Search results for: water security
11015 Gas Flotation Unit in Kuwait Oil Company Operations
Authors: Homoud Bourisli, Haitham Safar
Abstract:
Oil is one of main resources of energy in the world. As conventional oil is drying out, oil recovery is crucial to maintain the same level of oil production. Since water injection is one of the commonly used methods to increase and maintain pressure in oil wells, oil-water separation processes of the water associated with oil production for water injection oil recovery is very essential. Therefore, Gas Flotation Units are used for oil-water separation to be able to re-inject the treated water back into the wells to increase pressure.Keywords: Kuwait oil company, dissolved gas flotation unit, induced gas flotation unit, oil-water separation
Procedia PDF Downloads 57411014 Study on the OTP Authentication Method and Security for User Mobility in the Cloud
Authors: Jong-Won Lee
Abstract:
Since Cloud environment has appeared as the most powerful keyword in the computing industry, the growth in VDI (Virtual Desktop Infrastructure) became remarkable in domestic market. In recent years, with the trend that mobile devices such as smartphones and pads spread so rapidly, the strengths of VDI that allows people to access and perform business on the move along with companies' office needs expedite more rapid spread of VDI. However, although this enhanced accessibility and mobility can bring the enhanced productivity, it sometimes conflicts with the security, so there should be more detailed security solution, which is user authentication. In this paper, mobile OTP (One-Time Password) authentication method is proposed to secure mobile device portability through rapid and secure authentication using mobile devices such as mobile phones or pads, which does not require additional purchase or possession of OTP tokens of users. However, in order to use the service continuously and reliably in the cloud environment, both service provider and user have to prepare for security awareness and security threats, and continuously study the conflicting aspect between the improving user convenience and the security and supplement so that cloud service can provide opportunities to develop as a new growth industry in the future and create a new market in IT industry.Keywords: cloud, OTP, mobility, security, authentication
Procedia PDF Downloads 35211013 Impact of Saline Water and Water Restriction in Laying Hens
Authors: Reza Vakili
Abstract:
This experiment was conducted to investigate the effect of duration water restriction of drinking water and salinity level on production performance, egg quality and biochemical and hematological blood indices of laying hens. A total of 240 Hy-Line laying hens were used in a completely randomized design with a 2 × 2 factorial arrangement of treatments. Experimental treatments were: 1) free access to drinking water and a low level of salinity (TDS below 500 mg/L) (FAW+LS), 2) free access to water and a high level of salinity (TDS above 1500 mg/L), (FAW+HS), 3) 12 h nightly water restriction and a low level of salinity (LAW+LS), and 4) 12 h water restriction and a high level of salinity (LAW+HS). Intake of feed, percentage of egg production and egg weight and mass were not affected by water restriction or salinity level (P > 0.05), however, a trend (P < 0.01) for lower water consumption was detected in water-restricted hens, regardless of salinity level (213 vs 187). A tendency for lower eggshell and yolk weights was observed in hens that had limited access to water with high salinity compared to those had free access to high saline water (P = 0.08). Serum total protein and glucose concentrations significantly reduced (P < 0.05) in hens drank high salinity water, regardless of water restriction. Moreover, saline water increased the concentration of uric acid, creatinine, and cholesterol when compared to low salinity drank-hens (P < 0.05). The concentrations of ALT and AST increased with salinity level (P < 0.05) and water restriction caused an increment in AST content (P < 0.05). In conclusion, Hy-Line laying hens could withstand water restriction, whilst could not tolerate water salinity of about 1500 mg/L.Keywords: chemical pollutants, eggs, laying hens, salinity, water quality
Procedia PDF Downloads 2711012 Improving the Security of Internet of Things Using Encryption Algorithms
Authors: Amirhossein Safi
Abstract:
Internet of things (IOT) is a kind of advanced information technology which has drawn societies’ attention. Sensors and stimulators are usually recognized as smart devices of our environment. Simultaneously, IOT security brings up new issues. Internet connection and possibility of interaction with smart devices cause those devices to involve more in human life. Therefore, safety is a fundamental requirement in designing IOT. IOT has three remarkable features: overall perception, reliable transmission, and intelligent processing. Because of IOT span, security of conveying data is an essential factor for system security. Hybrid encryption technique is a new model that can be used in IOT. This type of encryption generates strong security and low computation. In this paper, we have proposed a hybrid encryption algorithm which has been conducted in order to reduce safety risks and enhancing encryption's speed and less computational complexity. The purpose of this hybrid algorithm is information integrity, confidentiality, non-repudiation in data exchange for IOT. Eventually, the suggested encryption algorithm has been simulated by MATLAB software, and its speed and safety efficiency were evaluated in comparison with conventional encryption algorithm.Keywords: internet of things, security, hybrid algorithm, privacy
