Search results for: radiation protection
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 3636

Search results for: radiation protection

1506 The Concept of Anchor Hazard Potential Map

Authors: Sao-Jeng Chao, Chia-Yun Wei, Si-Han Lai, Cheng-Yu Huang, Yu-Han Teng

Abstract:

In Taiwan, the landforms are mainly dominated by mountains and hills. Many road sections of the National Highway are impossible to avoid problems such as slope excavation or slope filling. In order to increase the safety of the slope, various slope protection methods are used to stabilize the slope, especially the soil anchor technique is the most common. This study is inspired by the soil liquefaction potential map. The concept of the potential map is widely used. The typhoon, earth-rock flow, tsunami, flooded area, and the recent discussion of soil liquefaction have safety potential concepts. This paper brings the concept of safety potential to the anchored slope. Because the soil anchor inspection is only the concept of points, this study extends the concept of the point to the surface, using the Quantum GIS program to present the slope damage area, and depicts the slope appearance and soil anchor point with the slope as-built drawing. The soil anchor scores are obtained by anchor inspection data, and the low, medium and high potential areas are remitted by interpolation. Thus, the area where the anchored slope may be harmful is judged and relevant maintenance is provided. The maintenance units can thus prevent judgment and deal with the anchored slope as soon as possible.

Keywords: anchor, slope, potential map, lift-off test, existing load

Procedia PDF Downloads 135
1505 Healthcare Seeking Behaviors of Parents Who Have Children with Disabilities: A Case Study at the Effutu Municipality, Winneba-Central Region, Ghana-West Africa

Authors: Priscilla Deede Hammond

Abstract:

Healthcare seeking behaviour has emerged as a tool to tackle perceived ill-health by taking remedial actions. And currently, efforts are being directed towards encouraging people (especially parents) to learn and use health-promoting behaviours in seeking their children’s healthcare. Regardless of these efforts, most parents encounter challenges with raising a child with a disability. The purpose of the study was to explore the healthcare-seeking behaviours of parents of children with disabilities. In order to achieve the purpose of the study, a case study design was employed where the researcher used a qualitative approach such as semi-structured interview to gather the required data. Data from participants were analysed using a thematic analysis approach. It was revealed from the findings of the study that, some of the parents after the first diagnosis by health professionals consulted a spiritualist or a herbalist for help. Also, some parents stated that their response to their children’s healthcare depended on the severity of the sickness. The study recommends the Ministry of Gender, Children and Social Protection and other social agencies such as the Social Welfare Department to provide health assessment and financial support to families of children with disabilities.

Keywords: healthcare, health, parents, disabilities

Procedia PDF Downloads 219
1504 Ergosterol Biosynthesis: Non-Conventional Method for Improving Process

Authors: Madalina Postaru, Alexandra Tucaliuc, Dan Cascaval, Anca Irina Galaction

Abstract:

Ergosterol (ergosta-5,7,22-trien-3β-ol) is the precursor of vitamin D2 (ergocalciferol), known as provitamin D2 as it is converted under UV radiation to this vitamin. The natural sources of ergosterol are mainly the yeasts (Saccharomyces sp., Candida sp.), but it can be also found in fungus (Claviceps sp.) or plants (orchids). As ergosterol is mainly accumulated in yeast cell membranes, especially in free form in the plasma-membrane, and the chemical synthesis of ergosterol does not represent an efficient method for its production, this study aimed to analyze the influence of aeration efficiency on ergosterol production by S. cerevisiae in batch and fed-batch fermentations, by considering different levels of mixing intensity, aeration rate, and n-dodecane concentration. Our previous studies on ergosterol production by S. cerevisiae in batch and fed-batch fermentation systems indicated that the addition of n-dodecane led to the increase of almost 50% of this sterol concentration, the highest productivity being reached for the fed-batch process. The experiments were carried out in a laboratory stirred bioreactor, provided with computer-controlled and recorded parameters. In batch fermentation system, the study indicated that the oxygen mass transfer coefficient, kLa, is amplified for about 3 times by increasing the volumetric concentration of n-dodecane from 0 to 15%. Moreover, the increase of dissolved oxygen concentration by adding n-dodecane leads to the diminution for 3.5 times of the produced alcohol amount. In fed-batch fermentation process, the positive influence of hydrocarbon on oxygen transfer rate is amplified mainly at its higher concentration level, as the result of the increased yeasts cells amount. Thus, by varying n-dodecane concentration from 0 to 15% vol., the kLa value increase becomes more important than for the batch fermentation, being of 4 times

Keywords: ergosterol, yeast fermentation, n-dodecane, oxygen-vector

Procedia PDF Downloads 114
1503 Effect of Fiber Orientation on the Mechanical Properties of Fabricated Plate Using Basalt Fiber

Authors: Sharmili Routray, Kishor Chandra Biswal

Abstract:

The use of corrosion resistant fiber reinforced polymer (FRP) reinforcement is beneficial in structures particularly those exposed to deicing salts, and/or located in highly corrosive environment. Generally Glass, Carbon and Aramid fibers are used for the strengthening purpose of the structures. Due to the necessities of low weight and high strength materials, it is required to find out the suitable substitute with low cost. Recent developments in fiber production technology allow the strengthening of structures using Basalt fiber which is made from basalt rock. Basalt fiber has good range of thermal performance, high tensile strength, resistance to acids, good electro‐magnetic properties, inert nature, resistance to corrosion, radiation and UV light, vibration and impact loading. This investigation focuses on the effect of fibre content and fiber orientation of basalt fibre on mechanical properties of the fabricated composites. Specimen prepared with unidirectional Basalt fabric as reinforcing materials and epoxy resin as a matrix in polymer composite. In this investigation different fiber orientation are taken and the fabrication is done by hand lay-up process. The variation of the properties with the increasing number of plies of fiber in the composites is also studied. Specimens are subjected to tensile strength test and the failure of the composite is examined with the help of INSTRON universal testing Machine (SATEC) of 600 kN capacities. The average tensile strength and modulus of elasticity of BFRP plates are determined from the test Program.

