Search results for: port safety and security
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 6112

Search results for: port safety and security

4192 Rural Households’ Resilience to Food Insecurity in Niger

Authors: Aboubakr Gambo, Adama Diaw, Tobias Wunscher

Abstract:

This study attempts to identify factors affecting rural households’ resilience to food insecurity in Niger. For this, we first create a resilience index by using Principal Component Analysis on the following five variables at the household level: income, food expenditure, duration of grain held in stock, livestock in Tropical Livestock Units and number of farms exploited and second apply Structural Equation Modelling to identify the determinants. Data from the 2010 National Survey on Households’ Vulnerability to Food Insecurity done by the National Institute of Statistics is used. The study shows that asset and social safety nets indicators are significant and have a positive impact on households’ resilience. Climate change approximated by long-term mean rainfall has a negative and significant effect on households’ resilience to food insecurity. The results indicate that to strengthen households’ resilience to food insecurity, there is a need to increase assistance to households through social safety nets and to help them gather more resources in order to acquire more assets. Furthermore, early warning of climatic events could alert households especially farmers to be prepared and avoid important losses that they experience anytime an uneven climatic event occur.

Keywords: food insecurity, principal component analysis, structural equation modelling, resilience

Procedia PDF Downloads 361
4191 Psycholgical Contract Violation and Its Impact on Job Satisfaction Level: A Study on Subordinate Employees in Enterprises of Hanoi, Vietnam

Authors: Quangyen Tran, YeZhuang Tian, Chengfeng Li

Abstract:

Psychological contract violations may lead to damaging an organization through losing its potential employees; it is a very significant concept in understanding the employment relationships. The authors selected contents of psychological contract violation scale based on the nine areas of violation most relevant to managerial samples (High pay, training, job security, career development, pay based on performance, promotion, feedback, expertise and quality of co-workers and support with personal problems), using regression analysis, the degree of psychological contract violations was measured by an adaptation of a multiplicative scale with Cronbach’s alpha as a measure of reliability. Through the regression analysis, psychological contract violations was found have a positive impact on employees’ job satisfaction, the frequency of psychological contract violations was more intense among male employees particularly in terms of training, job security and pay based on performance. Job dissatisfaction will lead to a lowering of employee commitment in the job, enterprises in Hanoi, Vietnam should therefore offer lucrative jobs in terms of salary and other emoluments to their employees.

Keywords: psychological contract, psychological contract violation, job satisfaction, subordinate employees, employers’ obligation

Procedia PDF Downloads 325
4190 An Innovative Auditory Impulsed EEG and Neural Network Based Biometric Identification System

Authors: Ritesh Kumar, Gitanjali Chhetri, Mandira Bhatia, Mohit Mishra, Abhijith Bailur, Abhinav

Abstract:

The prevalence of the internet and technology in our day to day lives is creating more security issues than ever. The need for protecting and providing a secure access to private and business data has led to the development of many security systems. One of the potential solutions is to employ the bio-metric authentication technique. In this paper we present an innovative biometric authentication method that utilizes a person’s EEG signal, which is acquired in response to an auditory stimulus,and transferred wirelessly to a computer that has the necessary ANN algorithm-Multi layer perceptrol neural network because of is its ability to differentiate between information which is not linearly separable.In order to determine the weights of the hidden layer we use Gaussian random weight initialization. MLP utilizes a supervised learning technique called Back propagation for training the network. The complex algorithm used for EEG classification reduces the chances of intrusion into the protected public or private data.

Keywords: EEG signal, auditory evoked potential, biometrics, multilayer perceptron neural network, back propagation rule, Gaussian random weight initialization

Procedia PDF Downloads 409
4189 Geographic Information System-Based Identification of Road Traffic Crash Hotspots on Rural Roads in Oman

Authors: Mohammed Bakhit Kashoob, Mohammed Salim Al-Maashani, Ahmed Abdullah Al-Marhoon

Abstract:

The use of Geographic Information System (GIS) tools in the analysis of traffic crash data can help to identify locations or hotspots with high instances or risk of traffic crashes. The identification of traffic crash hotspots can effectively improve road safety measures. Mapping of road traffic crash hotspots can help the concerned authorities to give priority and take targeted measures and improvements to the road structure at these locations to reduce traffic crashes and fatalities. In Oman, there are countless rural roads that have more risks for traveling vehicles compared to urban roads. The likelihood of traffic crashes as well as fatality rate may increase with the presence of risks that are associated with the rural type of community. In this paper, the traffic crash hotspots on rural roads in Oman are specified using spatial analysis methods in GIS and traffic crash data. These hotspots are ranked based on the frequency of traffic crash occurrence (i.e., number of traffic crashes) and the rate of fatalities. The result of this study presents a map visualization of locations on rural roads with high traffic crashes and high fatalities rates.

Keywords: road safety, rural roads, traffic crash, GIS tools

Procedia PDF Downloads 149
4188 Computational Fluid Dynamics Simulation to Study the Effect of Ambient Temperature on the Ventilation in a Metro Tunnel

Authors: Yousef Almutairi, Yajue Wu

Abstract:

Various large-scale trends have characterized the current century thus far, including increasing shifts towards urbanization and greater movement. It is predicted that there will be 9.3 billion people on Earth in 2050 and that over two-thirds of this population will be city dwellers. Moreover, in larger cities worldwide, mass transportation systems, including underground systems, have grown to account for the majority of travel in those settings. Underground networks are vulnerable to fires, however, endangering travellers’ safety, with various examples of fire outbreaks in this setting. This study aims to increase knowledge of the impacts of extreme climatic conditions on fires, including the role of the high ambient temperatures experienced in Middle Eastern countries and specifically in Saudi Arabia. This is an element that is not always included when assessments of fire safety are made (considering visibility, temperatures, and flows of smoke). This paper focuses on a tunnel within Riyadh’s underground system as a case study and includes simulations based on computational fluid dynamics using ANSYS Fluent, which investigates the impact of various ventilation systems while identifying smoke density, speed, pressure and temperatures within this tunnel.