Procedia PDF Downloads 46911011 Computational Fluid Dynamics Study on Water Soot Blower Direction in Tangentially Fired Pulverized-Coal Boiler
Authors: Teewin Plangsrinont, Wasawat Nakkiew
Abstract:
In this study, computational fluid dynamics (CFD) was utilized to simulate and predict the path of water from water soot blower through an ambient flow field in 300-megawatt tangentially burned pulverized coal boiler that utilizes a water soot blower as a cleaning device. To predict the position of the impact of water on the opposite side of the water soot blower under identical conditions, the nozzle size and water flow rate were fixed in this investigation. The simulation findings demonstrated a high degree of accuracy in predicting the direction of water flow to the boiler's water wall tube, which was validated by comparison to experimental data. Results show maximum deviation value of the water jet trajectory is 10.2 percent.Keywords: computational fluid dynamics, tangentially fired boiler, thermal power plant, water soot blower
Procedia PDF Downloads 21111010 Water Supply and Utility Management to Address Urban Sanitation Issues
Authors: Akshaya P., Priyanjali Prabhkaran
Abstract:
The paper examines the formulation of strategies to develop a comprehensive model of city level water utility management to addressing urban sanitation issues. The water is prime life sustaining natural resources and nature’s gifts to all living beings on the earth multiple urban sanitation issues are addressed in the supply of water in a city. Many of these urban sanitation issues are linked to population expansion and economic inequity. Increased usage of water and the development caused water scarcity. The lack of water supply results increases the chance of unhygienic situations in the cities. In this study, the urban sanitation issues are identified with respect to water supply and utility management. The study compared based on their best practices and initiatives. From this, best practices and initiatives identify suitable sustainable measures to address water supply issues in the city level. The paper concludes with the listed provision that should be considered suitable measures for water supply and utility management in city level to address the urban sanitation issues.Keywords: water, benchmarking water supply, water supply networks, water supply management
Procedia PDF Downloads 11011009 Evaluation of Water Quality on the Strength of Simple Concrete: Case Study of Wells in Jipijapa, Manabí, Ecuador
Authors: Julio Cesar Pino Tarragó, Dunia Lisbet Domínguez Gálvez, Luis Alfonso Moreno Ponce, Jhony Julio Regalado Jalca
Abstract:
This study examines the impact of three distinct types of water on the compressive strength of plain concrete, focusing on samples from wells in Jipijapa, Manabí, Ecuador: Joa water, characterized by high sulfur content; Chade 1 water, with low sulfur content; and Chade 2 water, which is highly brackish. Compressive strength tests were conducted at 7, 14, and 28 days to assess the influence of these water types on the structural integrity of the concrete. The results indicate that both brackish and sulfur-rich water significantly reduces concrete strength, while Chade 1 water, though initially enhancing strength, displays variability in long-term performance. These outcomes underscore the importance of optimizing construction practices in regions like Jipijapa, where potable water is scarce, by exploring sustainable alternatives for using non-potable water, thereby conserving limited water resources.Keywords: compressive strength, plain concrete, sulfur water, brackish water, water quality
Procedia PDF Downloads 3811008 Calculation of Water Economy Balance for Water Management
Authors: Vakhtang Geladze, Nana Bolashvili, Tamazi Karalashvili, Nino Machavariani, Ana Karalashvili, George Geladze, Nana Kvirkvelia
Abstract:
Fresh water deficit is one of the most important global problems today. It must be taken into consideration that in the nearest future fresh water crisis will become even more acute owing to the global climate warming and fast desertification processes in the world. Georgia is rich in water resources, but there are disbalance between the eastern and western parts of the country. The goal of the study is to integrate the recent mechanisms compatible with European standards into Georgian water resources management system on the basis of GIS. Moreover, to draw up water economy balance for the purpose of proper determination of water consumption priorities that will be an exchange ratio of water resources and water consumption of the concrete territory. For study region was choose south-eastern part of country, Kvemo kartli Region. This is typical agrarian region, tends to the desertification. The water supply of the region was assessed on the basis of water economy balance, which was first time calculated for this region.Keywords: desertification, GIS, sustainable management, water management
Procedia PDF Downloads 13911007 Optimising the Reservoir Operation Using Water Resources Yield and Planning Model at Inanda Dam, uMngeni Basin
Authors: O. Nkwonta, B. Dzwairo, F. Otieno, J. Adeyemo
Abstract:
The effective management of water resources is of great importance to ensure the supply of water resources to support changing water requirements over a selected planning horizon and in a sustainable and cost-effective way. Essentially, the purpose of the water resources planning process is to balance the available water resources in a system with the water requirements and losses to which the system is subjected. In such situations, water resources yield and planning model can be used to solve those difficulties. It has an advantage over other models by managing model runs, developing a representative system network, modelling incremental sub-catchments, creating a variety of standard system features, special modelling features, and run result output options.Keywords: complex, water resources, planning, cost effective, management
