Search results for: malware mitigation
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 842

Search results for: malware mitigation

572 Research on Urban Thermal Environment Climate Map Based on GIS: Taking Shapingba District, Chongqing as an Example

Authors: Zhao Haoyue

Abstract:

Due to the combined effects of climate change, urban expansion, and population growth, various environmental issues, such as urban heat islands and pollution, arise. Therefore, reliable information on urban environmental climate is needed to address and mitigate the negative effects. The emergence of urban climate maps provides a practical basis for urban climate regulation and improvement. This article takes Shapingba District, Chongqing City, as an example to study the construction method of urban thermal environment climate maps based on GIS spatial analysis technology. The thermal load, ventilation potential analysis map, and thermal environment comprehensive analysis map were obtained. Based on the classification criteria obtained from the climate map, corresponding protection and planning mitigation measures have been proposed.

Keywords: urban climate, GIS, heat island analysis, urban thermal environment

Procedia PDF Downloads 64
571 Trauma-Informed Leadership: Educational Leadership Practices in a Global Pandemic

Authors: Kyna Elliott

Abstract:

The COVID-19 global pandemic has changed the shape, design, and delivery of education. As communities continue to fight the pandemic, research suggests the coronavirus is leaving an indelible mark on education which will last long after the pandemic has ended. Faculty and students bring more than their textbooks into the classroom. They bring their lived experiences into the classroom, and it is through these lived experiences that interactions and learning filter through. The COVID-19 pandemic has proved to be a traumatic experience for many. Leaders will need to have the tools and skills to mitigate trauma's impact on faculty and students. This presentation will explore research-based trauma-informed leadership practices, pedagogy, and mitigation strategies within secondary school environments.

Keywords: COVID-19, compassion fatigue, educational leadership, the science of trauma, trauma-informed leadership, trauma-informed pedagogy

Procedia PDF Downloads 184
570 3D Dynamic Modeling of Transition Zones

Authors: Edina Koch, Péter Hudacsek

Abstract:

In railways transition zone is present at the boundaries of zones with different stiffness. When a train rides from an embankment onto a stiff structure, such as a bridge, tunnel or culvert, an abrupt change in the support stiffness occurs possibly inducing differential settlements. This in long term can yield to the degradation of the tracks and foundations in the transition zones. A number of techniques have been proposed or implemented to provide gradual stiffness transition at the problem zones, such as methods to ensure gradually changing pad stiffness, application of long sleepers or installation of auxiliary rails in the transition zone. Aim of the research presented in this paper is to analyze the 3D and the dynamic effects induced by the passing train over an area where significant difference in the support stiffness exists. The effects were analyzed for different arrangements associated with certain differential settlement mitigation strategies of the transition zones.

Keywords: culvert, dynamic load, HS small model, railway transition zone

Procedia PDF Downloads 252
569 Monitoring Land Productivity Dynamics of Gombe State, Nigeria

Authors: Ishiyaku Abdulkadir, Satish Kumar J

Abstract:

Land Productivity is a measure of the greenness of above-ground biomass in health and potential gain and is not related to agricultural productivity. Monitoring land productivity dynamics is essential to identify, especially when and where the trend is characterized degraded for mitigation measures. This research aims to monitor the land productivity trend of Gombe State between 2001 and 2015. QGIS was used to compute NDVI from AVHRR/MODIS datasets in a cloud-based method. The result appears that land area with improving productivity account for 773sq.km with 4.31%, stable productivity traced to 4,195.6 sq.km with 23.40%, stable but stressed productivity represent 18.7sq.km account for 0.10%, early sign of decline productivity occupied 5203.1sq.km with 29%, declining productivity account for 7019.7sq.km, represent 39.2%, water bodies occupied 718.7sq.km traced to 4% of the state’s area.

Keywords: above-ground biomass, dynamics, land productivity, man-environment relationship

Procedia PDF Downloads 116
568 The Road Ahead: Merging Human Cyber Security Expertise with Generative AI

Authors: Brennan Lodge

Abstract:

Cybersecurity professionals have long been embroiled in a digital arms race, confronting increasingly sophisticated threats with innovative solutions. The field of cybersecurity is in an unending race against malicious adversaries. As threats evolve in complexity, the tools used to defend against them need to advance even faster. Burdened with a vast arsenal of tools and an expansive scope of threat intelligence, analysts frequently navigate a complex web, trying to discern patterns amidst information overload. Herein lies the potential of Retrieval Augmented Generation (RAG). By combining the capabilities of Large Language Models (LLMs) with a generative AI facet, RAG brings to the table an unparalleled ability for real-time cross-referencing, bridging the gap between raw data and actionable insights. Imagine an analyst named Sarah working at a global Fortune 500 company. Every day, Sarah navigates a maze of diverse knowledge bases, real-time threat intelligence, and her company's vast proprietary data, from network specifics to intricate technical blueprints. One day, she's challenged by a potential breach through a personal device due to the company's global "Bring Your Own Device" policy. With the clock ticking, Sarah has mere minutes to trace the malware's origin, all while considering complex regional regulations. As she races against the benchmark of Mean Time To Resolution (MTTR), she wonders: Could "Cozy Bear" with its notorious malware tactic, HAMMERTOSS, be behind this? Balancing policy intricacies, global network considerations, and ever-emerging cyber threats, Sarah's role epitomizes the intense challenges faced by today's cybersecurity analysts. While analysts grapple with this array of intricate, time-sensitive challenges, the necessity for precision and efficiency is key. RAG technology—a cutting-edge advancement in Gen AI—is a promising solution. Designed to assimilate diverse data sources such as cyber advisory notices, phishing email sentiment, secure and insecure code examples, information security policy documentation, and the MITRE ATT&CK framework, RAG equips analysts with real-time querying capabilities through a vector database and a cross referenced concise response from a Gen AI model. Traditional relational databases often necessitate a tedious process of filtering through numerous entries. Now, with the synergy of vector databases and Gen AI models, analysts can rapidly access both contextually or semantically akin data points. This augmented approach equips analysts with a comprehensive understanding of the prevailing cyber threats, elevating the robustness of cybersecurity defenses and upskilling the analyst and team, too. Vector databases underpin the knowledge translation in Gen AI. They bridge the gap between raw data and translation into meaningful insights, ensuring that analysts are equipped with comprehensive and relevant information. This superior capability of the RAG framework, with its impressive depth and precision, finds application across a broad spectrum of cybersecurity challenges. Let's delve into some use cases where its potential becomes particularly evident: Phishing Email Sentiment Analysis: Phishing remains a predominant vector for cybersecurity breaches. Leveraging RAG's capabilities, analysts can not only assess the potential malevolence of an email but can also understand the context behind it. By cross-referencing patterns from varied data sources in real-time, the detection process evolves from a mere content evaluation to a holistic understanding of attacker tactics, behaviors, and evolving profiles. This allows for the identification of nuanced phishing strategies that might otherwise go undetected. Insecure Code Analysis: Software vulnerabilities form a critical entry point for cyber adversaries. With RAG, the process of code evaluation undergoes a transformation. Instead of manual code reviews, the system pulls insights from vector databases and historical code snippets marked as insecure, enabling detection of vulnerabilities based on historical patterns, emerging threat vectors, and even predictive threat modeling. This ensures that even the most obfuscated or embedded vulnerabilities are identified, and corrective measures can be promptly implemented. Vulnerability and Upskill Advisory: In the fast-paced world of cybersecurity, staying updated is paramount. Through RAG's capabilities, analysts are not only made aware of real-time vulnerabilities but are also guided on the necessary skills and tools needed to combat them. By dynamically sourcing data through vulnerability advisories, news on advanced persistent threats, and tactics to defend, RAG ensures that analysts are not only reactive to threats but are also proactively upskilled, thereby bolstering their defense mechanisms. Information Security Policies for Compliance Teams: Compliance remains at the heart of many organizational cybersecurity strategies. However, with ever-shifting regulatory landscapes, staying compliant becomes a moving target. RAG's ability to source real-time data ensures that compliance teams always have access to the latest policy changes, guidelines, and best practices. This not only facilitates adherence to current standards but also anticipates future shifts, assists with audits, and ensures that organizations remain ahead of the compliance curve. Fusing a RAG architecture with platforms like Slack amplifies its practical utility. Slack, known for its real-time communication prowess, seamlessly evolves into more than just a messaging platform in this context. Cybersecurity analysts can pose intricate queries within Slack and, almost instantaneously, receive comprehensive feedback powered by the harmonious interplay of RAG and Gen AI. This integration effectively transforms Slack into an AI-augmented chatbot-like assistant for cybersecurity professionals, always ready to provide informed insights on-demand, making it an indispensable ally in the ever-evolving cyber battlefield. Navigating the vast landscape of cybersecurity, analysts often encounter unfamiliar terminologies and techniques., analysts require tools that not only detect or inform them of threats, like CISA (U.S Cybersecurity Infrastructure Security Agency) Advisories, but also interpret and communicate them effectively. Consider a junior cybersecurity analyst named Alex, who comes across the term "Kerberoasting" while reviewing a network log. Unfamiliar with its intricacies, Alex turns to Slack to pose a query: "chat explain is Kerberoasting, using CISA." Almost instantaneously, Slack, powered by the harmonious interplay of RAG and Gen AI, provides a detailed response, cross-referencing a recent cyber advisory on the technique. It explains how attackers can exploit the Kerberos Ticket Granting Service to decipher service account passwords, potentially compromising a network. In this dynamic realm of cybersecurity, the blend of RAG and Generative AI represents more than just a technological leap. It embodies a paradigm shift, promising a future where human expertise and AI-driven precision join forces. As cyber threats continue their relentless advance, this synergy ensures that defenders are equipped with an arsenal that's not just reactive, but also profoundly insightful. No longer should analysts be submerged in a deluge of data without direction. Instead, they should be empowered, to discern, act, and preempt with unparalleled clarity and confidence. By harmoniously intertwining human discernment with AI capabilities, we should chart a path towards a future where cybersecurity is not just about defense, but about achieving a strategic advantage, paving the way for a safer, informed and a more secure digital horizon.

