Search results for: transience seawater intrusion
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 348

Search results for: transience seawater intrusion

318 Comparison of Salt-Water Intrusion into Eastern and Western Coastal Aquifers of Urmia Lake thru Over-Exploration of Groundwater Resources

Authors: Saman Javadi, Mohammad Hassan Mahmoudi, Fatemeh Jafari, Aminreza Neshat

Abstract:

Urmia Lake’s water level has been dropped during the past decade. Although the most common reason in studies was declared climate change, but observation of adjacent lake (like Van in Turkey) is not the same as the common reason. Most of studies were focused on climate and land use change, but groundwater resource as one of the most important element is negligible. Due to population and agriculture activities growth, exploration of groundwater resource has been increased. In as much as continued decline of water levels can lead to saltwater intrusion, reduce stream discharge near outcrop regions and threaten groundwater quality, aquifers of this region were affected by saltwater intrusion of Urmia Lake. In this research comparison of saltwater intrusion into eastern and western coastal aquifer was studied. In conclusion eastern aquifers are in a critical situation; vice versa the western ones are in a better situation. Thus applying management of groundwater operation would be necessary for eastern aquifers.

Keywords: coastal aquifer, groundwater over-exploration, saltwater intrusion, Urmia Lake

Procedia PDF Downloads 505
317 The Photocatalytic Approach for the Conversion of Polluted Seawater CO₂ into Renewable Source of Energy

Authors: Yasar N. Kavil, Yasser A. Shaban, Radwan K. Al Farawati, Mohamed I. Orif, Shahed U. M. Khanc

Abstract:

Photocatalytic way of reduction of CO₂ in polluted seawater into chemical fuel, methanol, was successfully gained over Cu/C-co-doped TiO₂ nanoparticles under UV and natural sunlight. A homemade stirred batch annular reactor was used to carry out the photocatalytic reduction experiments. Photocatalysts with various Cu loadings (0, 0.5, 1, 3, 5 and 7 wt.%) were synthesized by the sol-gel procedure and were characterized by XRD, SEM, UV–Vis, FTIR, and XPS. The photocatalytic production of methanol was promoted by the co-doping with C and Cu into TiO₂. This improvement was attributed to the modification of bandgap energy and the hindrance of the charges recombination. The polluted seawater showing the yield depended on its background hydrographic parameters. We assessed two types of polluted seawater system, the observed yield was 2910 and 990 µmol g⁻¹ after 5 h of illumination under UV and natural sunlight respectively in system 1 and the corresponding yield in system 2 was 2250 and 910 µmol g⁻¹ after 5 h of illumination. The production of methanol in the case of oxygen-depleted water was low, this is mainly attributed to the competition of methanogenic bacteria over methanol production. The results indicated that the methanol yield produced by Cu-C/TiO₂ was much higher than those of carbon-modified titanium oxide (C/TiO₂) and Degussa (P25-TiO₂). Under the current experimental condition, the optimum loading was achieved by the doping of 3 wt % of Cu. The highest methanol yield was obtained over 1 g L-1 of 3wt% Cu/C-TiO₂.

Keywords: CO₂ photoreduction, copper, Cu/C-co-doped TiO₂, methanol, seawater

Procedia PDF Downloads 255
316 Design of an Improved Distributed Framework for Intrusion Detection System Based on Artificial Immune System and Neural Network

Authors: Yulin Rao, Zhixuan Li, Burra Venkata Durga Kumar

Abstract:

Intrusion detection refers to monitoring the actions of internal and external intruders on the system and detecting the behaviours that violate security policies in real-time. In intrusion detection, there has been much discussion about the application of neural network technology and artificial immune system (AIS). However, many solutions use static methods (signature-based and stateful protocol analysis) or centralized intrusion detection systems (CIDS), which are unsuitable for real-time intrusion detection systems that need to process large amounts of data and detect unknown intrusions. This article proposes a framework for a distributed intrusion detection system (DIDS) with multi-agents based on the concept of AIS and neural network technology to detect anomalies and intrusions. In this framework, multiple agents are assigned to each host and work together, improving the system's detection efficiency and robustness. The trainer agent in the central server of the framework uses the artificial neural network (ANN) rather than the negative selection algorithm of AIS to generate mature detectors. Mature detectors can distinguish between self-files and non-self-files after learning. Our analyzer agents use genetic algorithms to generate memory cell detectors. This kind of detector will effectively reduce false positive and false negative errors and act quickly on known intrusions.

Keywords: artificial immune system, distributed artificial intelligence, multi-agent, intrusion detection system, neural network

Procedia PDF Downloads 79
315 Intrusion Detection and Prevention System (IDPS) in Cloud Computing Using Anomaly-Based and Signature-Based Detection Techniques

Authors: John Onyima, Ikechukwu Ezepue

Abstract:

Virtualization and cloud computing are among the fast-growing computing innovations in recent times. Organisations all over the world are moving their computing services towards the cloud this is because of its rapid transformation of the organization’s infrastructure and improvement of efficient resource utilization and cost reduction. However, this technology brings new security threats and challenges about safety, reliability and data confidentiality. Evidently, no single security technique can guarantee security or protection against malicious attacks on a cloud computing network hence an integrated model of intrusion detection and prevention system has been proposed. Anomaly-based and signature-based detection techniques will be integrated to enable the network and its host defend themselves with some level of intelligence. The anomaly-base detection was implemented using the local deviation factor graph-based (LDFGB) algorithm while the signature-based detection was implemented using the snort algorithm. Results from this collaborative intrusion detection and prevention techniques show robust and efficient security architecture for cloud computing networks.

