Search results for: water security
11045 Innovative Method for Treating Oil-Produced Water with Low Operating Cost
Authors: Maha Salman, Gada Al-Nuwaibit, Ahmed Al-Haji, Saleh Al-Haddad, Abbas Al-Mesri, Mansour Al-Rugeeb
Abstract:
The high salinity of oil-produced water and its complicated chemical composition, makes designing a suitable treatment system for oil-produced water is extremely difficult and costly. On the current study, a new innovative method was proposed to treat the complicated oil-produced water through a simple mixing with brine stream produced from waste water treatment plant. The proposal will investigate the scaling potential of oil-produce water, seawater and the selected brine water (BW) produced from Sulaibiya waste water treatment and reclamation plant (SWWTRP) before and after the mixing with oil-produced water, and will calculate the scaling potential of all expected precipitated salts using different conversion and different % of mixing to optimize the % of mixing between the oil-produced water and the selected stream. The result shows a great, feasible and economic solution to treat oil produced with a very low capital cost.Keywords: brine water, oil-produced water, scaling potential, Sulaibiyah waste water and reclaminatin plant
Procedia PDF Downloads 44711044 Risk Management of Water Derivatives: A New Commodity in The Market
Authors: Daniel Mokatsanyane, Johnny Jansen Van Rensburg
Abstract:
This paper is a concise introduction of the risk management on the water derivatives market. Water, a new commodity in the market, is one of the most important commodity on earth. As important to life and planet as crops, metals, and energy, none of them matters without water. This paper presents a brief overview of water as a tradable commodity via a new first of its kind futures contract on the Nasdaq Veles California Water Index (NQH2O) derivative instrument, TheGeneralised Autoregressive Conditional Heteroscedasticity (GARCH) statistical model will be the used to measure the water price volatility of the instrument and its performance since it’s been traded. describe the main products and illustrate their usage in risk management and also discuss key challenges with modeling and valuation of water as a traded commodity and finally discuss how water derivatives may be taken as an alternative asset investment class.Keywords: water derivatives, commodity market, nasdaq veles california water Index (NQH2O, water price, risk management
Procedia PDF Downloads 13611043 Proactive WPA/WPA2 Security Using DD-WRT Firmware
Authors: Mustafa Kamoona, Mohamed El-Sharkawy
Abstract:
Although the latest Wireless Local Area Network technology Wi-Fi 802.11i standard addresses many of the security weaknesses of the antecedent Wired Equivalent Privacy (WEP) protocol, there are still scenarios where the network security are still vulnerable. The first security model that 802.11i offers is the Personal model which is very cheap and simple to install and maintain, yet it uses a Pre Shared Key (PSK) and thus has a low to medium security level. The second model that 802.11i provide is the Enterprise model which is highly secured but much more expensive and difficult to install/maintain and requires the installation and maintenance of an authentication server that will handle the authentication and key management for the wireless network. A central issue with the personal model is that the PSK needs to be shared with all the devices that are connected to the specific Wi-Fi network. This pre-shared key, unless changed regularly, can be cracked using offline dictionary attacks within a matter of hours. The key is burdensome to change in all the connected devices manually unless there is some kind of algorithm that coordinate this PSK update. The key idea of this paper is to propose a new algorithm that proactively and effectively coordinates the pre-shared key generation, management, and distribution in the cheap WPA/WPA2 personal security model using only a DD-WRT router.Keywords: Wi-Fi, WPS, TLS, DD-WRT
Procedia PDF Downloads 23411042 Conservation Agriculture and Precision Water Management in Alkaline Soils under Rice-Wheat Cropping System: Effect on Wheat Productivity and Irrigation Water Use-a Case Study from India
Authors: S. K. Kakraliya, H. S. Jat, Manish Kakraliya, P. C. Sharma, M. L. Jat
Abstract:
The biggest challenge in agriculture is to produce more food for the continually increasing world population with in the limited land and water resources. Serious water deficits and reducing natural resources are some of the major threats to the agricultural sustainability in many regions of South Asia. Food and water security may be gained by bringing improvement in the crop water productivity and the amount produced per unit of water consumed. Improvement in the crop water productivity may be achieved by pursuing alternative modern agronomics approaches, which are more friendly and efficient in utilizing natural resources. Therefore, a research trial on conservation agriculture (CA) and precision water management (PWM) was conducted in 2018-19 at Karnal, India to evaluate the effect on crop productivity and irrigation in sodic soils under rice-wheat (RW) systems of Indo-Gangetic Plains (IGP). Eight scenarios were compared varied in the tillage, crop establishment, residue and irrigarion management i.e., {First four scenarios irrigated with flood irrigation method;Sc1-Conventional tillage (CT) without residue, Sc2-CT with residue, Sc3- Zero tillage (ZT) without residue, Sc4-ZT with residue}, and {last four scenarios irrigated