Procedia PDF Downloads 45111006 Post-Covid 19 Pandemic Economy: Corporate Governance and Performance of Private Security Firms in Kenya
Authors: Sewe Silvanus Odhiambo
Abstract:
Globally, many governments have publicly recognized private security firms as essential services providers. The private security firms face a lot of challenges, but the COVID-19 situation also has exacerbated them to another level. This paper locates its relevance in the post-coronavirus era. The COVID-19 pandemic has redefined the world operation, which shows a higher impact on the security field. Accordingly, the purpose of the study was to examine the role of corporate governance on the performance of private security firms in a post-covid pandemic era in Kenya. The study employed a descriptive research design, which included a quantitative approach and secondary data. The study was carried in the month of July 2021 from the registered private security firms. After targeting all private security firms, only 54 firms had disclosed their annual report by the time of conducting the study. The results depicted that pandemic has affected the performance of private security firms measures unfavorably. Further, boards of directors show a positive association with security firm performance. The study recommends that there is need board of directors to enhance management’s risk assessments in the midst of COVID-19; ensure that there are business continuity plans; there is organizational resilience; there is need for the development of new digital strategies; enabling the digital workforce in the firms and have effective communication plans with both internal and external stakeholders to deal with uncertainties and develop more post-COVID practices for boards of directors to improve performance of private security firms in Kenya. The practical implications of the study are that the research outcomes might assist regulatory bodies, investors, policymakers, and the security sector in general in their formulation of public and corporate governance strategies concerning future emergency preparedness and responses. This study also provides a unique contribution to the literature of COVID-19 and security firm performance in emerging economies context.Keywords: COVID-19, corporate governance, firm performance, private security firms
Procedia PDF Downloads 16211005 Enhancing Code Security with AI-Powered Vulnerability Detection
Authors: Zzibu Mark Brian
Abstract:
As software systems become increasingly complex, ensuring code security is a growing concern. Traditional vulnerability detection methods often rely on manual code reviews or static analysis tools, which can be time-consuming and prone to errors. This paper presents a distinct approach to enhancing code security by leveraging artificial intelligence (AI) and machine learning (ML) techniques. Our proposed system utilizes a combination of natural language processing (NLP) and deep learning algorithms to identify and classify vulnerabilities in real-world codebases. By analyzing vast amounts of open-source code data, our AI-powered tool learns to recognize patterns and anomalies indicative of security weaknesses. We evaluated our system on a dataset of over 10,000 open-source projects, achieving an accuracy rate of 92% in detecting known vulnerabilities. Furthermore, our tool identified previously unknown vulnerabilities in popular libraries and frameworks, demonstrating its potential for improving software security.Keywords: AI, machine language, cord security, machine leaning
Procedia PDF Downloads 4011004 Technical Feasibility Analysis of PV Water Pumping System in Khuzestan Province-Iran
Authors: M.Goodarzi, M.Mohammadi, M. Rezaee
Abstract:
The technical analysis of using solar energy and electricity for water pumping in the Khuzestan province in Iran is investigated. For this purpose, the ecological conditions such as the weather data, air clearness and sunshine hours are analyzed. The nature of groundwater in the region was examined in terms of depth, static and dynamic head, water pumping rate.Three configurations for solar water pumping system were studied in this thesis; AC solar water pumping with storage battery, AC solar water pumping with storage tank and DC direct solar water pumping.Keywords: technical feasibility, solar energy, photovoltaic systems, photovoltaic water pumping system
Procedia PDF Downloads 63111003 Internet of Things based AquaSwach Water Purifier
Authors: Karthiyayini J., Arpita Chowdary Vantipalli, Darshana Sailu Tanti, Malvika Ravi Kudari, Krtin Kannan
Abstract:
This paper is propelled from the generally existing undertaking of the smart water quality management, which addresses an IoT (Internet of things) based brilliant water quality observing (SWQM) framework which we call it AquaSwach that guides in the ceaseless estimation of water conditions dependent on five actual boundaries i.e., temperature, pH, electric conductivity and turbidity properties and water virtue estimation each time you drink water. Six sensors relate to Arduino-Mega in a discrete way to detect the water parameters. Extracted data from the sensors are transmitted to a desktop application developed in the NET platform and compared with the WHO (World Health Organization) standard values.Keywords: AquaSwach, IoT, WHO, water quality
