Search results for: marine intrusion
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 977

Search results for: marine intrusion

947 Saline Water Transgression into Fresh Coastal Groundwater in the Confined Aquifer of Lagos, Nigeria

Authors: Babatunde Adebo, Adedeji Adetoyinbo

Abstract:

Groundwater is an important constituent of the hydrological cycle and plays a vital role in augmenting water supply to meet the ever-increasing needs of people for domestic, agricultural and industrial purposes. Unfortunately, this important resource has in most cases been contaminated due to the advancement of seawater into the fresh groundwater. This is due to the high volume of water being abstracted in these areas as a result of a high population of coastal dwellers. The knowledge of salinity level and intrusion of saltwater into the freshwater aquifer is, therefore, necessary for groundwater monitoring and prediction in the coastal areas. In this work, an advection-dispersion saltwater intrusion model is used to study and simulate saltwater intrusion in a typical coastal aquifer. The aquifer portion was divided into a grid with elements and nodes. Map of the study area indicating well locations were overlain on the grid system such that these locations coincide with the nodes. Chlorides at these well were considered as initial nodal salinities. Results showed a highest and lowest increase in simulated chloride of 37.89 mg/L and 0.8 mg/L respectively. It also revealed that the chloride concentration of most of the considered well might climb unacceptable level in the next few years, if the current abstraction rate continues unabated.

Keywords: saltwater intrusion, coastal aquifer, nodal salinity, chloride concentration

Procedia PDF Downloads 215
946 Analysis and Design Modeling for Next Generation Network Intrusion Detection and Prevention System

Authors: Nareshkumar Harale, B. B. Meshram

Abstract:

The continued exponential growth of successful cyber intrusions against today’s businesses has made it abundantly clear that traditional perimeter security measures are no longer adequate and effective. We evolved the network trust architecture from trust-untrust to Zero-Trust, With Zero Trust, essential security capabilities are deployed in a way that provides policy enforcement and protection for all users, devices, applications, data resources, and the communications traffic between them, regardless of their location. Information exchange over the Internet, in spite of inclusion of advanced security controls, is always under innovative, inventive and prone to cyberattacks. TCP/IP protocol stack, the adapted standard for communication over network, suffers from inherent design vulnerabilities such as communication and session management protocols, routing protocols and security protocols are the major cause of major attacks. With the explosion of cyber security threats, such as viruses, worms, rootkits, malwares, Denial of Service attacks, accomplishing efficient and effective intrusion detection and prevention is become crucial and challenging too. In this paper, we propose a design and analysis model for next generation network intrusion detection and protection system as part of layered security strategy. The proposed system design provides intrusion detection for wide range of attacks with layered architecture and framework. The proposed network intrusion classification framework deals with cyberattacks on standard TCP/IP protocol, routing protocols and security protocols. It thereby forms the basis for detection of attack classes and applies signature based matching for known cyberattacks and data mining based machine learning approaches for unknown cyberattacks. Our proposed implemented software can effectively detect attacks even when malicious connections are hidden within normal events. The unsupervised learning algorithm applied to network audit data trails results in unknown intrusion detection. Association rule mining algorithms generate new rules from collected audit trail data resulting in increased intrusion prevention though integrated firewall systems. Intrusion response mechanisms can be initiated in real-time thereby minimizing the impact of network intrusions. Finally, we have shown that our approach can be validated and how the analysis results can be used for detecting and protection from the new network anomalies.

Keywords: network intrusion detection, network intrusion prevention, association rule mining, system analysis and design

Procedia PDF Downloads 200
945 Human Error Analysis in the USA Marine Accidents Reports

Authors: J. Sánchez-Beaskoetxea

Abstract:

The analysis of accidents, such as marine accidents, is one of the most useful instruments to avoid future accidents. In the case of marine accidents, from a simple collision of a small boat in a port to the wreck of a gigantic tanker ship, the study of the causes of the accidents is the basis of a great part of the marine international legislation. Some countries have official institutions who investigate all the accidents in which a ship with their flag is involved. In the case of the USA, the National Transportation Safety Board (NTSB) is responsible for these researches. The NTSB, after a deep investigation into each accident, publishes a Marine Accident Report with the possible cause of the accident. This paper analyses all the Marine Accident Reports published by the NTBS and focuses its attention especially in the Human Errors that led to reported accidents. In this research, the different Human Errors made by crew members are cataloged in 10 different groups. After a complete analysis of all the reports, the statistical analysis on the Human Errors typology in marine accidents is presented in order to use it as a tool to avoid the same errors in the future.