with sub-surface drip irrigation method; Sc5-ZT without residue, Sc6- ZT with residue, Sc7-ZT inclusion legume without residue and Sc8- ZT inclusion legume with residue}. Results revealed that CA-flood irrigation (S3, Sc4) and CA-PWM system (Sc5, Sc6, Sc7 and Sc8) recorded about ~5% and ~15% higher wheat yield, respectively compared to Sc1. Similar, CA-PWM saved ~40% irrigation water compared to Sc1. Rice yield was not different under different scenarios in the first year (kharif 2019) but almost half irrigation water saved under CA-PWM system. Therefore, results of our study on modern agronomic practices including CA and precision water management (subsurface drip irrigation) for RW rotation would be addressed the existing and future challenges in the RW system.Keywords: Sub-surface drip, Crop residue, Crop yield , Zero tillage
Procedia PDF Downloads 12111041 Field Scale Simulation Study of Miscible Water Alternating CO2 Injection Process in Fractured Reservoirs
Authors: Hooman Fallah
Abstract:
Vast amounts of world oil reservoirs are in natural fractured reservoirs. There are different methods for increasing recovery from fractured reservoirs. Miscible injection of water alternating CO2 is a good choice among this methods. In this method, water and CO2 slugs are injected alternatively in reservoir as miscible agent into reservoir. This paper studies water injection scenario and miscible injection of water and CO2 in a two dimensional, inhomogeneous fractured reservoir. The results show that miscible water alternating CO2¬ gas injection leads to 3.95% increase in final oil recovery and total water production decrease of 3.89% comparing to water injection scenario.Keywords: simulation study, CO2, water alternating gas injection, fractured reservoirs
Procedia PDF Downloads 29111040 Assessing Smallholder Rice and Vegetable Farmers’ Constraints and Needs to Adopt Small-Scale Irrigation in South Tongu District, Ghana
Authors: Tamekloe Michael Kossivi, Kenichi Matsui
Abstract:
Irrigation access is one of the essential rural development investment options that can significantly improve smallholder farmers’ agriculture productivity. Investment in irrigation infrastructural development to supply adequate water could improve food security, growth in income for farmers, poverty alleviation, and improve business and livelihood. This paper assesses smallholder farmers’ constraints and the needs to adopt small-scale irrigation for crops production in the South Tongu District of Ghana. The data collection involved database search, questionnaire survey, interview, and field work. The structured questionnaire survey was administered from September to November 2020 among 120 respondents in six purposively sampled irrigation communities in the District. The questions focused on small-scale irrigation development constraints and needs. As a result, we found that the respondents relied mainly on rainfall for agriculture production. They did not have adequate irrigation access. Even though the District is blessed with open arable lands and rich water sources for rice and vegetable production on a massive scale, water sources like the Lower Volta River, Tordzi River, and Avu Lagoon were not close enough to the respondents. The respondents faced inadequate credit support (100%), unreliable rainfall (76%), insufficient water supply (54%), and unreliable water delivery challenges on their farms (53%). Physical constraints for the respondents to adopt irrigation included flood (77%), drought (93%), inadequate irrigation technology (59%), and insufficient technical know-how (65%). Farmers were interested in investing in irrigation infrastructural development to enhance productivity on their farms only if they own the farmlands. External support from donors on irrigation systems did not allow smallholder farmers to control irrigation facilities.Keywords: constraints, food security, needs, smallholder farmers, small-scale irrigation
Procedia PDF Downloads 13711039 Rethinking Military Aid to Civil Authorities for Internal Security Operations: A Sustainable Solution to Rebuilding Civil Military Relations in Nigeria
Authors: Emmanuela Ngozi Maduka
Abstract:
In Nigeria, civil-military relations is at its lowest point as a result of the challenges emanating from incessant initiation of military aid to civil authorities (MACA) for internal security operations. This paper is concerned with the question whether it is appropriate for the military to handle internal security crisis with exception to terrorism and armed militia. It analyses the legal framework for MACA in internal security operations which appear to be in contradiction with military tactical and equipment training. The paper argues that the expectation that transitional re-training of the military for internal security operations will reconcile these inconsistencies specifically on the issue of use of force is not practicable and will always pose challenges for both the military and the citizens. Accordingly, this paper adopts a socio-legal methodology for better clarity on the interactions between the legal framework on MACA and military internal security operations. The paper also identifies the lack of effective and proficient paramilitary within the security design of Nigeria as the key issue which results in incessant initiation of MACA and advocates for the establishment of an effective and proficient paramilitary to effectively handle internal security crisis within Nigeria.Keywords: civil-military relations, MACA, military training, operational challenges, paramilitary, use of force
