Search results for: natural threats
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 6138

Search results for: natural threats

6108 Cyber-Social Networks in Preventing Terrorism: Topological Scope

Authors: Alessandra Rossodivita, Alexei Tikhomirov, Andrey Trufanov, Nikolay Kinash, Olga Berestneva, Svetlana Nikitina, Fabio Casati, Alessandro Visconti, Tommaso Saporito

Abstract:

It is well known that world and national societies are exposed to diverse threats: anthropogenic, technological, and natural. Anthropogenic ones are of greater risks and, thus, attract special interest to researchers within wide spectrum of disciplines in efforts to lower the pertinent risks. Some researchers showed by means of multilayered, complex network models how media promotes the prevention of disease spread. To go further, not only are mass-media sources included in scope the paper suggests but also personificated social bots (socbots) linked according to reflexive theory. The novel scope considers information spread over conscious and unconscious agents while counteracting both natural and man-made threats, i.e., infections and terrorist hazards. Contrary to numerous publications on misinformation disseminated by ‘bad’ bots within social networks, this study focuses on ‘good’ bots, which should be mobilized to counter the former ones. These social bots deployed mixture with real social actors that are engaged in concerted actions at spreading, receiving and analyzing information. All the contemporary complex network platforms (multiplexes, interdependent networks, combined stem networks et al.) are comprised to describe and test socbots activities within competing information sharing tools, namely mass-media hubs, social networks, messengers, and e-mail at all phases of disasters. The scope and concomitant techniques present evidence that embedding such socbots into information sharing process crucially change the network topology of actor interactions. The change might improve or impair robustness of social network environment: it depends on who and how controls the socbots. It is demonstrated that the topological approach elucidates techno-social processes within the field and outline the roadmap to a safer world.

Keywords: complex network platform, counterterrorism, information sharing topology, social bots

Procedia PDF Downloads 135
6107 Sharing Experience in Authentic Learning for Mobile Security

Authors: Kai Qian, Lixin Tao

Abstract:

Mobile devices such as smartphones are getting more and more popular in our daily lives. The security vulnerability and threat attacks become a very emerging and important research and education topic in computing security discipline. There is a need to have an innovative mobile security hands-on laboratory to provide students with real world relevant mobile threat analysis and protection experience. This paper presents an authentic teaching and learning mobile security approach with smartphone devices which covers most important mobile threats in most aspects of mobile security. Each lab focuses on one type of mobile threats, such as mobile messaging threat, and conveys the threat analysis and protection in multiple ways, including lectures and tutorials, multimedia or app-based demonstration for threats analysis, and mobile app development for threat protections. This authentic learning approach is affordable and easily-adoptable which immerse students in a real world relevant learning environment with real devices. This approach can also be applied to many other mobile related courses such as mobile Java programming, database, network, and any security relevant courses so that can learn concepts and principles better with the hands-on authentic learning experience.

Keywords: mobile computing, Android, network, security, labware

Procedia PDF Downloads 377
6106 Using Information Theory to Observe Natural Intelligence and Artificial Intelligence

Authors: Lipeng Zhang, Limei Li, Yanming Pearl Zhang

Abstract:

This paper takes a philosophical view as axiom, and reveals the relationship between information theory and Natural Intelligence and Artificial Intelligence under real world conditions. This paper also derives the relationship between natural intelligence and nature. According to communication principle of information theory, Natural Intelligence can be divided into real part and virtual part. Based on information theory principle that Information does not increase, the restriction mechanism of Natural Intelligence creativity is conducted. The restriction mechanism of creativity reveals the limit of natural intelligence and artificial intelligence. The paper provides a new angle to observe natural intelligence and artificial intelligence.

Keywords: natural intelligence, artificial intelligence, creativity, information theory, restriction of creativity

Procedia PDF Downloads 347
6105 Natural Gas Production Forecasts Using Diffusion Models

Authors: Md. Abud Darda

Abstract:

Different options for natural gas production in wide geographic areas may be described through diffusion of innovation models. This type of modeling approach provides an indirect estimate of an ultimately recoverable resource, URR, capture the quantitative effects of observed strategic interventions, and allow ex-ante assessments of future scenarios over time. In order to ensure a sustainable energy policy, it is important to forecast the availability of this natural resource. Considering a finite life cycle, in this paper we try to investigate the natural gas production of Myanmar and Algeria, two important natural gas provider in the world energy market. A number of homogeneous and heterogeneous diffusion models, with convenient extensions, have been used. Models validation has also been performed in terms of prediction capability.