Keywords: anomaly-based detection, cloud computing, intrusion detection, intrusion prevention, signature-based detection

Procedia PDF Downloads 270
314 Groundwater Quality in the Rhiss-Nekor Plain, Morocco: Impacts of Human Activities

Authors: Ali Ait Boughrous, Said Benyoussef, Hossain El Ouarghi, Moulay Abdelazize Aboulhassan, Samah Aitbnichou, Said Benguamra

Abstract:

The Rhiss-Nekor aquifer represents a primary water source for the central Rif region. Many operating structures were built for irrigation and drinking water supply. Because of the vulnerability of this aquifer, a thorough knowledge of the environment is needed to evaluate and protect resources. This work aims at the quality assessment of the water table of the plain Ghiss-Nekor and determination of pollution sources in order to establish a map of the web. The plain-Rhiss Nekor, with an area of 100 km2, is located on the Mediterranean coast of Morocco. It has a particular geological structure resulting from the opening of a graben at the end of the Tertiary, which is filled by the accumulation of hundreds of meters of sediment, generating considerable heterogeneity in deposits. This heterogeneity gives various hydrodynamic properties within the aquifer of the plain. The analysis of the water quality of twenty water points, well distributed over the plain, showed high natural salinity linked to the geological nature of the area. This salinity increases in the littoral area by the seawater intrusion phenomenon. This is accentuated by overexploitation of the ground water due to the growing demand. Some wells, located inland, are characterized by organic pollution caused by wastewater seepage from septic tanks and lost wells widespread in the region.

Keywords: anthropogenic factors, groundwater quality, marine intrusion, Rhiss-Nekor aquifer

Procedia PDF Downloads 111
313 Intrusion Detection Using Dual Artificial Techniques

Authors: Rana I. Abdulghani, Amera I. Melhum

Abstract:

With the abnormal growth of the usage of computers over networks and under the consideration or agreement of most of the computer security experts who said that the goal of building a secure system is never achieved effectively, all these points led to the design of the intrusion detection systems(IDS). This research adopts a comparison between two techniques for network intrusion detection, The first one used the (Particles Swarm Optimization) that fall within the field (Swarm Intelligence). In this Act, the algorithm Enhanced for the purpose of obtaining the minimum error rate by amending the cluster centers when better fitness function is found through the training stages. Results show that this modification gives more efficient exploration of the original algorithm. The second algorithm used a (Back propagation NN) algorithm. Finally a comparison between the results of two methods used were based on (NSL_KDD) data sets for the construction and evaluation of intrusion detection systems. This research is only interested in clustering the two categories (Normal and Abnormal) for the given connection records. Practices experiments result in intrude detection rate (99.183818%) for EPSO and intrude detection rate (69.446416%) for BP neural network.

Keywords: IDS, SI, BP, NSL_KDD, PSO

Procedia PDF Downloads 357
312 Feature Based Unsupervised Intrusion Detection

Authors: Deeman Yousif Mahmood, Mohammed Abdullah Hussein

Abstract:

The goal of a network-based intrusion detection system is to classify activities of network traffics into two major categories: normal and attack (intrusive) activities. Nowadays, data mining and machine learning plays an important role in many sciences; including intrusion detection system (IDS) using both supervised and unsupervised techniques. However, one of the essential steps of data mining is feature selection that helps in improving the efficiency, performance and prediction rate of proposed approach. This paper applies unsupervised K-means clustering algorithm with information gain (IG) for feature selection and reduction to build a network intrusion detection system. For our experimental analysis, we have used the new NSL-KDD dataset, which is a modified dataset for KDDCup 1999 intrusion detection benchmark dataset. With a split of 60.0% for the training set and the remainder for the testing set, a 2 class classifications have been implemented (Normal, Attack). Weka framework which is a java based open source software consists of a collection of machine learning algorithms for data mining tasks has been used in the testing process. The experimental results show that the proposed approach is very accurate with low false positive rate and high true positive rate and it takes less learning time in comparison with using the full features of the dataset with the same algorithm.

Keywords: information gain (IG), intrusion detection system (IDS), k-means clustering, Weka

Procedia PDF Downloads 263
311 Applicability of Fuzzy Logic for Intrusion Detection in Mobile Adhoc Networks

Authors: Ruchi Makani, B. V. R. Reddy

Abstract:

Mobile Adhoc Networks (MANETs) are gaining popularity due to their potential of providing low-cost mobile connectivity solutions to real-world communication problems. Integrating Intrusion Detection Systems (IDS) in MANETs is a tedious task by reason of its distinctive features such as dynamic topology, de-centralized authority and highly controlled/limited resource environment. IDS primarily use automated soft-computing techniques to monitor the inflow/outflow of traffic packets in a given network to detect intrusion. Use of machine learning techniques in IDS enables system to make decisions on intrusion while continuous keep learning about their dynamic environment. An appropriate IDS model is essential to be selected to expedite this application challenges. Thus, this paper focused on fuzzy-logic based machine learning IDS technique for MANETs and presented their applicability for achieving effectiveness in identifying the intrusions. Further, the selection of appropriate protocol attributes and fuzzy rules generation plays significant role for accuracy of the fuzzy-logic based IDS, have been discussed. This paper also presents the critical attributes of MANET’s routing protocol and its applicability in fuzzy logic based IDS.