Keywords: cybersecurity, gen AI, retrieval augmented generation, cybersecurity defense strategies

Procedia PDF Downloads 43
567 Dynamic Voltage Restorer Control Strategies: An Overview

Authors: Arvind Dhingra, Ashwani Kumar Sharma

Abstract:

Power quality is an important parameter for today’s consumers. Various custom power devices are in use to give a proper supply of power quality. Dynamic Voltage Restorer is one such custom power device. DVR is a static VAR device which is used for series compensation. It is a power electronic device that is used to inject a voltage in series and in synchronism to compensate for the sag in voltage. Inductive Loads are a major source of power quality distortion. The induction furnace is one such typical load. A typical induction furnace is used for melting the scrap or iron. At the time of starting the melting process, the power quality is distorted to a large extent especially with the induction of harmonics. DVR is one such approach to mitigate these harmonics. This paper is an attempt to overview the various control strategies being followed for control of power quality by using DVR. An overview of control of harmonics using DVR is also presented.

Keywords: DVR, power quality, harmonics, harmonic mitigation

Procedia PDF Downloads 341
566 Low-Cost Space-Based Geoengineering: An Assessment Based on Self-Replicating Manufacturing of in-Situ Resources on the Moon

Authors: Alex Ellery

Abstract:

Geoengineering approaches to climate change mitigation are unpopular and regarded with suspicion. Of these, space-based approaches are regarded as unworkable and enormously costly. Here, a space-based approach is presented that is modest in cost, fully controllable and reversible, and acts as a natural spur to the development of solar power satellites over the longer term as a clean source of energy. The low-cost approach exploits self-replication technology which it is proposed may be enabled by 3D printing technology. Self-replication of 3D printing platforms will enable mass production of simple spacecraft units. Key elements being developed are 3D-printable electric motors and 3D-printable vacuum tube-based electronics. The power of such technologies will open up enormous possibilities at low cost including space-based geoengineering.

Keywords: 3D printing, in-situ resource utilization, self-replication technology, space-based geoengineering

Procedia PDF Downloads 381
565 (De)Motivating Mitigation Behavior: An Exploratory Framing Study Applied to Sustainable Food Consumption

Authors: Youval Aberman, Jason E. Plaks

Abstract:

This research provides initial evidence that self-efficacy of mitigation behavior – the belief that one’s action can make a difference on the environment – can be implicitly inferred from the way numerical information is presented in environmental messages. The scientific community sees climate change as a pressing issue, but the general public tends to construe climate change as an abstract phenomenon that is psychologically distant. As such, a main barrier to pro-environmental behavior is that individuals often believe that their own behavior makes little to no difference on the environment. When it comes to communicating how the behavior of billions of individuals affects global climate change, it might appear valuable to aggregate those billions and present the shocking enormity of the resources individuals consume. This research provides initial evidence that, in fact, this strategy is ineffective; presenting large-scale aggregate data dilutes the contribution of the individual and impedes individuals’ motivation to act pro-environmentally. The high-impact, underrepresented behavior of eating a sustainable diet was chosen for the present studies. US Participants (total N = 668) were recruited online for a study on ‘meat and the environment’ and received information about some of resources used in meat production – water, CO2e, and feed – with numerical information that varied in its frame of reference. A ‘Nation’ frame of reference discussed the resources used in the beef industry, such as the billions of CO2e released daily by the industry, while a ‘Meal’ frame of reference presented the resources used in the production of a single beef dish. Participants completed measures of pro-environmental attitudes and behavioral intentions, either immediately (Study 1) or two days (Study 2) after reading the information. In Study 2 (n = 520) participants also indicated whether they consumed less or more meat than usual. Study 2 included an additional control condition that contained no environmental data. In Study 1, participants who read about meat production at a national level, compared to at a meal level, reported lower motivation to make ecologically conscious dietary choices and reported lower behavioral intention to change their diet. In Study 2, a similar pattern emerged, with the added insight that the Nation condition, but not the Meal condition, deviated from the control condition. Participants across conditions, on average, reduced their meat consumption in the duration of Study 2, except those in the Nation condition who remained unchanged. Presenting nation-wide consequences of human behavior is a double-edged sword: Framing in a large scale might reveal the relationship between collective actions and environmental issues, but it hinders the belief that individual actions make a difference.

Keywords: climate change communication, environmental concern, meat consumption, motivation

Procedia PDF Downloads 137
564 Flushing Model for Artificial Islands in the Persian Gulf

Authors: Sawsan Eissa, Momen Gharib, Omnia Kabbany

Abstract:

A flushing numerical study has been performed for intended artificial islands on the Persian Gulf coast in Abu Dhabi, UAE. The island masterplan was tested for flushing using the DELFT 3D hydrodynamic model, and it was found that its residence time exceeds the acceptable PIANC flushing Criteria. Therefore, a number of mitigation measures were applied and tested one by one using the flushing model. Namely, changing the location of the entrance opening, dredging, removing part of the mangrove existing in the near vicinity to create a channel, removing the mangrove altogether, using culverts of different numbers and locations, and pumping at selected points. The pumping option gave the best solution, but it was disregarded due to high capital and running costs. Therefore, it opted for a combination of other solutions, including removing mangroves, introducing culverts, and adjusting island boundaries and types of protection.

Keywords: hydrodynamics, flushing, delft 3d, Persian Gulf, artificial islands.