Keywords: BFRP, fabrication, Fiber Reinforced Polymer (FRP), strengthening

Procedia PDF Downloads 289
1502 Compilation of Tall Building with Green Architecture Case Study: Babolsar City (North of Iran) at 2014-2015

Authors: Seyyed Hossein Alavi, Soudabeh Mehri Talarposhti

Abstract:

Quick development of urban population need for housing on the one hand and prevention of irregular urban extension for optimum usage of urban land, resolving problems of urban physiognomy, land using, and environmental issues and urban transport, on the other hand, proposed tall building as urban area extension requirement in developing and advanced countries. Beside the tall building, protection, and creation of green architecture is one the most important issues of today's architecture world. This research is about attending tall building with green architecture in Babolsar city 2015. For this, the issues that can make favorite conditions for green architecture has been discussed. The purpose of this discussion is skeleton extension and accessing interactions between architecture and related technologies. This discussion with using of qualitative research methods (Analytical Description) tried to studying designed performance models and also studying and analyzing the inside and foreign articles and books. Hope this research is useful in solving the existing problems in this issue.

Keywords: tall building, green architecture, skeleton extension, Babolsar city

Procedia PDF Downloads 425
1501 The BNCT Project Using the Cf-252 Source: Monte Carlo Simulations

Authors: Marta Błażkiewicz-Mazurek, Adam Konefał

Abstract:

The project can be divided into three main parts: i. modeling the Cf-252 neutron source and conducting an experiment to verify the correctness of the obtained results, ii. design of the BNCT system infrastructure, iii. analysis of the results from the logical detector. Modeling of the Cf-252 source included designing the shape and size of the source as well as the energy and spatial distribution of emitted neutrons. Two options were considered: a point source and a cylindrical spatial source. The energy distribution corresponded to various spectra taken from specialized literature. Directionally isotropic neutron emission was simulated. The simulation results were compared with experimental values determined using the activation detector method using indium foils and cadmium shields. The relative fluence rate of thermal and resonance neutrons was compared in the chosen places in the vicinity of the source. The second part of the project related to the modeling of the BNCT infrastructure consisted of developing a simulation program taking into account all the essential components of this system. Materials with moderating, absorbing, and backscattering properties of neutrons were adopted into the project. Additionally, a gamma radiation filter was introduced into the beam output system. The analysis of the simulation results obtained using a logical detector located at the beam exit from the BNCT infrastructure included neutron energy and their spatial distribution. Optimization of the system involved changing the size and materials of the system to obtain a suitable collimated beam of thermal neutrons.

Keywords: BNCT, Monte Carlo, neutrons, simulation, modeling

Procedia PDF Downloads 25
1500 ‘The Guilt Complex’: Assessing the Guilt of Youth Returning From Terrorist Groups in the Narratives of Justice Presentation on the Methodological Opportunities and Concerns in Operational Research

Authors: Arpita Mitra

Abstract:

The research explores the concept of ‘guilt’ as understood in relation to children and young individuals associated with terrorist groups who are exiting these groups and returning to civilian lives (‘young returnees’). The study explores young returnees’ guilt – in its psychological, legal, and sociological manifestations and how it contributes to experiences of reintegration and justice administration. Streamlining it further, the research question on assessing guilt engages with young adults – between 18 and 30 years – who were part of a terrorist organization during their formative years and have returned to civilian life. Overall, the findings of the said research are intended to contribute first-hand operational research to criminological literature as well as transitional justice mechanisms with regard to narratives on truth, justice, reparations and institutional reform/guarantees of non-recurrence. Particularly for this paper, the focus of the paper shall be on one aspect of this research, that is, on the added value of conducting operational research and the methodological challenges encountered during this process with regard to informed consent, data protection, mental health and security considerations for the respondents and researcher.

Keywords: terrorism, reintegration, young returnees, criminology

Procedia PDF Downloads 56
1499 The Impact of Regulatory Changes on the Development of Mobile Medical Apps

Authors: M. McHugh, D. Lillis

Abstract:

Mobile applications are being used to perform a wide variety of tasks in day-to-day life, ranging from checking email to controlling your home heating. Application developers have recognized the potential to transform a smart device into a medical device, by using a mobile medical application i.e. a mobile phone or a tablet. When initially conceived these mobile medical applications performed basic functions e.g. BMI calculator, accessing reference material etc.; however, increasing complexity offers clinicians and patients a range of functionality. As this complexity and functionality increases, so too does the potential risk associated with using such an application. Examples include any applications that provide the ability to inflate and deflate blood pressure cuffs, as well as applications that use patient-specific parameters and calculate dosage or create a dosage plan for radiation therapy. If an unapproved mobile medical application is marketed by a medical device organization, then they face significant penalties such as receiving an FDA warning letter to cease the prohibited activity, fines and possibility of facing a criminal conviction. Regulatory bodies have finalized guidance intended for mobile application developers to establish if their applications are subject to regulatory scrutiny. However, regulatory controls appear contradictory with the approaches taken by mobile application developers who generally work with short development cycles and very little documentation and as such, there is the potential to stifle further improvements due to these regulations. The research presented as part of this paper details how by adopting development techniques, such as agile software development, mobile medical application developers can meet regulatory requirements whilst still fostering innovation.

