Search results for: seawater intrusion
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 341

Search results for: seawater intrusion

131 A Review on Nuclear Desalination Technology

Authors: Aiswarya C. L, Swatantra Pratap Singh

Abstract:

In recent years, most desalination plants have been powered by fossil fuels, and to a lesser extent, by green energy. Greenhouse gases emitted by fossil-fuelled plants significantly impact the global climate. So scientists are forced to develop a powerful energy source to protect the environment with greater sustainability due to climate change issues. Nuclear energy can supply much more fresh water than what is currently available. Furthermore, it is more affordable and does not emit any greenhouse gases. This review compares conventional desalination plants with nuclear-powered desalination plants in terms of cost, energy consumption, water recovery, and environmental issues. On the basis of the review conducted, nuclear desalination has been demonstrated to be technically feasible and economically competitive with a variety of fossil fuels, renewable energy sources, and waste heat sources. Nuclear sources have been criticized due to their lack of safety. But studies show, if we were able to handle the issue with care, the problems could be eliminated. Here we're looking at the Seawater Reverse Osmosis Plant (SWROP) at Kudankulam Nuclear Power Plant in Tamil Nadu, India and review the further possibility of implementing nuclear desalination technology in other states of India.

Keywords: energy consumption, environmental impacts, nuclear desalination, water recovery

Procedia PDF Downloads 185
130 Biogeochemical Study of Polycuclic Aromatic Hydrocarbons and Its Physiological Response in Mudskippre (B. dussumieri) along the North western Coasts of the Persian Gulf

Authors: Ali Mashinchian Moradi, Mahmood Sinaei

Abstract:

Study on the biomarkers to assess health status of marine ecosystems has an important value in biomonitoring of marine environment. Accordingly, accumulation of polycyclic aromatic hydrocarbons in sediment, water and tissues (liver and gill) of mudskipper (Boleophthalmus dussmieri) and some physiological responses like lysosomal membrane change in haemocytes and the Glutathione-S Transferase (GST) activity in the liver were measured in mudskippers. Samples were collected from five sites along the noth western cost of the Persian Gulf. PAHs concentration was measured by HPLC method. The activity of GST enzyme was analysed by spectrophotometric method. Total PAH concentration in coastal seawater, sediments, liver and gill tissues ranged between 0.80-18.34 ug/L, 113.550-3384.34 ng/g dw, 3.99-46.64 ng/g dw and 3.11-17.This study showed that PAH concentrations in this region are not higher than available standards. The findings revile that lysosomal membrane destabilization and liver GST activities are highly sensitive to PAHs in mudskipper, B. dussumieri. Sediment PAH concentrations were strongly correlated with biomarkers, indicating PAHs were biologically available to fish. Thus, mudskipper perceived to be good sentinel organism for PAH pollution biomonitoring.

Keywords: PAHs, biomarker, mudskipper, Persian Gulf

Procedia PDF Downloads 322
129 Experimental and Theoretical Study on Hygrothermal Aging Effect on Mechanical Behavior of Fiber Reinforced Plastic Laminates

Authors: S. Larbi, R. Bensaada, S. Djebali, A. Bilek

Abstract:

The manufacture of composite parts is a major issue in many industrial domains. Polymer composite materials are ideal for structural applications where high strength-to-weight and stiffness-to-weight ratios are required. However, exposition to extreme environment conditions (temperature, humidity) affects mechanical properties of organic composite materials and lead to an undesirable degradation. Aging mechanisms in organic matrix are very diverse and vary according to the polymer and the aging conditions such as temperature, humidity etc. This paper studies the hygrothermal aging effect on the mechanical properties of fiber reinforced plastics laminates at 40 °C in different environment exposure. Two composite materials are used to conduct the study (carbon fiber/epoxy and glass fiber/vinyl ester with two stratifications for both the materials [904/04] and [454/04]). The experimental procedure includes a mechanical characterization of the materials in a virgin state and exposition of specimens to two environments (seawater and demineralized water). Absorption kinetics for the two materials and both the stratifications are determined. Three-point bending test is performed on the aged materials in order to determine the hygrothermal effect on the mechanical properties of the materials.

Keywords: FRP laminates, hygrothermal aging, mechanical properties, theory of laminates

Procedia PDF Downloads 255
128 A Study on the Impact of Artificial Intelligence on Human Society and the Necessity for Setting up the Boundaries on AI Intrusion

Authors: Swarna Pundir, Prabuddha Hans

Abstract:

As AI has already stepped into the daily life of human society, one cannot be ignorant about the data it collects and used it to provide a quality of services depending up on the individuals’ choices. It also helps in giving option for making decision Vs choice selection with a calculation based on the history of our search criteria. Over the past decade or so, the way Artificial Intelligence (AI) has impacted society is undoubtedly large.AI has changed the way we shop, the way we entertain and challenge ourselves, the way information is handled, and has automated some sections of our life. We have answered as to what AI is, but not why one may see it as useful. AI is useful because it is capable of learning and predicting outcomes, using Machine Learning (ML) and Deep Learning (DL) with the help of Artificial Neural Networks (ANN). AI can also be a system that can act like humans. One of the major impacts be Joblessness through automation via AI which is seen mostly in manufacturing sectors, especially in the routine manual and blue-collar occupations and those without a college degree. It raises some serious concerns about AI in regards of less employment, ethics in making moral decisions, Individuals privacy, human judgement’s, natural emotions, biased decisions, discrimination. So, the question is if an error occurs who will be responsible, or it will be just waved off as a “Machine Error”, with no one taking the responsibility of any wrongdoing, it is essential to form some rules for using the AI where both machines and humans are involved.