Keywords: AODV, mobile adhoc networks, intrusion detection, anomaly detection, fuzzy logic, fuzzy membership function, fuzzy inference system

Procedia PDF Downloads 147
310 The Effect of Subsurface Dam on Saltwater Intrusion in Heterogeneous Coastal Aquifers

Authors: Antoifi Abdoulhalik, Ashraf Ahmed

Abstract:

Saltwater intrusion (SWI) in coastal aquifers has become a growing threat for many countries around the world. While various control measures have been suggested to mitigate SWI, the construction of subsurface physical barriers remains one of the most effective solutions for this problem. In this work, we used laboratory experiments and numerical simulations to investigate the effectiveness of subsurface dams in heterogeneous layered coastal aquifer with different layering patterns. Four different cases were investigated, including a homogeneous (case H), and three heterogeneous cases in which a low permeability (K) layer was set in the top part of the system (case LH), in the middle part of the system (case HLH) and the bottom part of the system (case HL). Automated image analysis technique was implemented to quantify the main SWI parameters under high spatial and temporal resolution. The method also provides transient salt concentration maps, allowing for the first time clear visualization of the spillage of saline water over the dam (advancing wedge condition) as well as the flushing of residual saline water from the freshwater area (receding wedge condition). The SEAWAT code was adopted for the numerical simulations. The results show that the presence of an overlying layer of low permeability enhanced the ability of the dam to retain the saline water. In such conditions, the rate of saline water spillage and inland extension may considerably be reduced. Conversely, the presence of an underlying low K layer led to a faster increase of saltwater volume on the seaward side of the wall, therefore considerably facilitating the spillage. The results showed that a complete removal of the residual saline water eventually occurred in all the investigated scenarios, with a rate of removal strongly affected by the hydraulic conductivity of the lower part of the aquifer. The data showed that the addition of the underlying low K layer in case HL caused the complete flushing to be almost twice longer than in the homogeneous scenario.

Keywords: heterogeneous coastal aquifers, laboratory experiments, physical barriers, seawater intrusion control

Procedia PDF Downloads 210
309 The Technics of Desalination Water in Algeria

Authors: H. Aburideh, Z.Tigrine, D. Ziou, S. Hout, R. Bellatreche, D. Belhout, Z. Belgroun, M. Abbas

Abstract:

Faced with climate hazards in recent decades and the constant increase of the population, Algeria is making considerable efforts to provide water resources and water availability, both for its nascent industry, agriculture and for the drinking water supply of cities and arid region of the country. Following a remarkable worldwide technological breakthrough in seawater and brackish water desalination, known in recent years, the specialists have seen that the use of desalination of sea water in Algeria is a promising alternative as long as it has a coastline of 1200 km. Seawater is clean and virtually inexhaustible resource; mainly for population and industry that have high water consumption and are close to the sea. The purpose of this work is to present information on the number of sea water desalination stations and demineralization plants existing in Algeria. The constraints related to the operation of certain stations; those which are operational, those that are not operational as well as the seawater desalination program that was hired to cover 49 desalination plants across the country at the end of 2019 with the aim of increasing and diversifying water resources.

Keywords: desalination, water, membrane, demineralization

Procedia PDF Downloads 365
308 Studies on the Recovery of Calcium and Magnesium from Red Seawater by Nanofiltration Membrane

Authors: Mohamed H. Sorour, Hayam F. Shaalan, Heba A. Hani, Mahmoud A. El-Toukhy

Abstract:

This paper reports the results of nanofiltration (NF) polymeric membrane for the recovery of divalent ions (calcium and magnesium) from Red Seawater. Pilot plant experiments have been carried out using Alfa-Laval (NF 2517/48) membrane module. System was operated in both total recirculation mode (permeate and brine) and brine recirculation mode under hydraulic pressure of 15 bar. Impacts of some chelating agents on both flux and rejection have been also investigated. Results indicated that pure water permeability ranges from 17 to 85.5 L/m²h at 2-15 bar. Comparison with seawater permeability under the same operating pressure values reveals lower values of 8.9-31 L/m²h manifesting the effect of the osmotic pressure of seawater. Overall total dissolved solids (TDS) reduction was almost constant without incorporation of chelating agents. On the contrary of expectations, the use of chelating agents N-(2-hydroxyethyl) ethylene diamine-N,N´,N´-triacetic acid (HEDTA) and ethylene glycol bis (2-aminoethyl ether)-N,N,N´,N´-tetraacetic acid (EGTA) showed flux decline of about 3-15%. Analysis of rejection data of total recirculation mode showed reasonable rejection values of 35%, 59% and 90% for Ca, Mg and SO₄, respectively. Operating under brine recirculation mode only showed a decrease of rejection to 33%, 56% and 86% for Ca, Mg and SO₄, respectively. The use of chelating agents has no substantial effect on NF membrane performance except for increasing the total Ca rejection to 48 and 65% for EGTA and HEDTA, respectively. Results, in general, confirmed the powerful separation of NF technology for softening and recovery of divalent ions from seawater. It is anticipated that increasing operating pressure beyond the limits of our investigations would improve the rejection and flux values. A trade-off should be considered between operating cost (due to higher pressure and marginal benefits as manifested by expected improved performance). The experimental results fit well with the formulated rejection empirical correlations and the published ones.