Procedia PDF Downloads 14311038 Power Generation through Water Vapour: An Approach of Using Sea/River/Lake Water as Renewable Energy Source
Authors: Riad
Abstract:
As present world needs more and more energy in a low cost way, it needs to find out the optimal way of power generation. In the sense of low cost, renewable energy is one of the greatest sources of power generation. Water vapour of sea/river/lake can be used for power generation by using the greenhouse effect in a large flat type water chamber floating on the water surface. The water chamber will always be kept half filled. When water evaporates by sunlight, the high pressured gaseous water will be stored in the chamber. By passing through a pipe and by using aerodynamics it can be used for power generation. The water level of the chamber is controlled by some means. As a large amount of water evaporates, an estimation can be highlighted, approximately 3 to 4 thousand gallons of water evaporates from per acre of surface (this amount will be more by greenhouse effect). This large amount of gaseous water can be utilized for power generation by passing through a pipe. This method can be a source of power generation.Keywords: renewable energy, greenhouse effect, water chamber, water vapour
Procedia PDF Downloads 35511037 A Study on Water Quality Parameters of Pond Water for Better Management of Pond
Authors: Dona Grace Jeyaseeli
Abstract:
Water quality conditions in a pond are controlled by both natural processes and human influences. Natural factors such as the source of the pond water and the types of rock and soil in the pond watershed will influence some water quality characteristics. These factors are difficult to control but usually cause few problems. Instead, most serious water quality problems originate from land uses or other activities near or in the pond. The effects of these activities can often be minimized through proper management and early detection of problems through testing. In the present study a survey of three ponds in Coimbatore city, Tamilnadu, India were analyzed and found that water quality problems in their ponds, ranging from muddy water to fish kills. Unfortunately, most pond owners have never tested their ponds, and water quality problems are usually only detected after they cause a problem. Hence the present study discusses some common water quality parameters that may cause problems in ponds and how to detect through testing for better management of pond.Keywords: water quality, pond, test, problem
Procedia PDF Downloads 50711036 Data-Driven Monitoring and Control of Water Sanitation and Hygiene for Improved Maternal Health in Rural Communities
Authors: Paul Barasa Wanyama, Tom Wanyama
Abstract:
Governments and development partners in low-income countries often prioritize building Water Sanitation and Hygiene (WaSH) infrastructure of healthcare facilities to improve maternal healthcare outcomes. However, the operation, maintenance, and utilization of this infrastructure are almost never considered. Many healthcare facilities in these countries use untreated water that is not monitored for quality or quantity. Consequently, it is common to run out of water while a patient is on their way to or in the operating theater. Further, the handwashing stations in healthcare facilities regularly run out of water or soap for months, and the latrines are typically not clean, in part due to the lack of water. In this paper, we present a system that uses Internet of Things (IoT), big data, cloud computing, and AI to initiate WaSH security in healthcare facilities, with a specific focus on maternal health. We have implemented smart sensors and actuators to monitor and control WaSH systems from afar to ensure their objectives are achieved. We have also developed a cloud-based system to analyze WaSH data in real time and communicate relevant information back to the healthcare facilities and their stakeholders (e.g., medical personnel, NGOs, ministry of health officials, facilities managers, community leaders, pregnant women, and new mothers and their families) to avert or mitigate problems before they occur.Keywords: WaSH, internet of things, artificial intelligence, maternal health, rural communities, healthcare facilities
Procedia PDF Downloads 2411035 Optimizing Inanda Dam Using Water Resources Models
Authors: O. I. Nkwonta, B. Dzwairo, J. Adeyemo, A. Jaiyola, N. Sawyerr, F. Otieno
Abstract:
The effective management of water resources is of great importance to ensure the supply of water resources to support changing water requirements over a selected planning horizon and in a sustainable and cost-effective way. Essentially, the purpose of the water resources planning process is to balance the available water resources in a system with the water requirements and losses to which the system is subjected. In such situations, Water resources yield and planning model can be used to solve those difficulties. It has an advantage over other models by managing model runs, developing a representative system network, modelling incremental sub-catchments, creating a variety of standard system features, special modelling features, and run result output options.Keywords: complex, water resources, planning, cost effective and management
Procedia PDF Downloads 57311034 Voice Signal Processing and Coding in MATLAB Generating a Plasma Signal in a Tesla Coil for a Security System
Authors: Juan Jimenez, Erika Yambay, Dayana Pilco, Brayan Parra
Abstract:
This paper presents an investigation of voice signal processing and coding using MATLAB, with the objective of generating a plasma signal on a Tesla coil within a security system. The approach focuses on using advanced voice signal processing techniques to encode and modulate the audio signal, which is then amplified and applied to a Tesla coil. The result is the creation of a striking visual effect of voice-controlled plasma with specific applications in security systems. The article explores the technical aspects of voice signal processing, the generation of the plasma signal, and its relationship to security. The implications and creative potential of this technology are discussed, highlighting its relevance at the forefront of research in signal processing and visual effect generation in the field of security systems.Keywords: voice signal processing, voice signal coding, MATLAB, plasma signal, Tesla coil, security system, visual effects, audiovisual interaction
Procedia PDF Downloads 9511033 Enhancing Internet of Things Security: A Blockchain-Based Approach for Preventing Spoofing Attacks
Authors: Salha Abdullah Ali Al-Shamrani, Maha Muhammad Dhaher Aljuhani, Eman Ali Ahmed Aldhaheri
Abstract:
With the proliferation of Internet of Things (IoT) devices in various industries, there has been a concurrent rise in security vulnerabilities, particularly spoofing attacks. This study explores the potential of blockchain technology in enhancing the security of IoT systems and mitigating these attacks. Blockchain's decentralized and immutable ledger offers significant promise for improving data integrity, transaction transparency, and tamper-proofing. This research develops and implements a blockchain-based IoT architecture and a reference network to simulate real-world scenarios and evaluate a blockchain-integrated intrusion detection system. Performance measures including time delay, security, and resource utilization are used to assess the system's effectiveness, comparing it to conventional IoT networks without blockchain. The results provide valuable insights into the practicality and efficacy of employing blockchain as a security mechanism, shedding light on the trade-offs between speed and security in blockchain deployment for IoT. The study concludes that despite minor increases in time consumption, the security benefits of incorporating blockchain technology into IoT systems outweigh potential drawbacks, demonstrating a significant potential for blockchain in bolstering IoT security.Keywords: internet of things, spoofing, IoT, access control, blockchain, raspberry pi
Procedia PDF Downloads 7511032 The Use of Water Hyacinth for Bioenergy Electric Generation: For the case of Tana Water Hyacinth
Authors: Seada Hussen Adem, Frie Ayalew Yimam
Abstract:
Due to its high biomass output and potential to produce renewable energy, water hyacinth, a rapidly expanding aquatic weed, has gained recognition as a prospective bioenergy feedstock. Through a variety of conversion processes, such as anaerobic digestion, combustion, and gasification, this study suggests using water hyacinth to generate energy. The suggested strategy helps to reduce the annoyance brought on by the excessive growth of water hyacinth in Tana water bodies in addition to offering an alternate source of energy. The study emphasizes the value of environmentally friendly methods for managing Tana water resources as well as the potential of water hyacinth as a source of bioenergy.Keywords: anaerobic digestion, bioenergy, combustion, gasification, water hyacinth
Procedia PDF Downloads 6811031 The Effort of Good Governance in Enhancing Foods Security for Sustainable National Development
Authors: Egboja Simon Oga
Abstract:
One of the most important keys to the success of a nation is to ensure steady development and national economic self-sufficiency and independence. It is therefore in this regard that this paper is designed to identify food security to be crucial to all nations’ effort toward sustainable national development. Nigeria as a case study employed various effort by the successive government towards food security. Emphasis were placed on the extent to which government has boosted food security situation on the basis of the identified limitations, conclusion was drawn, recommendation/suggestions proffered, that subsidization of the process of farm inputs like fertilizer, improved seeds and agrochemical, education of farmers on modern methods of farming through extension services, improvisation of village-based food storage mechanism and provision of infrastructural facilities in rural areas to facilitate the preservation and easy evacuation of farm produces are necessary.Keywords: food, governance, development, security
Procedia PDF Downloads 33211030 Classification of Attacks Over Cloud Environment
Authors: Karim Abouelmehdi, Loubna Dali, Elmoutaoukkil Abdelmajid, Hoda Elsayed, Eladnani Fatiha, Benihssane Abderahim
Abstract:
The security of cloud services is the concern of cloud service providers. In this paper, we will mention different classifications of cloud attacks referred by specialized organizations. Each agency has its classification of well-defined properties. The purpose is to present a high-level classification of current research in cloud computing security. This classification is organized around attack strategies and corresponding defenses.Keywords: cloud computing, classification, risk, security
Procedia PDF Downloads 54811029 Socio-Economic Analysis of Water Saving Technologies in Agricultural Sector
Authors: Saeed Yazdani, F. Nekoofar
Abstract:
Considering the importance and scarcity of water resources, the efficient management of water resources is of great importance. In the agriculture sector, farmers are facilitated with various practices and technologies to encounter water insufficiency. This study aims to assess socio-economic factors affecting the application of water-saving technologies. A Logit method was employed to examine the impact of different variables on the use of water-saving technology. The required data was gathered from a sample of 204 farmers in 2021 in Alborz Province in Iran. The results indicate that different variables such as crop price variability, water sources, farm size, income, education, experience, membership in cooperatives have positive effects, and variables such as age and number of plots have negative effects on the probability of applying modern water-saving technologies.Keywords: socio-economics, water, irrigation, water saving technologies, scarcity
Procedia PDF Downloads 2411028 Tribal Food Security Assessment and Its Measurement Index: A Study of Tribes and Particularly Vulnerable Tribal Groups in Jharkhand, India
Authors: Ambika Prasad Gupta, Harshit Sosan Lakra
Abstract:
Food security is an important issue that has been widely discussed in literature. However, there is a lack of research on the specific food security challenges faced by tribal communities. Tribal food security refers to the ability of indigenous or tribal communities to consistently access and afford an adequate and nutritious supply of food. These communities often have unique cultural, social, and economic contexts that can impact their food security. The study aims to assess the food security status of all thirty-two major tribes, including Particularly Vulnerable Tribal Groups (PVTG) people living in various blocks of Jharkhand State. The methodology of this study focuses on measuring the food security index of indigenous people by developing and redefining a new Tribal Food Security Index (TFSI) as per the indigenous community-level indicators identified by the Global Food Security Index and other indicators relevant to food security. Affordability, availability, quality and safety, and natural resources were the dimensions used to calculate the overall Tribal Food Security Index. A survey was conducted for primary data collection of tribes and PVTGs at the household level in various districts of Jharkhand with a considerable tribal population. The result shows that due to the transition from rural to urban areas, there is a considerable change in TFSI and a decrease in forest dependency of tribal communities. Socioeconomic factors like occupation and household size had a significant correlation with TFSI. Tribal households living in forests have a higher food security index than tribal households residing in urban transition areas. The study also shows that alternative methodology adopted to measure specific community-level food security creates high significant impact than using commonly used indices.Keywords: indigenous people, tribal food security, particularly vulnerable tribal groups, Jharkhand
Procedia PDF Downloads 8311027 Security Model for RFID Systems
Authors: John Ayoade
Abstract:
Radio Frequency Identification (RFID) has gained a lot of popularity in all walks of life due to its usefulness and diverse use of the technology in almost every application. However, there have been some security concerns most especially in regards to how authentic readers and tags can confirm their authenticity before confidential data is exchanged between them. In this paper, Kerberos protocol is adopted for the mutual authentication of RFID system components in order to ensure the secure communication between those components and to realize the authenticity of the communicating components.Keywords: RFID, security, mutual authentication, Kerberos
Procedia PDF Downloads 47111026 Stressors Faced by Border Security Officers: The Singapore Experience
Authors: Jansen Ang, Andrew Neo, Dawn Chia
Abstract:
Border Security is unlike mainstream policing in that officers are essentially in static deployment, working round the clock every day and every hour of the year looking for illegitimate entry of persons and goods. In Singapore, Border Security officers perform multiple functions to ensure the nation’s safety and security. They are responsible for safeguarding the borders of Singapore to prevent threats from entering the country. Being the first line of defence in ensuring the nation’s border security officers are entrusted with the responsibility of screening travellers inbound and outbound of Singapore daily. They examined 99 million arrivals and departures at the various checkpoints in 2014, which is a considerable volume compared to most immigration agencies. The officers’ work scopes also include cargo clearance, protective and security functions of checkpoints. The officers work in very demanding environment which can range from the smog at the land checkpoints to the harshness of the ports at the sea checkpoints. In addition, all immigration checkpoints are located at the boundaries, posing commuting challenges for officers. At the land checkpoints, festive seasons and school breaks are peak periods as given the surge of inbound and outbound travellers at the various checkpoints. Such work provides unique challenges in comparison to other law enforcement duties. This paper assesses the current stressors faced by officers of a border security agency through the conduct of ground observations as well as a perceived stress survey as well as recommendations in combating stressors faced by border security officers. The findings from the field observations and surveys indicate organisational and operational stressors that are unique to border security and recommends interventions in managing these stressors. Understanding these stressors would better inform border security agencies on the interventions needed to enhance the resilience of border security officers.Keywords: border security, Singapore, stress, operations