Keywords: AI, ML, DL, ANN

Procedia PDF Downloads 63
127 DISGAN: Efficient Generative Adversarial Network-Based Method for Cyber-Intrusion Detection

Authors: Hongyu Chen, Li Jiang

Abstract:

Ubiquitous anomalies endanger the security of our system con- stantly. They may bring irreversible damages to the system and cause leakage of privacy. Thus, it is of vital importance to promptly detect these anomalies. Traditional supervised methods such as Decision Trees and Support Vector Machine (SVM) are used to classify normality and abnormality. However, in some case, the abnormal status are largely rarer than normal status, which leads to decision bias of these methods. Generative adversarial network (GAN) has been proposed to handle the case. With its strong generative ability, it only needs to learn the distribution of normal status, and identify the abnormal status through the gap between it and the learned distribution. Nevertheless, existing GAN-based models are not suitable to process data with discrete values, leading to immense degradation of detection performance. To cope with the discrete features, in this paper, we propose an efficient GAN-based model with specifically-designed loss function. Experiment results show that our model outperforms state-of-the-art models on discrete dataset and remarkably reduce the overhead.

Keywords: GAN, discrete feature, Wasserstein distance, multiple intermediate layers

Procedia PDF Downloads 97
126 Bioconcentration Analysis of Iodine Species in Seaweed (Eucheuma cottonii) from Maluku Marine as Alternative Food Source

Authors: Yeanchon H. Dulanlebit, Nikmans Hattu, Gloria Bora

Abstract:

Seaweed is a type of macro algae which are good source of iodine and have been widely used as food and nutrition supplement. One of iodine species that found in ocean plant is iodate. Analysis of iodate in seaweed (Eucheuma cottonii) from coastal area of Maluku has been done. The determination is done by using spectrophotometric method. Iodate in sample is reduced in excess of potassium iodide in the presence of acid solution, and then is reacted with starch to form blue complex. The study found out that the highest wavelength on determination of iodate species using spectrophotometer analysis method is 570 nm. Optimum value to yield maximum absorption is used in this research. Contents of iodate in seawater from coastal area of Ambon Island, Western Seram and Southeast Maluku are 0.2655, 0.2719 and 0.1760 mg/L, respectively. While in seaweeds from Ambon Island, Western Seram, Southeast Maluku-Taar, Ohoidertawun and Wab are 6.3122, 6.3293, 6.2333, 3.7406 and 4.4207 mg/kg in dry weight. Bioconcentration (enrichment) factor of iodate in seaweed (Eucheuma cottonii) from the three samples (cluster) is different; in Coastal area of Ambon Island, Western Seram and Southeast Maluku respectively are 23.78, 23.28 and 27.26.

Keywords: bioconcentration, eucheuma cottonii, iodate, iodine, seaweed

Procedia PDF Downloads 188
125 An Innovative Auditory Impulsed EEG and Neural Network Based Biometric Identification System

Authors: Ritesh Kumar, Gitanjali Chhetri, Mandira Bhatia, Mohit Mishra, Abhijith Bailur, Abhinav

Abstract:

The prevalence of the internet and technology in our day to day lives is creating more security issues than ever. The need for protecting and providing a secure access to private and business data has led to the development of many security systems. One of the potential solutions is to employ the bio-metric authentication technique. In this paper we present an innovative biometric authentication method that utilizes a person’s EEG signal, which is acquired in response to an auditory stimulus,and transferred wirelessly to a computer that has the necessary ANN algorithm-Multi layer perceptrol neural network because of is its ability to differentiate between information which is not linearly separable.In order to determine the weights of the hidden layer we use Gaussian random weight initialization. MLP utilizes a supervised learning technique called Back propagation for training the network. The complex algorithm used for EEG classification reduces the chances of intrusion into the protected public or private data.

Keywords: EEG signal, auditory evoked potential, biometrics, multilayer perceptron neural network, back propagation rule, Gaussian random weight initialization

Procedia PDF Downloads 362
124 Deep Learning and Accurate Performance Measure Processes for Cyber Attack Detection among Web Logs

Authors: Noureddine Mohtaram, Jeremy Patrix, Jerome Verny

Abstract:

As an enormous number of online services have been developed into web applications, security problems based on web applications are becoming more serious now. Most intrusion detection systems rely on each request to find the cyber-attack rather than on user behavior, and these systems can only protect web applications against known vulnerabilities rather than certain zero-day attacks. In order to detect new attacks, we analyze the HTTP protocols of web servers to divide them into two categories: normal attacks and malicious attacks. On the other hand, the quality of the results obtained by deep learning (DL) in various areas of big data has given an important motivation to apply it to cybersecurity. Deep learning for attack detection in cybersecurity has the potential to be a robust tool from small transformations to new attacks due to its capability to extract more high-level features. This research aims to take a new approach, deep learning to cybersecurity, to classify these two categories to eliminate attacks and protect web servers of the defense sector which encounters different web traffic compared to other sectors (such as e-commerce, web app, etc.). The result shows that by using a machine learning method, a higher accuracy rate, and a lower false alarm detection rate can be achieved.

