Search results for: transience seawater intrusion
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 348

Search results for: transience seawater intrusion

168 Innovative Method for Treating Oil-Produced Water with Low Operating Cost

Authors: Maha Salman, Gada Al-Nuwaibit, Ahmed Al-Haji, Saleh Al-Haddad, Abbas Al-Mesri, Mansour Al-Rugeeb

Abstract:

The high salinity of oil-produced water and its complicated chemical composition, makes designing a suitable treatment system for oil-produced water is extremely difficult and costly. On the current study, a new innovative method was proposed to treat the complicated oil-produced water through a simple mixing with brine stream produced from waste water treatment plant. The proposal will investigate the scaling potential of oil-produce water, seawater and the selected brine water (BW) produced from Sulaibiya waste water treatment and reclamation plant (SWWTRP) before and after the mixing with oil-produced water, and will calculate the scaling potential of all expected precipitated salts using different conversion and different % of mixing to optimize the % of mixing between the oil-produced water and the selected stream. The result shows a great, feasible and economic solution to treat oil produced with a very low capital cost.

Keywords: brine water, oil-produced water, scaling potential, Sulaibiyah waste water and reclaminatin plant

Procedia PDF Downloads 412
167 A Reasoning Method of Cyber-Attack Attribution Based on Threat Intelligence

Authors: Li Qiang, Yang Ze-Ming, Liu Bao-Xu, Jiang Zheng-Wei

Abstract:

With the increasing complexity of cyberspace security, the cyber-attack attribution has become an important challenge of the security protection systems. The difficult points of cyber-attack attribution were forced on the problems of huge data handling and key data missing. According to this situation, this paper presented a reasoning method of cyber-attack attribution based on threat intelligence. The method utilizes the intrusion kill chain model and Bayesian network to build attack chain and evidence chain of cyber-attack on threat intelligence platform through data calculation, analysis and reasoning. Then, we used a number of cyber-attack events which we have observed and analyzed to test the reasoning method and demo system, the result of testing indicates that the reasoning method can provide certain help in cyber-attack attribution.

Keywords: reasoning, Bayesian networks, cyber-attack attribution, Kill Chain, threat intelligence

Procedia PDF Downloads 411
166 Effect of Evaporator Temperature on the Performance of Water Desalination/Refrigeration Adsorption System Using AQSOA-ZO2

Authors: Peter G. Youssef, Saad M. Mahmoud, Raya K. AL-Dadah

Abstract:

Many water desalination technologies have been developed but in general they are energy intensive and have high cost and adverse environmental impact. Recently, adsorption technology for water desalination has been investigated showing the potential of using low temperature waste heat (50-85oC) thus reducing energy consumption and CO2 emissions. This work mathematically compares the performance of an adsorption cycle that produces two useful effects namely, fresh water and cooling using two different adsorbents, silica-gel and an advanced zeolite material AQSOA-ZO2, produced by Mitsubishi plastics. It was found that at low chilled water temperatures, typically below 20oC, the AQSOA-Z02 is more efficient than silica-gel as the cycle can produce 5.8 m3 of fresh water per day and 50.1 Rton of cooling per tonne of AQSOA-ZO2. Above 20oC silica-gel is still better as the cycle production reaches 8.4 m3 per day and 62.4 Rton per tonne of silica-gel. These results show the potential of using the AQSOA-Z02 at low chilled water temperature for water desalination and cooling applications.

Keywords: adsorption, desalination, refrigeration, seawater

Procedia PDF Downloads 462
165 Efficacy of Sea Water with Reduced Rate Herbicide to Control Weeds in Tropical Turf

Authors: Md. Kamal Uddin, Abdul Shukor Juraimi, Md. Parvez Anwar

Abstract:

Seawater with reduced herbicide could be considered as a low cost environment friendly alternative method for weed control in turfgrass. Different concentration of sea water in combination with trifloxysulfuron-sodium and quinclorac were used to determine weed control level in turfgrass field. The weed species S. diander, C. aromaticus, and C. rotundus except E. atrovirens were fully controlled when treated with ¾ recommended trifloxysulfuron–sodium with sea water, ¾ recommended trifloxysulfuron–sodium with ¾ sea water, ½ recommended trifloxysulfuron–sodium with sea water, ¾ recommended quinclorac with sea water and ¾ recommended quinclorac with ¾ sea water. Eragrostis atrovirens showed maximum 48% injury when treated with ¾ recommended trifloxysulfuron–sodium and sea water. Among the tested turf grasses, P. vaginatum showed only 8% injury to sea water in combination with ¾ recommended quinclorac, indicating greater salt tolerance. Zoysia japonica also showed no more than 14% injury when treated with sea water in combination with ¾ recommended trifloxysulfuron–sodium or quinclorac.

Keywords: sea water, trifloxysulfuron–sodium, quinclorac, turf

Procedia PDF Downloads 347
164 Negative Environmental Impacts on Marine Seismic Survey Activities

Authors: Katherine Del Carmen Camacho Zorogastua, Victor Hugo Gallo Ramos, Jhon Walter Gomez Lora

Abstract:

Marine hydrocarbon exploration (oil and natural gas) activities are developed using 2D, 3D and 4D seismic prospecting techniques where sound waves are directed from a seismic vessel emitted every few seconds depending on the variety of air compressors, which cross the layers of rock at the bottom of the sea and are reflected to the surface of the water. Hydrophones receive and record the reflected energy signals for cross-sectional mapping of the lithological profile in order to identify possible areas where hydrocarbon deposits can be formed. However, they produce several significant negative environmental impacts on the marine ecosystem and in the social and economic sectors. Therefore, the objective of the research is to publicize the negative impacts and environmental measures that must be carried out during the development of these activities to prevent and mitigate water quality, the population involved (fishermen) and the marine biota (e.g., Cetaceans, fish) that are the most vulnerable. The research contains technical environmental aspects based on bibliographic sources of environmental studies approved by the Peruvian authority, research articles, undergraduate and postgraduate theses, books, guides, and manuals from Spain, Australia, Canada, Brazil, and Mexico. It describes the negative impacts on the environment and population (fishing sector), environmental prevention, mitigation, recovery and compensation measures that must be properly implemented and the cases of global sea species stranding, for which international experiences from Spain, Madagascar, Mexico, Ecuador, Uruguay, and Peru were referenced. Negative impacts on marine fauna, seawater quality, and the socioeconomic sector (fishermen) were identified. Omission or inadequate biological monitoring in mammals could alter their ability to communicate, feed, and displacement resulting in their stranding and death. In fish, they cause deadly damage to physical-physiological type and in their behavior. Inadequate wastewater treatment and waste management could increase the organic load and oily waste on seawater quality in violation of marine flora and fauna. The possible estrangement of marine resources (fish) affects the economic sector as they carry out their fishing activity for consumption or sale. Finally, it is concluded from the experiences gathered from Spain, Madagascar, Mexico, Ecuador, Uruguay, and Peru that there is a cause and effect relationship between the inadequate development of seismic exploration activities (cause) and marine species strandings (effect) since over the years, stranded or dead marine mammals have been detected on the shores of the sea in areas of seismic acquisition of hydrocarbons. In this regard, it is recommended to establish technical procedures, guidelines, and protocols for the monitoring of marine species in order to contribute to the conservation of hydrobiological resources.

Keywords: 3D seismic prospecting, cetaceans, significant environmental impacts, prevention, mitigation, recovery, environmental compensation

Procedia PDF Downloads 149
163 Analysis of Criteria for Determining the Location of Hilal Observation in the Tropical Regions: Study of Hilal Observation Location in Bengkulu City

Authors: Badrun Taman

Abstract:

This study aims to review the use of the Bengkulu Provincial Government Mess as the location of rukyatul hilal because its determination has not been carried out scientifically. There are three things that will be analyzed, namely geographical-astronomical conditions, the suitability of the location with ideal criteria, and the determination of the location of rukyatul hilal in accordance with regional conditions based on the results of the study. The research method used is qualitative with an astronomical geographical approach. The results showed that the factor that strengthened the disturbance from the weather aspect was the western sky horizon in the form of the Indian Ocean sea level. The potential for geographical disturbances on this horizon is high sea waves, relatively high sea breezes, and more seawater vapor due to sea surface temperatures and high air humidity. This study found new criteria for determining the location of the observation crescent. The criteria is the western horizon is not sea level (especially the Indian Ocean).