Keywords: human error, marine accidents, ship crew, USA

Procedia PDF Downloads 388
944 Mapping the Technological Interventions to the National Action Plan for Marine Litter Management 2018-2025: Addressing the Marine Plastic Litter at the Marine Tourism Destinations in Indonesia

Authors: Kaisar Akhir, Azhar Slamet

Abstract:

This study aims to provide recommendations for addressing marine plastic litter at the ocean tourism destinations in Indonesia sustainably through technological interventions in the framework of the National Action Plan for Marine Litter Management 2018-2025. In Indonesia, marine tourism is a rapidly growing economic sector. However, marine tourism destinations are facing a global challenge called marine plastic litter. Marine plastic litter is a threat to those destinations since it has potential impacts on the reduction of marine environmental sustainability, the health of tourists and local communities as well as tourism business income. Since 2018, the Indonesian government has passed and promulgated the National Plan of Action on Marine Litter Management 2018-2025. This national action plan consists of three important key aspects of interventions (i.e., societal effort, technological application, and institutional coordination) and five strategies for addressing marine litter in Indonesia, in particular, to address 70% of marine plastic litter by 2025. The strategies include 1) National movement for raising awareness of stakeholders, 2) Land-based litter management, 3) Litter management at the sea and coasts, 4) Funding mechanism, institutional strengthening, monitoring, and law enforcement, and 5) Research and development. In this study, technological interventions around the world and in Indonesia are reviewed and analyzed on their relevance to the national action plan based on five criteria. As a result, there are twelve kinds of technological interventions recommended to be implemented for addressing marine plastic litter in the marine tourism destinations in Indonesia.

Keywords: marine litter management, marine plastic litter, national action plan, ocean sustainability, ocean tourism destination, technological interventions

Procedia PDF Downloads 139
943 Prediction of Marine Ecosystem Changes Based on the Integrated Analysis of Multivariate Data Sets

Authors: Prozorkevitch D., Mishurov A., Sokolov K., Karsakov L., Pestrikova L.

Abstract:

The current body of knowledge about the marine environment and the dynamics of marine ecosystems includes a huge amount of heterogeneous data collected over decades. It generally includes a wide range of hydrological, biological and fishery data. Marine researchers collect these data and analyze how and why the ecosystem changes from past to present. Based on these historical records and linkages between the processes it is possible to predict future changes. Multivariate analysis of trends and their interconnection in the marine ecosystem may be used as an instrument for predicting further ecosystem evolution. A wide range of information about the components of the marine ecosystem for more than 50 years needs to be used to investigate how these arrays can help to predict the future.

Keywords: barents sea ecosystem, abiotic, biotic, data sets, trends, prediction

Procedia PDF Downloads 75
942 An Intrusion Detection Systems Based on K-Means, K-Medoids and Support Vector Clustering Using Ensemble

Authors: A. Mohammadpour, Ebrahim Najafi Kajabad, Ghazale Ipakchi

Abstract:

Presently, computer networks’ security rise in importance and many studies have also been conducted in this field. By the penetration of the internet networks in different fields, many things need to be done to provide a secure industrial and non-industrial network. Fire walls, appropriate Intrusion Detection Systems (IDS), encryption protocols for information sending and receiving, and use of authentication certificated are among things, which should be considered for system security. The aim of the present study is to use the outcome of several algorithms, which cause decline in IDS errors, in the way that improves system security and prevents additional overload to the system. Finally, regarding the obtained result we can also detect the amount and percentage of more sub attacks. By running the proposed system, which is based on the use of multi-algorithmic outcome and comparing that by the proposed single algorithmic methods, we observed a 78.64% result in attack detection that is improved by 3.14% than the proposed algorithms.

Keywords: intrusion detection systems, clustering, k-means, k-medoids, SV clustering, ensemble

Procedia PDF Downloads 190
941 Groundwater Quality in the Rhiss-Nekor Plain, Morocco: Impacts of Human Activities

Authors: Ali Ait Boughrous, Said Benyoussef, Hossain El Ouarghi, Moulay Abdelazize Aboulhassan, Samah Aitbnichou, Said Benguamra

Abstract:

The Rhiss-Nekor aquifer represents a primary water source for the central Rif region. Many operating structures were built for irrigation and drinking water supply. Because of the vulnerability of this aquifer, a thorough knowledge of the environment is needed to evaluate and protect resources. This work aims at the quality assessment of the water table of the plain Ghiss-Nekor and determination of pollution sources in order to establish a map of the web. The plain-Rhiss Nekor, with an area of 100 km2, is located on the Mediterranean coast of Morocco. It has a particular geological structure resulting from the opening of a graben at the end of the Tertiary, which is filled by the accumulation of hundreds of meters of sediment, generating considerable heterogeneity in deposits. This heterogeneity gives various hydrodynamic properties within the aquifer of the plain. The analysis of the water quality of twenty water points, well distributed over the plain, showed high natural salinity linked to the geological nature of the area. This salinity increases in the littoral area by the seawater intrusion phenomenon. This is accentuated by overexploitation of the ground water due to the growing demand. Some wells, located inland, are characterized by organic pollution caused by wastewater seepage from septic tanks and lost wells widespread in the region.