Keywords: anomaly detection, HTTP protocol, logs, cyber attack, deep learning

Procedia PDF Downloads 178
123 What It Means to Be an Internally Displaced Person: The Story of the Abu-Shouk Camp

Authors: Mawa Abdelbagi Mohamed Mohamed, Eslam Alaa Elbahlawan

Abstract:

This study examines the complex social fabric woven within the Abu-Shouk internally displaced persons camp, shaped by the chaotic waves of armed conflict and displacement in the early 2000s. The impact of war, economic constraints, and altered living conditions have fundamentally reshaped families and traditions, presenting both challenges and opportunities. In this exploration, we navigate the resilience of a community thrust into adversity, spotlighting how it emerged as essential in rebuilding social bonds. Exchanges of culture, intertribal marriages, and communal gathering spots have become essential tools in fostering cohesion and understanding amidst diversity. However, this resilience has been tested by the intrusion of politics, leading to shifts in governance structures and community dynamics. As we conclude, it is evident that while the scars of displacement and political disruptions are present, the community's enduring spirit and adaptability shine through. Empowering the community to rebuild their social tapestry, bridging the gaps, and restoring unity amid evolving political realities remain the beacon guiding their journey toward a shared, purposeful future.

Keywords: darfur, internally displaced person, social fabric, conflict

Procedia PDF Downloads 32
122 Adsorbent Removal of Oil Spills Using Bentonite Clay

Authors: Saad Mohamed Elsaid Abdelrahman

Abstract:

The adsorption method is one of the best modern techniques used in removing pollutants, especially organic hydrocarbon compounds, from polluted water. Through this research, bentonite clay can be used to remove organic hydrocarbon compounds, such as heptane and octane, resulting from oil spills in seawater. Bentonite clay can be obtained from the Kholayaz area, located north of Jeddah, at a distance of 80 km. Chemical analysis shows that bentonite clay consists of a mixture of silica, alumina and oxides of some elements. Bentonite clay can be activated in order to raise its adsorption efficiency and to make it suitable for removing pollutants using an ionic organic solvent. It is necessary to study some of the factors that could be in the efficiency of bentonite clay in removing oily organic compounds, such as the time of contact of the clay with heptane and octane solutions, pH and temperature, in order to reach the highest adsorption capacity of bentonite clay. The temperature can be a few degrees Celsius higher. The adsorption capacity of the clay decreases when the temperature is raised more than 4°C to reach its lowest value at the temperature of 50°C. The results show that the friction time of 30 minutes and the pH of 6.8 is the best conditions to obtain the highest adsorption capacity of the clay, 467 mg in the case of heptane and 385 mg in the case of octane compound. Experiments conducted on bentonite clay were encouraging to select it to remove heavy molecular weight pollutants such as petroleum compounds under study.

Keywords: adsorbent, bentonite clay, oil spills, removal

Procedia PDF Downloads 58
121 Advanced Seismic Retrofit of a School Building by a DFP Base Isolation Solution

Authors: Stefano Sorace, Gloria Terenzi

Abstract:

The study of a base isolation seismic retrofit solution for a reinforced concrete school building is presented in this paper. The building was assumed as a benchmark structure for a Research Project financed by the Italian Department of Civil Protection, and is representative of several similar public edifices designed with earlier Technical Standards editions, in Italy as well as in other earthquake-prone European countries. The structural characteristics of the building, and a synthesis of the investigation campaigns developed on it, are initially presented. The mechanical parameters, dimensions, locations and installation details of the base isolation system, incorporating double friction pendulum sliding bearings as protective devices, are then illustrated, along with the performance assessment analyses carried out in original and rehabilitated conditions according to a full non-linear dynamic approach. The results of the analyses show a remarkable enhancement of the seismic response capacities of the structure in base-isolated configuration. This allows reaching the high performance levels postulated in the rehabilitation design with notably lower costs and architectural intrusion as compared to traditional retrofit interventions designed for the same objectives.

Keywords: seismic retrofit, seismic assessment, r/c structures, school buildings, base isolation

Procedia PDF Downloads 242
120 Smart-Textile Containers for Urban Mobility

Authors: René Vieroth, Christian Dils, M. V. Krshiwoblozki, Christine Kallmayer, Martin Schneider-Ramelow, Klaus-Dieter Lang

Abstract:

Green urban mobility in commercial and private contexts is one of the great challenges for the continuously growing cities all over the world. Bicycle based solutions are already and since a long time the key to success. Modern developments like e-bikes and high-end cargo-bikes complement the portfolio. Weight, aerodynamic drag, and security for the transported goods are the key factors for working solutions. Recent achievements in the field of smart-textiles allowed the creation of a totally new generation of intelligent textile cargo containers, which fulfill those demands. The fusion of technical textiles, design and electrical engineering made it possible to create an ecological solution which is very near to become a product. This paper shows all the details of this solution that includes an especially developed sensor textile for cut detection, a protective textile layer for intrusion prevention, an universal-charging-unit for energy harvesting from diverse sources and a low-energy alarm system with GSM/GPRS connection, GPS location and RFID interface.