Keywords: nanofiltration, seawater, recovery, calcium, magnesium

Procedia PDF Downloads 136
307 Intrusion Detection in SCADA Systems

Authors: Leandros A. Maglaras, Jianmin Jiang

Abstract:

The protection of the national infrastructures from cyberattacks is one of the main issues for national and international security. The funded European Framework-7 (FP7) research project CockpitCI introduces intelligent intrusion detection, analysis and protection techniques for Critical Infrastructures (CI). The paradox is that CIs massively rely on the newest interconnected and vulnerable Information and Communication Technology (ICT), whilst the control equipment, legacy software/hardware, is typically old. Such a combination of factors may lead to very dangerous situations, exposing systems to a wide variety of attacks. To overcome such threats, the CockpitCI project combines machine learning techniques with ICT technologies to produce advanced intrusion detection, analysis and reaction tools to provide intelligence to field equipment. This will allow the field equipment to perform local decisions in order to self-identify and self-react to abnormal situations introduced by cyberattacks. In this paper, an intrusion detection module capable of detecting malicious network traffic in a Supervisory Control and Data Acquisition (SCADA) system is presented. Malicious data in a SCADA system disrupt its correct functioning and tamper with its normal operation. OCSVM is an intrusion detection mechanism that does not need any labeled data for training or any information about the kind of anomaly is expecting for the detection process. This feature makes it ideal for processing SCADA environment data and automates SCADA performance monitoring. The OCSVM module developed is trained by network traces off line and detects anomalies in the system real time. The module is part of an IDS (intrusion detection system) developed under CockpitCI project and communicates with the other parts of the system by the exchange of IDMEF messages that carry information about the source of the incident, the time and a classification of the alarm.

Keywords: cyber-security, SCADA systems, OCSVM, intrusion detection

Procedia PDF Downloads 512
306 Determining Water Infiltration Zone Using 2-D Resistivity Imaging Technique

Authors: Azim Hilmy Mohamad Yusof, Muhamad Iqbal Mubarak Faharul Azman, Nur Azwin Ismail, Noer El Hidayah Ismail

Abstract:

Infiltration is the process by which precipitation or water soaks into subsurface soils and moves into rocks through cracks and pore spaces. This paper explains how the water infiltration will be identified using 2-D resistivity imaging. Padang Minden, in Universiti Sains Malaysia, Penang has been chosen as the survey area during this study. The study area consists of microcline granite with grain size of medium to coarse. 2-D Resistivity Imaging survey is used to detect subsurface layer for many years by making measurements on the ground surface. The result shows that resistivity value of 0.015 Ωm - 10 Ωm represent the salt water intrusion zone while the resistivity value of 11 Ωm - 100 Ωm is suggested as the boundary zone between the salt water intrusion zone and low saturated zone.

Keywords: 2-D resistivity imaging, microcline granite, salt water intrusion, water infiltration

Procedia PDF Downloads 310
305 Quantitative Changes in Biofilms of a Seawater Tubular Heat Exchanger Subjected to Electromagnetic Fields Treatment

Authors: Sergio Garcia, Alfredo Trueba, Luis M. Vega, Ernesto Madariaga

Abstract:

Biofilms adhesion is one of the more important cost of industries plants on wide world, which use to water for cooling heat exchangers or are in contact with water. This study evaluated the effect of Electromagnetic Fields on biofilms in tubular heat exchangers using seawater cooling. The results showed an up to 40% reduction of the biofilm thickness compared to the untreated control tubes. The presence of organic matter was reduced by 75%, the inorganic mater was reduced by 87%, and 53% of the dissolved solids were eliminated. The biofilm thermal conductivity in the treated tube was reduced by 53% as compared to the control tube. The hardness in the effluent during the experimental period was decreased by 18% in the treated tubes compared with control tubes. Our results show that the electromagnetic fields treatment has a great potential in the process of removing biofilms in heat exchanger.

Keywords: biofilm, heat exchanger, electromagnetic fields, seawater

Procedia PDF Downloads 165
304 Gene Expression Analysis for Corals / Zooxanthellae under High Seawater Temperature Stress

Authors: Haruka Ito, Toru Maruyama, Michihiro Ito, Chuya Shinzato, Hiroyuki Fujimura, Yoshikatsu Nakano, Shoichiro Suda, Sachiyo Aburatani, Haruko Takeyama

Abstract:

Clarifying symbiotic relationships is one of the most important theme for understanding the marine eco-system. Coral reef has been regarded as an important environmental resource. Coral holobiont composed by coral, symbiotic microalgae zooxanthellae, and bacteria have complexed relationship. Zooxanthellae mainly supply organic matter to the host corals through their photosynthetic activity. The symbiotic relationship is indispensable for corals but may easily collapses due to the rise of seawater temperature. However, the molecular mechanism how seawater temperature influences their relationships still remain unclear. In this study, the transcriptomic analysis has applied to elucidate the coral-zooxanthellae relationships under high seawater temperature stress. To observe reactions of corals and zooxanthellae against the rise of seawater temperature, meta-gene expression in coral have been analyzed. The branches from six different colonies of a stony coral, Acropora tenuis, were sampled at nine times by 2016 at two locations, Ishikawabaru and South of Sesoko Island, Okinawa, Japan. The mRNAs extracted from the branches including zooxanthellae were sequenced by illumina HiSeq. Gene Set Enrichment Analysis (GSEA) based on hyper geometric distribution was performed. The seawater temperature at 2016 summer was unusually high, which was caused by El Niño event, and the number of zooxanthellae in coral was decreased in August. GSEA derived the several specific genes expressed in A. tenuis under heat stress conditions. The upregulated genes under heat stress highly related with infection immunity. The downregulated genes significantly contained cell cycle related genes. Thu, it is considered that heat stress cause disorder in cell metabolism of A. tenuis, resulting in serious influence to coral holobiont.