Keywords: fire, subway tunnel, CFD, mechanical ventilation, smoke, temperature, harsh weather

Procedia PDF Downloads 132
4187 Blockchain-Based Decentralized Architecture for Secure Medical Records Management

Authors: Saeed M. Alshahrani

Abstract:

This research integrated blockchain technology to reform medical records management in healthcare informatics. It was aimed at resolving the limitations of centralized systems by establishing a secure, decentralized, and user-centric platform. The system was architected with a sophisticated three-tiered structure, integrating advanced cryptographic methodologies, consensus algorithms, and the Fast Healthcare Interoperability Resources (HL7 FHIR) standard to ensure data security, transaction validity, and semantic interoperability. The research has profound implications for healthcare delivery, patient care, legal compliance, operational efficiency, and academic advancements in blockchain technology and healthcare IT sectors. The methodology adapted in this research comprises of Preliminary Feasibility Study, Literature Review, Design and Development, Cryptographic Algorithm Integration, Modeling the data and testing the system. The research employed a permissioned blockchain with a Practical Byzantine Fault Tolerance (PBFT) consensus algorithm and Ethereum-based smart contracts. It integrated advanced cryptographic algorithms, role-based access control, multi-factor authentication, and RESTful APIs to ensure security, regulate access, authenticate user identities, and facilitate seamless data exchange between the blockchain and legacy healthcare systems. The research contributed to the development of a secure, interoperable, and decentralized system for managing medical records, addressing the limitations of the centralized systems that were in place. Future work will delve into optimizing the system further, exploring additional blockchain use cases in healthcare, and expanding the adoption of the system globally, contributing to the evolution of global healthcare practices and policies.

Keywords: healthcare informatics, blockchain, medical records management, decentralized architecture, data security, cryptographic algorithms

Procedia PDF Downloads 55
4186 Nation Building versus Self Determination: Thai State’s Response to Insurgency in South

Authors: Sunaina Sunaina

Abstract:

The emergence of Thailand as a modern nation was amalgamation of several minority groups. Eventually, the nation tried to mitigate these diversities in the name of nationalism in the backdrop of colonial powers presence in neighboring nations. However, the continued imposition of modern nation building processes (which is a western concept) in the post-colonial era deepen the feelings of alienation among the minority groups and leads to separatist conflicts. It is significant that whatever form these conflicts take, will impact the security of nation as well as the region of Southeast Asia. This paper tries to explore the possible factors behind the state policies adopted by the government of Thailand to manage the insurgency in Southern provinces in the south. The protracted insurgency in the South has historical roots as Pattani kingdom had glorious period whether it was trade or commerce or education and its assimilation was never accepted by the leaders of these areas. But after assimilation of southern provinces in the state, it has been the state policy as an important factor in promoting or mitigating the insurgency. Initial protests from the elite class of southern provinces inflated into a more organized and violent uprising after Second World War. It was only the decade of 1990s that a relative peace could prevail for some time. The violence reemerged in 2004 with more intensity and till today this area is suffering with violence. Period of different Prime Ministers dealt this insurgency in different ways sometimes very hard line approach had been adopted especially under Primeminstership of Thaksin Shinawatra. Recently, the peace talks which were started during the period of Yinglunck Shinawatra and were carried forward by Junta government also halted. And again, the region stays in a very volatile state. Violence in these provinces not only questions the capability of government to provide political solution to the problem, but also emerges as a major threat to the internal security of the state. The current era where global terrorism is spreading fast, such vulnerable areas may work as a new ground for its proliferation in Southeast Asia. The paper attempts to understand how Thailand’s historical experience of security determines a different approach to national unity which limits the prospects for autonomy in the South. In conjunction with this experience it is nature of national politics and leadership that influences the nature of policies on the ground in Southern Thailand. The paper also tries to bring out conflict between state sovereignty and self-determination as demanded by many in the southern provinces.

Keywords: insurgency, southern Thailand, security, nation building

Procedia PDF Downloads 126
4185 Study of the Behavior of Copper Immersed in Sea Water of the Bay of Large Agadir by Electrochemical Methods

Authors: Aicha Chaouay, Lahsen Bazzi, Mustapha Hilali

Abstract:

Seawater has chemical and biological characteristics making it particularly aggressive in relation to the corrosion of many materials including copper and steels low or moderate allies. Note that these materials are widely used in the manufacture of port infrastructure in the marine environment. These structures are exposed to two types of corrosion including: general corrosion and localized corrosion caused by the presence of sulfite-reducing micro-organisms. This work contributes to the study of the problematic related to bacterial contamination of the marine environment of large Agadir and evaluating the impact of this pollution on the corrosion resistance of copper. For the realization of this work, we conducted monthly periodic draws between (October 2012 February 2013) of seawater from the Anza area of the Bay of Agadir. Thus, after each sampling, a study of the electro chemical corrosion behavior of copper was carried out. Electro chemical corrosion parameters such as the corrosion potential, the corrosion current density, the charge transfer resistance and the double layer capacity were evaluated. The electro chemical techniques used in this work are: the route potentiodynamic polarization curves and electro chemical impedance.