Keywords: diffusion models, energy forecast, natural gas, nonlinear production

Procedia PDF Downloads 202
6104 A CFD Analysis of Flow through a High-Pressure Natural Gas Pipeline with an Undeformed and Deformed Orifice Plate

Authors: R. Kiš, M. Malcho, M. Janovcová

Abstract:

This work aims to present a numerical analysis of the natural gas which flows through a high-pressure pipeline and an orifice plate, through the use of CFD methods. The paper contains CFD calculations for the flow of natural gas in a pipe with different geometry used for the orifice plates. One of them has a standard geometry and a shape without any deformation and the other is deformed by the action of the pressure differential. It shows the behaviour of natural gas in a pipeline using the velocity profiles and pressure fields of the gas in both models with their differences. The entire research is based on the elimination of any inaccuracy which should appear in the flow of the natural gas measured in the high-pressure pipelines of the gas industry and which is currently not given in the relevant standard.

Keywords: orifice plate, high-pressure pipeline, natural gas, CFD analysis

Procedia PDF Downloads 358
6103 Strategies to Promote Safety and Reduce the Vulnerability of Urban Worn-out Textures to the Potential Risk of Earthquake

Authors: Bahareh Montakhabi

Abstract:

Earthquake is known as one of the deadliest natural disasters, with a high potential for damage to life and property. Some of Iran's cities were completely destroyed after major earthquakes, and the people of the region suffered a lot of mental, financial and psychological damage. Tehran is one of the cities located on the fault line. According to experts, the only city that could be severely damaged by a moderate earthquake in Earthquake Engineering Intensity Scale (EEIS) (70% destruction) is Tehran because Tehran is built precisely on the fault. Seismic risk assessment (SRA) of cities in the scale of urban areas and neighborhoods is the first phase of the earthquake crisis management process, which can provide the information required to make optimal use of available resources and facilities in order to reduce the destructive effects and consequences of an earthquake. This study has investigated strategies to promote safety and reduce the vulnerability of worn-out urban textures in the District 12 of Tehran to the potential risk of earthquake aimed at prioritizing the factors affecting the vulnerability of worn-out urban textures to earthquake crises and how to reduce them, using the analytical-exploratory method, analytical hierarchy process (AHP), Expert choice and SWOT technique. The results of SWAT and AHP analysis of the vulnerability of the worn-out textures of District 12 to internal threats (1.70) and external threats (2.40) indicate weak safety of the textures of District 12 regarding internal and external factors and a high possibility of damage.

Keywords: risk management, vulnerability, worn-out textures, earthquake

Procedia PDF Downloads 164
6102 Production of Natural Gas Hydrate by Using Air and Carbon Dioxide

Authors: Yun-Ho Ahn, Hyery Kang, Dong-Yeun Koh, Huen Lee

Abstract:

In this study, we demonstrate the production of natural gas hydrates from permeable marine sediments with simultaneous mechanisms for methane recovery and methane-air or methane-air/carbon dioxide replacement. The simultaneous melting happens until the chemical potentials become equal in both phases as natural gas hydrate depletion continues and self-regulated methane-air replacement occurs over an arbitrary point. We observed certain point between dissociation and replacement mechanisms in the natural gas hydrate reservoir, and we call this boundary as critical methane concentration. By the way, when carbon dioxide was added, the process of chemical exchange of methane by air/carbon dioxide was observed in the natural gas hydrate. The suggested process will operate well for most global natural gas hydrate reservoirs, regardless of the operating conditions or geometrical constraints.

Keywords: air injection, carbon dioxide sequestration, hydrate production, natural gas hydrate

Procedia PDF Downloads 431
6101 Effectiveness of Natural Zeolite in Mitigating Alkali Silica Reaction Expansions

Authors: Esma Gizem Daskiran, Mehmet Mustafa Daskiran

Abstract:

This paper investigates the effectiveness of two natural zeolites in reducing expansion of concrete due to alkali-silica reaction. These natural zeolites have different reactive silica content. Three aggregates; two natural sand and one crushed stone aggregate were used while preparing mortar bars in accordance with accelerated mortar bar test method, ASTM C1260. Performance of natural zeolites are compared by examining the expansions due to alkali silica reaction. Natural zeolites added to the mixtures at %10 and %20 replacement levels by weight of cement. Natural zeolite with high reactive silica content had better performance on reducing expansions due to ASR. In this research, using high reactive zeolite at %20 replacement level was effective in mitigating expansions.