Procedia PDF Downloads 15
563 Validation of Solar PV Inverter Harmonics Behaviour at Different Power Levels in a Test Network

Authors: Wilfred Fritz

Abstract:

Grid connected solar PV inverters need to be compliant to standard regulations regarding unwanted harmonic generation. This paper gives an introduction to harmonics, solar PV inverter voltage regulation and balancing through compensation and investigates the behaviour of harmonic generation at different power levels. Practical measurements of harmonics and power levels with a power quality data logger were made, on a test network at a university in Germany. The test setup and test results are discussed. The major finding was that between the morning and afternoon load peak windows when the PV inverters operate under low solar insolation and low power levels, more unwanted harmonics are generated. This has a huge impact on the power quality of the grid as well as capital and maintenance costs. The design of a single-tuned harmonic filter towards harmonic mitigation is presented.

Keywords: harmonics, power quality, pulse width modulation, total harmonic distortion

Procedia PDF Downloads 199
562 Ammonia Bunkering Spill Scenarios: Modelling Plume’s Behaviour and Potential to Trigger Harmful Algal Blooms in the Singapore Straits

Authors: Bryan Low

Abstract:

In the coming decades, the global maritime industry will face a most formidable environmental challenge -achieving net zero carbon emissions by 2050. To meet this target, the Maritime Port Authority of Singapore (MPA) has worked to establish green shipping and digital corridors with ports of several other countries around the world where ships will use low-carbon alternative fuels such as ammonia for power generation. While this paradigm shift to the bunkering of greener fuels is encouraging, fuels like ammonia will also introduce a new and unique type of environmental risk in the unlikely scenario of a spill. While numerous modelling studies have been conducted for oil spills and their associated environmental impact on coastal and marine ecosystems, ammonia spills are comparatively less well understood. For example, there is a knowledge gap regarding how the complex hydrodynamic conditions of the Singapore Straits may influence the dispersion of a hypothetical ammonia plume, which has different physical and chemical properties compared to an oil slick. Chemically, ammonia can be absorbed by phytoplankton, thus altering the balance of the marine nitrogen cycle. Biologically, ammonia generally serves the role of a nutrient in coastal ecosystems at lower concentrations. However, at higher concentrations, it has been found to be toxic to many local species. It may also have the potential to trigger eutrophication and harmful algal blooms (HABs) in coastal waters, depending on local hydrodynamic conditions. Thus, the key objective of this research paper is to support the development of a model-based forecasting system that can predict ammonia plume behaviour in coastal waters, given prevailing hydrodynamic conditions and their environmental impact. This will be essential as ammonia bunkering becomes more commonplace in Singapore’s ports and around the world. Specifically, this system must be able to assess the HAB-triggering potential of an ammonia plume, as well as its lethal and sub-lethal toxic effects on local species. This will allow the relevant authorities to better plan risk mitigation measures or choose a time window with the ideal hydrodynamic conditions to conduct ammonia bunkering operations with minimal risk. In this paper, we present the first part of such a forecasting system: a jointly coupled hydrodynamic-water quality model that can capture how advection-diffusion processes driven by ocean currents influence plume behaviour and how the plume interacts with the marine nitrogen cycle. The model is then applied to various ammonia spill scenarios where the results are discussed in the context of current ammonia toxicity guidelines, impact on local ecosystems, and mitigation measures for future bunkering operations conducted in the Singapore Straits.

Keywords: ammonia bunkering, forecasting, harmful algal blooms, hydrodynamics, marine nitrogen cycle, oceanography, water quality modeling

Procedia PDF Downloads 34
561 Elevating Environmental Impact Assessment through Remote Sensing in Engineering

Authors: Spoorthi Srupad

Abstract:

Environmental Impact Assessment (EIA) stands as a critical engineering application facilitated by Earth Resources and Environmental Remote Sensing. Employing advanced technologies, this process enables a systematic evaluation of potential environmental impacts arising from engineering projects. Remote sensing techniques, including satellite imagery and geographic information systems (GIS), play a pivotal role in providing comprehensive data for assessing changes in land cover, vegetation, water bodies, and air quality. This abstract delves into the significance of EIA in engineering, emphasizing its role in ensuring sustainable and environmentally responsible practices. The integration of remote sensing technologies enhances the accuracy and efficiency of impact assessments, contributing to informed decision-making and the mitigation of adverse environmental consequences associated with engineering endeavors.