Keywords: anthropogenic factors, groundwater quality, marine intrusion, Rhiss-Nekor aquifer

Procedia PDF Downloads 110
940 Survey of Intrusion Detection Systems and Their Assessment of the Internet of Things

Authors: James Kaweesa

Abstract:

The Internet of Things (IoT) has become a critical component of modern technology, enabling the connection of numerous devices to the internet. The interconnected nature of IoT devices, along with their heterogeneous and resource-constrained nature, makes them vulnerable to various types of attacks, such as malware, denial-of-service attacks, and network scanning. Intrusion Detection Systems (IDSs) are a key mechanism for protecting IoT networks and from attacks by identifying and alerting administrators to suspicious activities. In this review, the paper will discuss the different types of IDSs available for IoT systems and evaluate their effectiveness in detecting and preventing attacks. Also, examine the various evaluation methods used to assess the performance of IDSs and the challenges associated with evaluating them in IoT environments. The review will highlight the need for effective and efficient IDSs that can cope with the unique characteristics of IoT networks, including their heterogeneity, dynamic topology, and resource constraints. The paper will conclude by indicating where further research is needed to develop IDSs that can address these challenges and effectively protect IoT systems from cyber threats.

Keywords: cyber-threats, iot, intrusion detection system, networks

Procedia PDF Downloads 51
939 Investigate the Movement of Salt-Wedge at Co Chien Estuary, Vietnam in the Context of Climate Change and Reduce Upstream Flow Using 3D Model

Authors: Hieu Duy Nguyen, Chitsan Lin Jr., Dung Duc Tran

Abstract:

Nowadays, drought and salinity intrusion becomes a severe problem in the Lower Mekong region due to climate change, especially in coastal provinces. Freshwater resources are decreased due to sea-level rise and the decline in water flow from upstream in the dry season. The combination of the above issues can lead to many effects on the environment and human health in affected areas such as the pathological of digestive or decreased the immune system. Tidal cycle and upstream flows are the two main factors affecting the saline intrusion process and the former salt-wedge in the estuary. Under suitable conditions, salt-wedge can be going further upstream under the water surface and affected groundwater. In order to have a proper plan for the mitigation of the above adverse effects, we need to understand the characteristics of this process. In this study, 3D model is used to investigate the movement of salt-wedge under different conditions of tidal and flow discharge. The salinity in the vertical profile is also measured in the dry season of 2017 and 2018 for model calibrating. The data has proved that there is the presence of salt-wedge in the study area. The obtained results will help strategic planners to use and preserve water resources more effectively and serve as a basis for new research directions on saline intrusion and human health.

Keywords: salt-wedge, salinity intrusion, human health, 3D model

Procedia PDF Downloads 83
938 Multi-Criteria Evaluation of IDS Architectures in Cloud Computing

Authors: Elmahdi Khalil, Saad Enniari, Mostapha Zbakh

Abstract:

Cloud computing promises to increase innovation and the velocity with witch applications are deployed, all while helping any enterprise meet most IT service needs at a lower total cost of ownership and higher return investment. As the march of cloud continues, it brings both new opportunities and new security challenges. To take advantages of those opportunities while minimizing risks, we think that Intrusion Detection Systems (IDS) integrated in the cloud is one of the best existing solutions nowadays in the field. The concept of intrusion detection was known since past and was first proposed by a well-known researcher named Anderson in 1980's. Since that time IDS's are evolving. Although, several efforts has been made in the area of Intrusion Detection systems for cloud computing environment, many attacks still prevail. Therefore, the work presented in this paper proposes a multi criteria analysis and a comparative study between several IDS architectures designated to work in a cloud computing environments. To achieve this objective, in the first place we will search in the state of the art of several consistent IDS architectures designed to work in a cloud environment. Whereas, in a second step we will establish the criteria that will be useful for the evaluation of architectures. Later, using the approach of multi criteria decision analysis Mac Beth (Measuring Attractiveness by a Categorical Based Evaluation Technique we will evaluate the criteria and assign to each one the appropriate weight according to their importance in the field of IDS architectures in cloud computing. The last step is to evaluate architectures against the criteria and collecting results of the model constructed in the previous steps.

Keywords: cloud computing, cloud security, intrusion detection/prevention system, multi-criteria decision analysis

Procedia PDF Downloads 442
937 Horizon Scanning of Disruptive Technology Trends in Marine for 2030 Horizon

Authors: Jose Gonzalez, Fai Cheng, Ivy Fan

Abstract:

Shipping has a mature and ever expanding worldwide market. The future of the marine industry itself is not only irrevocably linked with the global economic, social, and political landscape; it is also subject to the technological developments in different fields. Some of them may have never been linked to the marine industry before. Companies in the marine sector are getting more dependent on technologies to achieve competitive advantage in an increasing open market. Technologies can be fused across different business functions and geopolitical influences. A successful marine business should be prepared to embrace such potential changes that lie ahead. The present paper intends to articulate long-term marine technology strategies from an industrial perspective. Methodology and current development are introduced. The paper will also provide insight into future technological trends demand for major commercial ship types. It may also assist different stakeholders in tailoring their long-term strategies to achieve a Sea Change and to uncap opportunity.

