Search results for: transience seawater intrusion
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 348

Search results for: transience seawater intrusion

258 A Research and Application of Feature Selection Based on IWO and Tabu Search

Authors: Laicheng Cao, Xiangqian Su, Youxiao Wu

Abstract:

Feature selection is one of the important problems in network security, pattern recognition, data mining and other fields. In order to remove redundant features, effectively improve the detection speed of intrusion detection system, proposes a new feature selection method, which is based on the invasive weed optimization (IWO) algorithm and tabu search algorithm(TS). Use IWO as a global search, tabu search algorithm for local search, to improve the results of IWO algorithm. The experimental results show that the feature selection method can effectively remove the redundant features of network data information in feature selection, reduction time, and to guarantee accurate detection rate, effectively improve the speed of detection system.

Keywords: intrusion detection, feature selection, iwo, tabu search

Procedia PDF Downloads 499
257 Batch and Dynamic Investigations on Magnesium Separation by Ion Exchange Adsorption: Performance and Cost Evaluation

Authors: Mohamed H. Sorour, Hayam F. Shaalan, Heba A. Hani, Eman S. Sayed

Abstract:

Ion exchange adsorption has a long standing history of success for seawater softening and selective ion removal from saline sources. Strong, weak and mixed types ion exchange systems could be designed and optimized for target separation. In this paper, different types of adsorbents comprising zeolite 13X and kaolin, in addition to, poly acrylate/zeolite (AZ), poly acrylate/kaolin (AK) and stand-alone poly acrylate (A) hydrogel types were prepared via microwave (M) and ultrasonic (U) irradiation techniques. They were characterized using X-ray diffraction (XRD), Fourier transform infrared spectroscopy (FTIR), and scanning electron microscopy (SEM). The developed adsorbents were evaluated on bench scale level and based on assessment results, a composite bed has been formulated for performance evaluation in pilot scale column investigations. Owing to the hydrogel nature of the partially crosslinked poly acrylate, the developed adsorbents manifested a swelling capacity of about 50 g/g. The pilot trials have been carried out using magnesium enriched Red Seawater to simulate Red Seawater desalination brine. Batch studies indicated varying uptake efficiencies, where Mg adsorption decreases according to the following prepared hydrogel types AU>AM>AKM>AKU>AZM>AZU, being 108, 107, 78, 69, 66 and 63 mg/g, respectively. Composite bed adsorbent tested in the up-flow mode column studies indicated good performance for Mg uptake. For an operating cycle of 12 h, the maximum uptake during the loading cycle approached 92.5-100 mg/g, which is comparable to the performance of some commercial resins. Different regenerants have been explored to maximize regeneration and minimize the quantity of regenerants including 15% NaCl, 0.1 M HCl and sodium carbonate. Best results were obtained by acidified sodium chloride solution. In conclusion, developed cation exchange adsorbents comprising clay or zeolite support indicated adequate performance for Mg recovery under saline environment. Column design operated at the up-flow mode (approaching expanded bed) is appropriate for such type of separation. Preliminary cost indicators for Mg recovery via ion exchange have been developed and analyzed.

Keywords: batch and dynamic magnesium separation, seawater, polyacrylate hydrogel, cost evaluation

Procedia PDF Downloads 110
256 Artificial Neural Network Based Model for Detecting Attacks in Smart Grid Cloud

Authors: Sandeep Mehmi, Harsh Verma, A. L. Sangal

Abstract:

Ever since the idea of using computing services as commodity that can be delivered like other utilities e.g. electric and telephone has been floated, the scientific fraternity has diverted their research towards a new area called utility computing. New paradigms like cluster computing and grid computing came into existence while edging closer to utility computing. With the advent of internet the demand of anytime, anywhere access of the resources that could be provisioned dynamically as a service, gave rise to the next generation computing paradigm known as cloud computing. Today, cloud computing has become one of the most aggressively growing computer paradigm, resulting in growing rate of applications in area of IT outsourcing. Besides catering the computational and storage demands, cloud computing has economically benefitted almost all the fields, education, research, entertainment, medical, banking, military operations, weather forecasting, business and finance to name a few. Smart grid is another discipline that direly needs to be benefitted from the cloud computing advantages. Smart grid system is a new technology that has revolutionized the power sector by automating the transmission and distribution system and integration of smart devices. Cloud based smart grid can fulfill the storage requirement of unstructured and uncorrelated data generated by smart sensors as well as computational needs for self-healing, load balancing and demand response features. But, security issues such as confidentiality, integrity, availability, accountability and privacy need to be resolved for the development of smart grid cloud. In recent years, a number of intrusion prevention techniques have been proposed in the cloud, but hackers/intruders still manage to bypass the security of the cloud. Therefore, precise intrusion detection systems need to be developed in order to secure the critical information infrastructure like smart grid cloud. Considering the success of artificial neural networks in building robust intrusion detection, this research proposes an artificial neural network based model for detecting attacks in smart grid cloud.

Keywords: artificial neural networks, cloud computing, intrusion detection systems, security issues, smart grid

Procedia PDF Downloads 294
255 Toxicity Identification and Evaluation for the Effluent from Seawater Desalination Facility in Korea Using D. magna and V. fischeri

Authors: Sung Jong Lee, Hong Joo Ha, Chun Sang Hong

Abstract:

In recent years, the interests on the impacts of industrial wastewater on aquatic ecosystem have increased with concern about ecosystem protection and human health. Whole effluent toxicity tests are used to monitor toxicity by unknown toxic chemicals as well as conventional pollutants from industrial effluent discharges. This study describes the application of TIE (toxicity identification evaluation) procedures to an acutely toxic effluent from a Seawater desalination facility in industrial complex which was toxic to Daphnia magna. In TIE phase I (characterization step), the toxic effects by heavy metals, organic compounds, oxidants, volatile organic compounds, suspended solids and ammonia were screened and revealed that the source of toxicity is far from these toxicants group. Chemical analysis (TIE phase II) on TDS showed that the concentration of chloride ion (24,215 ~ 29,562 mg/L) was substantially higher than that predicted from EC50 for D. magna. In confirmation step (TIE phase III), chloride ion was demonstrated to be main toxicant in this effluent by the spiking approach, species sensitivity approach, and deletion approach. Calcium, potassium, magnesium, sodium, fluorine, sulfate ion concentration was not shown toxicity from D. magna. Finally, we concluded that chloride was the most contributing toxicant in the waste water treatment plant. Further research activities are needed for technical support of toxicity identification and evaluation on the various types of wastewater treatment plant discharge in Korea. Acknowledgement: This research was supported by a grant (16IFIP-B089911-03) from Plant Research Program funded by Ministry of Land, Infrastructure and Transport of Korean government.