Keywords: environmental impact assessment, engineering applications, sustainability, environmental monitoring, remote sensing, geographic information systems, environmental management

Procedia PDF Downloads 43
560 Understanding the Basics of Information Security: An Act of Defense

Authors: Sharon Q. Yang, Robert J. Congleton

Abstract:

Information security is a broad concept that covers any issues and concerns about the proper access and use of information on the Internet, including measures and procedures to protect intellectual property and private data from illegal access and online theft; the act of hacking; and any defensive technologies that contest such cybercrimes. As more research and commercial activities are conducted online, cybercrimes have increased significantly, putting sensitive information at risk. Information security has become critically important for organizations and private citizens alike. Hackers scan for network vulnerabilities on the Internet and steal data whenever they can. Cybercrimes disrupt our daily life, cause financial losses, and instigate fear in the public. Since the start of the pandemic, most data related cybercrimes targets have been either financial or health information from companies and organizations. Libraries also should have a high interest in understanding and adopting information security methods to protect their patron data and copyrighted materials. But according to information security professionals, higher education and cultural organizations, including their libraries, are the least prepared entities for cyberattacks. One recent example is that of Steven’s Institute of Technology in New Jersey in the US, which had its network hacked in 2020, with the hackers demanding a ransom. As a result, the network of the college was down for two months, causing serious financial loss. There are other cases where libraries, colleges, and universities have been targeted for data breaches. In order to build an effective defense, we need to understand the most common types of cybercrimes, including phishing, whaling, social engineering, distributed denial of service (DDoS) attacks, malware and ransomware, and hacker profiles. Our research will focus on each hacking technique and related defense measures; and the social background and reasons/purpose of hacker and hacking. Our research shows that hacking techniques will continue to evolve as new applications, housing information, and data on the Internet continue to be developed. Some cybercrimes can be stopped with effective measures, while others present challenges. It is vital that people understand what they face and the consequences when not prepared.

Keywords: cybercrimes, hacking technologies, higher education, information security, libraries

Procedia PDF Downloads 95
559 Mitigation of Seismic Forces Effect on Highway Bridge Using Aseismic Bearings

Authors: Kaoutar Zellat, Tahar Kadri

Abstract:

The purpose of new aseismic techniques is to provide an additional means of energy dissipation, thereby reducing the transmitted acceleration into the superstructure. In order to demonstrate the effectiveness of aseismic bearings technique and understand the behavior of seismically isolated bridges by such devices a three-span continuous deck bridge made of reinforced concrete is considered. The bridge is modeled as a discrete model and the relative displacements of the isolation bearing are crucial from the design point of view of isolation system and separation joints at the abutment level. The systems presented here are passive control systems and the results of some important experimental tests are also included. The results show that the base shear in the piers is significantly reduced for the isolated system as compared to the non isolated system in the both directions of the bridge. This indicates that the use of aseismic systems is effective in reducing the earthquake response of the bridge.

Keywords: aseismic bearings, bridge isolation, bridge, seismic response

Procedia PDF Downloads 320
558 A Linear Relation for Voltage Unbalance Factor Evaluation in Three-Phase Electrical Power System Using Space Vector

Authors: Dana M. Ragab, Jasim A Ghaeb

Abstract:

The Voltage Unbalance Factor (VUF) index is recommended to evaluate system performance under unbalanced operation. However, its calculation requires complex algebra which limits its use in the field. Furthermore, one system cycle is required at least to detect unbalance using the VUF. Ideally unbalance mitigation must be performed within 10 ms for 50 Hz systems. In this work, a linear relation for VUF evaluation in three-phase electrical power system using space vector (SV) is derived. It is proposed to determine the voltage unbalance quickly and accurately and to overcome the constraints associated with the traditional methods of VUF evaluation. Aqaba-Qatrana-South Amman (AQSA) power system is considered to study the system performance under unbalanced conditions. The results show that both the complexity of calculations and the time required to evaluate VUF are reduced significantly.

Keywords: power quality, space vector, unbalance evaluation, three-phase power system

Procedia PDF Downloads 158
557 H.264 Video Privacy Protection Method Using Regions of Interest Encryption

Authors: Taekyun Doo, Cheongmin Ji, Manpyo Hong

Abstract:

Like a closed-circuit television (CCTV), video surveillance system is widely placed for gathering video from unspecified people to prevent crime, surveillance, or many other purposes. However, abuse of CCTV brings about concerns of personal privacy invasions. In this paper, we propose an encryption method to protect personal privacy system in H.264 compressed video bitstream with encrypting only regions of interest (ROI). There is no need to change the existing video surveillance system. In addition, encrypting ROI in compressed video bitstream is a challenging work due to spatial and temporal drift errors. For this reason, we propose a novel drift mitigation method when ROI is encrypted. The proposed method was implemented by using JM reference software based on the H.264 compressed videos, and experimental results show the verification of our proposed methods and its effectiveness.

Keywords: H.264/AVC, video encryption, privacy protection, post compression, region of interest

Procedia PDF Downloads 311
556 Gas Flaring Utilization at KK Station

Authors: Abd Alati Ali Abushnaq, Malek Essnni, Abduraouf Eteer

Abstract:

The present study proposes a comprehensive approach to effectively utilize associated gas from the KK remote station, eliminating the practice of flaring and mitigating greenhouse gas (GHG) emissions. The proposed integrated system involves diverting the associated gas via a newly designed pipeline, seamlessly connecting to the existing 12-inch pipeline at the tie-in point. The proposed destination is the low-pressure system at A-100 or 3rd stage, where the associated gas will be channeled towards the NGL (natural gas liquid) plant for processing. To ensure the system's efficacy under varying gas production scenarios, the study employs two industry-standard simulation software packages, Aspen HYSYS and PIPSIM. The simulated results demonstrate the system's ability to handle the projected increase in gas production, reaching up to 38 MMSCFD. This comprehensive analysis ensures the system's robustness and adaptability to future production demands.