Keywords: agile, applications, FDA, medical, mobile, regulations, software engineering, standards

Procedia PDF Downloads 356
1498 Integrating the Modbus SCADA Communication Protocol with Elliptic Curve Cryptography

Authors: Despoina Chochtoula, Aristidis Ilias, Yannis Stamatiou

Abstract:

Modbus is a protocol that enables the communication among devices which are connected to the same network. This protocol is, often, deployed in connecting sensor and monitoring units to central supervisory servers in Supervisory Control and Data Acquisition, or SCADA, systems. These systems monitor critical infrastructures, such as factories, power generation stations, nuclear power reactors etc. in order to detect malfunctions and ignite alerts and corrective actions. However, due to their criticality, SCADA systems are vulnerable to attacks that range from simple eavesdropping on operation parameters, exchanged messages, and valuable infrastructure information to malicious modification of vital infrastructure data towards infliction of damage. Thus, the SCADA research community has been active over strengthening SCADA systems with suitable data protection mechanisms based, to a large extend, on cryptographic methods for data encryption, device authentication, and message integrity protection. However, due to the limited computation power of many SCADA sensor and embedded devices, the usual public key cryptographic methods are not appropriate due to their high computational requirements. As an alternative, Elliptic Curve Cryptography has been proposed, which requires smaller key sizes and, thus, less demanding cryptographic operations. Until now, however, no such implementation has been proposed in the SCADA literature, to the best of our knowledge. In order to fill this gap, our methodology was focused on integrating Modbus, a frequently used SCADA communication protocol, with Elliptic Curve based cryptography and develop a server/client application to demonstrate the proof of concept. For the implementation we deployed two C language libraries, which were suitably modify in order to be successfully integrated: libmodbus (https://github.com/stephane/libmodbus) and ecc-lib https://www.ceid.upatras.gr/webpages/faculty/zaro/software/ecc-lib/). The first library provides a C implementation of the Modbus/TCP protocol while the second one offers the functionality to develop cryptographic protocols based on Elliptic Curve Cryptography. These two libraries were combined, after suitable modifications and enhancements, in order to give a modified version of the Modbus/TCP protocol focusing on the security of the data exchanged among the devices and the supervisory servers. The mechanisms we implemented include key generation, key exchange/sharing, message authentication, data integrity check, and encryption/decryption of data. The key generation and key exchange protocols were implemented with the use of Elliptic Curve Cryptography primitives. The keys established by each device are saved in their local memory and are retained during the whole communication session and are used in encrypting and decrypting exchanged messages as well as certifying entities and the integrity of the messages. Finally, the modified library was compiled for the Android environment in order to run the server application as an Android app. The client program runs on a regular computer. The communication between these two entities is an example of the successful establishment of an Elliptic Curve Cryptography based, secure Modbus wireless communication session between a portable device acting as a supervisor station and a monitoring computer. Our first performance measurements are, also, very promising and demonstrate the feasibility of embedding Elliptic Curve Cryptography into SCADA systems, filling in a gap in the relevant scientific literature.

Keywords: elliptic curve cryptography, ICT security, modbus protocol, SCADA, TCP/IP protocol

Procedia PDF Downloads 259
1497 Legal Regulation and Critical Analysis for an Effectively Treatment of Pharmaceutical Waste

Authors: Merita Dauti, Edita Alili-Idrizi, Sihana Ahmeti –Lika, Ledjan Malaj

Abstract:

The extermination and proper disposal of pharmaceutical wastes from expired and unused medications remains a disputable issue due to their specific nature and characteristics. Even though the hazards from these wastes are already well known in terms of environment and human health, people still treat them as usual wastes. At a national level, in many countries the management of pharmaceutical and medical wastes has been one of the main objectives in order to protect people’s health and the environment. Even though many legal regulations exist in this respect, there has not been a single law that would clearly explain the procedures of returning medicines, ways of selection, treatment and extermination of pharmaceutical wastes. This paper aims at analyzing the practices of pharmaceutical waste management and treatment in some European countries as well as a review of the legislation and official guidelines in managing these kinds of wastes and protecting the environment and human health. A suitable treatment and management of expired medications and other similar wastes would be in the interest of public health in the first place, as well as in the interest of healthcare institutions and other bodies engaged in environment protection.

Keywords: pharmaceutical waste, legal regulation, proper disposal, environment pollution

Procedia PDF Downloads 331
1496 Chemicals to Remove and Prevent Biofilm

Authors: Cynthia K. Burzell

Abstract:

Aequor's Founder, a Marine and Medical Microbiologist, discovered novel, non-toxic chemicals in the ocean that uniquely remove biofilm in minutes and prevent its formation for days. These chemicals and over 70 synthesized analogs that Aequor developed can replace thousands of toxic biocides used in consumer and industrial products and, as new drug candidates, kill biofilm-forming bacteria and fungi Superbugs -the antimicrobial-resistant (AMR) pathogens for which there is no cure. Cynthia Burzell, PhD., is a Marine and Medical Microbiologist studying natural mechanisms that inhibit biofilm formation on surfaces in contact with water. In 2002, she discovered a new genus and several new species of marine microbes that produce small molecules that remove biofilm in minutes and prevent its formation for days. The molecules include new antimicrobials that can replace thousands of toxic biocides used in consumer and industrial products and can be developed into new drug candidates to kill the biofilm-forming bacteria and fungi -- including the antimicrobial-resistant (AMR) Superbugs for which there is no cure. Today, Aequor has over 70 chemicals that are divided into categories: (1) Novel natural chemicals. Lonza validated that the primary natural chemical removed biofilm in minutes and stated: "Nothing else known can do this at non-toxic doses." (2) Specialty chemicals. 25 of these structural analogs are already approved under the U.S. Environmental Protection Agency (EPA)'s Toxic Substances Control Act, certified as "green" and available for immediate sale. These have been validated for the following agro-industrial verticals: (a) Surface cleaners: The U.S. Department of Agriculture validated that low concentrations of Aequor's formulations provide deep cleaning of inert, nano and organic surfaces and materials; (b) Water treatments: NASA validated that one dose of Aequor's treatment in the International Space Station's water reuse/recycling system lasted 15 months without replenishment. DOE validated that our treatments lower energy consumption by over 10% in buildings and industrial processes. Future validations include pilot projects with the EPA to test efficacy in hospital plumbing systems. (c) Algae cultivation and yeast fermentation: The U.S. Department of Energy (DOE) validated that Aequor's treatment boosted biomass of renewable feedstocks by 40% in half the time -- increasing the profitability of biofuels and biobased co-products. DOE also validated increased yields and crop protection of algae under cultivation in open ponds. A private oil and gas company validated decontamination of oilfield water. (3) New structural analogs. These kill Gram-negative and Gram-positive bacteria and fungi alone, in combinations with each other, and in combination with low doses of existing, ineffective antibiotics (including Penicillin), "potentiating" them to kill AMR pathogens at doses too low to trigger resistance. Both the U.S. National Institutes for Health (NIH) and Department of Defense (DOD) has executed contracts with Aequor to provide the pre-clinical trials needed for these new drug candidates to enter the regulatory approval pipelines. Aequor seeks partners/licensees to commercialize its specialty chemicals and support to evaluate the optimal methods to scale-up of several new structural analogs via activity-guided fractionation and/or biosynthesis in order to initiate the NIH and DOD pre-clinical trials.