Keywords: coral, symbiosis, thermal stress response, transcriptome analysis

Procedia PDF Downloads 248
303 Analysis and Design Modeling for Next Generation Network Intrusion Detection and Prevention System

Authors: Nareshkumar Harale, B. B. Meshram

Abstract:

The continued exponential growth of successful cyber intrusions against today’s businesses has made it abundantly clear that traditional perimeter security measures are no longer adequate and effective. We evolved the network trust architecture from trust-untrust to Zero-Trust, With Zero Trust, essential security capabilities are deployed in a way that provides policy enforcement and protection for all users, devices, applications, data resources, and the communications traffic between them, regardless of their location. Information exchange over the Internet, in spite of inclusion of advanced security controls, is always under innovative, inventive and prone to cyberattacks. TCP/IP protocol stack, the adapted standard for communication over network, suffers from inherent design vulnerabilities such as communication and session management protocols, routing protocols and security protocols are the major cause of major attacks. With the explosion of cyber security threats, such as viruses, worms, rootkits, malwares, Denial of Service attacks, accomplishing efficient and effective intrusion detection and prevention is become crucial and challenging too. In this paper, we propose a design and analysis model for next generation network intrusion detection and protection system as part of layered security strategy. The proposed system design provides intrusion detection for wide range of attacks with layered architecture and framework. The proposed network intrusion classification framework deals with cyberattacks on standard TCP/IP protocol, routing protocols and security protocols. It thereby forms the basis for detection of attack classes and applies signature based matching for known cyberattacks and data mining based machine learning approaches for unknown cyberattacks. Our proposed implemented software can effectively detect attacks even when malicious connections are hidden within normal events. The unsupervised learning algorithm applied to network audit data trails results in unknown intrusion detection. Association rule mining algorithms generate new rules from collected audit trail data resulting in increased intrusion prevention though integrated firewall systems. Intrusion response mechanisms can be initiated in real-time thereby minimizing the impact of network intrusions. Finally, we have shown that our approach can be validated and how the analysis results can be used for detecting and protection from the new network anomalies.

Keywords: network intrusion detection, network intrusion prevention, association rule mining, system analysis and design

Procedia PDF Downloads 200
302 Unmanned Aerial System Development for the Remote Reflectance Sensing Using Above-Water Radiometers

Authors: Sunghun Jung, Wonkook Kim

Abstract:

Due to the difficulty of the utilization of satellite and an aircraft, conventional ocean color remote sensing has a disadvantage in that it is difficult to obtain images of desired places at desired times. These disadvantages make it difficult to capture the anomalies such as the occurrence of the red tide which requires immediate observation. It is also difficult to understand the phenomena such as the resuspension-precipitation process of suspended solids and the spread of low-salinity water originating in the coastal areas. For the remote sensing reflectance of seawater, above-water radiometers (AWR) have been used either by carrying portable AWRs on a ship or installing those at fixed observation points on the Ieodo ocean research station, Socheongcho base, and etc. In particular, however, it requires the high cost to measure the remote reflectance in various seawater environments at various times and it is even not possible to measure it at the desired frequency in the desired sea area at the desired time. Also, in case of the stationary observation, it is advantageous that observation data is continuously obtained, but there is the disadvantage that data of various sea areas cannot be obtained. It is possible to instantly capture various marine phenomena occurring on the coast using the unmanned aerial system (UAS) including vertical takeoff and landing (VTOL) type unmanned aerial vehicles (UAV) since it could move and hover at the one location and acquire data of the desired form at a high resolution. To remotely estimate seawater constituents, it is necessary to install an ultra-spectral sensor. Also, to calculate reflected light from the surface of the sea in consideration of the sun’s incident light, a total of three sensors need to be installed on the UAV. The remote sensing reflectance of seawater is the most basic optical property for remotely estimating color components in seawater and we could remotely estimate the chlorophyll concentration, the suspended solids concentration, and the dissolved organic amount. Estimating seawater physics from the remote sensing reflectance requires the algorithm development using the accumulation data of seawater reflectivity under various seawater and atmospheric conditions. The UAS with three AWRs is developed for the remote reflection sensing on the surface of the sea. Throughout the paper, we explain the details of each UAS component, system operation scenarios, and simulation and experiment results. The UAS consists of a UAV, a solar tracker, a transmitter, a ground control station (GCS), three AWRs, and two gimbals.

Keywords: above-water radiometers (AWR), ground control station (GCS), unmanned aerial system (UAS), unmanned aerial vehicle (UAV)

Procedia PDF Downloads 141
301 Studies of the Corrosion Kinetics of Metal Alloys in Stagnant Simulated Seawater Environment

Authors: G. Kabir, A. M. Mohammed, M. A. Bawa

Abstract:

The paper presents corrosion behaviors of Naval Brass, aluminum alloy and carbon steel in simulated seawater under stagnant conditions. The behaviors were characterized on the variation of chloride ions concentration in the range of 3.0wt% and 3.5wt% and exposure time. The weight loss coupon-method immersion technique was employed. The weight loss for the various alloys was measured. Based on the obtained results, the corrosion rate was determined. It was found that the corrosion rates of the various alloys are related to the chloride ions concentrations, exposure time and kinetics of passive film formation of the various alloys. Carbon steel, suffers corrosion many folds more than Naval Brass. This indicated that the alloy exhibited relatively strong resistance to corrosion in the exposure environment of the seawater. Whereas, the aluminum alloy exhibited an excellent and beneficial resistance to corrosion more than the Naval Brass studied. Despite the prohibitive cost, Naval Brass and aluminum alloy, indicated to have beneficial corrosion behavior that can offer wide range of application in seashore operations. The corrosion kinetics parameters indicated that the corrosion reaction is limited by diffusion mass transfer of the corrosion reaction elements and not by reaction controlled.