Procedia PDF Downloads 32611025 A Review on Stormwater Harvesting and Reuse
Authors: Fatema Akram, Mohammad G. Rasul, M. Masud K. Khan, M. Sharif I. I. Amir
Abstract:
Australia is a country of some 7,700 million square kilometres with a population of about 22.6 million. At present water security is a major challenge for Australia. In some areas the use of water resources is approaching and in some parts it is exceeding the limits of sustainability. A focal point of proposed national water conservation programs is the recycling of both urban storm-water and treated wastewater. But till now it is not widely practiced in Australia, and particularly storm-water is neglected. In Australia, only 4% of storm-water and rainwater is recycled, whereas less than 1% of reclaimed wastewater is reused within urban areas. Therefore, accurately monitoring, assessing and predicting the availability, quality and use of this precious resource are required for better management. As storm-water is usually of better quality than untreated sewage or industrial discharge, it has better public acceptance for recycling and reuse, particularly for non-potable use such as irrigation, watering lawns, gardens, etc. Existing storm-water recycling practice is far behind of research and no robust technologies developed for this purpose. Therefore, there is a clear need for using modern technologies for assessing feasibility of storm-water harvesting and reuse. Numerical modelling has, in recent times, become a popular tool for doing this job. It includes complex hydrological and hydraulic processes of the study area. The hydrologic model computes storm-water quantity to design the system components, and the hydraulic model helps to route the flow through storm-water infrastructures. Nowadays water quality module is incorporated with these models. Integration of Geographic Information System (GIS) with these models provides extra advantage of managing spatial information. However for the overall management of a storm-water harvesting project, Decision Support System (DSS) plays an important role incorporating database with model and GIS for the proper management of temporal information. Additionally DSS includes evaluation tools and Graphical user interface. This research aims to critically review and discuss all the aspects of storm-water harvesting and reuse such as available guidelines of storm-water harvesting and reuse, public acceptance of water reuse, the scopes and recommendation for future studies. In addition to these, this paper identifies, understand and address the importance of modern technologies capable of proper management of storm-water harvesting and reuse.Keywords: storm-water management, storm-water harvesting and reuse, numerical modelling, geographic information system, decision support system, database
Procedia PDF Downloads 37311024 Programming Systems in Implementation of Process Safety at Chemical Process Industry
Authors: Maryam Shayan
Abstract:
Programming frameworks have been utilized as a part of chemical industry process safety operation and configuration to enhance its effectiveness. This paper gives a brief survey and investigation of the best in class and effects of programming frameworks in process security. A study was completed by talking staff accountable for procedure wellbeing practices in the Iranian chemical process industry and diving into writing of innovation for procedure security. This article investigates the useful and operational attributes of programming frameworks for security and endeavors to sort the product as indicated by its level of effect in the administration chain of importance. The study adds to better comprehension of the parts of Information Communication Technology in procedure security, the future patterns and conceivable gaps for innovative work.Keywords: programming frameworks, chemical industry process, process security, administration chain, information communication technology
Procedia PDF Downloads 37411023 Water Crisis or Crisis of Water Management: Assessing Water Governance in Iran
Authors: Sedigheh Kalantari
Abstract:
Like many countries in the arid and semi-arid belt, Iran experiences a natural limitation in the availability of water resources. However, rapid socioeconomic development has created a serious water crisis in a nation that was once one of the world’s pioneers in sustainable water management, due to the Persians’ contribution to hydraulic engineering inventions – the Qanat – throughout history. The exogenous issues like the changing climate, frequent droughts, and international sanctions are only crisis catalyzers, not the main cause of the water crisis; and a resilient water management system is expected to be capable of coping with these periodic external pressures. The current dramatic water security issues in Iran are rooted in managerial, political, and institutional challenges rather than engineering and technical issues, and the country is suffering from challenges in water governance. The country, instead of rigorous water conservation efforts, is still focused on supply-driven approach, technology and centralized methods, and structural solutions that aim to increase water supply; while