Keywords: TIE, D. magna, V. fischeri, seawater desalination facility

Procedia PDF Downloads 230
254 Pervasive Computing: Model to Increase Arable Crop Yield through Detection Intrusion System (IDS)

Authors: Idowu Olugbenga Adewumi, Foluke Iyabo Oluwatoyinbo

Abstract:

Presently, there are several discussions on the food security with increase in yield of arable crop throughout the world. This article, briefly present research efforts to create digital interfaces to nature, in particular to area of crop production in agriculture with increase in yield with interest on pervasive computing. The approach goes beyond the use of sensor networks for environmental monitoring but also by emphasizing the development of a system architecture that detect intruder (Intrusion Process) which reduce the yield of the farmer at the end of the planting/harvesting period. The objective of the work is to set a model for setting up the hand held or portable device for increasing the quality and quantity of arable crop. This process incorporates the use of infrared motion image sensor with security alarm system which can send a noise signal to intruder on the farm. This model of the portable image sensing device in monitoring or scaring human, rodent, birds and even pests activities will reduce post harvest loss which will increase the yield on farm. The nano intelligence technology was proposed to combat and minimize intrusion process that usually leads to low quality and quantity of produce from farm. Intranet system will be in place with wireless radio (WLAN), router, server, and client computer system or hand held device e.g PDAs or mobile phone. This approach enables the development of hybrid systems which will be effective as a security measure on farm. Since, precision agriculture has developed with the computerization of agricultural production systems and the networking of computerized control systems. In the intelligent plant production system of controlled greenhouses, information on plant responses, measured by sensors, is used to optimize the system. Further work must be carry out on modeling using pervasive computing environment to solve problems of agriculture, as the use of electronics in agriculture will attracts more youth involvement in the industry.

Keywords: pervasive computing, intrusion detection, precision agriculture, security, arable crop

Procedia PDF Downloads 377
253 Research of Acoustic Propagation within Marine Riser in Deepwater Drilling

Authors: Xiaohui Wang, Zhichuan Guan, Roman Shor, Chuanbin Xu

Abstract:

Early monitoring and real-time quantitative description of gas intrusion under the premise of ensuring the integrity of the drilling fluid circulation system will greatly improve the accuracy and effectiveness of deepwater gas-kick monitoring. Therefore, in order to study the propagation characteristics of ultrasonic waves in the gas-liquid two-phase flow within the marine riser, in this paper, a numerical simulation method of ultrasonic propagation in the annulus of the riser was established, and the credibility of the numerical analysis was verified by the experimental results of the established gas intrusion monitoring simulation experimental device. The numerical simulation can solve the sound field in the gas-liquid two-phase flow according to different physical models, and it is easier to realize the single factor control. The influence of each parameter on the received signal can be quantitatively investigated, and the law with practical guiding significance can be obtained.

Keywords: gas-kick detection, ultrasonic, void fraction, coda wave velocity

Procedia PDF Downloads 126
252 Diversity and Taxonomy: Malaysian Marine Algae Genus Halimeda (Halimedaceae, Chlorophyta)

Authors: Nur Farah Ain Zainee, Ahmad Ismail, Nazlina Ibrahim, Asmida Ismail

Abstract:

The study of genus Halimeda in Malaysia is in the early stage due to less specific study on its taxonomy. Most of the previous research tend to choose other genus such as Caulerpa and Gracilaria because of the potential of being utilized. The identification of Halimeda is complex by the high morphological variation within individual species due to different types of habitat and the changes in composition of seawater. The study was completed to study the diversity and distribution of Halimeda in Malaysia and to identify the morphological and anatomical differences between Halimeda species. The methods which have been used for this study are collection of Halimeda and seawater, preservation of specimen, identification of the specimen including the preparation of the temporary slide and decalcification of the calcium layer by using diluted hydrochloric acid. The specimen were processed in laboratory and kept as herbarium specimen in Algae Herbarium, Universiti Kebangsaan Malaysia. Environmental parameters were tested by using YSI multiparameter probe and the recorded data were temperature, salinity, pH and dissolved oxygen. The nutrient content of seawater such as nitrate and phosphate were analysed by using Hach kit model DR 2000. In the present study, out of 330 herbarium specimen, ten species were identified as Halimeda cuneata, H. discoidea, H. macroloba, H. macrophysa, H. opuntia, H. simulans, H. stuposa, H. taenicola, H. tuna and H. velasquezii. Of these, five species were new record to Malaysia. They are Halimeda cuneata, H. macrophysa, H. stuposa, H. taenicola and H. velasquezii. H. opuntia was found as the most abundance species with wide distribution in Malaysia coastal area. Meanwhile, from the study of their distribution, two localities in which Pulau Balak Balak, Kudat and Pulau Langkawi, Kedah, were noted having high number of Halimeda species. As a conclusion, this study has successfully identified ten species of Halimeda of Malaysia with full description of morphological characteristics that may assist further researcher to differentiate and identify Halimeda.