Keywords: alkali silica reaction, natural zeolite, durability, expansion

Procedia PDF Downloads 370
6100 Nondestructive Natural Gas Hydrate Production by Using Air and Carbon Dioxide

Authors: Ahn Yun-Ho, Hyery Kang, Koh Dong-Yeun, Huen Lee

Abstract:

In this study, we demonstrate the production of natural gas hydrates from permeable marine sediments with simultaneous mechanisms for methane recovery and methane-air or methane-air/carbon dioxide replacement. The simultaneous melting happens until the chemical potentials become equal in both phases as natural gas hydrate depletion continues and self-regulated methane-air replacement occurs over an arbitrary point. We observed certain point between dissociation and replacement mechanisms in the natural gas hydrate reservoir, and we call this boundary as critical methane concentration. By the way, when carbon dioxide was added, the process of chemical exchange of methane by air/carbon dioxide was observed in the natural gas hydrate. The suggested process will operate well for most global natural gas hydrate reservoirs, regardless of the operating conditions or geometrical constraints.

Keywords: air injection, carbon dioxide sequestration, hydrate production, natural gas hydrate

Procedia PDF Downloads 547
6099 ASEAN Our Eyes: A Strategic Information Exchange Platform on Counter-Terrorism

Authors: Nila Febri Wilujeng, Helda Risman

Abstract:

Enjoying stable security within its region for the last 50 years, ASEAN nowadays contends with the global context emerging dynamically, which brings about multidimensional challenges and threats such as terrorism, radicalism, armed rebellion, hijacking, and other non-traditional threats. Dealing with these circumstances, ASEAN member states tighten its capacity by enhancing regional cooperation and strategic information exchange among ASEAN member states so-called ASEAN Our Eyes. This initiative adopted for the sake of forestalling any possible threat posed by violent extremism, radicalization, and terrorism through timely strategic information exchange among ASEAN member states. By using qualitative method, this paper will utilize regional security complex and international cooperation theories in analyzing the process to examine ASEAN Our Eyes based on its terms of reference. As a result, it portrays that ASEAN Our Eyes is able to undermine the gaps in the realm of strategic information exchange in monitoring the movement of violent extremism, radicalism, foreign terrorist fighters, and crime-terror nexus. However, it remains premature as a strategic measure to encounter those threats in the years to come.

Keywords: regional cooperation, counter-terrorism, ASEAN our eyes, strategic information exchange

Procedia PDF Downloads 173
6098 Phone Number Spoofing Attack in VoLTE 4G

Authors: Joo-Hyung Oh

Abstract:

The number of service users of 4G VoLTE (voice over LTE) using LTE data networks is rapidly growing. VoLTE based on all-IP network enables clearer and higher-quality voice calls than 3G. It does, however, pose new challenges; a voice call through IP networks makes it vulnerable to security threats such as wiretapping and forged or falsified information. And in particular, stealing other users’ phone numbers and forging or falsifying call request messages from outgoing voice calls within VoLTE result in considerable losses that include user billing and voice phishing to acquaintances. This paper focuses on the threats of caller phone number spoofing in the VoLTE and countermeasure technology as safety measures for mobile communication networks.

Keywords: LTE, 4G, VoLTE, phone number spoofing

Procedia PDF Downloads 407
6097 Enhancing Security and Privacy Protocols in Telehealth: A Comprehensive Approach across IoT/Fog/Cloud Environments

Authors: Yunyong Guo, Man Wang, Bryan Guo, Nathan Guo

Abstract:

This paper introduces an advanced security and privacy model tailored for Telehealth systems, emphasizing end-to-end protection across IoT, Fog, and Cloud components. The proposed model integrates encryption, key management, intrusion detection, and privacy-preserving measures to safeguard patient data. A comprehensive simulation study evaluates the model's effectiveness in scenarios such as unauthorized access, physical breaches, and insider threats. Results indicate notable success in detecting and mitigating threats yet underscore areas for refinement. The study contributes insights into the intricate balance between security and usability in Telehealth environments, setting the stage for continued advancements.

Keywords: cloud, enhancing security, fog, IoT, telehealth

Procedia PDF Downloads 37
6096 Security of Internet of Things: Challenges, Requirements and Future Directions

Authors: Amjad F. Alharbi, Bashayer A. Alotaibi, Fahd S. Alotaibi

Abstract:

The emergence of Internet of Things (IoT) technology provides capabilities for a huge number of smart devices, services and people to be communicate with each other for exchanging data and information over existing network. While as IoT is progressing, it provides many opportunities for new ways of communications as well it introduces many security and privacy threats and challenges which need to be considered for the future of IoT development. In this survey paper, an IoT security issues as threats and current challenges are summarized. The security architecture for IoT are presented from four main layers. Based on these layers, the IoT security requirements are presented to insure security in the whole system. Furthermore, some researches initiatives related to IoT security are discussed as well as the future direction for IoT security are highlighted.

