to reflect on the problem and propose scenarios in which the negative effects can be reversed. For this text, 36 “Pueblos Mágicos” have been selected for study, based on those settlements that are cited in volumes I and IV (the first and last of the collection) of the series produced by the multidisciplinary group led by Carmen Valverde and Liliana López Levi (researchers from UNAM and UAM Xochimilco respectively) in the project supported by CONACyT entitled “Pueblos Mágicos. An interdisciplinary vision”, of which we are part. This sample is considered representative since it forms 30% of the total of 121 “Pueblos Mágicos” existing at that moment. With this information, the elements of its intangible heritage loss or transformation have been identified in every chapter based on the texts written by the participants of that project. Finally, this text shows an analysis of the effects that this federal program, as a public policy applied to 132 populations, has had on the conservation or transformation of the intangible cultural heritage of the “Pueblos Mágicos.” Transculturality, globalization, the creation of identities and the desire to increase the flow of tourists have impacted the changes that traditions (main intangible cultural heritage) have had in the 18 years that the federal program lasted.Keywords: public policies, cultural tourism, heritage preservation, pueblos mágicos program
Procedia PDF Downloads 1901093 A Review on the Perception of Beşiktaş Public Square
Authors: Neslinur Hizli, Berrak Kirbaş Akyürek
Abstract:
Beşiktaş, one of the historical coastal district of İstanbul, is on the very edge of the radical transformation because of an approaching ‘Beşiktaş Public Square Project’. At this juncture, due its location, presence on the coast, population density and distance to the other centers of the city, the decisions to be taken are critical to whole Istanbul that will be majorly affected from this transformation. As the new project aims to pedestrianize the area by placing the vehicular traffic under the ground, Beşiktaş and its square will change from top to bottom. Among those considerations, through the advantages and disadvantages the perception of the existing conditions of the Beşiktaş play significant role. The motive of this paper is the lack of determination and clarity on the cognition of the Square. After brief analysis on the historical transformation of the area, prominent studies on the criteria of public square are revised. Through cognitive mapping methodology, characteristics of the Square and the public space in general find a place to discuss from individual views. This study aims to discuss and review Beşiktaş Public Square from perspective, mind and behavior of the users. Cognitive map study with thirty subjects (30) is evaluated and categorized upon the five elements that Kevin Lynch defined as the images of the city. The results obtained digitized and represented with tables and graphs. Findings of the research underline the crucial issues on the approaching change in Beşiktaş. Thus, this study may help to develop comprehensive ideas and new suggestions on the Square.Keywords: Beşiktaş public square, cognitive map, perception, public space
Procedia PDF Downloads 2671092 The Business of American Football: The Kicker Position and Performance to Salary Correlation
Authors: James R. Ogden, Denise T. Ogden
Abstract:
The National Football League (USA) is the largest sporting business in the United States. In order to generate revenue, it is important that NFL teams win. Coaches, owners and general managers of the NFL teams want to create powerful teams with reliable players and they are willing to spend large amounts of money in order to do so. This research looks at one of the National Football League’s key players, the kicker. It would be intuitively obvious to suggest that those kickers who perform the best get paid the most. In this paper the researchers performed a correlation and regression analysis to determine if there is a correlation between an NFL kicker’s field goal percentage and salary. The research proposition was that higher performing kickers receive higher salaries. The data suggest that there is no correlation between salary and on-field performance.Keywords: business management, sports marketing, tourism, American football
Procedia PDF Downloads 3051091 Reducing Environmental Impact of Olive Oil Production in Sakaka City Using Combined Chemical, Physical, and Biological Treatment
Authors: Abdullah Alhajoj, Bassam Alowaiesh
Abstract:
This work aims to reduce the risks of discharging olive mill waste directly to the environment without treatment in Sakaka City, KSA. The organic loads expressed by chemical oxygen demand (COD) and biological oxygen demand (BOD) of the produced wastewater (OMWW) as well as the solid waste (OMW) were evaluated. The wastes emitted from the three-phase centrifuge decanters was found to be higher than that emitted from the two-phase centrifuge decanters. The olive mill wastewater (OMWW) was treated using advanced oxidation combined with filtration treatment. The results indicated that the concentration of COD, BOD, TSS, oil and grease and phenol was reduced by using complex sand filtration from 72150, 21660 10256, 36430, and 1470 mg/l to 980, 421, 58, 68, and 0.35 mg/l for three-phase OMWW and from 150562, 17955, 15325, 19658 and 2153 mg/l to 1050, 501, 29, 0.75, and 0.29 mg/l, respectively. While, by using modified trickling filter (packed with the neck of waste plastic bottles the concentration of the previously mentioned parameters was reduced to 1190, 570, 55, 0.85, and 0.3 mg/l, respectively. This work supports the application of such treatment technique for reducing the environmental threats of olive mill waste effluents in Saudi Arabia.Keywords: two-phase, three-phase, olive mill, olive oil, waste treatment, filtration, advanced oxidation, waste plastic bottles
Procedia PDF Downloads 1531090 Community-based Mapping as a Planning Tool; Examples from Pakistan