Keywords: Distribution, diversity, Halimeda, morphological, taxonomy

Procedia PDF Downloads 302
251 Experimental Study on Using the Aluminum Sacrificial Anode as a Cathodic Protection for Marine Structures

Authors: A. Radwan, A. Elbatran, A. Mehanna, M. Shehadeh

Abstract:

The corrosion is natural chemical phenomenon that is applied in many engineering structures. Hence, it is one of the important topics to study in the engineering research. Ship and offshore structures are most exposed to corrosion due to the presence of corrosive medium of air and the seawater. Consequently, investigation of the corrosion behavior and properties over ship and offshore hulls is one of the important topics to study in the marine engineering research. Using sacrificial anode is the most popular solution for protecting marine structures from corrosion. Hence, this research investigates the extent of corrosion between the composite ship model and relative velocity of water, along with the sacrificial aluminum anode consumption and its degree of protection in seawater. In this study, the consumption rate of sacrificial aluminum anode with respect to relative velocity at different Reynold’s numbers was studied experimentally, and it was found that, the degree of cathodic protection represented by the cathode potential at a given distance from the aluminum anode was decreased slightly with increment of the relative velocity.

Keywords: corrosion, Reynold's numbers, sacrificial anode, velocity

Procedia PDF Downloads 531
250 A Levelized Cost Analysis for Solar Energy Powered Sea Water Desalination in the Arabian Gulf Region

Authors: Abdullah Kaya, Muammer Koc

Abstract:

A levelized cost analysis of solar energy powered seawater desalination in The Emirate of Abu Dhabi is conducted to show that clean and renewable desalination is economically viable. The Emirate heavily relies on seawater desalination for its freshwater needs due to limited freshwater resources available. This trend is expected to increase further due to growing population and economic activity, rapid decline in limited freshwater reserves, and aggravating effects of climate change. Seawater desalination in Abu Dhabi is currently done through thermal desalination technologies such as multi-stage flash (MSF) and multi-effect distillation (MED) which are coupled with thermal power plants known as co-generation. Our analysis indicates that these thermal desalination methods are inefficient regarding energy consumption and harmful to the environment due to CO₂ emissions and other dangerous byproducts. Therefore, utilization of clean and renewable desalination options has become a must for The Emirate for the transition to a sustainable future. The rapid decline in the cost of solar PV system for energy production and RO technology for desalination makes the combination of these two an ideal option for a future of sustainable desalination in the Emirate of Abu Dhabi. A Levelized cost analysis for water produced by solar PV + RO system indicates that Abu Dhabi is well positioned to utilize this technological combination for cheap and clean desalination for the coming years. It has been shown that cap-ex cost of solar PV powered RO system has potential to go as low as to 101 million US $ (1111 $/m³) at best case considering the recent technological developments. The levelized cost of water (LCW) values fluctuate between 0.34 $/m³ for the baseline case and 0.27 $/m³ for the best case. Even the highly conservative case yields LCW cheaper than 100% from all thermal desalination methods currently employed in the Emirate. Exponential cost decreases in both solar PV and RO sectors along with increasing economic scale globally signal the fact that a cheap and clean desalination can be achieved by the combination of these technologies.

Keywords: solar PV, RO desalination, sustainable desalination, levelized cost of analysis, Emirate of Abu Dhabi

Procedia PDF Downloads 136
249 Simulation of 'Net' Nutrients Removal by Green Mussel (Perna viridis) in Estuarine and Coastal Areas

Authors: Chayarat Tantanasarit, Sandhya Babel

Abstract:

Green mussels (Perna viridis) can effectively remove nutrients from seawater through their filtration process. This study aims to estimate 'net' nutrient removal rate by green mussel through calculation of nutrient uptake and release. Nutrients (carbon, nitrogen, and phosphorus) uptake was calculated based on the mussel filtration rate. Nutrient release was evaluated from carbon, nitrogen, and phosphorus released as mussel feces. By subtracting nutrient release from nutrient uptake, net nutrient removal by green mussel can be found as 3302, 380 and 124 mg/year/indv. Mass balance model was employed to simulate nutrient removal in actual green mussel farming conditions. Mussels farm area, seawater flow rate and amount of mussels were considered in the model. Results show that although larger quantity of green mussel farms lead to higher nutrient removal rate, the maximum green mussel cultivation should be taken into consideration as nutrients released through mussel excretion can strongly affect marine ecosystem.

Keywords: carbon, ecretion, filtration, nitrogen, phosphorus

Procedia PDF Downloads 368
248 Brine Waste from Seawater Desalination in Malaysia

Authors: Cynthia Mahadi, Norhafezah Kasmuri

Abstract:

Water scarcity is a growing issue these days. As a result, saltwater is being considered a limitless supply of fresh water through the desalination process, which is likely to address the worldwide water crisis, including in Malaysia. This study aims to offer the best management practice for controlling brine discharge in Malaysia by comparing environmental regulations on brine waste management in other countries. Then, a survey was distributed to the public to acquire further information about their level of awareness of the harmful effects of brine waste and to find out their perspective on the proposed solutions to ensure the effectiveness of the measures. As a result, it has been revealed that Malaysia still lacks regulations regarding the disposal of brine waste. Thus, a recommendation based on practices in other nations has been put forth by this study. This study suggests that the government and Malaysia's environmental regulatory body should govern brine waste disposal in the Environmental Quality Act 1974. Also, to add the construction of a desalination plant in Schedule 1 of prescribed activities was necessary. Because desalination plants can harm the environment during both construction and operation, every proposal for the construction of a desalination plant should involve the submission of an environmental impact assessment (EIA).

Keywords: seawater desalination, brine waste, environmental impact assessment, fuzzy Delphi method

Procedia PDF Downloads 51
247 Corrosion and Tribocorrosion Behaviour of Potential Coatings Applied in High-Strength Low-Alloy Steel for Offshore Applications

Authors: Ainara Lopez-Ortega, Raquel Bayon, Elena Rodriguez, Amaya Igartua

Abstract:

The materials used in offshore structural applications are continuously subjected to aggressive environmental conditions that accelerate their degradation, thus shortening their useful life. Wear, corrosion and the effect of marine microorganisms are the main processes taking place in marine environments, and whenever they occur simultaneously the durability of materials is strongly reduced. In the present work, the tribocorrosion behaviour of a High-Strength Low-Alloy (HSLA) steel and three coatings commonly used for protecting offshore components has been studied by means of unidirectional tribological tests in synthetic seawater. The coatings were found to enhance the tribological response of the uncoated steel and provide the system with improved corrosion resistance, in terms of smaller material losses and reduction of friction coefficients. The tests were repeated after ageing the materials in a salt-fog cabinet, and the aging process was found to slightly affect the performance of two of the coatings, in terms of higher material losses, meanwhile the third coating was not affected.