Keywords: criteria, location, Rukyatul Hilal, tropics, Indian ocean

Procedia PDF Downloads 67
162 Attack Redirection and Detection using Honeypots

Authors: Chowduru Ramachandra Sharma, Shatunjay Rawat

Abstract:

A false positive state is when the IDS/IPS identifies an activity as an attack, but the activity is acceptable behavior in the system. False positives in a Network Intrusion Detection System ( NIDS ) is an issue because they desensitize the administrator. It wastes computational power and valuable resources when rules are not tuned properly, which is the main issue with anomaly NIDS. Furthermore, most false positives reduction techniques are not performed during the real-time of attempted intrusions; instead, they have applied afterward on collected traffic data and generate alerts. Of course, false positives detection in ‘offline mode’ is tremendously valuable. Nevertheless, there is room for improvement here; automated techniques still need to reduce False Positives in real-time. This paper uses the Snort signature detection model to redirect the alerted attacks to Honeypots and verify attacks.

Keywords: honeypot, TPOT, snort, NIDS, honeybird, iptables, netfilter, redirection, attack detection, docker, snare, tanner

Procedia PDF Downloads 133
161 Semi-Supervised Outlier Detection Using a Generative and Adversary Framework

Authors: Jindong Gu, Matthias Schubert, Volker Tresp

Abstract:

In many outlier detection tasks, only training data belonging to one class, i.e., the positive class, is available. The task is then to predict a new data point as belonging either to the positive class or to the negative class, in which case the data point is considered an outlier. For this task, we propose a novel corrupted Generative Adversarial Network (CorGAN). In the adversarial process of training CorGAN, the Generator generates outlier samples for the negative class, and the Discriminator is trained to distinguish the positive training data from the generated negative data. The proposed framework is evaluated using an image dataset and a real-world network intrusion dataset. Our outlier-detection method achieves state-of-the-art performance on both tasks.

Keywords: one-class classification, outlier detection, generative adversary networks, semi-supervised learning

Procedia PDF Downloads 122
160 Using Social Network Analysis for Cyber Threat Intelligence

Authors: Vasileios Anastopoulos

Abstract:

Cyber threat intelligence assists organizations in understanding the threats they face and helps them make educated decisions on preparing their defenses. Sharing of threat intelligence and threat information is increasingly leveraged by organizations and enterprises, and various software solutions are already available, with the open-source malware information sharing platform (MISP) being a popular one. In this work, a methodology for the production of cyber threat intelligence using the threat information stored in MISP is proposed. The methodology leverages the discipline of social network analysis and the diamond model, a model used for intrusion analysis, to produce cyber threat intelligence. The workings are demonstrated with a case study on a production MISP instance of a real organization. The paper concluded with a discussion on the proposed methodology and possible directions for further research.

Keywords: cyber threat intelligence, diamond model, malware information sharing platform, social network analysis

Procedia PDF Downloads 126
159 Investigating what Effects Aviation Fluids Have on the Flatwise Compressive Strength of Nomex® Honeycomb Core Material

Authors: G. Kim, R. Sterkenburg

Abstract:

One of the disadvantages of honeycomb sandwich structure is that they are prone to fluid intrusion. The purpose of this study is to determine if the structural properties of honeycomb core are affected by contact with a fluid. The test specimens were manufactured of fiberglass prepreg for the facesheets and Nomex® honeycomb core for the core material in accordance with ASTM C-365/365M. Test specimens were soaked in several different kinds of fluids, such as aircraft fuel, turbine engine oil, hydraulic fluid, and water for a period of 60 days. A flatwise compressive test was performed, and the test results were analyzed to determine how the contact with aircraft fluids affected the compressive strength of the Nomex® honeycomb core and how the strength was recovered when the specimens were dry. In addition, the investigation of de-bonding between facesheet and core material after soaking were performed to support the study.