Keywords: alloys, chloride ions concentration, corrosion kinetics, corrosion rate, diffusion mass transfer, exposure time, seawater, weight loss

Procedia PDF Downloads 270
300 An Intrusion Detection Systems Based on K-Means, K-Medoids and Support Vector Clustering Using Ensemble

Authors: A. Mohammadpour, Ebrahim Najafi Kajabad, Ghazale Ipakchi

Abstract:

Presently, computer networks’ security rise in importance and many studies have also been conducted in this field. By the penetration of the internet networks in different fields, many things need to be done to provide a secure industrial and non-industrial network. Fire walls, appropriate Intrusion Detection Systems (IDS), encryption protocols for information sending and receiving, and use of authentication certificated are among things, which should be considered for system security. The aim of the present study is to use the outcome of several algorithms, which cause decline in IDS errors, in the way that improves system security and prevents additional overload to the system. Finally, regarding the obtained result we can also detect the amount and percentage of more sub attacks. By running the proposed system, which is based on the use of multi-algorithmic outcome and comparing that by the proposed single algorithmic methods, we observed a 78.64% result in attack detection that is improved by 3.14% than the proposed algorithms.

Keywords: intrusion detection systems, clustering, k-means, k-medoids, SV clustering, ensemble

Procedia PDF Downloads 192
299 Solar Energy Applications in Seawater Distillation

Authors: Yousef Abdulaziz Almolhem

Abstract:

Geographically, the most Arabic countries locate in areas confined to arid or semiarid regions. For this reason, most of our countries have adopted the seawater desalination as a strategy to overcome this problem. For example, the water supply of AUE, Kuwait, and Saudi Arabia is almost 100% from the seawater desalination plants. Many areas in Saudia Arabia and other countries in the world suffer from lack of fresh water which hinders the development of these areas, despite the availability of saline water and high solar radiation intensity. Furthermore, most developing countries do not have sufficient meteorological data to evaluate if the solar radiation is enough to meet the solar desalination. A mathematical model was developed to simulate and predict the thermal behavior of the solar still which used direct solar energy for distillation of seawater. Measurement data were measured in the Environment and Natural Resources Department, Faculty of Agricultural and Food sciences, King Faisal University, Saudi Arabia, in order to evaluate the present model. The simulation results obtained from this model were compared with the measured data. The main results of this research showed that there are slight differences between the measured and predicted values of the elements studied, which is resultant from the change of some factors considered constants in the model such as the sky clearance, wind velocity and the salt concentration in the water in the basin of the solar still. It can be concluded that the present model can be used to estimate the average total solar radiation and the thermal behavior of the solar still in any area with consideration to the geographical location.

Keywords: mathematical model, sea water, distillation, solar radiation

Procedia PDF Downloads 258
298 Predicting Ecological Impacts of Sea-Level Change on Coastal Conservation Areas in India

Authors: Mohammad Zafar-ul Islam, Shaily Menon, Xingong Li, A. Townsend Peterson

Abstract:

In addition to the mounting empirical data on direct implications of climate change for natural and human systems, evidence is increasing for other, indirect climate change phenomena such as sea-level rise. Rising sea levels and associated marine intrusion into terrestrial environments are predicted to be among the most serious eventual consequences of climate change. The many complex and interacting factors affecting sea levels create considerable uncertainty in sea-level rise projections: conservative estimates are on the order of 0.5-1.0 m globally, while other estimates are much higher, approaching 6 m. Marine intrusion associated with 1– 6 m sea-level rise will impact species and habitats in coastal ecosystems severely. Examining areas most vulnerable to such impacts may allow design of appropriate adaptation and mitigation strategies. We present an overview of potential effects of 1 and 6 m sea level rise for coastal conservation areas in the Indian Subcontinent. In particular, we examine the projected magnitude of areal losses in relevant biogeographic zones, ecoregions, protected areas (PAs), and Important Bird Areas (IBAs). In addition, we provide a more detailed and quantitative analysis of likely effects of marine intrusion on 22 coastal PAs and IBAs that provide critical habitat for birds in the form of breeding areas, migratory stopover sites, and overwintering habitats. Several coastal PAs and IBAs are predicted to experience higher than 50% losses to marine intrusion. We explore consequences of such inundation levels on species and habitat in these areas.

Keywords: sea-level change, coastal inundation, marine intrusion, biogeographic zones, ecoregions, protected areas, important bird areas, adaptation, mitigation

Procedia PDF Downloads 228
297 Survey of Intrusion Detection Systems and Their Assessment of the Internet of Things

Authors: James Kaweesa

Abstract:

The Internet of Things (IoT) has become a critical component of modern technology, enabling the connection of numerous devices to the internet. The interconnected nature of IoT devices, along with their heterogeneous and resource-constrained nature, makes them vulnerable to various types of attacks, such as malware, denial-of-service attacks, and network scanning. Intrusion Detection Systems (IDSs) are a key mechanism for protecting IoT networks and from attacks by identifying and alerting administrators to suspicious activities. In this review, the paper will discuss the different types of IDSs available for IoT systems and evaluate their effectiveness in detecting and preventing attacks. Also, examine the various evaluation methods used to assess the performance of IDSs and the challenges associated with evaluating them in IoT environments. The review will highlight the need for effective and efficient IDSs that can cope with the unique characteristics of IoT networks, including their heterogeneity, dynamic topology, and resource constraints. The paper will conclude by indicating where further research is needed to develop IDSs that can address these challenges and effectively protect IoT systems from cyber threats.