Keywords: coatings, corrosion, high-strength low-alloy steel, seawater, tribocorrosion

Procedia PDF Downloads 391
246 Anomaly Detection with ANN and SVM for Telemedicine Networks

Authors: Edward Guillén, Jeisson Sánchez, Carlos Omar Ramos

Abstract:

In recent years, a wide variety of applications are developed with Support Vector Machines -SVM- methods and Artificial Neural Networks -ANN-. In general, these methods depend on intrusion knowledge databases such as KDD99, ISCX, and CAIDA among others. New classes of detectors are generated by machine learning techniques, trained and tested over network databases. Thereafter, detectors are employed to detect anomalies in network communication scenarios according to user’s connections behavior. The first detector based on training dataset is deployed in different real-world networks with mobile and non-mobile devices to analyze the performance and accuracy over static detection. The vulnerabilities are based on previous work in telemedicine apps that were developed on the research group. This paper presents the differences on detections results between some network scenarios by applying traditional detectors deployed with artificial neural networks and support vector machines.

Keywords: anomaly detection, back-propagation neural networks, network intrusion detection systems, support vector machines

Procedia PDF Downloads 314
245 Intrusion Detection System Using Linear Discriminant Analysis

Authors: Zyad Elkhadir, Khalid Chougdali, Mohammed Benattou

Abstract:

Most of the existing intrusion detection systems works on quantitative network traffic data with many irrelevant and redundant features, which makes detection process more time’s consuming and inaccurate. A several feature extraction methods, such as linear discriminant analysis (LDA), have been proposed. However, LDA suffers from the small sample size (SSS) problem which occurs when the number of the training samples is small compared with the samples dimension. Hence, classical LDA cannot be applied directly for high dimensional data such as network traffic data. In this paper, we propose two solutions to solve SSS problem for LDA and apply them to a network IDS. The first method, reduce the original dimension data using principal component analysis (PCA) and then apply LDA. In the second solution, we propose to use the pseudo inverse to avoid singularity of within-class scatter matrix due to SSS problem. After that, the KNN algorithm is used for classification process. We have chosen two known datasets KDDcup99 and NSLKDD for testing the proposed approaches. Results showed that the classification accuracy of (PCA+LDA) method outperforms clearly the pseudo inverse LDA method when we have large training data.

Keywords: LDA, Pseudoinverse, PCA, IDS, NSL-KDD, KDDcup99

Procedia PDF Downloads 202
244 Intrusiveness, Appraisal and Thought Control Strategies in Patients with Obsessive Compulsive Disorder

Authors: T. Arshad

Abstract:

A correlation study was done to explore the relationship of intrusiveness, appraisal and thought control strategies in patients with Obsessive Compulsive Disorder. Theoretical frame work for the present study was Salkovskis (1985) cognitive model of obsessive compulsive disorder. Sample of 100 patients (men=48, women=52) of age 14-62 years (M=32.13, SD=10.37) was recruited from hospitals of Lahore, Pakistan. Revised Obsessional Intrusion Inventory, Stress Appraisal Measure, Thought Control Questionnaire and Symptoms Checklist-R were self-administered. Findings revealed that intrusiveness is correlated with appraisals (controllable by self, controllable by others, uncontrollable, stressfulness) and thought control strategy (punishment). Furthermore, appraisals (uncontrollable, stressfulness, controllable by others) were emerged as strong predictors for different through control strategies (distraction, punishment and social control). Moreover, men have higher frequency of intrusion, whereas women were frequently using social control as thought control strategy. Results implied that intrusiveness, appraisals (controllable by others, uncontrollable, stressfulness) and thought control strategy (punishment) are related which maintains the disorder.

Keywords: appraisal, intrusiveness, obsessive compulsive disorder, thought control strategies

Procedia PDF Downloads 364
243 Investigation on the Capacitive Deionization of Functionalized Carbon Nanotubes (F-CNTs) and Silver-Decorated F-CNTs for Water Softening

Authors: Khrizelle Angelique Sablan, Rizalinda De Leon, Jaeyoung Lee, Joey Ocon

Abstract:

The impending water shortage drives us to find alternative sources of water. One of the possible solutions is desalination of seawater. There are numerous processes by which it can be done and one if which is capacitive deionization. Capacitive deionization is a relatively new technique for water desalination. It utilizes the electric double layer for ion adsorption. Carbon-based materials are commonly used as electrodes for capacitive deionization. In this study, carbon nanotubes (CNTs) were treated in a mixture of nitric and sulfuric acid. The silver addition was also facilitated to incorporate antimicrobial action. The acid-treated carbon nanotubes (f-CNTs) and silver-decorated f-CNTs (Ag@f-CNTs) were used as electrode materials for seawater deionization and compared with CNT and acid-treated CNT. The synthesized materials were characterized using TEM, EDS, XRD, XPS and BET. The electrochemical performance was evaluated using cyclic voltammetry, and the deionization performance was tested on a single cell with water containing 64mg/L NaCl. The results showed that the synthesized Ag@f-CNT-10 H could have better performance than CNT and a-CNT with a maximum ion removal efficiency of 50.22% and a corresponding adsorption capacity of 3.21 mg/g. It also showed antimicrobial activity against E. coli. However, the said material lacks stability as the efficiency decreases with repeated usage of the electrode.