Keywords: cargo-bike, cut-detection, e-bike, energy-harvesting, green urban mobility, logistics, smart-textiles, textile-integrity sensor

Procedia PDF Downloads 289
119 SPPO-Based Cation Exchange Membranes with a Positively Charged Layer for Cation Fractionation

Authors: Noor Ul Afsar, Wengen Ji, Bin Wu, Muhammad A. Shehzad, Liang Ge, Tongwen Xu

Abstract:

The synthesis of monovalent cation perm-selective membranes (MCPMs) to efficiently discriminate amongst cations from seawater is of great importance for several industrial applications. However, a technical approach is highly desired to construct MCPMs to obtain a high ionic flux and sustain perm-selectivity simultaneously. In the present work, the thickness of the quaternized poly (2, 6-dimethyl-1, 4-phenylene oxide) (QPPO) layer on the surface of the SPPO-PVA (SPVA) composite membrane was adjusted using a facile procedure to achieve high permselectivity without scarifying the ionic flux. The thickness of the selective layer was precisely controlled using various concentrations of the QPPO solution. By the introduction of the cationic layer on the SPVA membrane, the monovalent cation can be separated from the divalent cation by their difference in charge density. The influence of the selective barrier (thickness) endows MCPMs with high perm-selectivity up to 12.7 for 0.1 mol L⁻¹ Li⁺/Mg²⁺ system, which is very satisfactory for polymeric membranes. The fabricated membranes have low electrical resistance and high limiting current density (iₗᵢₘ). Keeping in view the ED results, the prepared membranes with selective surface layers could be a viable candidate for Li⁺ selective separation from divalent cation Mg²⁺.

Keywords: monovalent cation perm-selective membranes, cation fractionation, perm-selectivity, ionic flux, electrodialysis

Procedia PDF Downloads 38
118 Performance Tracking of Thermal Plant Systems of Kuwait and Impact on the Environment

Authors: Abdullah Alharbi

Abstract:

Purpose: This research seeks to take a holistic strategic evaluation of the thermal power plants in Kuwait at both policy and technical level in order to allow a systematic retrofitting program. The new world order in energy generation and consumption demand that sources of energy can safeguard the use of natural resources and generate minimal impacts on the environment. For Kuwait, the energy used per capita is mainly associated with desalination plants. The overall impact of thermal power plant installations manifests indisposed of seawater and the health of marine life. Design/methodology/approach: The research adopts a case study based evaluation of performance data and documents of thermal plant installations in Kuwait. Findings: Research findings on the performance of existing thermal plants demand policy benchmarking with internationally acceptable standards in order to create clarity on decisions regarding demolition, retrofitting, or renewal. Research implications: This research has the potential to strategically inform and influence the piecemeal changes to power plants, including the replacement of power generation equipment, considering the varied technologies for thermal plants. Originality/value: This research provides evidence based data that can be useful for influencing operational efficiency after a holistic evaluation of existing capacity in comparison with future demands.

Keywords: energy, Kuwait, performance, stainability, tracking, thermal plant

Procedia PDF Downloads 65
117 Detection of Cyberattacks on the Metaverse Based on First-Order Logic

Authors: Sulaiman Al Amro

Abstract:

There are currently considerable challenges concerning data security and privacy, particularly in relation to modern technologies. This includes the virtual world known as the Metaverse, which consists of a virtual space that integrates various technologies and is therefore susceptible to cyber threats such as malware, phishing, and identity theft. This has led recent studies to propose the development of Metaverse forensic frameworks and the integration of advanced technologies, including machine learning for intrusion detection and security. In this context, the application of first-order logic offers a formal and systematic approach to defining the conditions of cyberattacks, thereby contributing to the development of effective detection mechanisms. In addition, formalizing the rules and patterns of cyber threats has the potential to enhance the overall security posture of the Metaverse and, thus, the integrity and safety of this virtual environment. The current paper focuses on the primary actions employed by avatars for potential attacks, including Interval Temporal Logic (ITL) and behavior-based detection to detect an avatar’s abnormal activities within the Metaverse. The research established that the proposed framework attained an accuracy of 92.307%, resulting in the experimental results demonstrating the efficacy of ITL, including its superior performance in addressing the threats posed by avatars within the Metaverse domain.

Keywords: security, privacy, metaverse, cyberattacks, detection, first-order logic

Procedia PDF Downloads 14
116 Human-Tiger Conflict in Chitwan National Park, Nepal

Authors: Abishek Poudel

Abstract:

Human-tiger conflicts are serious issues of conflicts between local people and park authority and the conflicting situation potentially play negative role in park management. The study aimed (1) To determine the trend and nature of human-tiger conflicts (2) To understand people's perception and mitigation measures towards tiger conservation. Both primary and secondary information were used to determine human- tiger conflicts in Chitwan National Park. Systematic random sampling with 5% intensity was done to collect the perception of the villagers regarding human-tiger conflicts. The study sites were selected based on frequencies of incidences of human attacks and livestock depredation viz. Rajahar and Ayodhyapuri VDCs respectively. The trend of human casualties by tiger has increased in last five year whereas the trend of livestock has decreased. Reportedly, between 2008 and 2012, tigers killed 22 people, injured 10 and killed at least 213 livestock. Conflict was less common in the park and more intense in the sub-optimal habitats of Buffer Zone. Goat was the most vulnerable livestock followed by cattle. The livestock grazing and human intrusion into tiger habitat were the causes of conflicts. Developing local stewardship and support for tiger conservation, livestock insurance, and compensation policy simplification may help reduce human-tiger conflicts.