the effectiveness of water governance and management has often left unused. To solve these issues, it is necessary to assess the present situation and its evolution over time. In this respect, establishing water governance assessment mechanisms will be a significant aspect of this paper. The research framework, however, is a conceptual framework to assess governance performance of Iran to critically diagnose problematic issues and areas, as well as proffer empirically based solutions and determine the best possible steps towards transformational processes. This concept aims to measure the adequacy of current solutions and strategies designed to ameliorate these problems and then develop and prescribe adequate futuristic solutions. Thus, the analytical framework developed in this paper seeks to provide insights on key factors influencing water governance in Iranian cities, institutional frameworks to manage water across scales and authorities, multi-level management gaps and policy responses, through an evidence-based approach and good practices to drive reform toward sustainability and water resource conservation. The findings of this paper show that the current structure of the water governance system in Iran, coupled with the lack of a comprehensive understanding of the root causes of the problem, leaves minimal hope for developing sustainable solutions to Iran’s increasing water crisis. In order to follow sustainable development approaches, Iran needs to replace symptom management with problem prevention.Keywords: governance, Iran, sustainable development, water management, water resources
Procedia PDF Downloads 2711022 Iraq Water Resources Planning: Perspectives and Prognoses
Authors: Nadhir Al-Ansari, Ammar A. Ali, Sven Knutsson
Abstract:
Iraq is located in the Middle East. It covers an area of 433,970 square kilometres populated by about 32 million inhabitants. Iraq greatly relies in its water resources on the Tigris and Euphrates Rivers. Recently, Iraq is suffering from water shortage problems. This is due to external and internal factors. The former includes global warming and water resources policies of neighbouring countries while the latter includes mismanagement of its water resources. The supply and demand are predicted to be 43 and 66.8 Billion Cubic Meters (BCM) respectively in 2015, while in 2025 it will be 17.61 and 77 BCM respectively. In addition, future prediction suggests that Tigris and Euphrates Rivers will be completely dry in 2040. To overcome this problem, prudent water management policies are to be adopted. This includes Strategic Water Management Vision, development of irrigation techniques, reduction of water losses, use of non-conventional water resources and research and development planning.Keywords: Iraq, Tigris River, Euphrates River, water scarcity, water resources management
Procedia PDF Downloads 44911021 Mobile Agent Security Using Reference Monitor Based Security Framework
Authors: Sandhya Armoogum
Abstract:
In distributed systems and in open systems such as the Internet, often mobile code has to run on unknown and potentially hostile hosts. Mobile code such as a mobile agent is vulnerable when executing on remote hosts. The mobile agent may be subjected to various attacks such as tampering, inspection, and replay attack by a malicious host. Much research has been done to provide solutions for various security problems, such as authentication of mobile agent and hosts, integrity and confidentiality of the data carried by the mobile agent. Many of such proposed solutions in literature are not suitable for open systems whereby the mobile code arrives and executes on a host which is not known and trusted by the mobile agent owner. In this paper, we propose the adoption of the reference monitor by hosts in an open system for providing trust and security for mobile code execution. A secure protocol for the distribution of the reference monitor entity is described. This reference monitor entity on the remote host may also provide several security services such as authentication and integrity to the mobile code.Keywords: security, mobile agents, reference monitor, trust
Procedia PDF Downloads 44011020 Comprehensive Review of Ultralightweight Security Protocols
Authors: Prashansa Singh, Manjot Kaur, Rohit Bajaj
Abstract:
The proliferation of wireless sensor networks and Internet of Things (IoT) devices in the quickly changing digital landscape has highlighted the urgent need for strong security solutions that can handle these systems’ limited resources. A key solution to this problem is the emergence of ultralightweight security protocols, which provide strong security features while respecting the strict computational, energy, and memory constraints imposed on these kinds of devices. This in-depth analysis explores the field of ultralightweight security protocols, offering a thorough examination of their evolution, salient features, and the particular security issues they resolve. We carefully examine and contrast different protocols, pointing out their advantages and disadvantages as well as the compromises between resource limitations and security resilience. We also study these protocols’ application domains, including the Internet of Things, RFID systems, and wireless sensor networks, to name a few. In addition, the review highlights recent developments and advancements in the field, pointing out new trends and possible avenues for future research. This paper aims to be a useful resource for researchers, practitioners, and developers, guiding the design and implementation of safe, effective, and scalable systems in the Internet of Things era by providing a comprehensive overview of ultralightweight security protocols.Keywords: wireless sensor network, machine-to-machine, MQTT broker, server, ultralightweight, TCP/IP