Keywords: commercial sector, marine, trends, technology

Procedia PDF Downloads 374
936 Assessing Water Quality Using GIS: The Case of Northern Lebanon Miocene Aquifer

Authors: M. Saba, A. Iaaly, E. Carlier, N. Georges

Abstract:

This research focuses on assessing the ground water quality of Northern Lebanon affected by saline water intrusion. The chemical, physical and microbiological parameters were collected in various seasons spanning over the period of two years. Results were assessed using Geographic Information System (GIS) due to its visual capabilities in presenting the pollution extent in the studied region. Future projections of the excessive pumping were also simulated using GIS in order to assess the extent of the problem of saline intrusion in the near future.

Keywords: GIS, saline water, quality control, drinkable water quality standards, pumping

Procedia PDF Downloads 334
935 Challenges of Sustainable Marine Fishing in Ghana

Authors: Eric K. W. Aikins

Abstract:

Traditionally, Ghana is a marine fishing country. The fishing industry dominated by artisanal marine fishing helps Ghana to meet its fish and protein requirements. Also, it provides employment for most coastal dwellers that depend on fishing as their main economic enterprise. Nonetheless, the marine fishing industry is confronted with challenges that have contributed to a declining fish production in recent past decade. Bad fishing practices and the general limited knowledge on sustainable management of fisheries resources are the limiting factors that affect sustainable fish production and sustainable marine biodiversity management in Ghana. This paper discusses the challenges and strategies for attaining and maintaining sustainable marine fishing in Ghana as well as the state of marine fishing in Ghana. It concludes that an increase in the level of involvement of local fishers in the management of fisheries resources of the country could help local fishers to employ sustainable fisheries resources exploitation methods that could result in an improvement in the spatio-economic development and wellbeing of affected fishing communities in particular and Ghana in general.

Keywords: pair trawling, sargassum, spatio-economic development, sustainable marine fishing

Procedia PDF Downloads 258
934 Constructing a Semi-Supervised Model for Network Intrusion Detection

Authors: Tigabu Dagne Akal

Abstract:

While advances in computer and communications technology have made the network ubiquitous, they have also rendered networked systems vulnerable to malicious attacks devised from a distance. These attacks or intrusions start with attackers infiltrating a network through a vulnerable host and then launching further attacks on the local network or Intranet. Nowadays, system administrators and network professionals can attempt to prevent such attacks by developing intrusion detection tools and systems using data mining technology. In this study, the experiments were conducted following the Knowledge Discovery in Database Process Model. The Knowledge Discovery in Database Process Model starts from selection of the datasets. The dataset used in this study has been taken from Massachusetts Institute of Technology Lincoln Laboratory. After taking the data, it has been pre-processed. The major pre-processing activities include fill in missed values, remove outliers; resolve inconsistencies, integration of data that contains both labelled and unlabelled datasets, dimensionality reduction, size reduction and data transformation activity like discretization tasks were done for this study. A total of 21,533 intrusion records are used for training the models. For validating the performance of the selected model a separate 3,397 records are used as a testing set. For building a predictive model for intrusion detection J48 decision tree and the Naïve Bayes algorithms have been tested as a classification approach for both with and without feature selection approaches. The model that was created using 10-fold cross validation using the J48 decision tree algorithm with the default parameter values showed the best classification accuracy. The model has a prediction accuracy of 96.11% on the training datasets and 93.2% on the test dataset to classify the new instances as normal, DOS, U2R, R2L and probe classes. The findings of this study have shown that the data mining methods generates interesting rules that are crucial for intrusion detection and prevention in the networking industry. Future research directions are forwarded to come up an applicable system in the area of the study.

Keywords: intrusion detection, data mining, computer science, data mining

Procedia PDF Downloads 267
933 Gender Inequality on Marine Tourism Development in Small Island

Authors: Khodijah Ismail, Elfindri

Abstract:

Tourism development have many environmental, economically and sociocultural benefits. Small islands have a lot of potential for marine tourism development. But, stereotype gender issues still dominate the social and cultural life of rural communities that have an impact on the gap in benefits of local development. The purpose of this study is to found development strategy concept of marine tourism in small islands gender-based. This study found in the marine tourism development of small islands not involved women, from planning to monitor marine tourism development in small islands. It's affects to the low of socio-economic of women in the coastal village and small islands. This condition is not advantage for sustainable development of marine tourism in small islands. Therefore, strengthening of livelihood assets by gender based through the marine tourism development in small islands is very important to attention, that women can contributed to household welfare, bargaining positioned in social culture was better and increase broad access to local government development policies. To realize it requires the full support of the government and relevant stakeholders through gender empowerment and strengthening of accessibility, connectivity, regulation, and design institution.