Keywords: Bay of Agadir, microbial contamination, seawater (Morocco), corrosion, copper

Procedia PDF Downloads 508
4184 India’s Deterrence Program: Defense or Development

Authors: Aneri Mehta, Krunal Mehta

Abstract:

A doctrine, any doctrine, incorporates a set of beliefs or principles held by a body of persons. A national nuclear doctrine represents, therefore, the collective set of beliefs or principles held by the nation in regard to the utility of its nuclear weapons. India’s foreign policy has been profoundly affected by the nuclear explosions conducted in May 1998. The departure from the professed peaceful nuclear policies has had several implications for India’s defense and foreign policies. The explosions in Pokhran have aggravated tensions in south Asia by disrupting diplomatic initiatives with Pak and China. Diplomacy has been reduced to damage control. The object of India’s nuclear deterrence is to persuade an adversary that the costs to him of seeking a military solution to his political problems with India will far outweigh the benefits. The paper focuses on India’s guidelines governing nuclear policy, development of nuclear materials for effective deterrence as well as civil development purpose. The paper finds that security concerns and technological capabilities are important determinants of whether India develops a nuclear weapons programs, while security concerns, economic capabilities, and domestic politics help to explain the possession of nuclear weapons.

Keywords: foreign policy, nuclear deterrence, nuclear policy, development

Procedia PDF Downloads 521
4183 Study on Control Techniques for Adaptive Impact Mitigation

Authors: Rami Faraj, Cezary Graczykowski, Błażej Popławski, Grzegorz Mikułowski, Rafał Wiszowaty

Abstract:

Progress in the field of sensors, electronics and computing results in more and more often applications of adaptive techniques for dynamic response mitigation. When it comes to systems excited with mechanical impacts, the control system has to take into account the significant limitations of actuators responsible for system adaptation. The paper provides a comprehensive discussion of the problem of appropriate design and implementation of adaptation techniques and mechanisms. Two case studies are presented in order to compare completely different adaptation schemes. The first example concerns a double-chamber pneumatic shock absorber with a fast piezo-electric valve and parameters corresponding to the suspension of a small unmanned aerial vehicle, whereas the second considered system is a safety air cushion applied for evacuation of people from heights during a fire. For both systems, it is possible to ensure adaptive performance, but a realization of the system’s adaptation is completely different. The reason for this is technical limitations corresponding to specific types of shock-absorbing devices and their parameters. Impact mitigation using a pneumatic shock absorber corresponds to much higher pressures and small mass flow rates, which can be achieved with minimal change of valve opening. In turn, mass flow rates in safety air cushions relate to gas release areas counted in thousands of sq. cm. Because of these facts, both shock-absorbing systems are controlled based on completely different approaches. Pneumatic shock-absorber takes advantage of real-time control with valve opening recalculated at least every millisecond. In contrast, safety air cushion is controlled using the semi-passive technique, where adaptation is provided using prediction of the entire impact mitigation process. Similarities of both approaches, including applied models, algorithms and equipment, are discussed. The entire study is supported by numerical simulations and experimental tests, which prove the effectiveness of both adaptive impact mitigation techniques.

Keywords: adaptive control, adaptive system, impact mitigation, pneumatic system, shock-absorber

Procedia PDF Downloads 90
4182 Mother-Child Attachment and Anxiety Symptoms in Middle Childhood: Differences in Levels of Attachment Security

Authors: Simran Sharda

Abstract:

There is increasing evidence that leads psychologists today to believe that the attachment formed between a mother and child plays a much more profound role in later-life outcomes than previously expected. Particularly, the fact that a link may exist between maternal attachment and the development in addition to the severity of social anxiety in middle childhood seems to be gaining ground. This research will examine and address a myriad of major issues related to the impact of mother-child attachment: behaviors of children with different levels of secure attachment, various aspects of anxiety in relation to attachment security as well as other styles of mother-child attachments, especially avoidant attachment and over-attachment. This analysis serves to compile previous literature on the subject and touch light upon a logical extension of the research. Moreover, researchers have identified links between attachment and the externalization of problem behaviors: these behaviors may later manifest as social anxiety as well as increased severity and likelihood of PTSD diagnosis (an anxiety disorder). Furthermore, secure attachment has been linked to increased health benefits, cognitive skills, emotive socialization, and developmental psychopathology.

Keywords: child development, anxiety, cognition, developmental psychopathology, mother-child relationships, maternal, cognitive development

Procedia PDF Downloads 159
4181 Uncontrolled Urbanization Leads to Main Challenge for Sustainable Development of Mongolia

Authors: Davaanyam Surenjav, Chinzolboo Dandarbaatar, Ganbold Batkhuyag

Abstract:

Primate city induced rapid urbanization has been become one of the main challenges in sustainable development in Mongolia like other developing countries since transition to market economy in 1990. According due to statistical yearbook, population number of Ulaanbaatar city has increased from 0.5 million to 1.5 million for last 30 years and contains now almost half (47%) of total Mongolian population. Rural-Ulaanbaatar and local Cities-Ulaanbaatar city migration leads to social issues like uncontrolled urbanization, income inequality, poverty, overwork of public service, economic over cost for redevelopment and limitation of transport and environmental degradation including air, noise, water and soil pollution. Most thresholds of all of the sustainable urban development main and sub-indicators over exceeded from safety level to unsafety level in Ulaanbaatar. So, there is an urgent need to remove migration pull factors including some administrative and high education functions from Ulaanbaatar city to its satellite cities or secondary cities. Moreover, urban smart transport system and green and renewable energy technologies should be introduced to urban development master plan of Ulaanbaatar city.