Keywords: sandwich structure, honeycomb, environmental degradation, debonding

Procedia PDF Downloads 136
158 Freudian Psychoanalysis Towards an Ethics of Finitude

Authors: Katya E. Manalastas

Abstract:

This thesis is a dialogue with Freud about vulnerability and any forms of transience we encounter in life. This study argues that Freud’s Ethics of Finitude, which is framed within the psychoanalytic context, is a critical theory about how human beings fail to become what they are because of their attachment to their illusions—to their visions of perfection and immortality. Freud’s Ethics of Finitude positions itself between our detachment to ideals and recognition of our own death through our loved one. His texts portray the predicament of the finite individual who suffers from feelings of guilt and anxiety because of his failure to live up to the demands of his idealistic civilized society. The civilized society has overestimated men’s susceptibility to culture. It imposes excessive sublimation, conformity to rigid moral ideals, and instinctive repression to manage human aggression. However, by doing this, civilization becomes a main source of men’s suffering. The lack of instinctive freedom will result in a community of tamed but unhappy people. Civilization has also constructed theories and measures to rule out death and pain from the realities of life. Therefore, a man lives his life repressing his instincts and ignorant of his own mortality. For Freud, war and neurosis are just few of the consequences of a civilization that imprisons the individual from cultural hypocrisy instead of giving more play to truthfulness. The occurrence of Great War destroyed our pride in the attainments of civilization and let loose the hostile impulses within us which we thought had been totally eradicated by means of instinctive repression and sublimation. War destroyed most of the things that we had loved and showed us the impermanence of all the things that we had deemed perfect and everlasting. This chaotic event also revealed the damaging impact of our attachment to past values that no longer bind us; our futile attempts to escape suffering; and our refusal to confront the painfulness of loss and mourning. With this given backdrop, this study launches Freud’s Ethics of Finitude—which culminates not in the submission of an individual to the unquestioned authority nor in the blind optimism and love for illusory happiness but in the pedagogy of mourning which brings forth the authentic education of man towards the truth about himself. His Ethics of Finitude is a form of labor in and through which the individual steps out of the realm of illusions and ideals that hinder him to confront his imperfections and accept the difficulties of existence. Through his analysis of the Great War, Freud seeks to awaken in us our ability to evaluate the way we see ourselves and to live our lives with death in mind. His Ethics of Finitude leads us to the fulfillment of our first duty as a living being, which is to endure life. We can only endure life if we are prepared to die and let go.

Keywords: critical theory, ethics of finitude, psychoanalysis, Sigmund Freud

Procedia PDF Downloads 47
157 Association of Photosynthetic Pigment with Oceanic Physical Parameters in the North-eastern Bay of Bengal

Authors: Saif Khan Sunny, Md. Masud-ul-alam

Abstract:

This study presents the association of photosynthetic pigment: chlorophyll-a (chl-a) and physical parameters: sea surface temperature (SST), dissolved oxygen (DO), sea surface salinity (SSS), and total dissolved solids (TDS) in the northeastern Bay of Bengal. At 15 sampling stations in the bay near the eastern coast of Teknaf, photosynthetic pigment and environmental variables were measured for surface water where acetone extraction was used for ch-a. Samples of seawater were taken in March 2021, where chlorophyll-a content varies from 0.554 to 9.696 mg/m3 in surface water over the sampling site. Higher concentrations may be attributable to the nutrient supply of hatcheries and the delivery of fluvial input. The observed SST, DO, SSS, and TDS in the north-eastern Bay of Bengal are 26.65 to 28.6 °C, 6.26 to 8.03 mg/l, 29.3 to 33.1 PSU, and 22.4 to 25.3 ppm, respectively. Temperature and chl-a had a positive association (0.18), according to an analysis of the cross-correlation matrix. Again, a negative correlation (0.34) between dissolved oxygen and temperature is significant at p < 0.05. Total dissolved solids and dissolved oxygen have a significant negative correlation (0.70) where p is < 0.001.