Procedia PDF Downloads 8411019 The Social Perception of National Security Risks: A Comparative Perspective
Authors: Nicula Valentin, Andrei Virginia
Abstract:
Nowadays, the individual plays a central role in the state’s architecture. This is why the subjective dimension of the security represents a key concept in risk assessment. The paper’s scope is to emphasize the discrepancy between expert and lay evaluations of national security hazards, which is caused by key factors like emotions, personal experience, knowledge and media. Therefore, we have chosen to apply, using these two different groups of respondents, the Q-sort method, which reveals individual beliefs, attitudes, preferences hidden behind the subjects’ own way of prioritizing the risks they are confronted with. Our study’s conclusions are meant to unveil significant indicators needed to be taken into consideration by a state’s leadership in order to understand the social perception of national security hazards, to communicate better with the public opinion and prevent or mitigate the overestimation of the severity or probability of these dangers.Keywords: risk perception, Q-sort method, national security hazards, individual beliefs
Procedia PDF Downloads 31011018 Subsea Control Module (SCM) - A Vital Factor for Well Integrity and Production Performance in Deep Water Oil and Gas Fields
Authors: Okoro Ikechukwu Ralph, Fuat Kara
Abstract:
The discoveries of hydrocarbon reserves has clearly drifted offshore, and in deeper waters - areas where the industry still has limited knowledge; and that were hitherto, regarded as being out of reach. This shift presents significant and increased challenges in technology requirements needed to guarantee safety of personnel, environment and equipment; ensure high reliability of installed equipment; and provide high level of confidence in security of investment and company reputation. Nowhere are these challenges more apparent than on subsea well integrity and production performance. The past two decades has witnessed enormous rise in deep and ultra-deep water offshore field developments for the recovery of hydrocarbons. Subsea installed equipment at the seabed has been the technology of choice for these developments. This paper discusses the role of Subsea Control module (SCM) as a vital factor for deep-water well integrity and production performance. A case study for Deep-water well integrity and production performance is analysed.Keywords: offshore reliability, production performance, subsea control module, well integrity
Procedia PDF Downloads 51211017 Evaluation of Food Safety and Security Practices in Midday Meal Programmes in Rural Areas of Beed District
Authors: Nuzhat Sultana M. B.
Abstract:
Children are high-risk population in terms of food born illnesses. Food safety and security are the most important aspect of the success of midday meal programmes. Improper holding temperatures, cross-contamination and poor personal hygiene of food handlers are the main causes for the prevalence of pathogenic microbes in the food servicing areas. Two hundred and fifty preschool children in the age of 3 to 6 years from urban and rural anganwadies (pre school center) of Beed district were selected. Nutritional status of preschool children were assessed by anthropometrical and clinical measurement. The study assessed the food safety and security with the help of personal hygiene and other safety measures maintained by the food personnel working for midday meal programme, supplying mid meals to children in govt. anganwadies (pre school center). The hygiene level, sanitary condition and microbial quality of food and water, pathological health examination of food handlers were assessed with the help of checklist. A questionnaire was designed to evaluate knowledge, attitude, and practices of food handlers. Results of the study show that the nutritional and health status of rural and urban preschool children was very poor. Many of the food handlers were not aware of general knowledge and hygiene practices to be followed during food preparation areas. An intervention programme of education and importing training at workplaces has shown a positive impact on the outcome of safety and security practices and safe, hygienic practices of food handlers at workplace.Keywords: food, health, preschool children, safety, security
Procedia PDF Downloads 20311016 Influence of Security Attributes in Component-Based Software Development
Authors: Somayeh Zeinali
Abstract:
A component is generally defined as a piece of executable software with a published interface. Component-based software engineering (CBSE) has become recognized as a new sub-discipline of software engineering. In the component-based software development, components cannot be completely secure and thus easily become vulnerable. Some researchers have investigated this issue and proposed approaches to detect component intrusions or protect distributed components. Software security also refers to the process of creating software that is considered secure.The terms “dependability”, “trustworthiness”, and “survivability” are used interchangeably to describe the properties of software security.Keywords: component-based software development, component-based software engineering , software security attributes, dependability, component
Procedia PDF Downloads 559