Keywords: challenge for sustainable urban development, migration factors, primate city , urban safety thresholds

Procedia PDF Downloads 130
4180 Public Wi-Fi Security Threat Evil Twin Attack Detection Based on Signal Variant and Hop Count

Authors: Said Abdul Ahad Ahadi, Elyas Baray, Nitin Rakesh, Sudeep Varshney

Abstract:

Wi-Fi is a widely used internet source that is used to provide internet access in many areas such as Stores, Cafes, University campuses, Restaurants and so on. This technology brought more facilities in communication and networking. On the other hand, due to the transmission of data over the air, which makes the network vulnerable, so it becomes prone to various threats such as Evil Twin and etc. The Evil Twin is a kind of adversary which impersonates a legitimate access point (LAP) as it can happen by spoofing the name (SSID) and MAC address (BSSID) of a legitimate access point (LAP). And this attack can cause many threats such as MITM, Service Interruption, Access point service blocking. Various Evil Twin Attack Detection Techniques are proposed, but they require additional hardware, or they require protocol modification. In this paper, we proposed a new technique based on Access Point’s two fingerprints, Received Signal Strength Indicator (RSSI) and Hop Count, that is hard to copy by an adversary. And we implemented the technique in a system called “ETDetector,” which can detect and prevent the attack.

Keywords: evil twin, LAP, SSID, Wi-Fi security, signal variation, ETAD, kali linux, scapy, python

Procedia PDF Downloads 143
4179 A Cohort Study of Early Cardiologist Consultation by Telemedicine on the Critical Non-STEMI Inpatients

Authors: Wisit Wichitkosoom

Abstract:

Objectives: To find out the more effect of early cardiologist consultation using a simple technology on the diagnosis and early proper management of patients with Non-STEMI at emergency department of district hospitals without cardiologist on site before transferred. Methods: A cohort study was performed in Udonthani general hospital at Udonthani province. From 1 October 2012–30 September 2013 with 892 patients diagnosed with Non-STEMI. All patients mean aged 46.8 years of age who had been transferred because of Non-STEMI diagnosed, over a 12 week period of studied. Patients whose transferred, in addition to receiving proper care, were offered a cardiologist consultation with average time to Udonthani hospital 1.5 hour. The main outcome measure was length of hospital stay, mortality at 3 months, inpatient investigation, and transfer rate to the higher facilitated hospital were also studied. Results: Hospital stay was significantly shorter for those didn’t consult cardiologist (hazard ratio 1.19; approximate 95% CI 1.001 to 1.251; p = 0.039). The 136 cases were transferred to higher facilitated hospital. No statistically significant in overall mortality between the groups (p=0.068). Conclusions: Early cardiologist consultant can reduce length of hospital stay for patients with cardiovascular conditions outside of cardiac center. The new basic technology can apply for the safety patient.

Keywords: critical, telemedicine, safety, non STEMI

Procedia PDF Downloads 418
4178 Impact of Unconditional Cash Transfer Scheme on the Food Security Status of the Elderly in Ekiti State, Nigeria

Authors: R. O. Babatunde, O. M. Igbalajobi, F. Matambalya

Abstract:

Moderate economic growth in developing and emerging countries has led to improvement in the food consumption and nutrition situation in the last two decades. Nevertheless, about 870 million people, with a quarter of them from Sub-Saharan Africa, are still suffering from hunger worldwide. As part of measures to reduce the widespread poverty and hunger, cash transfer programmes are now being implemented in many countries of the world. While nationwide cash transfer schemes are few in Sub-Saharan Africa generally, the available ones are more concentrated in East and Southern Africa. Much of the available literature on social protection had focused on the poverty impact of cash transfer schemes at the household level, with the larger proportion originating from Latin America. On the contrary, much less empirical studies have been conducted on the poverty impact of cash transfer in Sub-Saharan Africa, let alone on the food security and nutrition impact. To fill this gap in knowledge, this paper examines the impact of cash transfer on food security in Nigeria. As a case study, the paper analysed the Ekiti State Cash Transfer Scheme (ECTS). ECTS is an unconditional transfer scheme which was established in 2011 to directly provide cash transfer to elderly persons aged 65 years and above in Ekiti State of Nigeria. Using survey data collected in 2013, we analysed the impact of the scheme on food availability and dietary diversity of the beneficiary households. Descriptive and Propensity Score Matching (PSM) techniques were used to estimate the Average Treatment Effect (ATE) and Average Treatment Effect on the Treated (ATT) among the beneficiary and control groups. Thereafter, a model to test for the impact of participation in the cash transfer scheme on calorie availability and dietary diversity was estimated. The results indicate that while households in the sample are clearly vulnerable, there were statistically significant differences between the beneficiary and control groups. For instance, monthly expenditure, calorie availability and dietary diversity were significantly larger among the beneficiary and consequently, the prevalence and depth of hunger were lower in the group. Econometric results indicate that the cash transfer has a positive and significant effect on food availability and dietary diversity in the households. Expanding the coverage of the present scheme to cover all eligible households in the country and incorporating cash transfer into a comprehensive hunger reduction policy will make it to have a greater impact at improving food security among the most vulnerable households in the country.