Keywords: associated gas, flaring mitigation, GHG emissions, pipeline diversion, NGL plant, KK remote station, production forecasting, Aspen HYSYS, PIPSIM

Procedia PDF Downloads 29
555 Development of ELF Passive Shielding Application Using Magnetic Aqueous Substrate

Authors: W. N. L. Mahadi, S. N. Syed Zin, W. A. R. Othman, N. A. Mohd Rasyid, N. Jusoh

Abstract:

Public concerns on Extremely Low Frequency (ELF) Electromagnetic Field (EMF) exposure have been elongated since the last few decades. Electrical substations and high tension rooms (HT room) in commercial buildings were among the contributing factors emanating ELF magnetic fields. This paper discussed various shielding methods conventionally used in mitigating the ELF exposure. Nevertheless, the standard methods were found to be impractical and incapable of meeting currents shielding demands. In response to that, remarkable researches were conducted in effort to invent novel methods which is more convenient and efficient such as magnetic aqueous shielding or paint, textiles and papers shielding. A mitigation method using magnetic aqueous substrate in shielding application was proposed in this paper for further investigation. using Manganese Zinc Ferrite (Mn0.4Zn0.6Fe2O4). The magnetic field and flux distribution inside the aqueous magnetic material are evaluated to optimize shielding against ELF-EMF exposure, as to mitigate its exposure.

Keywords: ELF shielding, magnetic aqueous substrate, shielding effectiveness, passive shielding, magnetic material

Procedia PDF Downloads 500
554 Relevance in the Water-Energy-Food nexus: an Opportunity for Promoting Socio Economic Development in Algeria

Authors: Nadjib Drouiche

Abstract:

Water resources in Algeria are scarce, often low quality, fragile, and unevenly distributed in space and time. The pressure on water resources can be associated with industrial development, a steady population growth, and demanding land irrigation measures. These conditions createa tense competitionfor managing waterresourcesand sharing thembetween agricultural development, drinking water supply, industrial activities, etc. Moreover, the impact of climate change has placed in the forefront national policies focused on the water-energy-food nexus (WEF). In this context, desalination membrane technologies could play an increasing rolefor supporting segments of the Algerian economy that are heavily water-dependent. By implementing water reuse and desalination strategies together in the agricultural sector, there is an opportunity to expand the access to healthy food and clean water, thereby keeping the WEF nexus effects under control.

Keywords: desalination, mitigation, climate change, sustainable development goals

Procedia PDF Downloads 65
553 Knowledge Integration from Concept to Practice: An Exploratory Study of Designing a Flood Resilient Urban Park in Viet Nam

Authors: To Quyen Le, Oswald Devisch, Tu Anh Trinh, Els Hannes

Abstract:

Urban centres worldwide are affected differently by flooding. In Vietnam this impact is increasingly negative caused by a process of rapid urbanisation. Traditional spatial planning and flood mitigation planning are not able to deal with this growing threat. This article therefore proposes to focus on increasing the participation of local communities in flood control and management. It explores, on the basis of a design studio exercise, how lay knowledge on flooding can be integrated within planning processes. The article presents a theoretical basis for the structured criterion for site selection for a flood resilient urban park from the perspective of science, then discloses the tacit and explicit knowledge of the flood-prone area and finally integrates this knowledge into the design strategies for flood resilient urban park design.

Keywords: analytic hierarchy process, AHP, design resilience, flood resilient urban park, knowledge integration

Procedia PDF Downloads 146
552 On Virtual Coordination Protocol towards 5G Interference Mitigation: Modelling and Performance Analysis

Authors: Bohli Afef

Abstract:

The fifth-generation (5G) wireless systems is featured by extreme densities of cell stations to overcome the higher future demand. Hence, interference management is a crucial challenge in 5G ultra-dense cellular networks. In contrast to the classical inter-cell interference coordination approach, which is no longer fit for the high density of cell-tiers, this paper proposes a novel virtual coordination based on the dynamic common cognitive monitor channel protocol to deal with the inter-cell interference issue. A tractable and flexible model for the coverage probability of a typical user is developed through the use of the stochastic geometry model. The analyses of the performance of the suggested protocol are illustrated both analytically and numerically in terms of coverage probability.

Keywords: ultra dense heterogeneous networks, dynamic common channel protocol, cognitive radio, stochastic geometry, coverage probability

Procedia PDF Downloads 294
551 Earth Tremors in Nigeria: A Precursor to Major Disaster?

Authors: Oluseyi Adunola Bamisaiye

Abstract:

The frequency of occurrence of earth tremor in Nigeria has increased tremendously in recent years. Slow earthquakes/ tremor have preceded some large earthquakes in some other regions of the world and the Nigerian case may not be an exception. Timely and careful investigation of these tremors may reveal their relation to large earthquakes and provides important clues to constrain the slip rates on tectonic faults. Thus making it imperative to keep under watch and also study carefully the tectonically active terrains within the country, in order to adequately forecast, prescribe mitigation measures and in order to avoid a major disaster. This report provides new evidence of a slow slip transient in a strongly locked seismogenic zone of the Okemesi fold belt. The aim of this research is to investigate the different methods of earth tremor monitoring using fault slip analysis and mapping of Okemesi hills, which has been the most recent epicenter to most of the recent tremors.