Keywords: livestock depredation, sub optimal habitat, human-tiger, local stewardship

Procedia PDF Downloads 441
115 Ground Effect on Marine Midge Water Surface Locomotion

Authors: Chih-Hua Wu, Bang-Fuh Chen, Keryea Soong

Abstract:

Midges can move on the surface of the water at speeds of approximately 340 body-lengths/s and can move continuously for >90 min. Their wings periodically scull the sea surface to push water backward and thus generate thrust; their other body parts, including their three pairs of legs, touch the water only occasionally. The aim of this study was to investigate the locomotion mechanism of marine midges with a size of 2 mm and living in shallow reefs in Wanliton, southern Taiwan. We assumed that midges generate lift through two mechanisms: by sculling the surface of seawater to leverage the generated tension for thrust and by retracting their wings to generate aerodynamic lift at a suitable angle of attack. We performed computational fluid dynamic simulations to determine the mechanism of midge locomotion above the surface of the water. The simulations indicated that ground effects are essential and that both the midge trunk and wing tips must be very close to the water surface to produce sufficient lift to keep the midge airborne. Furthermore, a high wing-beat frequency is crucial for the midge to produce sufficient lift during wing retraction. Accordingly, ground effects, forward speed, and high wing-beat frequency are major factors influencing the ability of midges to generate sufficient lift and remain airborne above the water surface.

Keywords: ground effect, water locomotion, CFD, aerodynamic lift

Procedia PDF Downloads 49
114 Sustainable Use of Fresh Groundwater Lens of Pleistocene Aquifer in Nam Dinh, Vietnam

Authors: Tran Thanh Le, Pham Trong Duc

Abstract:

The fresh groundwater lens of the Pleistocene aquifer in Nam Dinh was formed since 12,900 years ago. Currently, the Pleistocene aquifer has been continuously exploited on average of 154,163m3/day, distributed mainly in the districts of Nghia Hung, Hai Hau, a part of Truc Ninh, Y Yen, Nam Truc and Giao Thuy. The groundwater level is still on a declining trend, saltwater intrusion in this freshwater lens can occur if the growth rate in exploitation is maintained. This study focused on groundwater sustainable use by means of 4 groups of criteria including: Groundwater quality and pollution; Aquifers’ productivity and capacity; Environment impacts due to exploitation (groundwater level decline, land subsidence due to water exploitation); Social and economic impacts. Using a combination of methods including field surveys, geophysics, hydrogeochemistry, isotope and numerical models to determine safe groundwater exploitation thresholds for the whole study area has been determined to be 544,314m3/day and the actual exploitation amount is currently about 30% compared to the safe exploitation threshold. However, it should also be noted that the current groundwater exploitation threshold and level of its exploitation compared to the safe exploitation threshold of each locality are not the same. From this result, the groundwater exploitation threshold map of the study area was established to serve the management, licensing and orientation of groundwater exploitation.

Keywords: criteria, groundwater, fresh groundwater lens, pleistocene, Nam Dinh

Procedia PDF Downloads 119
113 Experimental Quantification and Modeling of Dissolved Gas during Hydrate Crystallization: CO₂ Hydrate Case

Authors: Amokrane Boufares, Elise Provost, Veronique Osswald, Pascal Clain, Anthony Delahaye, Laurence Fournaison, Didier Dalmazzone

Abstract:

Gas hydrates have long been considered as problematic for flow assurance in natural gas and oil transportation. On the other hand, they are now seen as future promising materials for various applications (i.e. desalination of seawater, natural gas and hydrogen storage, gas sequestration, gas combustion separation and cold storage and transport). Nonetheless, a better understanding of the crystallization mechanism of gas hydrate and of their formation kinetics is still needed for a better comprehension and control of the process. To that purpose, measuring the real-time evolution of the dissolved gas concentration in the aqueous phase during hydrate formation is required. In this work, CO₂ hydrates were formed in a stirred reactor equipped with an Attenuated Total Reflection (ATR) probe coupled to a Fourier Transform InfraRed (FTIR) spectroscopy analyzer. A method was first developed to continuously measure in-situ the CO₂ concentration in the liquid phase during solubilization, supersaturation, hydrate crystallization and dissociation steps. Thereafter, the measured concentration data were compared with those of equilibrium concentrations. It was observed that the equilibrium is instantly reached in the liquid phase due to the fast consumption of dissolved gas by the hydrate crystallization. Consequently, it was shown that hydrate crystallization kinetics is limited by the gas transfer at the gas-liquid interface. Finally, we noticed that the liquid-hydrate equilibrium during the hydrate crystallization is governed by the temperature of the experiment under the tested conditions.

Keywords: gas hydrate, dissolved gas, crystallization, infrared spectroscopy

Procedia PDF Downloads 243
112 Enhancing Internet of Things Security: A Blockchain-Based Approach for Preventing Spoofing Attacks

Authors: Salha Abdullah Ali Al-Shamrani, Maha Muhammad Dhaher Aljuhani, Eman Ali Ahmed Aldhaheri

Abstract:

With the proliferation of Internet of Things (IoT) devices in various industries, there has been a concurrent rise in security vulnerabilities, particularly spoofing attacks. This study explores the potential of blockchain technology in enhancing the security of IoT systems and mitigating these attacks. Blockchain's decentralized and immutable ledger offers significant promise for improving data integrity, transaction transparency, and tamper-proofing. This research develops and implements a blockchain-based IoT architecture and a reference network to simulate real-world scenarios and evaluate a blockchain-integrated intrusion detection system. Performance measures including time delay, security, and resource utilization are used to assess the system's effectiveness, comparing it to conventional IoT networks without blockchain. The results provide valuable insights into the practicality and efficacy of employing blockchain as a security mechanism, shedding light on the trade-offs between speed and security in blockchain deployment for IoT. The study concludes that despite minor increases in time consumption, the security benefits of incorporating blockchain technology into IoT systems outweigh potential drawbacks, demonstrating a significant potential for blockchain in bolstering IoT security.