Keywords: photosynthetic pigment, nutrient supply, chlorophyll, physical parameters

Procedia PDF Downloads 51
156 Performance of CO₂/N₂ Foam in Enhanced Oil Recovery

Authors: Mohamed Hassan, Rahul Gajbhiye

Abstract:

The high mobility and gravity override of CO₂ gas can be minimized by generating the CO₂ foam with the aid of surfactant. However, CO₂ is unable to generate the foam/stable foam above its supercritical point (1100 psi, 31°C). These difficulties with CO₂ foam is overcome by adding N₂ in small fraction to enhance the foam generation of CO₂ at supercritical conditions. This study shows how the addition of small quantity of N₂ helps in generating the CO₂ foam and performance of the CO₂/N₂ mixture foam in enhanced oil recovery. To investigate the performance of CO₂/N₂ foam, core-flooding experiments were conducted at elevated pressure and temperature condition (higher than supercritical CO₂ - 50°C and 1500 psi) in sandstone cores. Fluorosurfactant (FS-51) was used as a foaming agent, and n-decane was used as model oil in all the experiments. The selection of foam quality and N₂ fraction was optimized based on foam generation and stability tests. Every gas or foam flooding was preceded by seawater injection to simulate the behavior in the reservoir. The results from the core-flood experiments showed that the CO₂ and CO₂/N₂ foam flooding recovered an additional 34-40% of Original Initial Oil in Place (OIIP) indicating that foam flooding succeeded in producing more oil than pure CO₂ gas injection processes. Additionally, the performance CO₂/N₂ foam injection was better than CO₂ foam injection.

Keywords: CO₂/N₂ foam, enhanced oil recovery (EOR), supercritical CO₂, sweep efficiency

Procedia PDF Downloads 254
155 Proposing a Boundary Coverage Algorithm ‎for Underwater Sensor Network

Authors: Seyed Mohsen Jameii

Abstract:

Wireless underwater sensor networks are a type of sensor networks that are located in underwater environments and linked together by acoustic waves. The application of these kinds of network includes monitoring of pollutants (chemical, biological, and nuclear), oil fields detection, prediction of the likelihood of a tsunami in coastal areas, the use of wireless sensor nodes to monitor the passing submarines, and determination of appropriate locations for anchoring ships. This paper proposes a boundary coverage algorithm for intrusion detection in underwater sensor networks. In the first phase of the proposed algorithm, optimal deployment of nodes is done in the water. In the second phase, after the employment of nodes at the proper depth, clustering is executed to reduce the exchanges of messages between the sensors. In the third phase, the algorithm of "divide and conquer" is used to save energy and increase network efficiency. The simulation results demonstrate the efficiency of the proposed algorithm.

Keywords: boundary coverage, clustering, divide and ‎conquer, underwater sensor nodes

Procedia PDF Downloads 312
154 Managing the Water Projects and Controlling Its Boundary Disturbances Which Affect the Water Supply

Authors: Sead A. Bakheet, Salah M. Elkoum, Asharaf A. Almaghribi

Abstract:

Disturbance defined as activity that malfunction, intrusion, or interruption. We have to look around for the source of the disturbance affecting the inputs and outputs of engineering projects, take the necessary actions to control them. In this paper we will present and discuss a production system consisting of three elements, inputs, the production process and outputs. The production process which we chose is the production of large diameter pre-stressed concrete cylinder pipes (out puts), in reality, the outputs are the starting points of the operation (laying the concrete pipes for transporting drinkable water). The main objective also to address the controlling methods of the natural resources and raw materials (basic inputs), study the disturbances affecting them as well as the output quality. The importance of making the right decision, which effect the final product quality will be summarized. Finally, we will address the proposals regarding the managing of secure water supply to the customers.