Keywords: earth tremor, fault slip, intraplate activities, plate tectonics

Procedia PDF Downloads 121
550 Recovery of Post-Consumer PET Bottles in a Composite Material Preparation

Authors: Rafenomananjara Tsinjo Nirina, Tomoo Sekito, Andrianaivoravelona Jaconnet Oliva

Abstract:

Manufacturing a composite material from post-consumer bottles is an interesting outlet since Madagascar is still facing the challenges of managing plastic waste on the one hand and appropriate waste treatment facilities are not yet developed on the other hand. New waste management options are needed to divert End-Of-Life (EOL) soft plastic wastes from landfills and incineration. Waste polyethylene terephthalate (PET) bottles might be considered as a valuable resource and recovered into polymer concrete. The methodology is easy to implement and appropriate to the local context in Madagascar. This approach will contribute to the production of ecological building materials that might be profitable for the environment and the construction sector. This work aims to study the feasibility of using the post-consumer PET bottles as an alternative binding agent instead of the conventional Portland cement and water. Then, the mechanical and physical properties of the materials were evaluated.

Keywords: PET recycling, polymer concrete, ecological building materials, pollution mitigation

Procedia PDF Downloads 63
549 UBCSAND Model Calibration for Generic Liquefaction Triggering Curves

Authors: Jui-Ching Chou

Abstract:

Numerical simulation is a popular method used to evaluate the effects of soil liquefaction on a structure or the effectiveness of a mitigation plan. Many constitutive models (UBCSAND model, PM4 model, SANISAND model, etc.) were presented to model the liquefaction phenomenon. In general, inputs of a constitutive model need to be calibrated against the soil cyclic resistance before being applied to the numerical simulation model. Then, simulation results can be compared with results from simplified liquefaction potential assessing methods. In this article, inputs of the UBCSAND model, a simple elastic-plastic stress-strain model, are calibrated against several popular generic liquefaction triggering curves of simplified liquefaction potential assessing methods via FLAC program. Calibrated inputs can provide engineers to perform a preliminary evaluation of an existing structure or a new design project.

Keywords: calibration, liquefaction, numerical simulation, UBCSAND Model

Procedia PDF Downloads 124
548 Lean Implementation: Manufacturing vs. Construction a Roadmap for Success

Authors: Patrick Ahern, David Collery

Abstract:

The implementation of lean thinking in the manufacturing industry revolutionized the traditional approach to large-scale production through the process of identifying the waste in each task and putting in place mitigation measures to eliminate the waste in all its forms. The Irish construction industry, however, has been much slower to adopt the principles of lean, opting instead to stick with the traditional approach to construction project delivery which is inherently wasteful. Lean thinking holds the potential to revolutionize the construction industry in a similar manner to the adoption of lean manufacturing. Lean principles present opportunities for reduced project duration, reduced project cost, improved quality, and elimination of re-works and non-value-added activities. The following research has been designed to accumulate research data through available literature, electronic surveys, and interviews. The results show an industry reluctant to accept change and an undefined path to successful lean construction implementation.

Keywords: barriers, lean construction, lean implementation, lean manufacturing, lean philosophy

Procedia PDF Downloads 47
547 Enhancement to Green Building Rating Systems for Industrial Facilities by Including the Assessment of Impact on the Landscape

Authors: Lia Marchi, Ernesto Antonini

Abstract:

The impact of industrial sites on people’s living environment both involves detrimental effects on the ecosystem and perceptual-aesthetic interferences with the scenery. These, in turn, affect the economic and social value of the landscape, as well as the wellbeing of workers and local communities. Given the diffusion of the phenomenon and the relevance of its effects, it emerges the need for a joint approach to assess and thus mitigate the impact of factories on the landscape –being this latest assumed as the result of the action and interaction of natural and human factors. However, the impact assessment tools suitable for the purpose are quite heterogeneous and mostly monodisciplinary. On the one hand, green building rating systems (GBRSs) are increasingly used to evaluate the performance of manufacturing sites, mainly by quantitative indicators focused on environmental issues. On the other hand, methods to detect the visual and social impact of factories on the landscape are gradually emerging in the literature, but they generally adopt only qualitative gauges. The research addresses the integration of the environmental impact assessment and the perceptual-aesthetic interferences of factories on the landscape. The GBRSs model is assumed as a reference since it is adequate to simultaneously investigate different topics which affect sustainability, returning a global score. A critical analysis of GBRSs relevant to industrial facilities has led to select the U.S. GBC LEED protocol as the most suitable to the scope. A revision of LEED v4 Building Design+Construction has then been provided by including specific indicators to measure the interferences of manufacturing sites with the perceptual-aesthetic and social aspects of the territory. To this end, a new impact category was defined, namely ‘PA - Perceptual-aesthetic aspects’, comprising eight new credits which are specifically designed to assess how much the buildings are in harmony with their surroundings: these investigate, for example the morphological and chromatic harmonization of the facility with the scenery or the site receptiveness and attractiveness. The credits weighting table was consequently revised, according to the LEED points allocation system. As all LEED credits, each new PA credit is thoroughly described in a sheet setting its aim, requirements, and the available options to gauge the interference and get a score. Lastly, each credit is related to mitigation tactics, which are drawn from a catalogue of exemplary case studies, it also developed by the research. The result is a modified LEED scheme which includes compatibility with the landscape within the sustainability assessment of the industrial sites. The whole system consists of 10 evaluation categories, which contain in total 62 credits. Lastly, a test of the tool on an Italian factory was performed, allowing the comparison of three mitigation scenarios with increasing compatibility level. The study proposes a holistic and viable approach to the environmental impact assessment of factories by a tool which integrates the multiple involved aspects within a worldwide recognized rating protocol.