Keywords: Internet of Things (IoT), IoT security challenges, IoT security requirements, IoT security architecture

Procedia PDF Downloads 343
6095 Interspecific Hybridization in Natural Sturgeon Populations of the Eastern Black Sea: The Consequence of Drastic Population Decline

Authors: Tamar Beridze, Elisa Boscari, Fleur Scheele, Tamari Edisherashvili, Cort Anderson, Leonardo Congiu

Abstract:

The eastern part of the Black Sea and its tributaries are suitable habitats for several sturgeon species, among which Acipenser gueldenstaedtii, A. stellatus, A. nudiventris, A. persicus, A. sturio, and H. huso are well documented. However, different threats have led these species to a dramatic decline; all of them are currently listed as Critically Endangered and some Locally Extinct in that area. We tested 94 wild sturgeon samples from the Black Sea and Rioni River by analyzing the mitochondrial Control Region and nuclear markers for hybrid identification. The data analyses (1) assessed mitochondrial diversity among samples, (2) identified their species, as well as (3) indicated instances of hybridization. The data collected, besides confirming a sharp decrease of catches of Beluga and Stellate sturgeon in recent years, also revealed four juvenile hybrids between Russian and Stellate sturgeon, providing the first evidence of natural interspecific hybridization in the Rioni. The present communication raises concerns about the status of sturgeon species in this area and underlines the urgent need for conservation programs to restore self-sustaining populations.

Keywords: black sea, sturgeon, Rioni river, interspecific hybridization

Procedia PDF Downloads 100
6094 Thermodynamic Analysis of GT Cycle with Naphtha or Natural Gas as the Fuel: A Thermodynamic Comparison

Authors: S. Arpit, P. K. Das, S. K. Dash

Abstract:

In this paper, a comparative study is done between two fuels, naphtha and natural gas (NG), for a gas turbine (GT) plant of 32.5 MW with the same thermodynamic configuration. From the energy analysis, it is confirmed that the turbine inlet temperature (TIT) of the gas turbine in the case of natural gas is higher as compared to naphtha, and hence the isentropic efficiency of the turbine is better. The result from the exergy analysis also confirms that due to high turbine inlet temperature in the case of natural gas, exergy destruction in combustion chamber is less. But comparing two fuels for overall analysis, naphtha has higher energy and exergetic efficiency as compared to natural gas.

Keywords: exergy analysis, gas turbine, naphtha, natural gas

Procedia PDF Downloads 174
6093 Detection of Cyberattacks on the Metaverse Based on First-Order Logic

Authors: Sulaiman Al Amro

Abstract:

There are currently considerable challenges concerning data security and privacy, particularly in relation to modern technologies. This includes the virtual world known as the Metaverse, which consists of a virtual space that integrates various technologies and is therefore susceptible to cyber threats such as malware, phishing, and identity theft. This has led recent studies to propose the development of Metaverse forensic frameworks and the integration of advanced technologies, including machine learning for intrusion detection and security. In this context, the application of first-order logic offers a formal and systematic approach to defining the conditions of cyberattacks, thereby contributing to the development of effective detection mechanisms. In addition, formalizing the rules and patterns of cyber threats has the potential to enhance the overall security posture of the Metaverse and, thus, the integrity and safety of this virtual environment. The current paper focuses on the primary actions employed by avatars for potential attacks, including Interval Temporal Logic (ITL) and behavior-based detection to detect an avatar’s abnormal activities within the Metaverse. The research established that the proposed framework attained an accuracy of 92.307%, resulting in the experimental results demonstrating the efficacy of ITL, including its superior performance in addressing the threats posed by avatars within the Metaverse domain.

Keywords: security, privacy, metaverse, cyberattacks, detection, first-order logic

Procedia PDF Downloads 14
6092 The Management of Climate Change by Indigenous People: A Focus on Himachal Pradesh, India

Authors: Anju Batta Sehgal

Abstract:

Climate change is a major challenge in terms of agriculture, food security and rural livelihood for thousands of people especially the poor in Himachal, which falls in North-Western Himalayas. Agriculture contributes over 45 per cent to net state domestic product. It is the main source of income and employment. Over 93 per cent of population is dependent on agriculture which provides direct employment to 71 percent of its people. Area of operation holding is about 9,79 lakh hectares owned by 9.14 lakh farmers. About 80 per cent area is rain-fed and farmers depend on weather gods for rains. Region is a home of diverse ethnic communities having enormous socio-economic and cultural diversities, gifted with range of farming systems and rich resource wealth, including biodiversity, hot spots and ecosystems sustaining millions of people living in the region. But growing demands of ecosystem goods and services are posing threats to natural resources. Climate change is already making adverse impact on the indigenous people. The rural populace is directly dependent for all its food, shelter and other needs on the climate. Our aim should be to shift the focus to indigenous people as primary actors in terms of global climate change monitoring, adaptations and innovations. Objective of this paper is to identify the climate change related threats and vulnerabilities associated with agriculture as a sector and agriculture as people’s livelihood. Broadly it analyses the connections between the nature and rural consumers the ethnic groups.