Keywords: calorie availability, cash transfers, dietary diversity, propensity score matching

Procedia PDF Downloads 384
4177 A Preliminary Investigation on Factors that Influence Malaysian Road User’s Close Following Behaviour

Authors: Siti Hikmah Musthar, Ahmad Saifizul, Mohamed Rehan Karim, Jamilah Mohamad, Farah Fazlinda Mohamad

Abstract:

This paper aims to look at the situation of close following behaviour from the introductory phase before conducting a profound investigation and discussion on this subject. Close following behaviour is known as behaviour during when drivers follow front vehicle with headways lower than two-second. As such, the study of close-following is important due to the degree of negative consequences this behaviour can cause commonly identified as rear-end collision especially when road safety is concerned. This paper presents a preliminary results of close-following behaviour among selected respondents (n=515) in Peninsular Malaysia at selected highways and federal roads. Respondents were interviewed with survey questions tending to examine their actual driving behaviour related to close-following and their perception towards the subject of close following. Selected findings (four selected questions) are discussed in this paper of which identified as essential for deliberation (as opposed to other questions in the survey questionnaire) as far as a preliminary discussion is concerned. Through the statistical test of one-way ANOVA, study found that gender of drivers is not significant to influence drivers to close follow but instead, type of vehicle the respondent drives had more significant to influence drivers to have tendency to perform close following behaviour.

Keywords: close-following, driver behaviour, rear-end crash, road safety

Procedia PDF Downloads 420
4176 Silymarin Loaded Mesoporous Silica Nanoparticles: Preparation, Optimization, Pharmacodynamic and Oral Multi-Dose Safety Assessment

Authors: Sarah Nasr, Maha M. A. Nasra, Ossama Y. Abdallah

Abstract:

The present work aimed to prepare Silymarin loaded MCM-41 type mesoporous silica nanoparticles (MSNs) and to assess the system’s solubility enhancement ability on the pharmacodynamic performance of Silymarin as a hepatoprotective agent. MSNs prepared by soft-templating technique, were loaded with Silymarin, characterized for particle size, zeta potential, surface properties, DSC and XRPD. DSC and specific surface area data confirmed deposition of Silymarin in an amorphous state in MSNs’ pores. In-vitro drug dissolution testing displayed enhanced dissolution rate of Silymarin upon loading on MSNs. High dose Acetaminophen was then used to inflict hepatic injury upon albino male Wistar rats simultaneously receiving either free Silymarin, Silymarin loaded MSNs or blank MSNs. Plasma AST, ALT, albumin and total protein and liver homogenate content of TBARs or LDH as measures of antioxidant drug action were assessed for all animal groups. Results showed a significant superiority of Silymarin loaded MSNs to free drug in almost all parameters. Meanwhile prolonged administration of blank MSNs had no evident toxicity on rats.

Keywords: mesoporous silica nanoparticles, safety, solubility enhancement, silymarin

Procedia PDF Downloads 332
4175 The Phenomenon of Biofilm Formation and the Subsequent Management of Foodborne Pathogenic Bacteria

Authors: Raana Babadi Fathipour

Abstract:

Biofilms, those intricate structures of microbial aggregation that emerge as microorganisms adhere to animate or inanimate surfaces, possess an innate capacity to shield their inhabitants from adversities within the environment whilst fortifying their endurance against antimicrobial agents. This remarkable aspect facilitates the persistence and virulence of said microorganisms, establishing biofilm formation as an integral component of bacterial survival mechanisms. However, should foodborne pathogens adopt this mode of existence, the potentiality for foodborne disease infections becomes alarmingly intensified—an alarming prospect that harbors significant public health hazards and engenders deleterious economic ramifications. Thus, due to these consequences lurking on the horizon, extensive research concentrating upon comprehending biofilms and devising efficacious removal strategies assumes a position imbued with paramount importance within the realm of the food industry. The problem of food waste resulting from spoilage in the food industry continues to present a widespread challenge to both environmental sustainability and the security of our food supplies. In this comprehensive analysis, we delve into the formation of bacterial biofilms, highlighting the specific issues they pose within the realm of food production. Additionally, we provide an overview of various types of common foodborne pathogens that tend to thrive in these biofilms. Furthermore, we summarize existing strategies aimed at tackling or managing detrimental bacterial biofilm growth. We also introduce contemporary approaches that show promise in terms of controlling this issue and highlight their potential for further advancement. Ultimately, our focus lies on outlining prospects for future development as they pertain specifically to combatting bacterial biofilms within the field.

Keywords: foodborne pathogens, food safety, biofilm, resistance, quorum-sensing

Procedia PDF Downloads 58
4174 A Study on the Safety Evaluation of Pier According to the Water Level Change by the Monte-Carlo Method

Authors: Minho Kwon, Jeonghee Lim, Yeongseok Jeong, Donghoon Shin, Kiyoung Kim

Abstract:

Recently, global warming phenomenon has led to natural disasters caused by global environmental changes, and due to abnormal weather events, the frequency and intensity of heavy rain storm typhoons are increasing. Therefore, it is imperative to prepare for future heavy rain storms and typhoons. This study selects arbitrary target bridges and performs numerical analysis to evaluate the safety of bridge piers in the event that the water level changes. The numerical model is based on two-dimensional surface elements. Actual reinforced concrete was simulated by modeling concrete to include reinforcements, and a contact boundary model was applied between the ground and the concrete. The water level applied to the piers was considered at 18 levels between 7.5 m and 16.1 m. The elastic modulus, compressive strength, tensile strength, and yield strength of the reinforced concrete were calculated using 250 random combinations and numerical analysis was carried out for each water level. In the results of analysis, the bridge exceeded the stated limit at 15.0 m. At the maximum water level of 16.1m, the concrete’s failure rate was 35.2%, but the probability that the reinforcement would fail was 61.2%.