Keywords: capacitive deionization, carbon nanotubes, desalination, acid functionalization, silver

Procedia PDF Downloads 201
242 Promoting Social Advocacy through Digital Storytelling: The Case of Ocean Acidification

Authors: Chun Chen Yea, Wen Huei Chou

Abstract:

Many chemical changes in the atmosphere and the ocean are invisible to the naked eye, but they have profound impacts. These changes not only confirm the phenomenon of global carbon pollution, but also forewarn that more changes are coming. The carbon dioxide gases emitted from the burning of fossil fuels dissolve into the ocean and chemically react with seawater to form carbonic acid, which increases the acidity of the originally alkaline seawater. This gradual acidification is occurring at an unprecedented rate and will affect the effective formation of carapace of some marine organisms such as corals and crustaceans, which are almost entirely composed of calcium carbonate. The carapace of these organisms will become more dissoluble. Acidified seawater not only threatens the survival of marine life, but also negatively impacts the global ecosystem via the food chain. Faced with the threat of ocean acidification, all humans are duty-bound. The industrial sector outputs the highest level of carbon dioxide emissions in Taiwan, and the petrochemical industry is the major contributor. Ever since the construction of Formosa Plastics Group's No. 6 Naphtha Cracker Plant in Yunlin County, there have been many environmental concerns such as air pollution and carbon dioxide emission. The marine life along the coast of Yunlin is directly affected by ocean acidification arising from the carbon emissions. Societal change demands our willingness to act, which is what social advocacy promotes. This study uses digital storytelling for social advocacy and ocean acidification as the subject of a visual narrative in visualization to demonstrate the subsequent promotion of social advocacy. Storytelling can transform dull knowledge into an engaging narrative of the crisis faced by marine life. Digital dissemination is an effective social-work practice. The visualization promoting awareness on ocean acidification disseminated via social media platforms, such as Facebook and Instagram. Social media enables users to compose their own messages and share information across different platforms, which helps disseminate the core message of social advocacy.

Keywords: digital storytelling, visualization, ocean acidification, social advocacy

Procedia PDF Downloads 95
241 A Distributed Mobile Agent Based on Intrusion Detection System for MANET

Authors: Maad Kamal Al-Anni

Abstract:

This study is about an algorithmic dependence of Artificial Neural Network on Multilayer Perceptron (MPL) pertaining to the classification and clustering presentations for Mobile Adhoc Network vulnerabilities. Moreover, mobile ad hoc network (MANET) is ubiquitous intelligent internetworking devices in which it has the ability to detect their environment using an autonomous system of mobile nodes that are connected via wireless links. Security affairs are the most important subject in MANET due to the easy penetrative scenarios occurred in such an auto configuration network. One of the powerful techniques used for inspecting the network packets is Intrusion Detection System (IDS); in this article, we are going to show the effectiveness of artificial neural networks used as a machine learning along with stochastic approach (information gain) to classify the malicious behaviors in simulated network with respect to different IDS techniques. The monitoring agent is responsible for detection inference engine, the audit data is collected from collecting agent by simulating the node attack and contrasted outputs with normal behaviors of the framework, whenever. In the event that there is any deviation from the ordinary behaviors then the monitoring agent is considered this event as an attack , in this article we are going to demonstrate the  signature-based IDS approach in a MANET by implementing the back propagation algorithm over ensemble-based Traffic Table (TT), thus the signature of malicious behaviors or undesirable activities are often significantly prognosticated and efficiently figured out, by increasing the parametric set-up of Back propagation algorithm during the experimental results which empirically shown its effectiveness  for the ratio of detection index up to 98.6 percentage. Consequently it is proved in empirical results in this article, the performance matrices are also being included in this article with Xgraph screen show by different through puts like Packet Delivery Ratio (PDR), Through Put(TP), and Average Delay(AD).

Keywords: Intrusion Detection System (IDS), Mobile Adhoc Networks (MANET), Back Propagation Algorithm (BPA), Neural Networks (NN)

Procedia PDF Downloads 164
240 A New DIDS Design Based on a Combination Feature Selection Approach

Authors: Adel Sabry Eesa, Adnan Mohsin Abdulazeez Brifcani, Zeynep Orman

Abstract:

Feature selection has been used in many fields such as classification, data mining and object recognition and proven to be effective for removing irrelevant and redundant features from the original data set. In this paper, a new design of distributed intrusion detection system using a combination feature selection model based on bees and decision tree. Bees algorithm is used as the search strategy to find the optimal subset of features, whereas decision tree is used as a judgment for the selected features. Both the produced features and the generated rules are used by Decision Making Mobile Agent to decide whether there is an attack or not in the networks. Decision Making Mobile Agent will migrate through the networks, moving from node to another, if it found that there is an attack on one of the nodes, it then alerts the user through User Interface Agent or takes some action through Action Mobile Agent. The KDD Cup 99 data set is used to test the effectiveness of the proposed system. The results show that even if only four features are used, the proposed system gives a better performance when it is compared with the obtained results using all 41 features.

Keywords: distributed intrusion detection system, mobile agent, feature selection, bees algorithm, decision tree

Procedia PDF Downloads 368
239 Erosion and Deposition of Terrestrial Soil Supplies Nutrients to Estuaries and Coastal Bays: A Flood Simulation Study of Sediment-Nutrient Flux

Authors: Kaitlyn O'Mara, Michele Burford

Abstract:

Estuaries and coastal bays can receive large quantities of sediment from surrounding catchments during flooding or high flow periods. Large river systems that feed freshwater into estuaries can flow through several catchments of varying geology. Human modification of catchments for agriculture, industry and urban use can contaminate soils with excess nutrients, trace metals and other pollutants. Land clearing, especially clearing of riparian vegetation, can accelerate erosion, mobilising, transporting and depositing soil particles into rivers, estuaries and coastal bays. In this study, a flood simulation experiment was used to study the flux of nutrients between soil particles and water during this erosion, transport and deposition process. Granite, sedimentary and basalt surface soils (as well as sub-soils of granite and sedimentary) were collected from eroding areas surrounding the Brisbane River, Australia. The <63 µm size fraction of each soil type was tumbled in freshwater for 3 days, to simulation flood erosion and transport, followed by stationary exposure to seawater for 4 weeks, to simulate deposition into estuaries. Filtered water samples were taken at multiple time points throughout the experiment and analysed for water nutrient concentrations. The highest rates of nutrient release occurred during the first hour of exposure to freshwater and seawater, indicating a chemical reaction with seawater that may act to release some nutrient particles that remain bound to the soil during turbulent freshwater transport. Although released at a slower rate than the first hour, all of the surface soil types showed continual ammonia, nitrite and nitrate release over the 4-week seawater exposure, suggesting that these soils may provide ongoing supply of these nutrients to estuarine waters after deposition. Basalt surface soil released the highest concentrations of phosphates and dissolved organic phosphorus. Basalt soils are found in much of the agricultural land surrounding the Brisbane River and contributed largely to the 2011 Brisbane River flood plume deposit in Moreton Bay, suggesting these soils may be a source of phosphate enrichment in the bay. The results of this study suggest that erosion of catchment soils during storm and flood events may be a source of nutrient supply in receiving waterways, both freshwater and marine, and that the amount of nutrient release following these events may be affected by the type of soil deposited. For example, flooding in different catchments of a river system over time may result in different algal and food web responses in receiving estuaries.

Keywords: flood, nitrogen, nutrient, phosphorus, sediment, soil

Procedia PDF Downloads 153
238 Study of Surface Water Quality in the Wadi El Harrach for Its Use in the Artificial Groundwater Recharge of the Mitidja, North Algeria

Authors: M. Meddi, A. Boufekane

Abstract:

The Mitidja coastal groundwater which extends over an area of 1450 km2 is a strategic resource in the Algiers region. The high dependence of the regional economy on the use of this groundwater forces us to have recourse to its artificial recharge from the Wadi El Harrach in its upstream part. This system of artificial recharge has shown its effectiveness in the development of water resource mentioned in the succeeding works in several regions of the world. The objective of this study is to: Increase the reserves of water inputs by infiltration, raise the water level and its good quality in wells and boreholes, reduce losses to the sea, and address seawater intrusion by maintaining balance in the freshwater-saltwater interface in the downstream part of the groundwater basin. After analyzing the situation, it was noticed that a qualitative monitoring of the Wadi water for the groundwater recharge has to be done. For this purpose, we proceeded during three successive years (2010, 2011, and 2012) to the monthly sampling of water in the upstream part of the Wadi El Harrach for chemical analysis. The variation of the sediment transport concentration will be also measured. This monitoring aims to characterize the water quality and avoid clogging in the proposed recharge area. The results of these analyses showed the good chemical quality according to the analyses we performed in the laboratory during the three years, but they are too loaded with suspended matters. We noticed that these fine particles come from the grinding of limestone of sandpit located upstream of the area of the proposed recharge system. This problem can be solved by a water supply upstream of sandpit. For the recharge, we propose the method of using two wells for dual use, which means that it can be used for water supply and extraction. This solution is inexpensive in our case and could easily be used as wells are already drilled in the upstream part. This solution increases over time the piezometric level and also reduce groundwater contamination by saltwater in the downstream part.

Keywords: water quality, artificial groundwater recharge, Mitidja, North Algeria

Procedia PDF Downloads 259
237 Context Aware Anomaly Behavior Analysis for Smart Home Systems

Authors: Zhiwen Pan, Jesus Pacheco, Salim Hariri, Yiqiang Chen, Bozhi Liu

Abstract:

The Internet of Things (IoT) will lead to the development of advanced Smart Home services that are pervasive, cost-effective, and can be accessed by home occupants from anywhere and at any time. However, advanced smart home applications will introduce grand security challenges due to the increase in the attack surface. Current approaches do not handle cybersecurity from a holistic point of view; hence, a systematic cybersecurity mechanism needs to be adopted when designing smart home applications. In this paper, we present a generic intrusion detection methodology to detect and mitigate the anomaly behaviors happened in Smart Home Systems (SHS). By utilizing our Smart Home Context Data Structure, the heterogeneous information and services acquired from SHS are mapped in context attributes which can describe the context of smart home operation precisely and accurately. Runtime models for describing usage patterns of home assets are developed based on characterization functions. A threat-aware action management methodology, used to efficiently mitigate anomaly behaviors, is proposed at the end. Our preliminary experimental results show that our methodology can be used to detect and mitigate known and unknown threats, as well as to protect SHS premises and services.

Keywords: Internet of Things, network security, context awareness, intrusion detection

Procedia PDF Downloads 149
236 Equation to an Unknown (1980): Visibility, Community, and Rendering Queer Utopia

Authors: Ted Silva

Abstract:

Dietrich de Velsa's Équation à un inconnu / Equation to an Unknown hybridizes art cinema style with the sexually explicit aesthetics of pornography to envision a uniquely queer world unmoored by heteronormative influence. This stylization evokes the memory of a queer history that once approximated such a prospect. With this historical and political context in mind, this paper utilizes formal analysis to assess how the film frames queer sexual encounters as tender acts of care, sometimes literally mending physical wounds. However, Equation to Unknown also highlights the transience of these sexual exchanges. By emphasizing the homogeneity of the protagonist’s sexual conquests, the film reveals that these practices have a darker meaning when the men reject the individualized connection to pursue purely visceral gratification. Given the lack of diversity or even recognizable identifying factors, the men become more anonymous to each other the more they pair up. Ultimately, Equation to an Unknown both celebrates and problematizes its vision of a queer utopia, highlighting areas in the community wherein intimacy and care flourish and locating those spots in which they are neglected.