Keywords: cyber-threats, iot, intrusion detection system, networks

Procedia PDF Downloads 52
296 Impact of Nitrogenous Wastewater and Seawater Acidification on Algae

Authors: Pei Luen Jiang

Abstract:

Oysters (Ostreidae) and hard clams (Meretrix lusoria) are important shallow sea-cultured shellfish in Taiwan, and are mainly farmed in Changhua, Yunlin, Chiayi and Tainan. As these shellfish are fed primarily on natural plankton, the artificial feed is not required, leading to high economic value in aquatic farming. However, in recent years, though mariculture production areas have expanded steadily, large-scale deaths of farmed shellfish have also become increasingly common due to climate change and human factors. Through studies over the past few years, our research team has determined the impact of nitrogen deprivation on growth and morphological variations in algae and sea anemones (Actiniaria) and identified the target genes affected by adverse environmental factors. In mariculture, high-density farming is commonly adopted, which results in elevated concentrations of nitrogenous waste in the water. In addition, excessive carbon dioxide from the atmosphere also dissolves in seawater, causing a steady decrease in the pH of seawater, leading to acidification. This study to observe the impact of high concentrations of nitrogen sources and carbon dioxide on algae.

Keywords: algae, shellfish, nitrogen, acidification

Procedia PDF Downloads 148
295 Investigate the Movement of Salt-Wedge at Co Chien Estuary, Vietnam in the Context of Climate Change and Reduce Upstream Flow Using 3D Model

Authors: Hieu Duy Nguyen, Chitsan Lin Jr., Dung Duc Tran

Abstract:

Nowadays, drought and salinity intrusion becomes a severe problem in the Lower Mekong region due to climate change, especially in coastal provinces. Freshwater resources are decreased due to sea-level rise and the decline in water flow from upstream in the dry season. The combination of the above issues can lead to many effects on the environment and human health in affected areas such as the pathological of digestive or decreased the immune system. Tidal cycle and upstream flows are the two main factors affecting the saline intrusion process and the former salt-wedge in the estuary. Under suitable conditions, salt-wedge can be going further upstream under the water surface and affected groundwater. In order to have a proper plan for the mitigation of the above adverse effects, we need to understand the characteristics of this process. In this study, 3D model is used to investigate the movement of salt-wedge under different conditions of tidal and flow discharge. The salinity in the vertical profile is also measured in the dry season of 2017 and 2018 for model calibrating. The data has proved that there is the presence of salt-wedge in the study area. The obtained results will help strategic planners to use and preserve water resources more effectively and serve as a basis for new research directions on saline intrusion and human health.

Keywords: salt-wedge, salinity intrusion, human health, 3D model

Procedia PDF Downloads 84
294 Multi-Criteria Evaluation of IDS Architectures in Cloud Computing

Authors: Elmahdi Khalil, Saad Enniari, Mostapha Zbakh

Abstract:

Cloud computing promises to increase innovation and the velocity with witch applications are deployed, all while helping any enterprise meet most IT service needs at a lower total cost of ownership and higher return investment. As the march of cloud continues, it brings both new opportunities and new security challenges. To take advantages of those opportunities while minimizing risks, we think that Intrusion Detection Systems (IDS) integrated in the cloud is one of the best existing solutions nowadays in the field. The concept of intrusion detection was known since past and was first proposed by a well-known researcher named Anderson in 1980's. Since that time IDS's are evolving. Although, several efforts has been made in the area of Intrusion Detection systems for cloud computing environment, many attacks still prevail. Therefore, the work presented in this paper proposes a multi criteria analysis and a comparative study between several IDS architectures designated to work in a cloud computing environments. To achieve this objective, in the first place we will search in the state of the art of several consistent IDS architectures designed to work in a cloud environment. Whereas, in a second step we will establish the criteria that will be useful for the evaluation of architectures. Later, using the approach of multi criteria decision analysis Mac Beth (Measuring Attractiveness by a Categorical Based Evaluation Technique we will evaluate the criteria and assign to each one the appropriate weight according to their importance in the field of IDS architectures in cloud computing. The last step is to evaluate architectures against the criteria and collecting results of the model constructed in the previous steps.

Keywords: cloud computing, cloud security, intrusion detection/prevention system, multi-criteria decision analysis

Procedia PDF Downloads 443
293 Assessing Water Quality Using GIS: The Case of Northern Lebanon Miocene Aquifer

Authors: M. Saba, A. Iaaly, E. Carlier, N. Georges

Abstract:

This research focuses on assessing the ground water quality of Northern Lebanon affected by saline water intrusion. The chemical, physical and microbiological parameters were collected in various seasons spanning over the period of two years. Results were assessed using Geographic Information System (GIS) due to its visual capabilities in presenting the pollution extent in the studied region. Future projections of the excessive pumping were also simulated using GIS in order to assess the extent of the problem of saline intrusion in the near future.

Keywords: GIS, saline water, quality control, drinkable water quality standards, pumping

Procedia PDF Downloads 334
292 Study of the Behavior of Copper Immersed in Sea Water of the Bay of Large Agadir by Electrochemical Methods

Authors: Aicha Chaouay, Lahsen Bazzi, Mustapha Hilali

Abstract:

Seawater has chemical and biological characteristics making it particularly aggressive in relation to the corrosion of many materials including copper and steels low or moderate allies. Note that these materials are widely used in the manufacture of port infrastructure in the marine environment. These structures are exposed to two types of corrosion including: general corrosion and localized corrosion caused by the presence of sulfite-reducing micro-organisms. This work contributes to the study of the problematic related to bacterial contamination of the marine environment of large Agadir and evaluating the impact of this pollution on the corrosion resistance of copper. For the realization of this work, we conducted monthly periodic draws between (October 2012 February 2013) of seawater from the Anza area of the Bay of Agadir. Thus, after each sampling, a study of the electro chemical corrosion behavior of copper was carried out. Electro chemical corrosion parameters such as the corrosion potential, the corrosion current density, the charge transfer resistance and the double layer capacity were evaluated. The electro chemical techniques used in this work are: the route potentiodynamic polarization curves and electro chemical impedance.