Keywords: internet of things, spoofing, IoT, access control, blockchain, raspberry pi

Procedia PDF Downloads 37
111 Contribution of Remote Sensing and GIS to the Study of the Impact of the Salinity of Sebkhas on the Quality of Groundwater: Case of Sebkhet Halk El Menjel (Sousse)

Authors: Gannouni Sonia, Hammami Asma, Saidi Salwa, Rebai Noamen

Abstract:

Water resources in Tunisia have experienced quantitative and qualitative degradation, especially when talking about wetlands and Sbekhas. Indeed, the objective of this work is to study the spatio-temporal evolution of salinity for 29 years (from 1987 to 2016). A study of the connection between surface water and groundwater is necessary to know the degree of influence of the Sebkha brines on the water table. The evolution of surface salinity is determined by remote sensing based on Landsat TM and OLI/TIRS satellite images of the years 1987, 2007, 2010, and 2016. The processing of these images allowed us to determine the NDVI(Normalized Difference Vegetation Index), the salinity index, and the surface temperature around Sebkha. In addition, through a geographic information system(GIS), we could establish a map of the distribution of salinity in the subsurface of the water table of Chott Mariem and Hergla/SidiBouAli/Kondar. The results of image processing and the calculation of the index and surface temperature show an increase in salinity downstream of in addition to the sebkha and the development of vegetation cover upstream and the western part of the sebkha. This richness may be due both to contamination by seawater infiltration from the barrier beach of Hergla as well as the passage of groundwater to the sebkha.

Keywords: spatio-temporal monitoring, salinity, satellite images, NDVI, sebkha

Procedia PDF Downloads 93
110 Listening to the Voices of Syrian Refugee Women in Canada: An Ethnographic Insight into the Journey from Trauma to Adaptation

Authors: Areej Al-Hamad, Cheryl Forchuk, Abe Oudshoorn, Gerald Patrick Mckinley

Abstract:

Syrian refugee women face many obstacles when accessing health services in host countries that are influenced by various cultural, structural, and practical factors. This paper is based on critical ethnographic research undertaken in Canada to explore Syrian refugee women's migration experiences. Also, we aim to critically examine how the intersection of gender, trauma, violence and the political and economic conditions of Syrian refugee women shapes their everyday lives and health. The study also investigates the strategies and practices by which Syrian refugee women are currently addressing their healthcare needs and the models of care that are suggested for meeting their physical and mental health needs. Findings show that these women experienced constant worries, hardship, vulnerability, and intrusion of dignity. These experiences and challenges were aggravated by the structure of the Canadian social and health care system. This study offers a better understanding of the impact of migration and trauma on Syrian refugee women's roles, responsibilities, gender dynamics, and interaction with Ontario's healthcare system to improve interaction and outcomes. Health care models should address these challenges among Syrian refugee families in Canada.

Keywords: Syrian refugee women, intersectionality, critical ethnography, migration

Procedia PDF Downloads 61
109 Designing and Implementation of MPLS Based VPN

Authors: Muhammad Kamran Asif

Abstract:

MPLS stands for Multi-Protocol Label Switching. It is the technology which replaces ATM (Asynchronous Transfer Mode) and frame relay. In this paper, we have designed a full fledge small scale MPLS based service provider network core network model, which provides communication services (e.g. voice, video and data) to the customer more efficiently using label switching technique. Using MPLS VPN provides security to the customers which are either on LAN or WAN. It protects its single customer sites from being attacked by any intruder from outside world along with the provision of concept of extension of a private network over an internet. In this paper, we tried to implement a service provider network using minimum available resources i.e. five 3800 series CISCO routers comprises of service provider core, provider edge routers and customer edge routers. The customers on the one end of the network (customer side) is capable of sending any kind of data to the customers at the other end using service provider cloud which is MPLS VPN enabled. We have also done simulation and emulation for the model using GNS3 (Graphical Network Simulator-3) and achieved the real time scenarios. We have also deployed a NMS system which monitors our service provider cloud and generates alarm in case of any intrusion or malfunctioning in the network. Moreover, we have also provided a video help desk facility between customers and service provider cloud to resolve the network issues more effectively.