Keywords: biofilm, potentiation, prevention, removal

Procedia PDF Downloads 96
1495 Ranking of Performance Measures of GSCM towards Sustainability: Using Analytic Hierarchy Process

Authors: Dixit Garg, S. Luthra, A. Haleem

Abstract:

During recent years, the natural environment has become a challenging topic that business organizations must consider due to the economic and ecological impacts and increasing awareness of environment protection among society. Organizations are trying to achieve the goals of improvement in environment, low cost, high quality, flexibility and more customer satisfaction. Performance measurement frameworks are very useful to monitor the performance of any organization. The basic goal of this paper is to identify performance measures and ranking of these performance measures of GSCM performance measurement towards sustainability framework. Five perspectives (Environment, Economic, Social, Operational and Cost performances) and nineteen performance measures of GSCM performance towards sustainability have been have been identified from extensive literature review. Analytical Hierarchy Process (AHP) technique has been utilized for ranking of these performance perspectives and measures. All pair comparisons in AHP have been made on the basis on the experts’ opinions (selected from academia and industry). Ranking of these performance perspectives and measures will help to understand the importance of environmental, economic, social, operational performances, and cost performances in the supply chain.

Keywords: analytical hierarchy process, green supply chain management, performance measures, sustainability

Procedia PDF Downloads 513
1494 Rehabilitation Approach for Cancer Patients: Indication, Management and Outcome

Authors: Juliani Rianto, Emma Lumby, Tracey Smith

Abstract:

Cancer patients’ survival are growing with the new approach and therapy in oncology medicine. Cancer is now a new chronic disease, and rehabilitation program has become an ongoing program as part of cancer care. The focus of Cancer rehabilitation is maximising person’s physical and emotional function, stabilising general health and reducing unnecessary hospital admission. In Australia there are 150000 newly diagnosed cancer every year, and the most common Cancer are prostate, Breast, Colorectal, Melanoma and Lung Cancer. Through referral from the oncology team, we recruited cancer patient into our cancer rehabilitation program. Patients are assessed by our multi-disciplinary team including rehabilitation specialist, physiotherapist, occupational therapist, dietician, exercise physiologist, and psychologist. Specific issues are identified, including pain, side effect of chemo and radiation therapy and mental well-being. The goals were identified and reassessed every fortnight. Common goals including nutritional status, improve endurance and exercise performance, working on balance and mobility, improving emotional and vocational state, educational program for insomnia and tiredness, and reducing hospitalisation are identified and assessed. Patients are given 2 hours exercise program twice a week for 6 weeks with focus on aerobic and weight exercises and education sessions. Patients are generally benefited from the program. The quality of life is improved, support and interaction from the therapist has played an important factor in directing patient for their goals.

Keywords: cancer, exercises, benefit, mental health

Procedia PDF Downloads 59
1493 Improvement of Ventilation and Thermal Comfort Using the Atrium Design for Traditional Folk Houses-Fujian Earthen Building

Authors: Ying-Ming Su

Abstract:

Fujian earthen building which was known as a classic for ecological buildings was listed on the world heritage in 2008 (UNESCO) in China. Its design strategy can be applied to modern architecture planning and design. This study chose two different cases (Round Atrium: Er-Yi Building, Double Round Atrium: Zhen-Chen Building) of earthen building in Fu-Jian to compare the ventilation effects of different atrium forms. We adopt field measurements and computational fluid dynamics (CFD) simulation of temperature, humidity, and wind environment to identify the relationship between external environment and atrium about comfort and to confirm the relationship about atrium H/W (height/width). Results indicate that, through the atrium convection effect, it makes the natural wind guides to each space surrounded and keeps indoor comfort. It illustrates that the smaller the ratio of the H/W which is the relationship between the height and the width of an atrium is, the greater the wind speed generated within the street valley. Moreover, the wind speed is very close to the reference wind speed. This field measurement verifies that the value of H/W has great influence of solar radiation heat and sunshine shadows. The ventilation efficiency is: Er-Yi Building (H/W =0.2778) > Zhen-Chen Building (H/W=0.3670). Comparing the cases with the same shape but with different H/W, through the different size patios, airflow revolves in the atriums and can be brought into each interior space. The atrium settings meet the need of building ventilation, and can adjust the humidity and temperature within the buildings. It also creates good ventilation effect.

Keywords: traditional folk houses, atrium, tulou, ventilation, building microclimate

Procedia PDF Downloads 468
1492 Corporate Cautionary Statement: A Genre of Professional Communication

Authors: Chie Urawa

Abstract:

Cautionary statements or disclaimers in corporate annual reports need to be carefully designed because clear cautionary statements may protect a company in the case of legal disputes and may undermine positive impressions. This study compares the language of cautionary statements using two corpora, Sony’s cautionary statement corpus (S-corpus) and Panasonic’s cautionary statement corpus (P-corpus), illustrating the differences and similarities in relation to the use of meaningful cautionary statements and critically analyzing why practitioners use the way. The findings describe the distinct differences between the two companies in the presentation of the risk factors and the way how they make the statements. The word ability is used more for legal protection in S-corpus whereas the word possibility is used more to convey a better impression in P-corpus. The main similarities are identified in the use of lexical words and pronouns, and almost the same wordings for eight years. The findings show how they make the statements unique to the company in the presentation of risk factors, and the characteristics of specific genre of professional communication. Important implications of this study are that more comprehensive approach can be applied in other contexts, and be used by companies to reflect upon their cautionary statements.