Procedia PDF Downloads 21411002 An Exploration of Cyberspace Security, Strategy for a New Era
Authors: Laxmi R. Kasaraneni
Abstract:
The Internet connects all the networks, including the nation’s critical infrastructure that are used extensively by not only a nation’s government and military to protect sensitive information and execute missions, but also the primary infrastructure that provides services that enable modern conveniences such as education, potable water, electricity, natural gas, and financial transactions. It has become the central nervous system for the government, the citizens, and the industries. When it is attacked, the effects can ripple far and wide impacts not only to citizens’ well-being but nation’s economy, civil infrastructure, and national security. As such, these critical services may be targeted by malicious hackers during cyber warfare, it is imperative to not only protect them and mitigate any immediate or potential threats, but to also understand the current or potential impacts beyond the IT networks or the organization. The Nation’s IT infrastructure which is now vital for communication, commerce, and control of our physical infrastructure, is highly vulnerable to attack. While existing technologies can address some vulnerabilities, fundamentally new architectures and technologies are needed to address the larger structural insecurities of an infrastructure developed in a more trusting time when mass cyber attacks were not foreseen. This research is intended to improve the core functions of the Internet and critical-sector information systems by providing a clear path to create a safe, secure, and resilient cyber environment that help stakeholders at all levels of government, and the private sector work together to develop the cybersecurity capabilities that are key to our economy, national security, and public health and safety. This research paper also emphasizes the present and future cyber security threats, the capabilities and goals of cyber attackers, a strategic concept and steps to implement cybersecurity for maximum effectiveness, enabling technologies, some strategic assumptions and critical challenges, and the future of cyberspace.Keywords: critical challenges, critical infrastructure, cyber security, enabling technologies, national security
Procedia PDF Downloads 29711001 SAFECARE: Integrated Cyber-Physical Security Solution for Healthcare Critical Infrastructure
Authors: Francesco Lubrano, Fabrizio Bertone, Federico Stirano
Abstract:
Modern societies strongly depend on Critical Infrastructures (CI). Hospitals, power supplies, water supplies, telecommunications are just few examples of CIs that provide vital functions to societies. CIs like hospitals are very complex environments, characterized by a huge number of cyber and physical systems that are becoming increasingly integrated. Ensuring a high level of security within such critical infrastructure requires a deep knowledge of vulnerabilities, threats, and potential attacks that may occur, as well as defence and prevention or mitigation strategies. The possibility to remotely monitor and control almost everything is pushing the adoption of network-connected devices. This implicitly introduces new threats and potential vulnerabilities, posing a risk, especially to those devices connected to the Internet. Modern medical devices used in hospitals are not an exception and are more and more being connected to enhance their functionalities and easing the management. Moreover, hospitals are environments with high flows of people, that are difficult to monitor and can somehow easily have access to the same places used by the staff, potentially creating damages. It is therefore clear that physical and cyber threats should be considered, analysed, and treated together as cyber-physical threats. This means that an integrated approach is required. SAFECARE, an integrated cyber-physical security solution, tries to respond to the presented issues within healthcare infrastructures. The challenge is to bring together the most advanced technologies from the physical and cyber security spheres, to achieve a global optimum for systemic security and for the management of combined cyber and physical threats and incidents and their interconnections. Moreover, potential impacts and cascading effects are evaluated through impact propagation models that rely on modular ontologies and a rule-based engine. Indeed, SAFECARE architecture foresees i) a macroblock related to cyber security field, where innovative tools are deployed to monitor network traffic, systems and medical devices; ii) a physical security macroblock, where video management systems are coupled with access control management, building management systems and innovative AI algorithms to detect behavior anomalies; iii) an integration system that collects all the incoming incidents, simulating their potential cascading effects, providing alerts and updated information regarding assets availability.Keywords: cyber security, defence strategies, impact propagation, integrated security, physical security
Procedia PDF Downloads 16611000 Enhancing Cybersecurity Protective Behaviour: Role of Information Security Competencies and Procedural Information Security Countermeasure Awareness
Authors: Norshima Humaidi, Saif Hussein Abdallah Alghazo
Abstract:
Cybersecurity threat have become a serious issue recently, and one of the cause is because human error, which is usually constituted by carelessness, ignorance, and failure to practice cybersecurity behaviour adequately. Using a data from a quantitative survey, Partial Least Squares-Structural Equation Modelling (PLS-SEM) analysis was used to determine the factors that affect cybersecurity protective behaviour (CPB). This study adapts cybersecurity protective behaviour model by focusing on two constructs that can enhance CPB: manager’s information security competencies (MISI) and procedural information security countermeasure (PCM) awareness. Theory of leadership competencies were adapted to measure user’s perception towards competencies among security managers/leader in the organization. Confirmatory factor analysis (CFA) testing shows that all the measurement items of each constructs were adequate in their validity individually based on their factor loading value. Moreover, each constructs are valid based on their parameter estimates and statistical significance. The quantitative research findings show that PCM awareness strongly influences CPB compared to MISI. Meanwhile, MISI was significantlyPCM awarenss. This study believes that the research findings can contribute to human behaviour in IS studies and are particularly beneficial to policy makers in improving organizations’ strategic plans in information security, especially in this new era. Most organizations spend time and resources to provide and establish strategic plans of information security; however, if employees are not willing to comply and practice information security behaviour appropriately, then these efforts are in vain.Keywords: cybersecurity, protection behaviour, information security, information security competencies, countermeasure awareness
Procedia PDF Downloads 9710999 Best Practices to Enhance Patient Security and Confidentiality When Using E-Health in South Africa
Authors: Lethola Tshikose, Munyaradzi Katurura
Abstract:
Information and Communication Technology (ICT) plays a critical role in improving daily healthcare processes. The South African healthcare organizations have adopted Information Systems to integrate their patient records. This has made it much easier for healthcare organizations because patient information can now be accessible at any time. The primary purpose of this research study was to investigate the best practices that can be applied to enhance patient security and confidentiality when using e-health systems in South Africa. Security and confidentiality are critical in healthcare organizations as they ensure safety in EHRs. The research study used an inductive research approach that included a thorough literature review; therefore, no data was collected. The research paper’s scope included patient data and possible security threats associated with healthcare systems. According to the study, South African healthcare organizations discovered various patient data security and confidentiality issues. The study also revealed that when it comes to handling patient data, health professionals sometimes make mistakes. Some may not be computer literate, which posed issues and caused data to be tempered with. The research paper recommends that healthcare organizations ensure that security measures are adequately supported and promoted by their IT department. This will ensure that adequate resources are distributed to keep patient data secure and confidential. Healthcare organizations must correctly use standards set up by IT specialists to solve patient data security and confidentiality issues. Healthcare organizations must make sure that their organizational structures are adaptable to improve security and confidentiality.Keywords: E-health, EHR, security, confidentiality, healthcare
Procedia PDF Downloads 5910998 An Analysis of Privacy and Security for Internet of Things Applications
Authors: Dhananjay Singh, M. Abdullah-Al-Wadud
Abstract:
The Internet of Things is a concept of a large scale ecosystem of wireless actuators. The actuators are defined as things in the IoT, those which contribute or produces some data to the ecosystem. However, ubiquitous data collection, data security, privacy preserving, large volume data processing, and intelligent analytics are some of the key challenges into the IoT technologies. In order to solve the security requirements, challenges and threats in the IoT, we have discussed a message authentication mechanism for IoT applications. Finally, we have discussed data encryption mechanism for messages authentication before propagating into IoT networks.Keywords: Internet of Things (IoT), message authentication, privacy, security
Procedia PDF Downloads 38410997 Interactions between Water-Stress and VA Mycorrhizal Inoculation on Plant Growth and Leaf-Water Potential in Tomato
Authors: Parisa Alizadeh Oskuie, Shahram Baghban Ciruse
Abstract:
The influence of arbuscular mycorrhizal (AM) fungus(Glomus mossea) on plant growth and leaf-water potential of tomato (lycopersicum esculentum L.cv.super star) were studied in potted culture water stress stress period of 3 months in greenhouse conditions with the soil matric potential maintained at Fc1, Fc2, Fc3, and Fc4 respectively (0.8,0.7,0.6,0.5 Fc). Seven-day-old seedlings of tomato were transferred to pots containing Glomus mossea or non-AMF. AM colonization significantly stimulated shoot dry matter and leaf-water potential but water stress significantly decreased leaf area, shoot dry matter colonization and leaf-water potential.Keywords: leaf-water potential, plant growth, tomato, VA mycorrhiza, water-stress
Procedia PDF Downloads 42410996 A Review of Security Attacks and Intrusion Detection Schemes in Wireless Sensor Networks: A Survey
Authors: Maleh Yassine, Ezzati Abdellah
Abstract:
Wireless Sensor Networks (WSNs) are currently used in different industrial and consumer applications, such as earth monitoring, health related applications, natural disaster prevention, and many other areas. Security is one of the major aspects of wireless sensor networks due to the resource limitations of sensor nodes. However, these networks are facing several threats that affect their functioning and their life. In this paper we present security attacks in wireless sensor networks, and we focus on a review and analysis of the recent Intrusion Detection schemes in WSNs.Keywords: wireless sensor networks, security attack, denial of service, IDS, cluster-based model, signature based IDS, hybrid IDS
Procedia PDF Downloads 38610995 Water Demand Modelling Using Artificial Neural Network in Ramallah
Authors: F. Massri, M. Shkarneh, B. Almassri
Abstract:
Water scarcity and increasing water demand especially for residential use are major challenges facing Palestine. The need to accurately forecast water consumption is useful for the planning and management of this natural resource. The main objective of this paper is to (i) study the major factors influencing the water consumption in Palestine, (ii) understand the general pattern of Household water consumption, (iii) assess the possible changes in household water consumption and suggest appropriate remedies and (iv) develop prediction model based on the Artificial Neural Network to the water consumption in Palestinian cities. The paper is organized in four parts. The first part includes literature review of household water consumption studies. The second part concerns data collection methodology, conceptual frame work for the household water consumption surveys, survey descriptions and data processing methods. The third part presents descriptive statistics, multiple regression and analysis of the water consumption in the two Palestinian cities. The final part develops the use of Artificial Neural Network for modeling the water consumption in Palestinian cities.Keywords: water management, demand forecasting, consumption, ANN, Ramallah
Procedia PDF Downloads 21910994 NFC Communications with Mutual Authentication Based on Limited-Use Session Keys
Authors: Chalee Thammarat
Abstract:
Mobile phones are equipped with increased short-range communication functionality called Near Field Communication (or NFC for short). NFC needs no pairing between devices but suitable for little amounts of data in a very restricted area. A number of researchers presented authentication techniques for NFC communications, however, they still lack necessary authentication, particularly mutual authentication and security qualifications. This paper suggests a new authentication protocol for NFC communication that gives mutual authentication between devices. The mutual authentication is a one of property, of security that protects replay and man-in-the-middle (MitM) attack. The proposed protocols deploy a limited-use offline session key generation and use of distribution technique to increase security and make our protocol lightweight. There are four sub-protocols: NFCAuthv1 is suitable for identification and access control and NFCAuthv2 is suitable for the NFC-enhanced phone by a POS terminal for digital and physical goods and services.Keywords: cryptographic protocols, NFC, near field communications, security protocols, mutual authentication, network security
Procedia PDF Downloads 43010993 Suitability Assessment of Water Harvesting and Land Restoration in Catchment Comprising Abandoned Quarry Site in Addis Ababa, Ethiopia
Authors: Rahel Birhanu Kassaye, Ralf Otterpohl, Kumelachew Yeshitila
Abstract:
Water resource management and land degradation are among the critical issues threatening the suitable livability of many cities in developing countries such as Ethiopia. Rapid expansion of urban areas and fast growing population has increased the pressure on water security. On the other hand, the large transformation of natural green cover and agricultural land loss to settlement and industrial activities such as quarrying is contributing to environmental concerns. Integrated water harvesting is considered to play a crucial role in terms of providing alternative water source to insure water security and helping to improve soil condition, agricultural productivity and regeneration of ecosystem. Moreover, it helps to control stormwater runoff, thus reducing flood risks and pollution, thereby improving the quality of receiving water bodies and the health of inhabitants. The aim of this research was to investigate the potential of applying integrated water harvesting approaches as a provision for water source and enabling land restoration in Jemo river catchment consisting of abandoned quarry site adjacent to a settlement area that is facing serious water shortage in western hilly part of Addis Ababa city, Ethiopia. The abandoned quarry site, apart from its contribution to the loss of aesthetics, has resulted in poor water infiltration and increase in stormwater runoff leading to land degradation and flooding in the downstream. Application of GIS and multi-criteria based analysis are used for the assessment of potential water harvesting technologies considering the technology features and site characteristics of the case study area. Biophysical parameters including precipitation, surrounding land use, surface gradient, soil characteristics and geological aspects are used as site characteristic indicators and water harvesting technologies including retention pond, check dam, agro-forestation employing contour trench system were considered for evaluation with technical and socio-economic factors used as parameters in the assessment. The assessment results indicate the different suitability potential among the analyzed water harvesting and restoration techniques with respect to the abandoned quarry site characteristics. Application of agro-forestation with contour trench system with the revegetation of indigenous plants is found to be the most suitable option for reclamation and restoration of the quarry site. Successful application of the selected technologies and strategies for water harvesting and restoration is considered to play a significant role to provide additional water source, maintain good water quality, increase agricultural productivity at urban peri-urban interface scale and improve biodiversity in the catchment. The results of the study provide guideline for decision makers and contribute to the integration of decentralized water harvesting and restoration techniques in the water management and planning of the case study area.Keywords: abandoned quarry site, land reclamation and restoration, multi-criteria assessment, water harvesting