Keywords: gender inequality, marine tourism, development, tourism management

Procedia PDF Downloads 448
932 Hybrid Anomaly Detection Using Decision Tree and Support Vector Machine

Authors: Elham Serkani, Hossein Gharaee Garakani, Naser Mohammadzadeh, Elaheh Vaezpour

Abstract:

Intrusion detection systems (IDS) are the main components of network security. These systems analyze the network events for intrusion detection. The design of an IDS is through the training of normal traffic data or attack. The methods of machine learning are the best ways to design IDSs. In the method presented in this article, the pruning algorithm of C5.0 decision tree is being used to reduce the features of traffic data used and training IDS by the least square vector algorithm (LS-SVM). Then, the remaining features are arranged according to the predictor importance criterion. The least important features are eliminated in the order. The remaining features of this stage, which have created the highest level of accuracy in LS-SVM, are selected as the final features. The features obtained, compared to other similar articles which have examined the selected features in the least squared support vector machine model, are better in the accuracy, true positive rate, and false positive. The results are tested by the UNSW-NB15 dataset.

Keywords: decision tree, feature selection, intrusion detection system, support vector machine

Procedia PDF Downloads 232
931 System for Monitoring Marine Turtles Using Unstructured Supplementary Service Data

Authors: Luís Pina

Abstract:

The conservation of marine biodiversity keeps ecosystems in balance and ensures the sustainable use of resources. In this context, technological resources have been used for monitoring marine species to allow biologists to obtain data in real-time. There are different mobile applications developed for data collection for monitoring purposes, but these systems are designed to be utilized only on third-generation (3G) phones or smartphones with Internet access and in rural parts of the developing countries, Internet services and smartphones are scarce. Thus, the objective of this work is to develop a system to monitor marine turtles using Unstructured Supplementary Service Data (USSD), which users can access through basic mobile phones. The system aims to improve the data collection mechanism and enhance the effectiveness of current systems in monitoring sea turtles using any type of mobile device without Internet access. The system will be able to report information related to the biological activities of marine turtles. Also, it will be used as a platform to assist marine conservation entities to receive reports of illegal sales of sea turtles. The system can also be utilized as an educational tool for communities, providing knowledge and allowing the inclusion of communities in the process of monitoring marine turtles. Therefore, this work may contribute with information to decision-making and implementation of contingency plans for marine conservation programs.

Keywords: GSM, marine biology, marine turtles, unstructured supplementary service data (USSD)

Procedia PDF Downloads 181
930 A Proposed Optimized and Efficient Intrusion Detection System for Wireless Sensor Network

Authors: Abdulaziz Alsadhan, Naveed Khan

Abstract:

In recent years intrusions on computer network are the major security threat. Hence, it is important to impede such intrusions. The hindrance of such intrusions entirely relies on its detection, which is primary concern of any security tool like Intrusion Detection System (IDS). Therefore, it is imperative to accurately detect network attack. Numerous intrusion detection techniques are available but the main issue is their performance. The performance of IDS can be improved by increasing the accurate detection rate and reducing false positive. The existing intrusion detection techniques have the limitation of usage of raw data set for classification. The classifier may get jumble due to redundancy, which results incorrect classification. To minimize this problem, Principle Component Analysis (PCA), Linear Discriminant Analysis (LDA), and Local Binary Pattern (LBP) can be applied to transform raw features into principle features space and select the features based on their sensitivity. Eigen values can be used to determine the sensitivity. To further classify, the selected features greedy search, back elimination, and Particle Swarm Optimization (PSO) can be used to obtain a subset of features with optimal sensitivity and highest discriminatory power. These optimal feature subset used to perform classification. For classification purpose, Support Vector Machine (SVM) and Multilayer Perceptron (MLP) used due to its proven ability in classification. The Knowledge Discovery and Data mining (KDD’99) cup dataset was considered as a benchmark for evaluating security detection mechanisms. The proposed approach can provide an optimal intrusion detection mechanism that outperforms the existing approaches and has the capability to minimize the number of features and maximize the detection rates.

Keywords: Particle Swarm Optimization (PSO), Principle Component Analysis (PCA), Linear Discriminant Analysis (LDA), Local Binary Pattern (LBP), Support Vector Machine (SVM), Multilayer Perceptron (MLP)

Procedia PDF Downloads 336
929 Secondary Metabolites from Turkish Marine-Derived Fungi Hypocrea nigricans

Authors: H. Heydari, B. Konuklugil, P. Proksch

Abstract:

Marine-derived fungi can produce interesting bioactive secondary metabolites that can be considered the potential for drug development. Turkey is a country of a peninsula surrounded by the Black Sea at the north, the Aegean Sea at the west, and the Mediterranean Sea at the south. Despite the approximately 8400 km of coastline, studies on marine secondary metabolites and their biological activity are limited. In our ongoing search for new natural products with different bioactivities produced by the marine-derived fungi, we have investigated secondary metabolites of Turkish collection of the marine sea slug (Peltodoris atromaculata) associated fungi Hypocrea nigricans collected from Seferihisar in the Egean sea. According to the author’s best knowledge, no study was found on this fungal species in terms of secondary metabolites. Isolated from ethyl acetate extract of the culture of Hypocrea nigricans were (isodihydroauroglaucin,tetrahydroauroglaucin and dihydroauroglaucin. The structures of the compounds were established based on an NMR and MS analysis. Structural elucidation of another isolated secondary metabolite/s continues.