Keywords: cautionary statements, corporate annual reports, corpus, risk factors

Procedia PDF Downloads 166
1491 Public Interest Law for Gender Equality: An Exploratory Study of the 'Single Woman Reproductive Rights' Movement in China

Authors: Xiaofei Zhu

Abstract:

As a 'weapon of the weak', the Public Interest Law can provide a better perspective for the cause of gender justice. In recent years, the legal practice of single female reproductive rights in China has already possessed the elements of public interest law activities and the possibility of public interest law operation. Through the general operating procedures of public interest law practice, that is, from the choice of subject, the planning of the case, the operation of the strategy and the later development, the paper analyzes the gains and losses of the legal practice of single female reproductive rights in China, and puts forward some ideas on its possible operation path. On this basis, it is believed that the cause of women's rights should be carried out under the broad human rights perspective; it is necessary to realize the particularity of different types of women's rights protection practice; the practice of public interest law needs to accurately grasp the constituent elements of all aspects of the case, and strive to find the opportunities of institutional and social change; the practice of public welfare law of gender justice should be carried out from a long-term perspective.

Keywords: single women’s reproductive rights, public interest law, gender justice, legal strategies, legal change

Procedia PDF Downloads 136
1490 Intrusion Detection and Prevention System (IDPS) in Cloud Computing Using Anomaly-Based and Signature-Based Detection Techniques

Authors: John Onyima, Ikechukwu Ezepue

Abstract:

Virtualization and cloud computing are among the fast-growing computing innovations in recent times. Organisations all over the world are moving their computing services towards the cloud this is because of its rapid transformation of the organization’s infrastructure and improvement of efficient resource utilization and cost reduction. However, this technology brings new security threats and challenges about safety, reliability and data confidentiality. Evidently, no single security technique can guarantee security or protection against malicious attacks on a cloud computing network hence an integrated model of intrusion detection and prevention system has been proposed. Anomaly-based and signature-based detection techniques will be integrated to enable the network and its host defend themselves with some level of intelligence. The anomaly-base detection was implemented using the local deviation factor graph-based (LDFGB) algorithm while the signature-based detection was implemented using the snort algorithm. Results from this collaborative intrusion detection and prevention techniques show robust and efficient security architecture for cloud computing networks.

Keywords: anomaly-based detection, cloud computing, intrusion detection, intrusion prevention, signature-based detection

Procedia PDF Downloads 297
1489 Characterization of Vegetable Wastes and Its Potential Use for Hydrogen and Methane Production via Dark Anaerobic Fermentation

Authors: Ajay Dwivedi, M. Suresh Kumar, A. N. Vaidya

Abstract:

The problem of fruit and vegetable waste management is a grave one and with ever increasing need to feed the exponentially growing population, more and more solid waste in the form of fruit and vegetables waste are generated and its management has become one of the key issues in protection of environment. Energy generation from fruit and vegetables waste by dark anaerobic fermentation is a recent an interesting avenue effective management of solid waste as well as for generating free and cheap energy. In the present study 17 vegetables were characterized for their physical as well as chemical properties, these characteristics were used to determine the hydrogen and methane potentials of vegetable from various models, and also lab scale batch experiments were performed to determine their actual hydrogen and methane production capacity. Lab scale batch experiments proved that vegetable waste can be used as effective substrate for bio hydrogen and methane production, however the expected yield of bio hydrogen and methane was much lower than predicted by models, this was due to the fact that other vital experimental parameters such as pH, total solids content, food to microorganism ratio was not optimized.

Keywords: vegetable waste, physico-chemical characteristics, hydrogen, methane

Procedia PDF Downloads 424
1488 A Case Study of Coalface Workers' Attitude towards Occupational Health and Safety Key Performance Indicators

Authors: Gayan Mapitiya

Abstract:

Maintaining good occupational health and safety (OHS) performance is significant at the coalface, especially in industries such as mining, power, and construction. Coalface workers are vulnerable to high OHS risks such as working at heights, working with mobile plants and vehicles, working with underground and above ground services, chemical emissions, radiation hazards and explosions at everyday work. To improve OHS performance of workers, OHS key performance indicators (KPIs) (for example, lost time injuries (LTI), serious injury frequency rate (SIFR), total reportable injury frequency rate (TRIFR) and number of near misses) are widely used by managers in making OHS business decisions such as investing in safety equipment and training programs. However, in many organizations, workers at the coalface hardly see any relevance or value addition of OHS KPIs to their everyday work. Therefore, the aim of the study was to understand why coalface workers perceive that OHS KPIs are not practically relevant to their jobs. Accordingly, this study was conducted as a qualitative case study focusing on a large electricity and gas firm in Australia. Semi-structured face to face interviews were conducted with selected coalface workers to gather data on their attitude towards OHS KPIs. The findings of the study revealed that workers at the coalface generally have no understanding of the purpose of KPIs, the meaning of each KPI, origin of KPIs, and how KPIs are correlated to organizational performance. Indeed, KPIs are perceived as ‘meaningless obstacles’ imposed on workers by managers without a rationale. It is recommended to engage coalface workers (a fair number of representatives) in both KPIs setting and revising processes while maintaining a continuous dialogue between workers and managers in regards OHS KPIs.