Keywords: environmental impact, GBRS, landscape, LEED, sustainable factory

Procedia PDF Downloads 86
546 Adversary Emulation: Implementation of Automated Countermeasure in CALDERA Framework

Authors: Yinan Cao, Francine Herrmann

Abstract:

Adversary emulation is a very effective concrete way to evaluate the defense of an information system or network. It is about building an emulator, which depending on the vulnerability of a target system, will allow to detect and execute a set of identified attacks. However, emulating an adversary is very costly in terms of time and resources. Verifying the information of each technique and building up the countermeasures in the middle of the test is also needed to be accomplished manually. In this article, a synthesis of previous MITRE research on the creation of the ATT&CK matrix will be as the knowledge base of the known techniques and a well-designed adversary emulation software CALDERA based on ATT&CK Matrix will be used as our platform. Inspired and guided by the previous study, a plugin in CALDERA called Tinker will be implemented, which is aiming to help the tester to get more information and also the mitigation of each technique used in the previous operation. Furthermore, the optional countermeasures for some techniques are also implemented and preset in Tinker in order to facilitate and fasten the process of the defense improvement of the tested system.

Keywords: automation, adversary emulation, CALDERA, countermeasures, MITRE ATT&CK

Procedia PDF Downloads 170
545 Carbon Stock of the Moist Afromontane Forest in Gesha and Sayilem Districts in Kaffa Zone: An Implication for Climate Change Mitigation

Authors: Admassu Addi, Sebesebe Demissew, Teshome Soromessa, Zemede Asfaw

Abstract:

This study measures the carbon stock of the Moist Afromontane Gesha-Sayilem forest found in Gesha and Sayilem District in southwest Ethiopia. A stratified sampling method was used to identify the number of sampling point through the Global Positioning System. A total of 90 plots having nested plots to collect tree species and soil data were demarcated. The results revealed that the total carbon stock of the forest was 362.4 t/ha whereas the above ground carbon stock was 174.95t/ha, below ground litter, herbs, soil, and dead woods were 34.3,1.27, 0.68, 128 and 23.2 t/ha (up to 30 cm depth) respectively. The Gesha- Sayilem Forest is a reservoir of high carbon and thus acts as a great sink of the atmospheric carbon. Thus conservation of the forest through introduction REDD+ activities is considered an appropriate action for mitigating climate change.

Keywords: carbon sequestration, carbon stock, climate change, allometric, Ethiopia

Procedia PDF Downloads 125
544 Digital Elevation Model Analysis of Potential Prone Flood Disaster Watershed Citarum Headwaters Bandung

Authors: Faizin Mulia Rizkika, Iqbal Jabbari Mufti, Muhammad R. Y. Nugraha, Fadil Maulidir Sube

Abstract:

Flooding is an event of ponding on the flat area around the river as a result of the overflow of river water was not able to be accommodated by the river and may cause damage to the infrastructure of a region. This study aimed to analyze the data of Digital Elevation Model (DEM) for information that plays a role in the mapping of zones prone to flooding, mapping the distribution of zones prone to flooding that occurred in the Citarum upstream using secondary data and software (ArcGIS, MapInfo), this assessment was made distribution map of flooding, there were 13 counties / districts dam flood-prone areas in Bandung, and the most vulnerable districts are areas Baleendah-Dayeuhkolot-Bojongsoang-Banjaran. The area has a low slope and the same limits with boundary rivers and areas that have excessive land use, so the water catchment area is reduced.

Keywords: mitigation, flood, citarum, DEM

Procedia PDF Downloads 352
543 Design and Simulation of Unified Power Quality Conditioner based on Adaptive Fuzzy PI Controller

Authors: Brahim Ferdi, Samira Dib

Abstract:

The unified power quality conditioner (UPQC), a combination of shunt and series active power filter, is one of the best solutions towards the mitigation of voltage and current harmonics problems in distribution power system. PI controller is very common in the control of UPQC. However, one disadvantage of this conventional controller is the difficulty in tuning its gains (Kp and Ki). To overcome this problem, an adaptive fuzzy logic PI controller is proposed. The controller is composed of fuzzy controller and PI controller. According to the error and error rate of the control system and fuzzy control rules, the fuzzy controller can online adjust the two gains of the PI controller to get better performance of UPQC. Simulations using MATLAB/SIMULINK are carried out to verify the performance of the proposed controller. The results show that the proposed controller has fast dynamic response and high accuracy of tracking the current and voltage references.

Keywords: adaptive fuzzy PI controller, current harmonics, PI controller, voltage harmonics, UPQC

Procedia PDF Downloads 519