Keywords: climate change, agriculture, indigenous people, Himachal Pradesh

Procedia PDF Downloads 248
6091 Rethinking the Role of Small States in the Hybrid Era: Shifts in the Cypriot Foreign and Defence Policies, 2004-2019

Authors: Constantinos Adamides, Petros Petrikkos

Abstract:

In the era of growing hybrid threats, small states find themselves in need to re-evaluate existing foreign and defense policies. The pressure to establishing or maintain a status of a reliable partner in the community in which they belong to, vis-à-vis their multilateral relations with other organisations and entities, small states may need to shift their policies in the field to accommodate security needs that are not only pertinent to their security, but also to that of the organisations (bloc) in which they interact. Unlike potential shortcomings in a small state’s mainstream security and defence framework where the threat would be limited to the state itself, in more contemporary times with dominating hybrid threats, the small states’ security shortcomings may also become a security problem for the bloc in which these states belong to. An indicative example is small states like Cyprus and Malta, which belong and 'interact' in the European Union. As a result, the nature of hybrid threats can be utilised to hurt bigger states in a bloc by exploiting the small states’ vulnerabilities and security gaps. Inevitably, both the defensive and foreign policy collaborations of small states with bigger states have been and are constantly re-evaluated to tackle and prevent such problems. In essence, the goal of this ‘re-evaluation’ aims to achieve a twofold goal: The first is the small states’ quest to appear as a reliable partner within the bloc, while the second is to avoid being the weakest security link in the bloc’s defence against hybrid threats. Indeed, the hybrid arena is a security area where they can excel in the bloc, despite the potential and expected conventional military deficiencies. This new environment prompts us to think security from the perspective of small states differently and in relation to their role as members or big organisations. The paper focuses on the case of Cyprus following its accession to the European Union and examines how a country that has had a very focused security orientation –not least due to its ongoing security problems– altered its foreign and defence policies within the European Union to ensure compliance with the rest of the bloc, while at the same time maximizing its role as a security player. Specifically, it examines the methods through which the country shifted its policies as well as the challenges and opportunities that emerged from these security shifts.

Keywords: Cyprus, defence, foreign policy, hybrid threats, ontological security, small states

Procedia PDF Downloads 109
6090 Phone Number Spoofing Attack in VoLTE

Authors: Joo-Hyung Oh, Sekwon Kim, Myoungsun Noh, Chaetae Im

Abstract:

The number of service users of 4G VoLTE (voice over LTE) using LTE data networks is rapidly growing. VoLTE based on All-IP network enables clearer and higher-quality voice calls than 3G. It does, however, pose new challenges; a voice call through IP networks makes it vulnerable to security threats such as wiretapping and forged or falsified information. Moreover, in particular, stealing other users’ phone numbers and forging or falsifying call request messages from outgoing voice calls within VoLTE result in considerable losses that include user billing and voice phishing to acquaintances. This paper focuses on the threats of caller phone number spoofing in the VoLTE and countermeasure technology as safety measures for mobile communication networks.

Keywords: LTE, 4G, VoLTE, phone number spoofing

Procedia PDF Downloads 486
6089 The Potential Threat of Cyberterrorism to the National Security: Theoretical Framework

Authors: Abdulrahman S. Alqahtani

Abstract:

The revolution of computing and networks could revolutionise terrorism in the same way that it has brought about changes in other aspects of life. The modern technological era has faced countries with a new set of security challenges. There are many states and potential adversaries who have the potential and capacity in cyberspace, which makes them able to carry out cyber-attacks in the future. Some of them are currently conducting surveillance, gathering and analysis of technical information, and mapping of networks and nodes and infrastructure of opponents, which may be exploited in future conflicts. This poster presents the results of the quantitative study (survey) to test the validity of the proposed theoretical framework for the cyber terrorist threats. This theoretical framework will help to in-depth understand these new digital terrorist threats. It may also be a practical guide for managers and technicians in critical infrastructure, to understand and assess the threats they face. It might also be the foundation for building a national strategy to counter cyberterrorism. In the beginning, it provides basic information about the data. To purify the data, reliability and exploratory factor analysis, as well as confirmatory factor analysis (CFA) were performed. Then, Structural Equation Modelling (SEM) was utilised to test the final model of the theory and to assess the overall goodness-of-fit between the proposed model and the collected data set.