Keywords: KPIs, coalface, OHS risks, case-study

Procedia PDF Downloads 111
1487 Calculation of the Normalized Difference Vegetation Index and the Spectral Signature of Coffee Crops: Benefits of Image Filtering on Mixed Crops

Authors: Catalina Albornoz, Giacomo Barbieri

Abstract:

Crop monitoring has shown to reduce vulnerability to spreading plagues and pathologies in crops. Remote sensing with Unmanned Aerial Vehicles (UAVs) has made crop monitoring more precise, cost-efficient and accessible. Nowadays, remote monitoring involves calculating maps of vegetation indices by using different software that takes either Truecolor (RGB) or multispectral images as an input. These maps are then used to segment the crop into management zones. Finally, knowing the spectral signature of a crop (the reflected radiation as a function of wavelength) can be used as an input for decision-making and crop characterization. The calculation of vegetation indices using software such as Pix4D has high precision for monoculture plantations. However, this paper shows that using this software on mixed crops may lead to errors resulting in an incorrect segmentation of the field. Within this work, authors propose to filter all the elements different from the main crop before the calculation of vegetation indices and the spectral signature. A filter based on the Sobel method for border detection is used for filtering a coffee crop. Results show that segmentation into management zones changes with respect to the traditional situation in which a filter is not applied. In particular, it is shown how the values of the spectral signature change in up to 17% per spectral band. Future work will quantify the benefits of filtering through the comparison between in situ measurements and the calculated vegetation indices obtained through remote sensing.

Keywords: coffee, filtering, mixed crop, precision agriculture, remote sensing, spectral signature

Procedia PDF Downloads 382
1486 Ontology for Cross-Site-Scripting (XSS) Attack in Cybersecurity

Authors: Jean Rosemond Dora, Karol Nemoga

Abstract:

In this work, we tackle a frequent problem that frequently occurs in the cybersecurity field which is the exploitation of websites by XSS attacks, which are nowadays considered a complicated attack. These types of attacks aim to execute malicious scripts in a web browser of the client by including code in a legitimate web page. A serious matter is when a website accepts the “user-input” option. Attackers can exploit the web application (if vulnerable), and then steal sensitive data (session cookies, passwords, credit cards, etc.) from the server and/or from the client. However, the difficulty of the exploitation varies from website to website. Our focus is on the usage of ontology in cybersecurity against XSS attacks, on the importance of the ontology, and its core meaning for cybersecurity. We explain how a vulnerable website can be exploited, and how different JavaScript payloads can be used to detect vulnerabilities. We also enumerate some tools to use for an efficient analysis. We present detailed reasoning on what can be done to improve the security of a website in order to resist attacks, and we provide supportive examples. Then, we apply an ontology model against XSS attacks to strengthen the protection of a web application. However, we note that the existence of ontology does not improve the security itself, but it has to be properly used and should require a maximum of security layers to be taken into account.

Keywords: cybersecurity, web application vulnerabilities, cyber threats, ontology model

Procedia PDF Downloads 167
1485 Polyhouse Farming: An Integrated Approach to Organic Farming

Authors: Promila Dahiya, Kiran Singh

Abstract:

Indian agriculture has come a long way from being an era of frequent droughts and vulnerability to food shortages to becoming a significant exporter of agricultural commodities. Polyhouses are essentially microcosms aimed at providing physical environment suitable for the survival and growth of plants with high degree of temperature, humidity and carbon dioxide. The present study was conducted in 21 districts of Haryana State to review Polyhouse farming is an alternative farming in Haryana State to fulfil the needs of population byminimum use of land, water and energy. The information regarding number, area and type of polyhouses and subsidy provided by Govt. of India and Haryana on polyhouse farming was collected from respective district horticulture offices of Haryana State. Four different types of polyhouses were studied during work viz., Hitechnology polyhouse (Hi-tech), Anti-Insect Net Shade House (AINSH), Naturally Ventilated Polyhouse (NVPH) and Walk-In-Tunnel (WIT).In study it was found that in walk-in-tunnel (WIT) and natural ventilated polyhouses (NVPH) the temperature was 69.54% and 52.29% higher and the humidity was 96.37% and 85.19 % higher in comparison to open farming in the months of January and May. No significant different was found in temperature, humidity, dust, solar radiation and CO2 level between open and anti insect net shade house (AINH). In Hi-tech polyhouse, the environment was totally controlled by computer and was not found to much strenuous. Health status of workers was checked by doctor, and it was found that in polyhouse farming workers were more prone to problems of allergy and asthma.

Keywords: polyhouse, unfavorable climate, walk-in-tunnel, psychological aspect

Procedia PDF Downloads 461
1484 Hyperspectral Mapping Methods for Differentiating Mangrove Species along Karachi Coast

Authors: Sher Muhammad, Mirza Muhammad Waqar

Abstract:

It is necessary to monitor and identify mangroves types and spatial extent near coastal areas because it plays an important role in coastal ecosystem and environmental protection. This research aims at identifying and mapping mangroves types along Karachi coast ranging from 24.79 to 24.85 degree in latitude and 66.91 to 66.97 degree in longitude using hyperspectral remote sensing data and techniques. Image acquired during February, 2012 through Hyperion sensor have been used for this research. Image preprocessing includes geometric and radiometric correction followed by Minimum Noise Fraction (MNF) and Pixel Purity Index (PPI). The output of MNF and PPI has been analyzed by visualizing it in n-dimensions for end-member extraction. Well-distributed clusters on the n-dimensional scatter plot have been selected with the region of interest (ROI) tool as end members. These end members have been used as an input for classification techniques applied to identify and map mangroves species including Spectral Angle Mapper (SAM), Spectral Feature Fitting (SFF), and Spectral Information Diversion (SID). Only two types of mangroves namely Avicennia Marina (white mangroves) and Avicennia Germinans (black mangroves) have been observed throughout the study area.