Keywords: pornography studies, queer cinema, French cinema, history

Procedia PDF Downloads 61
235 Climate Change Impact on Water Resources Management in Remote Islands Using Hybrid Renewable Energy Systems

Authors: Elissavet Feloni, Ioannis Kourtis, Konstantinos Kotsifakis, Evangelos Baltas

Abstract:

Water inadequacy in small dry islands scattered in the Aegean Sea (Greece) is a major problem regarding Water Resources Management (WRM), especially during the summer period due to tourism. In the present work, various WRM schemes are designed and presented. The WRM schemes take into account current infrastructure and include Rainwater Harvesting tanks and Reverse Osmosis Desalination Units. The energy requirements are covered mainly by wind turbines and/or a seawater pumped storage system. Sizing is based on the available data for population and tourism per island, after taking into account a slight increase in the population (up to 1.5% per year), and it guarantees at least 80% reliability for the energy supply and 99.9% for potable water. Evaluation of scenarios is carried out from a financial perspective, after calculating the Life Cycle Cost (LCC) of each investment for a lifespan of 30 years. The wind-powered desalination plant was found to be the most cost-effective practice, from an economic point of view. Finally, in order to estimate the Climate Change (CC) impact, six different CC scenarios were investigated. The corresponding rate of on-grid versus off-grid energy required for ensuring the targeted reliability for the zero and each climatic scenario was investigated per island. The results revealed that under CC the grid-on energy required would increase and as a result, the reduction in wind turbines and seawater pumped storage systems’ reliability will be in the range of 4 to 44%. However, the range of this percentage change does not exceed 22% per island for all examined CC scenarios. Overall, CC is proposed to be incorporated into the design process for WRM-related projects. Acknowledgements: This research is co-financed by Greece and the European Union (European Social Fund - ESF) through the Operational Program «Human Resources Development, Education and Lifelong Learning 2014-2020» in the context of the project “Development of a combined rain harvesting and renewable energy-based system for covering domestic and agricultural water requirements in small dry Greek Islands” (MIS 5004775).

Keywords: small dry islands, water resources management, climate change, desalination, RES, seawater pumped storage system, rainwater harvesting

Procedia PDF Downloads 88
234 A Strategic Water and Energy Project as a Climate Change Adaptation Tool for Israel, Jordan and the Middle East

Authors: Doron Markel

Abstract:

Water availability in most of the Middle East (especially in Jordan) is among the lowest in the world and has been even further exacerbated by the regional climatic change and the reduced rainfall. The Araba Valley in Israel is disconnected from the national water system. On the other hand, the Araba Valley, both in Israel and Jordan, is an excellent area for solar energy gaining. The Dead Sea (Israel and Jordan) is a hypersaline lake which its level declines at a rate of more than 1 m/y. The decline stems from the increasing use of all available freshwater resources that discharge into the Dead Sea and decreasing natural precipitation due to climate change in the Middle East. As an adaptation tool for this humanmade and Climate Change results, a comprehensive water-energy and environmental project were suggested: The Red Sea-Dead Sea Conveyance. It is planned to desalinate the Red Sea water, supply the desalinated water to both Israel and Jordan, and convey the desalination brine to the Dead Sea to stabilize its water level. Therefore, the World Bank had led a multi-discipline feasibility study between 2008 and 2013, that had mainly dealt with the mixing of seawater and Dead Sea Water. The possible consequences of such mixing were precipitation and possible suspension of secondary Gypsum, as well as blooming of Dunaliella red algae. Using a comprehensive hydrodynamic-geochemical model for the Dead Sea, it was predicted that while conveying up to 400 Million Cubic Meters per year of seawater or desalination brine to the Dead Sea, the latter would not be stratified as it was until 1979; hence Gypsum precipitation and algal blooms would be neglecting. Using another hydrodynamic-biological model for the Red Sea, it was predicted the Seawater pump from the Gulf of Eilat would not harm the ecological system of the gulf (including the sensitive coral reef), giving a pump depth of 120-160 m. Based on these studies, a pipeline conveyance was recommended to convey desalination brine to the Dead Sea with the use of a hydropower plant, utilizing the elevation difference of 400 m between the Red Sea and the Dead Sea. The complementary energy would come from solar panels coupled with innovative storage technology, needed to produce a continuous energy production for an appropriate function of the desalination plant. The paper will describe the proposed project as well as the feasibility study results. The possibility to utilize this water-energy-environmental project as a climate change adaptation strategy for both Israel and Jordan will also be discussed.

Keywords: Red Sea, Dead Sea, water supply, hydro-power, Gypsum, algae

Procedia PDF Downloads 76
233 Risk and Vulnerability Assessment of Agriculture on Climate Change: Bangnampriao District, Thailand

Authors: Charuvan Kasemsap

Abstract:

This research was studied in Bangnampriao District, Chachernsao Province, Thailand. The primary data relating to flooding, drought, and saline intrusion problem on agriculture were collected by surveying, focus group, and in-depth interview with agricultural officers, technical officers of irrigation department, and local government leader of Bangnampriao District. The likelihood and consequence of risk were determined the risk index by risk assessment matrix. In addition, the risk index and the total coping capacity scores were investigated the vulnerability index by vulnerability matrix. It was found that the high-risk drought and saline intrusion was dramatically along Bang Pakong River owing to the end destination of Chao Phraya Irrigation system of Central Thailand. This leads yearly the damage of rice paddy, mango tree, orchard, and fish pond. Therefore, some agriculture avoids rice growing during January to May, and also pumps fresh water from a canal into individual storage pond. However, Bangnampriao District will be strongly affected by the impacts of climate change. Monthly precipitations are expected to decrease in number; dry seasons are expected to be more in number and longer in duration. Thus, the risk and vulnerability of agriculture are also increasing. Adaptation strategies need to be put in place in order to enhance the resilience of the agriculture.