Keywords: Monte-Carlo method, pier, water level change, limit state

Procedia PDF Downloads 286
4173 A Regression Analysis Study of the Applicability of Side Scan Sonar based Safety Inspection of Underwater Structures

Authors: Chul Park, Youngseok Kim, Sangsik Choi

Abstract:

This study developed an electric jig for underwater structure inspection in order to solve the problem of the application of side scan sonar to underwater inspection, and analyzed correlations of empirical data in order to enhance sonar data resolution. For the application of tow-typed sonar to underwater structure inspection, an electric jig was developed. In fact, it was difficult to inspect a cross-section at the time of inspection with tow-typed equipment. With the development of the electric jig for underwater structure inspection, it was possible to shorten an inspection time over 20%, compared to conventional tow-typed side scan sonar, and to inspect a proper cross-section through accurate angle control. The indoor test conducted to enhance sonar data resolution proved that a water depth, the distance from an underwater structure, and a filming angle influenced a resolution and data quality. Based on the data accumulated through field experience, multiple regression analysis was conducted on correlations between three variables. As a result, the relational equation of sonar operation according to a water depth was drawn.

Keywords: underwater structure, SONAR, safety inspection, resolution

Procedia PDF Downloads 265
4172 On the Effectiveness of Electricity Market Development Strategies: A Target Model for a Developing Country

Authors: Ezgi Avci-Surucu, Doganbey Akgul

Abstract:

Turkey’s energy reforms has achieved energy security through a variety of interlinked measures including electricity, gas, renewable energy and energy efficiency legislation; the establishment of an energy sector regulatory authority; energy price reform; the creation of a functional electricity market; restructuring of state-owned energy enterprises; and private sector participation through privatization and new investment. However, current strategies, namely; “Electricity Sector Reform and Privatization Strategy” and “Electricity Market and Supply Security Strategy” has been criticized for various aspects. The present paper analyzes the implementation of the aforementioned strategies in the framework of generation scheduling, transmission constraints, bidding structure and general aspects; and argues the deficiencies of current strategies which decelerates power investments and creates uncertainties. We conclude by policy suggestions to eliminate these deficiencies in terms of price and risk management, infrastructure, customer focused regulations and systematic market development.

Keywords: electricity markets, risk management, regulations, balancing and settlement, bilateral trading, generation scheduling, bidding structure

Procedia PDF Downloads 553
4171 Parametric Study of Underground Opening Stability under Uncertainty Conditions

Authors: Aram Yakoby, Yossef H. Hatzor, Shmulik Pinkert

Abstract:

This work presents an applied engineering method for evaluating the stability of underground openings under conditions of uncertainty. The developed method is demonstrated by a comprehensive parametric study on a case of large-diameter vertical borehole stability analysis, with uncertainties regarding the in-situ stress distribution. To this aim, a safety factor analysis is performed for the stability of both supported and unsupported boreholes. In the analysis, we used analytic geomechanical calculations and advanced numerical modeling to evaluate the estimated stress field. In addition, the work presents the development of a boundary condition for the numerical model that fits the nature of the problem and yields excellent accuracy. The borehole stability analysis is studied in terms of (1) the stress ratio in the vertical and horizontal directions, (2) the mechanical properties and geometry of the support system, and (3) the parametric sensitivity. The method's results are studied in light of a real case study of an underground waste disposal site. The conclusions of this study focus on the developed method for capturing the parametric uncertainty, the definition of critical geological depths, the criteria for implementing structural support, and the effectiveness of further in-situ investigations.

Keywords: borehole stability, in-situ stress, parametric study, factor of safety

Procedia PDF Downloads 68
4170 Organisational Effectiveness and Its Implications for Seaports

Authors: Shadi Alghaffari, Hong-Oanh Nguyen, Peggy Chen, Hossein Enshaei

Abstract:

The main purpose of this study was to explore the role of organisational effectiveness (OE) in seaports. OE is an important managerial concept, one that is necessary for leaders and directors in any organisation to understand the output of their work. OE has been applied in many organisations; however, it is a vital concept in the port business. This paper examines various approaches and applications of the OE concept to business management, and describes benefits that are important and applicable to seaport management. This research reviews and classifies articles published in relevant journals and books between 1950 and 2016; from the general literature on OE to the narrower field of OE in seaports. Based on the extensive literature review, this study identifies and discusses several issues relevant to both practices and theories of this concept. The review concludes by presenting a gap in the literature, as it found only a limited amount of research that endeavours to clarify OE in the seaport sector. As a result of this gap, seaports suffer from a lack of empirical study and are largely neglected in this subject area. The implementation of OE in this research has led to the maritime sector interfacing with different disciplines in order to acquire the advantage of enhancing managerial knowledge and competing successfully in the international marketplace.

Keywords: literature review, maritime, organisational effectiveness, seaport management

Procedia PDF Downloads 342
4169 An Experimental Study for Assessing Email Classification Attributes Using Feature Selection Methods

Authors: Issa Qabaja, Fadi Thabtah

Abstract:

Email phishing classification is one of the vital problems in the online security research domain that have attracted several scholars due to its impact on the users payments performed daily online. One aspect to reach a good performance by the detection algorithms in the email phishing problem is to identify the minimal set of features that significantly have an impact on raising the phishing detection rate. This paper investigate three known feature selection methods named Information Gain (IG), Chi-square and Correlation Features Set (CFS) on the email phishing problem to separate high influential features from low influential ones in phishing detection. We measure the degree of influentially by applying four data mining algorithms on a large set of features. We compare the accuracy of these algorithms on the complete features set before feature selection has been applied and after feature selection has been applied. After conducting experiments, the results show 12 common significant features have been chosen among the considered features by the feature selection methods. Further, the average detection accuracy derived by the data mining algorithms on the reduced 12-features set was very slight affected when compared with the one derived from the 47-features set.