Keywords: cyberterrorism, critical infrastructure, , national security, theoretical framework, terrorism

Procedia PDF Downloads 375
6088 Water Quality of Cengkareng Drain in Maritime Security Perspective

Authors: Febri Ramadhan, Sigid Hariyadi, Niken Tunjung Murti Pratiwi, Budiman Djoko Said

Abstract:

The scope about maritime security copes all of the problems emanating from maritime domain. Those problems can give such threats to national security of the state. One of threats taking place nowadays in maritime domain is about pollution. Pollution coming from many sources may increase water-borne disease risk that can cause the instability of national security. Pollution coming from many sources may increase water-borne disease risk. Hence the pollution makes an improper condition of environments for humans and others biota dwelling in the waters. One of the tools that can determine about pollution is by measuring about the water quality of its waters. In this case, what brings the waste and pollutants is there an activity of tidal waves introducing substances or energy into the natural environment. Cengkareng Drain is one of the water channels which is affected by tidal waves. Cengkareng Drain was become an observation area to examine the relation between water quality and tide waves. This research was conducted monthly from July to November 2015. Sampling of water was conducted every ebb and tide in every observation. Pollution index showed that the level of pollution on Cengkareng drain was moderately polluted, with the score about 7.7-8.6. Based on the results of t-test and analysis of similarity, the characteristic of water quality on rising tide does not significantly differ from the characteristic of water quality on ebbing tide. Therefore, we need a proper management as a means to control the pollutants in order to make good maritime security strategy.

Keywords: maritime security, Cengkareng drain, water quality, tidal waves

Procedia PDF Downloads 183
6087 Study of Heat Transfer by Natural Convection in Overhead Storage Tank of LNG

Authors: Hariti Rafika, Fekih Malika, Saighi Mohamed

Abstract:

During the period storage of liquefied natural gas, stability is necessarily affected by natural convection along the walls of the tank with thermal insulation is not perfectly efficient. In this paper, we present the numerical simulation of heat transfert by natural convection double diffusion,in unsteady laminar regime in a storage tank. The storage tank contains a liquefied natural gas (LNG) in its gaseous phase. Fluent, a commercial CFD package, based on the numerical finite volume method, is used to simulate the flow. The gas is just on the surface of the liquid phase. This numerical simulation allowed us to determine the temperature profiles, the stream function, the velocity vectors and the variation of the heat flux density in the vapor phase in the LNG storage tank volume. The results obtained for a general configuration, by numerical simulation were compared to those found in the literature.

Keywords: numerical simulation, natural convection, heat gains, storage tank, liquefied natural gas

Procedia PDF Downloads 448
6086 The Adaptive Properties of the Strategic Assurance System of the National Economy Sustainability to the Economic Security Threats

Authors: Badri Gechbaia

Abstract:

Adaptive management as a fundamental element of the concept of the assurance of economy`s sustainability to the economic security of the system-synergetic type has been considered. It has been proved that the adaptive sustainable development is a transitional phase from the extensive one and later on from the rapid growth to the sustainable development. It has been determined that the adaptive system of the strategic assurance of the sustainability of the economy to the economic security threats is formed on the principles of the domination in its complex of the subsystems with weightier adaptive characteristics that negate the destructive influence of external and internal environmental factors on the sustainability of the national economy.

Keywords: adaptive management, adaptive properties, economic security, strategic assurance

Procedia PDF Downloads 466
6085 Water Saving in Electricity Generation System Considering Natural Gas Limitation

Authors: Mehdi Ganjkhani, Sobhan Badakhshan, Seyedvahid Hosseini

Abstract:

Power plants exploit striking proportion of underground water consumption. Correspondingly, natural gas-fired power plants need less water than the other conventional power plants. Therefore, shifting unit commitment planning toward these power plants would help to save water consumption. This paper discusses the impacts of water consumption limitation on natural gas consumption and vice versa as a short-term water consumption management solution. To do so, conventional unit commitment problem is extended by adding water consumption and natural gas constraints to the previous constrains. The paper presents the impact of water saving on natural gas demands as well as natural gas shortage on water demand. Correspondingly, the additional cost of electricity production according to the aforementioned constraints is evaluated. Finally, a test system is applied to investigate potentials and impacts of water saving and natural gas shortage. Different scenarios are conducted and the results are presented. The results of the study illustrate that in order to use less water for power production it needs to use more natural gas. Meanwhile, natural gas shortage causes to utilize more amount of water in aggregate.