Keywords: MPLS, VPN, NMS, ATM, asynchronous transfer mode

Procedia PDF Downloads 308
108 Hydrogeophysical Investigations of Groundwater Resources and Demarcation of Saltwater-Freshwater Interface in Kilwa Kisiwani Island, Se Tanzania

Authors: Simon R. Melchioly, Ibrahimu C. Mjemah, Isaac M. Marobhe

Abstract:

The main objective of this research was to identify new potential sources of groundwater resources using geophysical methods and also to demarcate the saltwater - freshwater interface. Kilwa Kisiwani Island geologically is covered mostly by Quaternary alluvial sediments, sand, and gravel. The geophysical techniques employed during the research include Vertical Electrical Sounding (VES), Earth Resistivity Tomography (ERT), and Transient Electromagnetics (TEM). Two-dimensional interpolated geophysical results show that there exist freshwater lenses formations that are potential aquifers on the Island with resistivity values ranging from 11.68 Ωm to 46.71 Ωm. These freshwater lenses are underlain by formation with brackish water in which the resistivity values are varying between 3.89 Ωm and 1.6 Ωm. Saltwater with resistivity less than 1 Ωm is found at the bottom being overlaid by brackish saturated formation. VES resistivity results show that 89% (16 out of 18) of the VES sites are potential for groundwater resources drilling while TEM results indicate that 75% (12 out of 16) of TEM sites are potential for groundwater borehole drilling. The recommended drilling depths for potential sites in Kilwa Kisiwani Island show that the maximum depth is 25 m and the minimum being 10 m below ground surface. The aquifer structure in Kilwa Kisiwani Island is a shallow, unconfined freshwater lenses floating above the seawater and the maximum thickness of the aquifer is 25 m for few selected VES and TEM sites while the minimum thickness being 10 m.

Keywords: groundwater, hydrogeophysical, Kilwa Kisiwani, freshwater, saltwater, resistivity

Procedia PDF Downloads 167
107 Effect of Different Commercial Diets and Temperature on the Growth Performance, Feed Intake and Feed Conversion Ratio of Sobaity Seabream Sparidentex hasta

Authors: Seemab Zehra, A. H. W. Mohammed, E. Pantanella, J. L. Q. Laranja, P. H. De Mello, R. Saleh, A. A. Siddik, A. Al Shaikhi, A. M. Al-Suwailem

Abstract:

Two separate feeding trials were conducted to determine the effects of using different commercial diets and water temperatures on the growth performance, feed intake, feed conversion ratio (FCR) and condition factor of sobaity seabream Sparidentex hasta. In experiment I, growth performance, feed intake, protein efficiency ratio (PER), feed conversion ratio (FCR) and survival (%) of sobaity seabream Sparidentex hasta (330.5±2.6 g; 26.9±1.0 cm) were evaluated by four different commercial diets (1, 2, 3 and 4) for 80 days. The daily weight gain was around 3.2 g day-1 with an SGR of 0.7% day-1. Both the FCR and PER in the fish were significantly better in diet 2 that contained 46.36% crude protein and 12.54% crude fat. In experiment II, (99±2.6 g; 17.1±1.0 cm). The fish were cultured in 1m3 tanks supplied with seawater from the Red Sea wherein three different rearing temperatures were set as treatments (24, 28 and 32°C). Fish were fed with a commercial diet based on the results of experiment I (46.4% protein; 20.1 MJ kg-1 energy) to satiation for 96 days. Total weight gain was significantly higher for the fish reared in the 32°C group (158.57 g) followed by the 28°C group (138.25 g), while the lowest weight gain was observed in the 24°C group (116.98 g). The FCR was significantly lower in the 32°C group (1.62) as compared to 28 (1.8) and 24°C (1.85) groups. Based on the results obtained from these preliminary studies (experiment I and II), sobaity seabream can attain better growth performance, FCR and PER at 32°C in the Red Sea by feeding commercial diet 2.

Keywords: Sparidentex hasta, nutrition, FCR, Red Sea, growth performance

Procedia PDF Downloads 42
106 Mechanical Properties and Chloride Diffusion of Ceramic Waste Aggregate Mortar Containing Ground Granulated Blast-Furnace Slag

Authors: H. Higashiyama, M. Sappakittipakorn, M. Mizukoshi, O. Takahashi

Abstract:

Ceramic waste aggregates (CWAs) were made from electric porcelain insulator wastes supplied from an electric power company, which were crushed and ground to fine aggregate sizes. In this study, to develop the CWA mortar as an eco–efficient, ground granulated blast–furnace slag (GGBS) as a supplementary cementitious material (SCM) was incorporated. The water–to–binder ratio (W/B) of the CWA mortars was varied at 0.4, 0.5, and 0.6. The cement of the CWA mortar was replaced by GGBS at 20 and 40% by volume (at about 18 and 37% by weight). Mechanical properties of compressive and splitting tensile strengths, and elastic modulus were evaluated at the age of 7, 28, and 91 days. Moreover, the chloride ingress test was carried out on the CWA mortars in a 5.0% NaCl solution for 48 weeks. The chloride diffusion was assessed by using an electron probe microanalysis (EPMA). To consider the relation of the apparent chloride diffusion coefficient and the pore size, the pore size distribution test was also performed using a mercury intrusion porosimetry at the same time with the EPMA. The compressive strength of the CWA mortars with the GGBS was higher than that without the GGBS at the age of 28 and 91 days. The resistance to the chloride ingress of the CWA mortar was effective in proportion to the GGBS replacement level.