Keywords: Bay of Agadir, microbial contamination, seawater (Morocco), corrosion, copper

Procedia PDF Downloads 473
291 Constructing a Semi-Supervised Model for Network Intrusion Detection

Authors: Tigabu Dagne Akal

Abstract:

While advances in computer and communications technology have made the network ubiquitous, they have also rendered networked systems vulnerable to malicious attacks devised from a distance. These attacks or intrusions start with attackers infiltrating a network through a vulnerable host and then launching further attacks on the local network or Intranet. Nowadays, system administrators and network professionals can attempt to prevent such attacks by developing intrusion detection tools and systems using data mining technology. In this study, the experiments were conducted following the Knowledge Discovery in Database Process Model. The Knowledge Discovery in Database Process Model starts from selection of the datasets. The dataset used in this study has been taken from Massachusetts Institute of Technology Lincoln Laboratory. After taking the data, it has been pre-processed. The major pre-processing activities include fill in missed values, remove outliers; resolve inconsistencies, integration of data that contains both labelled and unlabelled datasets, dimensionality reduction, size reduction and data transformation activity like discretization tasks were done for this study. A total of 21,533 intrusion records are used for training the models. For validating the performance of the selected model a separate 3,397 records are used as a testing set. For building a predictive model for intrusion detection J48 decision tree and the Naïve Bayes algorithms have been tested as a classification approach for both with and without feature selection approaches. The model that was created using 10-fold cross validation using the J48 decision tree algorithm with the default parameter values showed the best classification accuracy. The model has a prediction accuracy of 96.11% on the training datasets and 93.2% on the test dataset to classify the new instances as normal, DOS, U2R, R2L and probe classes. The findings of this study have shown that the data mining methods generates interesting rules that are crucial for intrusion detection and prevention in the networking industry. Future research directions are forwarded to come up an applicable system in the area of the study.

Keywords: intrusion detection, data mining, computer science, data mining

Procedia PDF Downloads 268
290 Hybrid Anomaly Detection Using Decision Tree and Support Vector Machine

Authors: Elham Serkani, Hossein Gharaee Garakani, Naser Mohammadzadeh, Elaheh Vaezpour

Abstract:

Intrusion detection systems (IDS) are the main components of network security. These systems analyze the network events for intrusion detection. The design of an IDS is through the training of normal traffic data or attack. The methods of machine learning are the best ways to design IDSs. In the method presented in this article, the pruning algorithm of C5.0 decision tree is being used to reduce the features of traffic data used and training IDS by the least square vector algorithm (LS-SVM). Then, the remaining features are arranged according to the predictor importance criterion. The least important features are eliminated in the order. The remaining features of this stage, which have created the highest level of accuracy in LS-SVM, are selected as the final features. The features obtained, compared to other similar articles which have examined the selected features in the least squared support vector machine model, are better in the accuracy, true positive rate, and false positive. The results are tested by the UNSW-NB15 dataset.

Keywords: decision tree, feature selection, intrusion detection system, support vector machine

Procedia PDF Downloads 233
289 A Basic Concept for Installing Cooling and Heating System Using Seawater Thermal Energy from the West Coast of Korea

Authors: Jun Byung Joon, Seo Seok Hyun, Lee Seo Young

Abstract:

As carbon dioxide emissions increase due to rapid industrialization and reckless development, abnormal climates such as floods and droughts are occurring. In order to respond to such climate change, the use of existing fossil fuels is reduced, and the proportion of eco-friendly renewable energy is gradually increasing. Korea is an energy resource-poor country that depends on imports for 93% of its total energy. As the global energy supply chain instability experienced due to the Russia-Ukraine crisis increases, countries around the world are resetting energy policies to minimize energy dependence and strengthen security. Seawater thermal energy is a renewable energy that replaces the existing air heat energy. It uses the characteristic of having a higher specific heat than air to cool and heat main spaces of buildings to increase heat transfer efficiency and minimize power consumption to generate electricity using fossil fuels, and Carbon dioxide emissions can be minimized. In addition, the effect on the marine environment is very small by using only the temperature characteristics of seawater in a limited way. K-water carried out a demonstration project of supplying cooling and heating energy to spaces such as the central control room and presentation room in the management building by acquiring the heat source of seawater circulated through the power plant's waterway by using the characteristics of the tidal power plant. Compared to the East Sea and the South Sea, the main system was designed in consideration of the large tidal difference, small temperature difference, and low-temperature characteristics, and its performance was verified through operation during the demonstration period. In addition, facility improvements were made for major deficiencies to strengthen monitoring functions, provide user convenience, and improve facility soundness. To spread these achievements, the basic concept was to expand the seawater heating and cooling system with a scale of 200 USRT at the Tidal Culture Center. With the operational experience of the demonstration system, it will be possible to establish an optimal seawater heat cooling and heating system suitable for the characteristics of the west coast ocean. Through this, it is possible to reduce operating costs by KRW 33,31 million per year compared to air heat, and through industry-university-research joint research, it is possible to localize major equipment and materials and develop key element technologies to revitalize the seawater heat business and to advance into overseas markets. The government's efforts are needed to expand the seawater heating and cooling system. Seawater thermal energy utilizes only the thermal energy of infinite seawater. Seawater thermal energy has less impact on the environment than river water thermal energy, except for environmental pollution factors such as bottom dredging, excavation, and sand or stone extraction. Therefore, it is necessary to increase the sense of speed in project promotion by innovatively simplifying unnecessary licensing/permission procedures. In addition, support should be provided to secure business feasibility by dramatically exempting the usage fee of public waters to actively encourage development in the private sector.

Keywords: seawater thermal energy, marine energy, tidal power plant, energy consumption

Procedia PDF Downloads 68