Keywords: agriculture, bangnampriao, climate change, risk assessment

Procedia PDF Downloads 394
232 Screening the Growth Inhibition Mechanism of Sulfate-Reducing Bacteria by Chitosan/Lignosulfonate Nanocomposite in Seawater Media

Authors: K. Rasool

Abstract:

Sulfate-reducing bacteria (SRBs) induced biofilm formation is a global industrial concern due to its role in the development of microbial-induced corrosion (MIC). Herein, we have developed a biodegradable chitosan/lignosulfonate nanocomposite (CS@LS) as an efficient green biocide for the inhibition of SRBs biofilms. We investigated in detail the inhibition mechanism of SRBs by CS@LS in seawater media. Stable CS@LS-1:1 with 150–200 nm average size and zeta potential of + 34.25 mV was synthesized. The biocidal performance of CS@LS was evaluated by sulfate reduction profiles coupled with analysis of extracted extracellular polymeric substances (EPS) and lactate dehydrogenase (LDH) release assays. As the nanocomposite concentration was increased from 50 to 500 µg/mL, the specific sulfate reduction rate (SSRR) decreased from 0.278 to 0.036 g-sulfate/g-VSS*day showing a relative sulfate reduction inhibition of 86.64% as compared to that of control. Similarly, the specific organic uptake rate (SOUR) decreased from 0.082 to 0.039 0.036 g-TOC/g-VSS*day giving a relative co-substrate oxidation inhibition of 52.19% as compared to that of control. The SRBs spiked with 500 µg/mL CS@LS showed a reduction in cell viability to 1.5 × 106 MPN/mL. To assess the biosafety of the nanocomposite on the marine biota, the 72-hours acute toxicity assays using the zebrafish embryo model revealed that the LC50 for the CS@LS was 103.3 µg/mL. Thus, CS@LS can be classified as environmentally friendly. The nanocomposite showed long-term stability and excellent antibacterial properties against SRBs growth and is thus potentially useful for combating the problems of biofilm growth in harsh marine and aquatic environments.

Keywords: green biocides, chitosan/lignosulfonate nanocomposite, SRBs, toxicity

Procedia PDF Downloads 87
231 ‘A Ghost of One’s Own’: Spectral Intrusions and Trauma in the Poetry of Joanna Baillie and Anne Bannerman

Authors: Elli Karampela

Abstract:

In Specters of Marx (1993), Jacques Derrida refers to the ghost as an Other presence that occupies the space of the self and emanates from there, haunting in its shadowy pastness and threatening/striving to break free. In times of change, ghosts both reflect the dissolution of set principles and voice traumas of the past that create a sense of fear and instability. This paper observes the way female ghosts create connections with the living in the poetry of Joanna Baillie and Anne Bannerman, both integral, albeit under-researched in different ways, writers of the English Romantic period working in the aftermath of the French Revolution. Especially at the beginning of the nineteenth century, when ghost narratives were devoured by readers and enjoyed as stories that re-awakened sensation in times of revolution, there was at the same time fear of intrusion by terror’s unruly forces that threatened to turn the readers restless. The ghost was particularly dangerous because it was associated with memory and the intrusion of past trauma in the here and now. As will be seen, both Baillie and Bannerman explore the idea of the female ghost’s ‘return’ (a Freudian term that will be approached) which breaks both time and space boundaries to raise the suppressed female voice, threaten stability, and correct wrongs. As a result, the varied manifestations of female ghosts render Baillie and Bannerman active in the contemporary discourse about human rights and the reclamation of the agency.

Keywords: poetry, romanticism, spectrality, trauma, women

Procedia PDF Downloads 178
230 A Key Parameter in Ocean Thermal Energy Conversion Plant Design and Operation

Authors: Yongjian Gu

Abstract:

Ocean thermal energy is one of the ocean energy sources. It is a renewable, sustainable, and green energy source. Ocean thermal energy conversion (OTEC) applies the ocean temperature gradient between the warmer surface seawater and the cooler deep seawater to run a heat engine and produce a useful power output. Unfortunately, the ocean temperature gradient is not big. Even in the tropical and equatorial regions, the surface water temperature can only reach up to 28oC and the deep water temperature can be as low as 4oC. The thermal efficiency of the OTEC plants, therefore, is low. In order to improve the plant thermal efficiency by using the limited ocean temperature gradient, some OTEC plants use the method of adding more equipment for better heat recovery, such as heat exchangers, pumps, etc. Obviously, the method will increase the plant's complexity and cost. The more important impact of the method is the additional equipment needs to consume power too, which may have an adverse effect on the plant net power output, in turn, the plant thermal efficiency. In the paper, the author first describes varied OTEC plants and the practice of using the method of adding more equipment for improving the plant's thermal efficiency. Then the author proposes a parameter, plant back works ratio ϕ, for measuring if the added equipment is appropriate for the plant thermal efficiency improvement. Finally, in the paper, the author presents examples to illustrate the application of the back work ratio ϕ as a key parameter in the OTEC plant design and operation.

Keywords: ocean thermal energy, ocean thermal energy conversion (OTEC), OTEC plant, plant back work ratio ϕ

Procedia PDF Downloads 165
229 ANOVA-Based Feature Selection and Machine Learning System for IoT Anomaly Detection

Authors: Muhammad Ali

Abstract:

Cyber-attacks and anomaly detection on the Internet of Things (IoT) infrastructure is emerging concern in the domain of data-driven intrusion. Rapidly increasing IoT risk is now making headlines around the world. denial of service, malicious control, data type probing, malicious operation, DDos, scan, spying, and wrong setup are attacks and anomalies that can affect an IoT system failure. Everyone talks about cyber security, connectivity, smart devices, and real-time data extraction. IoT devices expose a wide variety of new cyber security attack vectors in network traffic. For further than IoT development, and mainly for smart and IoT applications, there is a necessity for intelligent processing and analysis of data. So, our approach is too secure. We train several machine learning models that have been compared to accurately predicting attacks and anomalies on IoT systems, considering IoT applications, with ANOVA-based feature selection with fewer prediction models to evaluate network traffic to help prevent IoT devices. The machine learning (ML) algorithms that have been used here are KNN, SVM, NB, D.T., and R.F., with the most satisfactory test accuracy with fast detection. The evaluation of ML metrics includes precision, recall, F1 score, FPR, NPV, G.M., MCC, and AUC & ROC. The Random Forest algorithm achieved the best results with less prediction time, with an accuracy of 99.98%.

Keywords: machine learning, analysis of variance, Internet of Thing, network security, intrusion detection

Procedia PDF Downloads 93