Keywords: Hypocrea nigricans, isolation, marine fungi, secondary metabolites

Procedia PDF Downloads 131
928 Marine Litter Dispersion in the Southern Shores of the Caspian Sea (Case Study: Mazandaran Province)

Authors: Siamak Jamshidi

Abstract:

One of the major environmental problems in the southern coasts of the Caspian Sea is that the marine and coastal debris is being deposited and accumulated due to industrial, urban and tourism activities. Study, sampling and analysis on the type, size, amount and origin of human-made (anthropogenic) waste in the coastal areas of this sea can be very effective in implementing management, cultural and informative programs to reduce marine environmental pollutants. Investigation on marine litter distribution under impact of seawater dynamics was performed for the first time in this research. The rate of entry and distribution of marine and coastal pollutants and wastes, which are mainly of urban, tourist and hospital origin, has multiplied on the southern shore of the Caspian Sea in the last decade. According to the results, the two most important sources of hospital waste in the coastal areas are Tonekabon and Mahmoudabad. In this case, the effect of dynamic parameters of seawater such as flow (with speeds of up to about 1 m/s) and waves, as well as the flow of rivers leading to the shoreline are also influential factors in the distribution of marine litter in the region. Marine litters in the southern coastal region were transported from west to east by the shallow waters of the southern Caspian Sea. In other words, the marine debris density has been observed more in the eastern part.

Keywords: southern shelf, coastal oceanography, seawater flow, vertical structure, marine environment

Procedia PDF Downloads 41
927 Large Amplitude Free Vibration of a Very Sag Marine Cable

Authors: O. Punjarat, S. Chucheepsakul, T. Phanyasahachart

Abstract:

This paper focuses on a variational formulation of large amplitude free vibration behavior of a very sag marine cable. In the static equilibrium state, the marine cable has a very large sag configuration. In the motion state, the marine cable is assumed to vibrate in in-plane motion with large amplitude from the static equilibrium position. The total virtual work-energy of the marine cable at the dynamic state is formulated which involves the virtual strain energy due to axial deformation, the virtual work done by effective weight, and the inertia forces. The equations of motion for the large amplitude free vibration of marine cable are obtained by taking into account the difference between the Euler’s equation in the static state and the displaced state. Based on the Galerkin finite element procedure, the linear and nonlinear stiffness matrices, and mass matrices of the marine cable are obtained and the eigenvalue problem is solved. The natural frequency spectrum and the large amplitude free vibration behavior of marine cable are presented.

Keywords: axial deformation, free vibration, Galerkin finite element method, large amplitude, variational method

Procedia PDF Downloads 223
926 Composition and Distribution of Seabed Marine Litter Along Algerian Coast (Western Mediterranean)

Authors: Ahmed Inal, Samir Rouidi, Samir Bachouche

Abstract:

The present study is focused on the distribution and composition of seafloor marine litter associated to trawlable fishing areas along Algerian coast. The sampling was done with a GOC73 bottom trawl during four (04) demersal resource assessment cruises, respectively, in 2016, 2019, 2021 and 2022, carried out on board BELKACEM GRINE R/V. A total of 254 fishing hauls were sampled for the assessment of marine litter. Hauls were performed between 22 and 600 m of depth, the duration was between 30 and 60 min. All sampling was conducted during daylight. After the haul, marine litter was sorted and split from the catch. Then, according to the basis of the MEDITS protocol, litters were sorted into six different categories (plastic, rubber, metal, wood, glass and natural fiber). Thereafter, all marine litter were counted and weighed separately to the nearest 0.5 g. The results shows that the maximums of marine litter densities in the seafloor of the trawling fishing areas along Algerian coast are, respectively, 1996 item/km2 in 2016, 5164 item/km2 in 2019, 2173 item/km2 in 2021 and 7319 item/km2 in 2022. Thus, the plastic is the most abundant litter, it represent, respectively, 46% of marine litter in 2016, 67% in 2019, 69% in 2021 and 74% in 2022. Regarding the weight of the marine litter, it varies between 0.00 and 103 kg in 2016, between 0.04 and 81 kg in 2019, between 0.00 and 68 Kg in 2021 and between 0.00 and 318 kg in 2022. Thus, the maximum rate of marine litter compared to the total catch approximate, respectively, 66% in 2016, 90% in 2019, 65% in 2021 and 91% in 2022. In fact, the average loss in catch is estimated, respectively, at 7.4% in 2016, 8.4% in 2019, 5.7% in 2021 and 6.4% in 2022. However, the bathymetric and geographical variability had a significant impact on both density and weight of marine litter. Marine litter monitoring program is necessary for offering more solution proposals.