Authors: Noman Ahmed, Fariha Tahseen
Abstract:
Since several decades, unplanned urbanization and rapid growth of informal settlements have evolved and increased in size and number. Large cities such as Karachi have been impacted with sprawl and rising share of unplanned settlements where poor communities reside. Threats of eviction, deteriorating law and order situation, lack of essential amenities and infrastructure, extortion and bullying from local and non-local musclemen and feeble response of government agencies towards their development needs are some predicaments. Non-governmental organizations (NGOs) have caused important interventions in such locations. Appraisal of the community-based mapping as a tool in supporting the development work in less privileged areas in Karachi has been the objective of this research. The Orangi Pilot Project (OPP), under the leadership of its slain director Perween Rahman had a significant role to play in developing and extending this approach in low income locations in Karachi and beyond. The paper investigates the application of mapping in the process of peri urban land invasion causing rapid transformation of traditional settlements in Karachi. Mixed methodology components comprising literature review, archival research, and unstructured interviews with key informants and case studies have been used.Keywords: squatters (katchi abadis), land grabbing, community empowerment, housing rights, mapping, infrastructure development
Procedia PDF Downloads 3151089 On the Use of Machine Learning for Tamper Detection
Authors: Basel Halak, Christian Hall, Syed Abdul Father, Nelson Chow Wai Kit, Ruwaydah Widaad Raymode
Abstract:
The attack surface on computing devices is becoming very sophisticated, driven by the sheer increase of interconnected devices, reaching 50B in 2025, which makes it easier for adversaries to have direct access and perform well-known physical attacks. The impact of increased security vulnerability of electronic systems is exacerbated for devices that are part of the critical infrastructure or those used in military applications, where the likelihood of being targeted is very high. This continuously evolving landscape of security threats calls for a new generation of defense methods that are equally effective and adaptive. This paper proposes an intelligent defense mechanism to protect from physical tampering, it consists of a tamper detection system enhanced with machine learning capabilities, which allows it to recognize normal operating conditions, classify known physical attacks and identify new types of malicious behaviors. A prototype of the proposed system has been implemented, and its functionality has been successfully verified for two types of normal operating conditions and further four forms of physical attacks. In addition, a systematic threat modeling analysis and security validation was carried out, which indicated the proposed solution provides better protection against including information leakage, loss of data, and disruption of operation.Keywords: anti-tamper, hardware, machine learning, physical security, embedded devices, ioT
Procedia PDF Downloads 1531088 Isolation and Identification of Cytotoxic Compounds from Fruticose Lichen Roccella montagnei, and It’s in Silico Docking Study against CDK-10
Authors: Tripti Mishra, Shipra Shukla, Sanjeev Meena, , Ruchi Singh, Mahesh Pal, D. K. Upreti, Dipak Datta
Abstract:
Roccella montagnei belongs to lichen family Roccelleceae growing luxuriantly along the coastal regions of India. As Roccella has been shown to be bioactive, we prepared methanolic extract and assessed its anticancer potential. The methanolic extract showed significant in vitro cytotoxic activity against four human cancer cell lines such as Colon (DLD-1, SW-620), Breast (MCF-7), Head and Neck (FaDu). This prompted us to isolate bioactive compounds through column chromatography. Two compounds Roccellic acid and Everninic acid have been isolated, out of which Everninic acid is reported for the first time. Both the compounds have been tested for in vitro cytotoxic activity in which Roccellic acid showed strong anticancer activity as compared to the Everninic acid. CDK-10 (Cyclin-dependent kinase) contributes to proliferation of cancer cells, and aberrant activity of these kinases has been reported in a wide variety of human cancers. These kinases, therefore, constitute biomarkers of proliferation and attractive pharmacological targets for the development of anticancer therapeutics. Therefore both the isolated compounds were tested for in silico molecular docking study against CDK-10 isomer enzyme to support the cytotoxic activity.Keywords: cytotoxic activity, everninic acid, roccellic acid, R. montagnei
Procedia PDF Downloads 3261087 Study the Effect of Sensitization on the Microstructure and Mechanical Properties of Gas Tungsten Arc Welded AISI 304 Stainless Steel Joints
Authors: Viranshu Kumar, Hitesh Arora, Pradeep Joshi
Abstract:
SS 304 is Austenitic stainless steel with Chromium and Nickel as basic constituents. It has excellent corrosion resistance properties and very good weldability. Austenitic stainless steels have superior mechanical properties at high temperatures and are used extensively in a range of applications. SS 304L has wide applications in various industries viz. Nuclear, Pharmaceutical, marine, chemical etc. due to its excellent applications and ease of joining this material has become very popular for fabrication as well as weld surfacing. Austenitic stainless steels have a tendency to form chromium depleted zones at the grain boundaries during welding and heat treatment, where chromium combines with available carbon in the vicinity of the grain boundaries, to produce an area depleted in chromium, and thus becomes susceptible to intergranular corrosion. This phenomenon is known as sensitization.Keywords: sensitization, SS 304, GTAW, mechanical properties, carbideprecipitationHAZ, microstructure, micro hardness, tensile strength
Procedia PDF Downloads 398