Keywords: electric energy generation system, underground water sources, unit commitment, water consumption saving, natural gas

Procedia PDF Downloads 155
6084 Advances in Natural Fiber Surface Treatment Methodologies for Upgradation in Properties of Their Reinforced Composites

Authors: G. L. Devnani, Shishir Sinha

Abstract:

Natural fiber reinforced polymer composite is a very attractive area among the scientific community because of their low cost, eco-friendly and sustainable in nature. Among all advantages there are few issues which need to be addressed, those issues are the poor adhesion and compatibility between two opposite nature materials that is fiber and matrix and their relatively high water absorption. Therefore, natural fiber modifications are necessary to improve their adhesion with different matrices. Excellent properties could be achieved with the surface treatment of these natural fibers ultimately leads to property up-gradation of their reinforced composites with different polymer matrices. Lot of work is going on to improve the adhesion between reinforced fiber phase and polymer matrix phase to improve the properties of composites. Researchers have suggested various methods for natural fiber treatment like silane treatment, treatment with alkali, acetylation, acrylation, maleate coupling, etc. In this study a review is done on the different methods used for the surface treatment of natural fibers and what are the advance treatment methodologies for natural fiber surface treatment for property improvement of natural fiber reinforced polymer composites.

Keywords: composites, acetylation, natural fiber, surface treatment

Procedia PDF Downloads 382
6083 Sustainability and Awareness with Natural Dyes in Textile

Authors: Recep Karadag

Abstract:

Natural dyeing had started since pre-historical times for dyeing of textile materials. The natural dyeing had continued to beginning of 20th century. At the end of 19th century some synthetic dyes were synthesized. Although development of dyeing technologies and methods, natural dyeing was not developed in recent years. Despite rapid advances of synthetic dyestuff industries, natural dye processes have not developed. Therefore natural dyeing was not competed against synthetic dyes. At the same time, it was very difficult that large quantities of coloured textile was dyed with natural dyes And it was very difficult to get reproducible results in the natural dyeing using classical and traditional processes. However, natural dyeing has used slightly in the textile handicraft up to now. It is very important view that re-using of natural dyes to create awareness in textiles in recent years. Natural dyes have got many awareness and sustainability properties. Natural dyes are more eco-friendly than synthetic dyes. A lot of natural dyes have got antioxidant, antibacterial, antimicrobial, antifungal and anti –UV properties. It had been known that were obtained limited numbers colours with natural dyes in the past. On the contrary, colour scale is too wide with natural dyes. Except fluorescent colours, numerous colours can be obtained with natural dyes. Fastnesses of dyed textiles with natural dyes are good that there are light, washing, rubbing, etc. The fastness values can be improved depend on dyeing processes. Thanks to these properties mass production can be made with natural dyes in textiles. Therefore fabric dyeing machine was designed. This machine is too suitable for natural dyeing and mass production. Also any dyeing machine can be modified for natural dyeing. Although dye extraction and dyeing are made separately in the traditional natural dyeing processes and these procedures are become by designed this machine. Firstly, colouring compounds are extracted from natural dye resources, then dyeing is made with extracted colouring compounds. The colouring compounds are moderately dissolved in water. Less water is used in the extraction of colouring compounds from dye resources and dyeing with this new technique on the contrary much quantity water needs to use for dissolve of the colouring compounds in the traditional dyeing. This dyeing technique is very useful method for mass productions with natural dyes in traditional natural dyeing that use less energy, less dye materials, less water, etc. than traditional natural dyeing techniques. In this work, cotton, silk, linen and wool fabrics were dyed with some natural dye plants by the technique. According to the analysis very good results were obtained by this new technique. These results are shown sustainability and awareness of natural dyes for textiles.

Keywords: antibacterial, antimicrobial, natural dyes, sustainability

Procedia PDF Downloads 475
6082 The Contribution of the Lomé Charter to Combating Trafficking in Persons at Sea: Nigerian and South African Legal Perspective

Authors: Obinna Emmanuel Nkomadu

Abstract:

A major maritime problem in the African continent is the widespread proliferation of threats to maritime security, and one of which is the traffic in persons (TIP) at sea, which victims are sometimes assaulted, injured, killed, and in many cases go missing. The South African and Nigerian law on TIP at sea is the Prevention and Combating of Trafficking in Persons Act and the Trafficking in Persons (Prohibition) Enforcement and Administration Act, respectively. These legislation prohibits TIP at sea but does not provides effective and efficient national coordination structures and international cooperation measures against traffickers who engage on human trafficking on the African maritime domain. As a result of the limitations on the maritime security laws of most African States and the maritime security threats on the continent, the African Union in 2016 adopted the African Charter on Maritime Security and Safety and Development in Africa (Lome Charter). The Lomé Charter provides mechanisms for national and international cooperation on maritime security threats, including TIP at sea. However, the Charter is yet to come into force due to the number of States required to accede or ratify the Charter. This paper identifies gaps on existing instruments on TIP at sea by those States and justify on South Africa and Nigeria should adopt the Charter. The justification flow from analysing relevant international law instruments, as well as legislation on human trafficking.