Keywords: composition, distribution, seabed, marine litter, algerian coast

Procedia PDF Downloads 36
925 A Review of Security Attacks and Intrusion Detection Schemes in Wireless Sensor Networks: A Survey

Authors: Maleh Yassine, Ezzati Abdellah

Abstract:

Wireless Sensor Networks (WSNs) are currently used in different industrial and consumer applications, such as earth monitoring, health related applications, natural disaster prevention, and many other areas. Security is one of the major aspects of wireless sensor networks due to the resource limitations of sensor nodes. However, these networks are facing several threats that affect their functioning and their life. In this paper we present security attacks in wireless sensor networks, and we focus on a review and analysis of the recent Intrusion Detection schemes in WSNs.

Keywords: wireless sensor networks, security attack, denial of service, IDS, cluster-based model, signature based IDS, hybrid IDS

Procedia PDF Downloads 344
924 Evaluation of Ensemble Classifiers for Intrusion Detection

Authors: M. Govindarajan

Abstract:

One of the major developments in machine learning in the past decade is the ensemble method, which finds highly accurate classifier by combining many moderately accurate component classifiers. In this research work, new ensemble classification methods are proposed with homogeneous ensemble classifier using bagging and heterogeneous ensemble classifier using arcing and their performances are analyzed in terms of accuracy. A Classifier ensemble is designed using Radial Basis Function (RBF) and Support Vector Machine (SVM) as base classifiers. The feasibility and the benefits of the proposed approaches are demonstrated by the means of standard datasets of intrusion detection. The main originality of the proposed approach is based on three main parts: preprocessing phase, classification phase, and combining phase. A wide range of comparative experiments is conducted for standard datasets of intrusion detection. The performance of the proposed homogeneous and heterogeneous ensemble classifiers are compared to the performance of other standard homogeneous and heterogeneous ensemble methods. The standard homogeneous ensemble methods include Error correcting output codes, Dagging and heterogeneous ensemble methods include majority voting, stacking. The proposed ensemble methods provide significant improvement of accuracy compared to individual classifiers and the proposed bagged RBF and SVM performs significantly better than ECOC and Dagging and the proposed hybrid RBF-SVM performs significantly better than voting and stacking. Also heterogeneous models exhibit better results than homogeneous models for standard datasets of intrusion detection. 

Keywords: data mining, ensemble, radial basis function, support vector machine, accuracy

Procedia PDF Downloads 221
923 Harmonization of State Law and Local Laws in Coastal and Marine Areas Management

Authors: N. S. B. Ambarini, Tito Sofyan, Edra Satmaidi

Abstract:

Coastal and marine are two potential natural resource one of the pillars of the national economy. The Indonesian archipelago has marine and coastal which is quite spacious. Various important natural resources such as fisheries, mining and so on are in coastal areas and the sea, so that this region is a unique area with a variety of interests to exploit it. Therefore, to preserve a sustainable manner need good management and comprehensive. To the national and local level legal regulations have been published relating to the management of coastal and marine areas. However, in practice it has not been able to function optimally. Substantially has not touched the problems of the region, especially concerning the interests of local communities (local). This study is a legal non-doctrinal approach to socio-legal studies. Based on the results of research in some coastal and marine areas in Bengkulu province - Indonesia, there is a fact that the system of customary law and local wisdom began to weaken implementation. Therefore harmonization needs to be done in implementing laws and regulations that apply to the values of indigenous and local knowledge that exists in the community.

Keywords: coastal and marine, harmonization, law, local

Procedia PDF Downloads 306
922 Designing Affect-Aware Virtual Worlds for Marine Education Using Legacy Internet of Things Gaming Devices

Authors: Jonathan Bishop, Kamal Bechkoum, Frederick Bishop

Abstract:

This study proposes a novel framework for marine education, leveraging legacy Internet of Things (IoT) gaming devices and affect-aware technology to create immersive virtual worlds. Focused on addressing challenges in fisheries and marine conflict resolution, this approach integrates the unique capabilities of these devices to enhance learner engagement and understanding. By repurposing existing technology, we aim to deliver personalized educational experiences that adapt to users' emotional states. Preliminary results indicate significant potential in utilizing these technologies to foster a deeper comprehension of marine conservation issues, promoting sustainable practices and conflict resolution skills. This interdisciplinary effort underscores the importance of innovative educational tools in environmental stewardship.