Keywords: ceramic waste aggregate, chloride diffusion, GGBS, pore size distribution

Procedia PDF Downloads 315
105 Corrosion Resistance Evaluation of Reinforcing Bars: A Comparative Study of Fusion Bonded Epoxy Coated, Cement Polymer Composite Coated and Dual Zinc Epoxy Coated Rebar for Application in Reinforced Concrete Structures

Authors: Harshit Agrawal, Salman Muhammad

Abstract:

Degradation to reinforced concrete (RC), primarily due to corrosion of embedded reinforcement, has been a major cause of concern worldwide. Among several ways to control corrosion, the use of coated reinforcement has gained significant interest in field applications. However, the choice of proper coating material and the effect of damage over coating are yet to be addressed for effective application of coated reinforcements. The present study aims to investigate and compare the performance of three different types of coated reinforcements —Fusion-Bonded Epoxy Coating (FBEC), Cement Polymer Composite Coating (CPCC), and Dual Zinc-Epoxy Coating (DZEC) —in concrete structures. The aim is to assess their corrosion resistance, durability, and overall effectiveness as coated reinforcement materials both in undamaged and simulated damaged conditions. Through accelerated corrosion tests, electrochemical analysis, and exposure to aggressive marine environments, the study evaluates the long-term performance of each coating system. This research serves as a crucial guide for engineers and construction professionals in selecting the most suitable corrosion protection for reinforced concrete, thereby enhancing the durability and sustainability of infrastructure.

Keywords: corrosion, reinforced concrete, coated reinforcement, seawater exposure, electrochemical analysis, service life, corrosion prevention

Procedia PDF Downloads 46
104 Geotechnical Design of Bridge Foundations and Approaches in Hilly Granite Formation

Authors: Q. J. Yang

Abstract:

This paper presents a case study of geotechnical design of bridge foundations and approaches in hilly granite formation in northern New South Wales of Australia. Firstly, the geological formation and existing cut slope conditions which have high risks of rock fall will be described. The bridge has three spans to be constructed using balanced cantilever method with a middle span of 150 m. After concept design option engineering, it was decided to change from pile foundation to pad footing with ground anchor system to optimize the bridge foundation design. The geotechnical design parameters were derived after two staged site investigations. The foundation design was carried out to satisfy both serviceability limit state and ultimate limit state during construction and in operation. It was found that the pad footing design was governed by serviceability limit state design loading cases. The design of bridge foundation also considered presence of weak rock layer intrusion and a layer of “no core” to ensure foundation stability. The precast mass concrete block system was considered for the retaining walls for the bridge approaches to resolve the constructability issue over hilly terrain. The design considered the retaining wall block sliding stability, while the overturning and internal stabilities are satisfied.

Keywords: pad footing, Hilly formation, stability, block works

Procedia PDF Downloads 295
103 Distribution and Taxonomy of Marine Fungi in Nha Trang Bay and Van Phong Bay, Vietnam

Authors: Thu Thuy Pham, Thi Chau Loan Tran, Van Duy Nguyen

Abstract:

Marine fungi play an important role in the marine ecosystems. Marine fungi also supply biomass and metabolic products of industrial value. Currently, the biodiversity of marine fungi along the coastal areas of Vietnam has not yet been studied fully. The objective of this study is to assess the spatial and temporal diversity of planktonic fungi from the coastal waters of Nha Trang Bay and Van Phong Bay in Central Vietnam using culture-dependent and independent approach. Using culture-dependent approach, filamentous fungi and yeasts were isolated on selective media and then classified by phenotype and genotype based on the sequencing of ITS (internal transcribed spacers) regions of rDNA with two primer pairs (ITS1F_KYO2 and ITS4; NS1 and NS8). Using culture-independent approach, environmental DNA samples were isolated and amplified using fungal-specific ITS primer pairs. A total of over 160 strains were isolated from 10 seawater sampling stations at 50 cm depth. They were classified into diverse genera and species of both yeast and mold. At least 5 strains could be potentially novel species. Our results also revealed that planktonic fungi were molecularly diverse with hundreds of phylotypes recovered across these two bays. The results of the study provide data about the distribution and taxonomy of mycoplankton in this area, thereby allowing assessment of their positive role in the biogeochemical cycle of coastal ecosystems and the development of new bioactive compounds for industrial applications.

Keywords: biodiversity, ITS, marine fungi, Nha Trang Bay, Van Phong Bay

Procedia PDF Downloads 159
102 Comprehensive Review of Adversarial Machine Learning in PDF Malware

Authors: Preston Nabors, Nasseh Tabrizi

Abstract:

Portable Document Format (PDF) files have gained significant popularity for sharing and distributing documents due to their universal compatibility. However, the widespread use of PDF files has made them attractive targets for cybercriminals, who exploit vulnerabilities to deliver malware and compromise the security of end-user systems. This paper reviews notable contributions in PDF malware detection, including static, dynamic, signature-based, and hybrid analysis. It presents a comprehensive examination of PDF malware detection techniques, focusing on the emerging threat of adversarial sampling and the need for robust defense mechanisms. The paper highlights the vulnerability of machine learning classifiers to evasion attacks. It explores adversarial sampling techniques in PDF malware detection to produce mimicry and reverse mimicry evasion attacks, which aim to bypass detection systems. Improvements for future research are identified, including accessible methods, applying adversarial sampling techniques to malicious payloads, evaluating other models, evaluating the importance of features to malware, implementing adversarial defense techniques, and conducting comprehensive examination across various scenarios. By addressing these opportunities, researchers can enhance PDF malware detection and develop more resilient defense mechanisms against adversarial attacks.

Keywords: adversarial attacks, adversarial defense, adversarial machine learning, intrusion detection, PDF malware, malware detection, malware detection evasion

Procedia PDF Downloads 14