Keywords: cooperation against trafficking in persons at sea, lomé charter, maritime security, Nigerian legislation on trafficking in persons, South African legislation on trafficking in person, and trafficking in persons at sea

Procedia PDF Downloads 113
6081 Onboard Heat, Pressure and Boil-Off Gas Treatment for Stacked NGH Tank Containers

Authors: Hee Jin Kang

Abstract:

Despite numerous studies on the reserves and availability of natural gas hydrates, the technology of transporting natural gas hydrates in large quantities to sea has not been put into practical use. Several natural gas hydrate transport technologies presented by the International Maritime Organization (IMO) are under preparation for commercialization. Among them, NGH tank container concept modularized transportation unit to prevent sintering effect during sea transportation. The natural gas hydrate can be vaporized in a certain part during the transportation. Unprocessed BOG increases the pressure inside the tank. Also, there is a risk of fire if you export the BOG out of the tank without proper handling. Therefore, in this study, we have studied the concept of technology to properly process BOG to modularize natural gas hydrate and to transport it to sea for long distance. The study is expected to contribute to the practical use of NGH tank container, which is a modular transport concept proposed to solve the sintering problem that occurs when transporting natural gas hydrate in the form of bulk cargo.

Keywords: Natural gas hydrate, tank container, marine transportation, boil-off gas

Procedia PDF Downloads 320
6080 Synthesis and Performance Adsorbent from Coconut Shells Polyetheretherketone for Natural Gas Storage

Authors: Umar Hayatu Sidik

Abstract:

The natural gas vehicle represents a cost-competitive, lower-emission alternative to the gasoline-fuelled vehicle. The immediate challenge that confronts natural gas is increasing its energy density. This paper addresses the question of energy density by reviewing the storage technologies for natural gas with improved adsorbent. Technical comparisons are made between storage systems containing adsorbent and conventional compressed natural gas based on the associated amount of moles contained with Compressed Natural Gas (CNG) and Adsorbed Natural Gas (ANG). We also compare gas storage in different cylinder types (1, 2, 3 and 4) based on weight factor and storage capacity. For the storage tank system, we discussed the concept of carbon adsorbents, when used in CNG tanks, offer a means of increasing onboard fuel storage and, thereby, increase the driving range of the vehicle. It confirms that the density of the stored gas in ANG is higher than that of compressed natural gas (CNG) operated at the same pressure. The obtained experimental data were correlated using linear regression analysis with common adsorption kinetic (Pseudo-first order and Pseudo-second order) and isotherm models (Sip and Toth). The pseudo-second-order kinetics describe the best fitness with a correlation coefficient of 9945 at 35 bar. For adsorption isotherms, the Sip model shows better fitness with the regression coefficient (R2) of 0.9982 and with the lowest RSMD value of 0.0148. The findings revealed the potential of adsorbent in natural gas storage applications.

Keywords: natural gas, adsorbent, compressed natural gas, adsorption

Procedia PDF Downloads 36
6079 A Chemical-Free Colouration Technique for Regenerated Fibres Using Waste Alpaca Fibres

Authors: M. Abdullah Al Faruque, Rechana Remadevi, Abu Naser M. Ahsanul Haque, Joselito Razal, Xungai Wang, Maryam Naebe

Abstract:

Generally, the colouration of textile fibres is performed by using synthetic colourants in dope dyeing or conventional dyeing methods. However, the toxic effect of some synthetic colorants due to long-term exposure can cause several health threats including cancer, asthma and skin diseases. Moreover, in colouration process, these colourants not only consume a massive amount of water but also generates huge proportion of wastewater to the environment. Despite having the environmentally friendly characteristics, current natural colourants have downsides in their yield and need chemical extraction processes which are water consuming as well. In view of this, the present work focuses to develop a chemical-free biocompatible and natural pigment based colouration technique to colour regenerated fibres. Waste alpaca fibre was used as a colourant and the colour properties, as well as the mechanical properties, of the regenerated fibres were investigated. The colourant from waste alpaca was fabricated through mechanical milling process and it was directly applied to the polyacrylonitrile (PAN) dope solution in different ratios of alpaca: PAN (10:90, 20:80, 30:70). The results obtained from the chemical structure characterization suggested that all the coloured regenerated fibres exhibited chemical functional groups of both PAN and alpaca. Furthermore, the color strength was increased gradually with the increment of alpaca content and showed excellent washing fastness properties. These results reveal a potential new pathway for chemical-free dyeing technique for fibres with improved properties.

Keywords: alpaca, chemical-free coloration, natural colorant, polyacrylonitrile, water consumption, wet spinning

Procedia PDF Downloads 137