Keywords: Marine Education, Marine Technology, Internet of Things, Fisheries, Conflict Management

Procedia PDF Downloads 19
921 Bonding Capacity of GFRP Sheet on Strengthen Concrete Beams After Influenced the Marine Environment

Authors: Mufti Amir Sultan, Rudy Djamaluddin, Rita Irmawaty

Abstract:

Structures built in aggressive environments such as in the sea/marine environment need to be carefully designed, due to the possibility of chloride ion penetration into the concrete. One way to reduce the strength degradation in such environment is to use FRP, which is attached to the surface of reinforced concrete using epoxy. A series of the specimen of reinforced concrete beams with dimension 100×120×600 mm were casted. Beams were immersed in the sea for 3 months (BL3), 6 months (BL6), and 12 months (BL12). Three specimens were prepared control beam without immersion to the sea (B0). The study presented is focused on determining the effect of the marine environment to the capacity of GFRP as flexural external reinforcement elements. The result indicated that the bonding capacity of BL3, BL6, and BL12 compared to B0 decreased for 7.91%, 11.99%, and 37.83%, respectively. The decreasing was caused by the weakening of the bonding capacity GFRP due to the influence of the marine environment.

Keywords: flexural, GFRP, marine environment, bonding capacity

Procedia PDF Downloads 326
920 System Engineering Design of Offshore Oil Drilling Production Platform from Marine Environment

Authors: C. Njoku Paul

Abstract:

This paper deals with systems engineering applications design for offshore oil drilling production platform in the Nigerian Marine Environment. Engineering Design model of the distribution and accumulation of petroleum hydrocarbons discharged into marine environment production platform and sources of impact of an offshore is treated.

Keywords: design of offshore oil drilling production platform, marine, environment, petroleum hydrocarbons

Procedia PDF Downloads 515
919 Bioprospecting of Marine Actinobacteria: The Leading Way for Industrially Important Enzymes and Bioactive Natural Products

Authors: Ramesh Subramani, Mathivanan Narayanasamy, William Aalbersberg

Abstract:

It is well accepted by last 35 years of research and on-going programmes that marine environment harbours abundant and unique biodiversity, which is currently playing as an important source in bioprospecting. It has become apparent that marine microorganisms are lead in the biodiscovery. Among marine organisms, actinobacteria are a target phylum for discovering novel antibiotics against increasing the multi-drug resistant human pathogens because of these taxa representing for novel genera and species. Marine actinomycetes are a proven source of new antibiotic leads and novel enzymes with important industrial applications. A total of 183 streptomycete and 25 non-streptomycete strains were isolated from different marine samples collected from north-eastern part of the Indian Ocean. Among them, 111 isolates displayed antibacterial activity against human pathogens and 151 exhibited antifungal activity against phytopathogens. Importantly, most of them produced various extracellular enzymes and 58 of them produced exopolysaccharides. Totally eight small bioactive compounds and a thermostable alkaline protease have been purified from a selected strain, Streptomyces fungicidicus. Besides, our on-going studies on non-streptomycete strains (rare actinomycetes) are most likely promising resource for new and unique compounds against current emerging drug-resistant pathogens. We have just recognised the chemical diversity in marine microorganisms. Therefore it is worthwhile to continue the exploration of marine microorganisms for new drug leads, novel enzymes and other bioprospecting research.

Keywords: bioactive compounds, industrial enzymes, marine actinobacteria, microbial metabolites, marine natural products

Procedia PDF Downloads 251
918 Inhibition of Sea Urchin and Starfish Embryonic Development by Hexane Extracts from Five Philippine Marine Sponges

Authors: Chona Gelani, Mylene Uy, Keisuke Yasuda, Emi Ohta, Shinji Ohta

Abstract:

The marine environment is undoubtedly a rich source of diverse organisms that possess bioactive secondary metabolites with important pharmacological activities. Marine sponges have since been contributing a wide array of compounds of biomedical and pharmaceutical importance. This study is an attempt to contribute to the growing and advancing marine natural products research. It aims to evaluate the cytotoxicity of the hexane extract (H) from the Philippine marine sponges, Rhabdastrella globostellata (Rg), Callyspongia sp. (Calsp), Callyspongia aerizusa (Ca), Carteriospongia sp. (Carsp), and Cinachyrella sp. (Cisp) using the eggs of starfish, Asterina pectinifera, and sea urchin, Hemicentrotus pulcherrimus. Specifically, the cytotoxicity of the marine sponge hexane extract was determined through its inhibition of starfish and sea urchin embryonic development. After 24 hours, CarspH and RgH inhibited early gastrulation of sea urchin at a minimum concentration of 15.63 and 31.25 μg/mL, respectively. CalspH inhibited the early gastrulation of both sea urchin and starfish at 125 μg/mL, whereas CaH halted the morula of sea urchin and early gastrulation of starfish at 250 μg/mL. CispH exhibited relatively weak inhibitory activity on starfish embryogenesis but inhibited the early gastrulation of sea urchin at 250 μg/mL. The results obtained from this study were used as basis for the separation, isolation and purification of the component(s) of the hexane extracts from the five Philippine marine sponges.

Keywords: embryonic development, marine sponge cytotoxicity, Philippine marine sponges, sea urchin and starfish embryogenesis

Procedia PDF Downloads 243