Procedia PDF Downloads 21710992 The Legal Personality of The Security Council
Authors: Helyeh Doutaghi
Abstract:
The United Nations Security Council (UNSC) is one of the six principal organs of the United Nations. Under the Charter of the United Nations (UN Charter), the UNSC’s primary responsibility is maintaining international peace and security, which it does through establishing and adopting a Security Council resolution. United Nations resolutions are formal expressions of the opinion or will of United Nations organs. However, there have been times when powerful politicians (or governments with great political power) had the first say in situations where the UNSC should have had jurisdiction based on the principle of rule of law, which is the notion that people are governed by the law rather than by officials. This paper will assess the effectiveness of the UNSC by analyzing its actions during the Iran-Iraq war for it has been found that one of the major reasons for the prolongation of the war was a result of the one-sided positions taken by the UNSC and many nations. The UNSC’s success in achieving its primary goal during the war will be discussed, including an examination of the duties and structure of the UNSC by reviewing the articles in the UN Charter; this will include examples of the UNSC’s role in other international disputes as well.Keywords: UN Security Council, Iran, Iraq, charter, international law
Procedia PDF Downloads 46210991 Surface Water Quality in Orchard Area, Amphawa District, Samut Songkram Province, Thailand
Authors: Sisuwan Kaseamsawat, Sivapan Choo-In
Abstract:
This study aimed to evaluated the surface water quality for agriculture and consumption in the district. Surface water quality parameters in this study in cluding water temperature, turbidity, conductivity. salinity, pH, dissolved oxygen, BOD, nitrate, Suspended solids, phosphorus. Total dissolve solids, iron, copper, zinc, manganese, lead and cadmium. Water samples were collected from small excavation, Lychee, Pomelo, and Coconut orchard for 3 season during January to December 2011. The surface water quality from small excavation, Lychee, pomelo, and coconut orchard are meet the type III of surface water quality standard issued by the National Environmental Quality Act B. E. 1992. except the concentration of heavy metal. And did not differ significantly at 0.05 level, except dissolved oxygen. The water is suitable for consumption by the usual sterile and generally improving water quality through the process before. And is suitable for agriculture.Keywords: water quality, surface water quality, Thailand, water
Procedia PDF Downloads 35810990 Bring Your Own Device Security Model in a Financial Institution of South Africa
Authors: Michael Nthabiseng Moeti, Makhulu Relebogile Langa, Joey Jansen van Vuuren
Abstract:
This paper examines the utilization of personal electronic devices like laptops, tablets, and smartphones for professional duties within a financial organization. This phenomenon is known as bring your own device (BYOD). BYOD accords employees the freedom to use their personal devices to access corporate resources from anywhere in the world with Internet access. BYOD arrangements introduce significant security risks for both organizations and users. These setups change the threat landscape for enterprises and demand unique security strategies, as conventional tools tailored for safeguarding managed devices fall short in adequately protecting enterprise assets without active user cooperation. This paper applies protection motivation theory (PMT) to highlight behavioral risks from BYOD users that may impact the security of financial institutions. Thematic analysis was applied to gain a comprehensive understanding of how users perceive this phenomenon. These findings demonstrates that the existence of a security policy does not ensure that all employees will take measures to protect their personal devices. Active promotion of BYOD security policies is crucial for financial institution employees and management. This paper developed a BYOD security model which is useful for understanding compliant behaviors. Given that BYOD security is becoming a major concern across financial sector, it is important. The paper recommends that future research could expand the number of universities from which data is collected.Keywords: BYOD, information security, protection motivation theory, security risks, thematic analysis
Procedia PDF Downloads 3310989 Adult Education for Transformation and Security Challenges in Nigeria
Authors: Asmau Zarma Gogaram
Abstract:
The paper examines adult education and how it can be employed as a strategy for transformation and security challenges in Nigeria. It defines the meaning of adult education and its objectives.The issue of the necessity of employing adult education as a strategy for transformation and security challenges was also examined in the paper.In doing this it discussed the different types of adult education programmes, i.e.continuing education, literacy education, retirement and pre-retirement education and civic education. The paper concluded by stating that if the programmes stated are internalizes and applied they can help to raise awareness. Finally the paper proffered some recommendations one of which was that government should at all levels increase their efforts or promoting acquisition of adult education.Keywords: adult education, transformation and security challenges, Nigeria, education and human development
Procedia PDF Downloads 52310988 Effect of Demineralized Water Purity on the Corrosion Behavior of Steel Alloys
Authors: A. M. El-Aziz, M. Elsehamy, H. Hussein
Abstract:
Steel or stainless steel have reasonable corrosion behavior in water, their corrosion resistance is significantly dependent on the water purity. It was not expected that demineralized water has an aggressive effect on steel alloys, in this study, the effect of water with different purity on steel X52 and stainless steel 316L was investigated. Weight loss and electrochemical measurements were employed to measure the corrosion behavior. Samples were microscopically investigated after test. It was observed that the higher the water purity the more reactive it is. Comparative analysis of the potentiodynamic curves for different water purity showed the aggressiveness of the demineralised water (conductivity of 0.05 microSiemens per cm) over the distilled water. Whereas, the corrosion rates of stainless steel 858 and 623 nm/y for demi and distilled water respectively. On the other hand, the corrosion rates of carbon steel x52 were estimated about 4.8 and 3.6 µm/y for demi and distilled water, respectively. Open circuit potential (OCP) recorded more positive potentials in case of stainless steel than carbon steel in different water purities. Generally, stainless steel illustrated high pitting resistance than carbon steel alloy, the surface film was investigated by scanning electron microscopy (SEM) and analyzed by energy dispersive X-ray spectroscopy (EDX). This behavior was explained based on that demi and distilled water might be considered as ‘hungry water’ in which it wants to be in equilibrium and will pull ions out of the surrounding metals trying to satisfy its ‘hunger’.Keywords: corrosion, demineralized water, distilled water, steel alloys
Procedia PDF Downloads 81510987 Advanced Metallic Frameworks for Development of Robust and Efficient Water Splitting Electrodes
Authors: Tam D. Nguyen, Joe Varga, Douglas MacFarlane, Alexandr Simonov
Abstract:
Development of advanced technologies for green hydrogen generation from renewables is of key strategic importance to global future energy security and economic growth. Renewable-powered water electrolysis (WE) is considered as the most effective of the sustainable methods for hydrogen generation at scale. Currently, the greatest challenge of hydrogen production via water electrolysis is the insufficiently high efficiency. In which, the energy loss associated with the conversion of water to hydrogen is approximately 40-60%, with 30-35% associated with the electrolysis itself and 10-12% with gas compression and transportation. Hence, development of an energy-efficient water electrolyser that can generate hydrogen at high pressure will address both of these major challenges. This requires the development of advanced electrode configuration of the water electrolysis cell. Herein, we developed a highly-ordered interconnected structure of the metallic inverse-opal (IO) frameworks based on low cost materials, e.g. Cu, Ni, Fe, Co. The water electrolysis electrodes based on these frameworks can provide excellent mechanical strength required for the application under conditions of extreme pressure, as well as outstanding catalytic performance through the exceptional high surface area and high electrical conductivity. For example, NiFe layered double hydroxide (LDH) catalyst deposited on Cu IO is able to reach the oxygen evolution reaction (OER) catalytic performance up to the rates of > 100 mA cm−2 (>727A gcatalyst-1) at an overpotential of ~0.3 V. This high performance is achieved with only few micron-thick catalyst layers, in contrast to similarly performance of 103-fold thicker electrodes based on foams and other substrates.Keywords: oxygen evolution reaction, support materials, mass transport, NiFe LDH
Procedia PDF Downloads 310986 Assessment of the Water Quality of the Nhue River in Vietnam and its Suitability for Irrigation Water
Authors: Thi Lan Huong Nguyen, Motohei Kanayama, Takahiro Higashi, Van Chinh Le, Thu Ha Doan, Anh Dao Chu
Abstract:
The Nhue River in Vietnam is the main source of irrigation water for suburban agricultural land and fish farm. Wastewater from the industrial plants located along these rivers has been discharged, which has degraded the water quality of the rivers. The present paper describes the chemical properties of water from the river focusing on heavy metal pollution and the suitability of water quality for irrigation. Water from the river was heavily polluted with heavy metals such as Pb, Cu, Zn, Cr, Cd, and Ni. Dissolved oxygen, COD, and total suspended solids, and the concentrations of all heavy metals exceeded the Vietnamese standard for surface water quality in all investigated sites. The concentrations of some heavy metals such as Cu, Cd, Cr and Ni were over the internationally recommended WHO maximum limits for irrigation water. A wide variation in heavy metal concentration of water due to metal types is the result of wastewater discharged from different industrial sources.Keywords: heavy metals, stream water, irrigation, industry
Procedia PDF Downloads 402