Keywords: mangrove, hyperspectral, hyperion, SAM, SFF, SID

Procedia PDF Downloads 360
1483 Study of Large-Scale Atmospheric Convection over the Tropical Indian Ocean and Its Association with Oceanic Variables

Authors: Supriya Manikrao Ovhal

Abstract:

In India, the summer monsoon rainfall occurs owing to large scale convection with reference to continental ITCZ. It was found that convection over tropical ocean increases with SST from 26 to 28 degree C, and when SST is above 29 degree C, it sharply decreases for warm pool areas of Indian and for monsoon areas of West Pacific Ocean. The reduction in convection can be influenced by large scale subsidence forced by nearby or remotely generated deep convection, thus it was observed that under the influence of strong large scale rising motion, convection does not decreases but increases monotonically with SST even if SST value is higher than 29.5 degree C. Since convection is related to SST gradient, that helps to generate low level moisture convergence and upward vertical motion in the atmosphere. Strong wind fields like cross equatorial low level jet stream on equator ward side of the warm pool are produced due to convection initiated by SST gradient. Areas having maximum SST have low SST gradient, and that result in feeble convection. Hence it is imperative to mention that the oceanic role (other than SST) could be prominent in influencing large Scale Atmospheric convection. Since warm oceanic surface somewhere or the other contributes to penetrate the heat radiation to the subsurface of the ocean, and as there is no studies seen related to oceanic subsurface role in large Scale Atmospheric convection, in the present study, we are concentrating on the oceanic subsurface contribution in large Scale Atmospheric convection by considering the SST gradient, mixed layer depth (MLD), thermocline, barrier layer. The present study examines the probable role of subsurface ocean parameters in influencing convection.

Keywords: sst, d20, olr, wind

Procedia PDF Downloads 90
1482 The Strategic Importance of Technology in the International Production: Beyond the Global Value Chains Approach

Authors: Marcelo Pereira Introini

Abstract:

The global value chains (GVC) approach contributes to a better understanding of the international production organization amid globalization’s second unbundling from the 1970s on. Mainly due to the tools that help to understand the importance of critical competences, technological capabilities, and functions performed by each player, GVC research flourished in recent years, rooted in discussing the possibilities of integration and repositioning along regional and global value chains. Regarding this context, part of the literature endorsed a more optimistic view that engaging in fragmented production networks could represent learning opportunities for developing countries’ firms, since the relationship with transnational corporations could allow them build skills and competences. Increasing recognition that GVCs are based on asymmetric power relations provided another sight about benefits, costs, and development possibilities though. Once leading companies tend to restrict the replication of their technologies and capabilities by their suppliers, alternative strategies beyond the functional specialization, seen as a way to integrate value chains, began to be broadly highlighted. This paper organizes a coherent narrative about the shortcomings of the GVC analytical framework, while recognizing its multidimensional contributions and recent developments. We adopt two different and complementary perspectives to explore the idea of integration in the international production. On one hand, we emphasize obstacles beyond production components, analyzing the role played by intangible assets and intellectual property regimes. On the other hand, we consider the importance of domestic production and innovation systems for technological development. In order to provide a deeper understanding of the restrictions on technological learning of developing countries’ firms, we firstly build from the notion of intellectual monopoly to analyze how flagship companies can prevent subordinated firms from improving their positions in fragmented production networks. Based on intellectual property protection regimes we discuss the increasing asymmetries between these players and the decreasing access of part of them to strategic intangible assets. Second, we debate the role of productive-technological ecosystems and of interactive and systemic technological development processes, as concepts of the Innovation Systems approach. Supporting the idea that not only endogenous advantages are important for international competition of developing countries’ firms, but also that the building of these advantages itself can be a source of technological learning, we focus on local efforts as a crucial element, which is not replaceable for technology imported from abroad. Finally, the paper contributes to the discussion about technological development as a two-dimensional dynamic. If GVC analysis tends to underline a company-based perspective, stressing the learning opportunities associated to GVC integration, historical involvement of national States brings up the debate about technology as a central aspect of interstate disputes. In this sense, technology is seen as part of military modernization before being also used in civil contexts, what presupposes its role for national security and productive autonomy strategies. From this outlook, it is important to consider it as an asset that, incorporated in sophisticated machinery, can be the target of state policies besides the protection provided by intellectual property regimes, such as in export controls and inward-investment restrictions.

Keywords: global value chains, innovation systems, intellectual monopoly, technological development

Procedia PDF Downloads 77
1481 Measures for Limiting Corruption upon Migration Wave in Europe

Authors: Jordan Georgiev Deliversky

Abstract:

Fight against migrant smuggling has been put as a priority issues at the European Union policy agenda for more than a decade. The trafficked person, who has been targeted as the object of criminal exploitation, is specifically unique for human trafficking. Generally, the beginning of human trafficking activities is related to profit from the victim’s exploitation. The objective of this paper is to present measures that could result in the limitation of corruption mainly through analyzing the existing legislation framework against corruption in Europe. The analysis is focused on exploring the multiple origins of factors influencing migration processes in Europe, as corruption could be characterized as one of the most significant reasons for refugees to flee their countries. The main results show that law enforcement must turn the focus on the financing of the organized crime groups that are involved in migrant smuggling activities. Corruption has a significant role in managing smuggling operations and in particular when criminal organizations and networks are involved. Illegal migrants and refugees usually represent significant sources of additional income for officials involved in the process of boarding protection and immigration control within the European Union borders.

Keywords: corruption, influence, human smuggling, legislation, migration

Procedia PDF Downloads 350
1480 Evaluation of Produced Water Treatment Using Advanced Oxidation Processes and Sodium Ferrate(VI)

Authors: Erica T. R. Mendonça, Caroline M. B. de Araujo, Filho, Osvaldo Chiavone, Sobrinho, Maurício A. da Motta

Abstract:

Oil and gas exploration is an essential activity for modern society, although the supply of its global demand has caused enough damage to the environment, mainly due to produced water generation, which is an effluent associated with the oil and gas produced during oil extraction. It is the aim of this study to evaluate the treatment of produced water, in order to reduce its oils and greases content (OG), by using flotation as a pre-treatment, combined with oxidation for the remaining organic load degradation. Thus, there has been tested Advanced Oxidation Process (AOP) using both Fenton and photo-Fenton reactions, as well as a chemical oxidation treatment using sodium ferrate(VI), Na2[FeO4], as a strong oxidant. All the studies were carried out using real samples of produced water from petroleum industry. The oxidation process using ferrate(VI) ion was studied based on factorial experimental designs. The factorial design was used in order to study how the variables pH, temperature and concentration of Na2[FeO4] influences the O&G levels. For the treatment using ferrate(VI) ion, the results showed that the best operating point is obtained when the temperature is 28 °C, pH 3, and a 2000 mg.L-1 solution of Na2[FeO4] is used. This experiment has achieved a final O&G level of 4.7 mg.L-1, which means 94% percentage removal efficiency of oils and greases. Comparing Fenton and photo-Fenton processes, it was observed that the Fenton reaction did not provide good reduction of O&G (around 20% only). On the other hand, a degradation of approximately 80.5% of oil and grease was obtained after a period of seven hours of treatment using photo-Fenton process, which indicates that the best process combination has occurred between the flotation and the photo-Fenton reaction using solar radiation, with an overall removal efficiency of O&G of approximately 89%.

Keywords: advanced oxidation process, ferrate (VI) ion, oils and greases removal, produced water treatment

Procedia PDF Downloads 316
1479 Determines the Continuity of Void in Underground Mine Tunnel Using Ground Penetrating Radar

Authors: Farid Adisaputra Gumilang

Abstract:

Kucing Liar Underground Mine is a future mine of PT Freeport Indonesia PTFI that is currently being developed. In the development process, problems were found when blasting the tunnels; there were overbreak, and void occur caused by geological contact or poor rock conditions. Geotechnical engineers must evaluate not only the remnant capacity of ground support systems but also investigate the depth of rock mass yield within pillars. To prevent the potential hazard caused by void zones, geotechnical engineers must ensure the planned drift is mined in the best location where people can work safely. GPR, or Ground penetrating radar, is a geophysical method that can image the subsurface. This non-destructive method uses electromagnetic radiation and detects the reflected signals from subsurface structures. The GPR survey measurements are conducted 48 meters along the drift that has a poor ground condition with 150MHz antenna with several angles (roof, wall, and floor). Concern grounds are determined by the continuity of reflector/low reflector in the radargram section. Concern grounds are determined by the continuity of reflector/low reflector in the radargram section. In this paper, processing data using instantaneous amplitude to identify the void zone. In order to have a good interpretation and result, it combines with the geological information and borehole camera data, so the calibrated GPR data allows the geotechnical engineer to determine the safe location to change the drift location.

Keywords: underground mine, ground penetrating radar, reflectivity, borehole camera

Procedia PDF Downloads 74
1478 Surface Modified Quantum Dots for Nanophotonics, Stereolithography and Hybrid Systems for Biomedical Studies

Authors: Redouane Krini, Lutz Nuhn, Hicham El Mard Cheol Woo Ha, Yoondeok Han, Kwang-Sup Lee, Dong-Yol Yang, Jinsoo Joo, Rudolf Zentel

Abstract:

To use Quantum Dots (QDs) in the two photon initiated polymerization technique (TPIP) for 3D patternings, QDs were modified on the surface with photosensitive end groups which are able to undergo a photopolymerization. We were able to fabricate fluorescent 3D lattice structures using photopatternable QDs by TPIP for photonic devices such as photonic crystals and metamaterials. The QDs in different diameter have different emission colors and through mixing of RGB QDs white light fluorescent from the polymeric structures has been created. Metamaterials are capable for unique interaction with the electrical and magnetic components of the electromagnetic radiation and for manipulating light it is crucial to have a negative refractive index. In combination with QDs via TPIP technique polymeric structures can be designed with properties which cannot be found in nature. This makes these artificial materials gaining a huge importance for real-life applications in photonic and optoelectronic. Understanding of interactions between nanoparticles and biological systems is of a huge interest in the biomedical research field. We developed a synthetic strategy of polymer functionalized nanoparticles for biomedical studies to obtain hybrid systems of QDs and copolymers with a strong binding network in an inner shell and which can be modified in the end through their poly(ethylene glycol) functionalized outer shell. These hybrid systems can be used as models for investigation of cell penetration and drug delivery by using measurements combination between CryoTEM and fluorescence studies.

Keywords: biomedical study models, lithography, photo induced polymerization, quantum dots

Procedia PDF Downloads 520
1477 Electron-Ion Recombination for Photoionized and Collisionally Ionized Plasmas

Authors: Shahin A. Abdel-Naby, Asad T. Hassan

Abstract:

Astrophysical plasma environments can be classified into collisionally ionized (CP) and photoionizedplasmas (PP). In the PP, ionization is caused by an external radiation field, while it is caused by electron collision in the CP. Accurate and reliable laboratory astrophysical data for electron-ion recombination is needed for plasma modeling for low and high-temperatures. Dielectronic recombination (DR) is the dominant recombination process for the CP for most of the ions. When a free electron is captured by an ion with simultaneous excitation of its core, a doubly-exited intermediate state may be formed. The doubly excited state relaxes either by electron emission (autoionization) or by radiative decay (photon emission). DR process takes place when the relaxation occurs to a bound state by a photon emission. DR calculations at low-temperatures are problematic and challenging since small uncertaintiesin the low-energy DR resonance positions can produce huge uncertainties in DR rate coefficients.DR rate coefficients for N²⁺ and O³⁺ ions are calculated using state-of-the-art multi-configurationBreit-Pauli atomic structure AUTOSTRUCTURE collisional package within the generalized collisional-radiative framework. Level-resolved calculations for RR and DR rate coefficients from the ground and metastable initial states are produced in an intermediate coupling scheme associated withn = 0 and n = 1 core-excitations. DR cross sections for these ions are convoluted with the experimental electron-cooler temperatures to produce DR rate coefficients. Good agreements are foundbetween these rate coefficients and theexperimental measurements performed at CRYRING heavy-ionstorage ring for both ions.

Keywords: atomic data, atomic process, electron-ion collision, plasmas

Procedia PDF Downloads 93