Keywords: data mining, email classification, phishing, online security

Procedia PDF Downloads 432
4168 Piracy in Southeast Asian Waters: Problems, Legal Measures and Way Forward

Authors: Ahmad Almaududy Amri

Abstract:

Southeast Asia is considered as an area which is important in terms of piratical studies. There are several reasons to this argument: firstly, it has the second highest figure of piracy attacks in the world from 2008 to 2012. Only the African Region transcends the number of piracies that were committed in Southeast Asia. Secondly, the geographical location of the region is very important to world trade. There are several sea lanes and straits which are normally used for international navigation mainly for trade purposes. In fact, there are six out of 25 busiest ports all over the world located in Southeast Asia. In ancient times, the main drivers of piracy were raiding for plunder and capture of slaves; however, in modern times, developments in politics, economics and even military technology have drastically altered the universal crime of piracy. There are a variety of motives behind modern day piracy including economic gains from receiving ransoms from government or ship companies, political and even terrorist reasons. However, it cannot be denied that piratical attacks persist and continue. States have taken measures both at the international and regional level in order to eradicate piratical attacks. The United Nations Convention on the Law of the Sea and the Convention on the Suppression of Unlawful Act against the Safety of Navigation served as the two main international legal frameworks in combating piracy. At the regional level, Regional Cooperation Agreement against Piracy and Armed Robbery and ASEAN measures are regard as prominent in addressing the piracy problem. This paper will elaborate the problems of piracy in Southeast Asia and examine the adequacy of legal frameworks at both the international and regional levels in order address the current legal measures in combating piracy. Furthermore, it will discuss current challenges in the implementation of anti-piracy measures at the international and regional levels as well as the way forward in addressing the issue.

Keywords: piracy, Southeast Asia, maritime security, legal frameworks

Procedia PDF Downloads 503
4167 Applications for Additive Manufacturing Technology for Reducing the Weight of Body Parts of Gas Turbine Engines

Authors: Liubov Magerramova, Mikhail Petrov, Vladimir Isakov, Liana Shcherbinina, Suren Gukasyan, Daniil Povalyukhin, Olga Klimova-Korsmik, Darya Volosevich

Abstract:

Aircraft engines are developing along the path of increasing resource, strength, reliability, and safety. The building of gas turbine engine body parts is a complex design and technological task. Particularly complex in the design and manufacturing are the casings of the input stages of helicopter gearboxes and central drives of aircraft engines. Traditional technologies, such as precision casting or isothermal forging, are characterized by significant limitations in parts production. For parts like housing, additive technologies guarantee spatial freedom and limitless or flexible design. This article presents the results of computational and experimental studies. These investigations justify the applicability of additive technologies (AT) to reduce the weight of aircraft housing gearbox parts by up to 32%. This is possible due to geometrical optimization compared to the classical, less flexible manufacturing methods and as-casted aircraft parts with over-insured values of safety factors. Using an example of the body of the input stage of an aircraft gearbox, visualization of the layer-by-layer manufacturing of a part based on thermal deformation was demonstrated.

Keywords: additive technologies, gas turbine engines, topological optimization, synthesis process

Procedia PDF Downloads 116
4166 Packet Fragmentation Caused by Encryption and Using It as a Security Method

Authors: Said Rabah Azzam, Andrew Graham

Abstract:

Fragmentation of packets caused by encryption applied on the network layer of the IOS model in Internet Protocol version 4 (IPv4) networks as well as the possibility of using fragmentation and Access Control Lists (ACLs) as a method of restricting network access to certain hosts or areas of a network.Using default settings, fragmentation is expected to occur and each fragment to be reassembled at the other end. If this does not occur then a high number of ICMP messages should be generated back towards the source host indicating that the packet is too large and that it needs to be made smaller. This result is also expected when the MTU is changed for certain links between devices.When using ACLs and packet fragments to restrict access to hosts or network segments it is possible that ACLs cannot be set up in this way. If ACLs cannot be setup to allow only fragments then it is a limitation of the hardware’s firmware holding back this particular method. If the ACL on the restricted switch can be set up in such a way to allow only fragments then a connection that forces packets to fragment should be allowed to pass through the ACL. This should then make a network connection to the destination machine allowing data to be sent to and from the destination machine. ICMP messages from the restricted access switch and host should also be blocked from being sent back across the link which will be shown in an SSH session into the switch.

Keywords: fragmentation, encryption, security, switch

Procedia PDF Downloads 336
4165 Interactions between Sodium Aerosols and Fission Products: A Theoretical Chemistry and Experimental Approach

Authors: Ankita Jadon, Sidi Souvi, Nathalie Girault, Denis Petitprez

Abstract:

Safety requirements for Generation IV nuclear reactor designs, especially the new generation sodium-cooled fast reactors (SFR) require a risk-informed approach to model severe accidents (SA) and their consequences in case of outside release. In SFRs, aerosols are produced during a core disruptive accident when primary system sodium is ejected into the containment and burn in contact with the air; producing sodium aerosols. One of the key aspects of safety evaluation is the in-containment sodium aerosol behavior and their interaction with fission products. The study of the effects of sodium fires is essential for safety evaluation as the fire can both thermally damage the containment vessel and cause an overpressurization risk. Besides, during the fire, airborne fission product first dissolved in the primary sodium can be aerosolized or, as it can be the case for fission products, released under the gaseous form. The objective of this work is to study the interactions between sodium aerosols and fission products (Iodine, toxic and volatile, being the primary concern). Sodium fires resulting from an SA would produce aerosols consisting of sodium peroxides, hydroxides, carbonates, and bicarbonates. In addition to being toxic (in oxide form), this aerosol will then become radioactive. If such aerosols are leaked into the environment, they can pose a danger to the ecosystem. Depending on the chemical affinity of these chemical forms with fission products, the radiological consequences of an SA leading to containment leak tightness loss will also be affected. This work is split into two phases. Firstly, a method to theoretically understand the kinetics and thermodynamics of the heterogeneous reaction between sodium aerosols and fission products: I2 and HI are proposed. Ab-initio, density functional theory (DFT) calculations using Vienna ab-initio simulation package are carried out to develop an understanding of the surfaces of sodium carbonate (Na2CO3) aerosols and hence provide insight on its affinity towards iodine species. A comprehensive study of I2 and HI adsorption, as well as bicarbonate formation on the calculated lowest energy surface of Na2CO3, was performed which provided adsorption energies and description of the optimized configuration of adsorbate on the stable surface. Secondly, the heterogeneous reaction between (I2)g and Na2CO3 aerosols were investigated experimentally. To study this, (I2)g was generated by heating a permeation tube containing solid I2, and, passing it through a reaction chamber containing Na2CO3 aerosol deposit. The concentration of iodine was then measured at the exit of the reaction chamber. Preliminary observations indicate that there is an effective uptake of (I2)g on Na2CO3 surface, as suggested by our theoretical chemistry calculations. This work is the first step in addressing the gaps in knowledge of in-containment and atmospheric source term which are essential aspects of safety evaluation of SFR SA. In particular, this study is aimed to determine and characterize the radiological and chemical source term. These results will then provide useful insights for the developments of new models to be implemented in integrated computer simulation tool to analyze and evaluate SFR safety designs.

Keywords: iodine adsorption, sodium aerosols, sodium cooled reactor, DFT calculations, sodium carbonate

Procedia PDF Downloads 215
4164 Importance of Location Selection of an Energy Storage System in a Smart Grid

Authors: Vanaja Rao

Abstract:

In the recent times, the need for the integration of Renewable Energy Sources (RES) in a Smart Grid is on the rise. As a result of this, associated energy storage systems are known to play important roles in sustaining the efficient operation of such RES like wind power and solar power. This paper investigates the importance of location selection of Energy Storage Systems (ESSs) in a Smart Grid. Three scenarios of ESS location is studied and analyzed in a Smart Grid, which are – 1. Near the generation/source, 2. In the middle of the Grid and, 3. Near the demand/consumption. This is explained with the aim of assisting any Distribution Network Operator (DNO) in deploying the ESSs in a power network, which will significantly help reduce the costs and time of planning and avoid any damages incurred as a result of installing them at an incorrect location of a Smart Grid. To do this, the outlined scenarios mentioned above are modelled and analyzed with the National Grid’s datasets of energy generation and consumption in the UK power network. As a result, the outcome of this analysis aims to provide a better overview for the location selection of the ESSs in a Smart Grid. This ensures power system stability and security along with the optimum usage of the ESSs.

Keywords: distribution networks, energy storage system, energy security, location planning, power stability, smart grid

Procedia PDF Downloads 299
4163 Contribution at Dimensioning of the Energy Dissipation Basin

Authors: M. Aouimeur

Abstract:

The environmental risks of a dam and particularly the security in the Valley downstream of it,, is a very complex problem. Integrated management and risk-sharing become more and more indispensable. The definition of "vulnerability “concept can provide assistance to controlling the efficiency of protective measures and the characterization of each valley relatively to the floods's risk. Security can be enhanced through the integrated land management. The social sciences may be associated to the operational systems of civil protection, in particular warning networks. The passage of extreme floods in the site of the dam causes the rupture of this structure and important damages downstream the dam. The river bed could be damaged by erosion if it is not well protected. Also, we may encounter some scouring and flooding problems in the downstream area of the dam. Therefore, the protection of the dam is crucial. It must have an energy dissipator in a specific place. The basin of dissipation plays a very important role for the security of the dam and the protection of the environment against floods downstream the dam. It allows to dissipate the potential energy created by the dam with the passage of the extreme flood on the weir and regularize in a natural manner and with more security the discharge or elevation of the water plan on the crest of the weir, also it permits to reduce the speed of the flow downstream the dam, in order to obtain an identical speed to the river bed. The problem of the dimensioning of a classic dissipation basin is in the determination of the necessary parameters for the dimensioning of this structure. This communication presents a simple graphical method, that is fast and complete, and a methodology which determines the main features of the hydraulic jump, necessary parameters for sizing the classic dissipation basin. This graphical method takes into account the constraints imposed by the reality of the terrain or the practice such as the one related to the topography of the site, the preservation of the environment equilibrium and the technical and economic side.This methodology is to impose the loss of head DH dissipated by the hydraulic jump as a hypothesis (free design) to determine all the others parameters of classical dissipation basin. We can impose the loss of head DH dissipated by the hydraulic jump that is equal to a selected value or to a certain percentage of the upstream total head created by the dam. With the parameter DH+ =(DH/k),(k: critical depth),the elaborate graphical representation allows to find the other parameters, the multiplication of these parameters by k gives the main characteristics of the hydraulic jump, necessary parameters for the dimensioning of classic dissipation basin.This solution is often preferred for sizing the dissipation basins of small concrete dams. The results verification and their comparison to practical data, confirm the validity and reliability of the elaborate graphical method.

Keywords: dimensioning, energy dissipation basin, hydraulic jump, protection of the environment

Procedia PDF Downloads 583