Keywords: disturbances, management, inputs, outputs, decision

Procedia PDF Downloads 39
153 Velocity Logs Error Reduction for In-Service Calibration of Vessel Performance Indicators

Authors: Maria Tsompanoglou, Dimitris Armenis

Abstract:

Vessel behavior in different operational and weather conditions constitutes the main area of interest for the ship operator. Ship speed and fuel consumption are the most decisive parameters in this respect, as their correlation provides information about the economic and environmental efficiency of the vessel, becoming the basis of decision making in terms of maintenance and trading. In the analysis of vessel operational profile for the evaluation of fuel consumption and the equivalent CO2 emissions footprint, the indications of Speed Through Water are widely used. The seasonal and regional variations in seawater characteristics, which are available nowadays, can provide the basis for accurate estimation of the errors in Speed Through Water indications at any time. Accuracy in the speed value on a route basis can enable operator identify the ship fuel and propulsion efficiency and proceed with improvements. This paper discusses case studies, where the actual vessel speed was corrected by a post-processing algorithm. The effects of the vessel correction to standard Key Performance Indicators, as well as operational findings not identified earlier, are also discussed.

Keywords: data analytics, MATLAB, vessel performance monitoring, speed through water

Procedia PDF Downloads 273
152 Applications of AI, Machine Learning, and Deep Learning in Cyber Security

Authors: Hailyie Tekleselase

Abstract:

Deep learning is increasingly used as a building block of security systems. However, neural networks are hard to interpret and typically solid to the practitioner. This paper presents a detail survey of computing methods in cyber security, and analyzes the prospects of enhancing the cyber security capabilities by suggests that of accelerating the intelligence of the security systems. There are many AI-based applications used in industrial scenarios such as Internet of Things (IoT), smart grids, and edge computing. Machine learning technologies require a training process which introduces the protection problems in the training data and algorithms. We present machine learning techniques currently applied to the detection of intrusion, malware, and spam. Our conclusions are based on an extensive review of the literature as well as on experiments performed on real enterprise systems and network traffic. We conclude that problems can be solved successfully only when methods of artificial intelligence are being used besides human experts or operators.

Keywords: artificial intelligence, machine learning, deep learning, cyber security, big data

Procedia PDF Downloads 99
151 Localized Recharge Modeling of a Coastal Aquifer from a Dam Reservoir (Korba, Tunisia)

Authors: Nejmeddine Ouhichi, Fethi Lachaal, Radhouane Hamdi, Olivier Grunberger

Abstract:

Located in Cap Bon peninsula (Tunisia), the Lebna dam was built in 1987 to balance local water salt intrusion taking place in the coastal aquifer of Korba. The first intention was to reduce coastal groundwater over-pumping by supplying surface water to a large irrigation system. The unpredicted beneficial effect was recorded with the occurrence of a direct localized recharge to the coastal aquifer by leakage through the geological material of the southern bank of the lake. The hydrological balance of the reservoir dam gave an estimation of the annual leakage volume, but dynamic processes and sound quantification of recharge inputs are still required to understand the localized effect of the recharge in terms of piezometry and quality. Present work focused on simulating the recharge process to confirm the hypothesis, and established a sound quantification of the water supply to the coastal aquifer and extend it to multi-annual effects. A spatial frame of 30km² was used for modeling. Intensive outcrops and geophysical surveys based on 68 electrical resistivity soundings were used to characterize the aquifer 3D geometry and the limit of the Plio-quaternary geological material concerned by the underground flow paths. Permeabilities were determined using 17 pumping tests on wells and piezometers. Six seasonal piezometric surveys on 71 wells around southern reservoir dam banks were performed during the 2019-2021 period. Eight monitoring boreholes of high frequency (15min) piezometric data were used to examine dynamical aspects. Model boundary conditions were specified using the geophysics interpretations coupled with the piezometric maps. The dam-groundwater flow model was performed using Visual MODFLOW software. Firstly, permanent state calibration based on the first piezometric map of February 2019 was established to estimate the permanent flow related to the different reservoir levels. Secondly, piezometric data for the 2019-2021 period were used for transient state calibration and to confirm the robustness of the model. Preliminary results confirmed the temporal link between the reservoir level and the localized recharge flow with a strong threshold effect for levels below 16 m.a.s.l. The good agreement of computed flow through recharge cells on the southern banks and hydrological budget of the reservoir open the path to future simulation scenarios of the dilution plume imposed by the localized recharge. The dam reservoir-groundwater flow-model simulation results approve a potential for storage of up to 17mm/year in existing wells, under gravity-feed conditions during level increases on the reservoir into the three years of operation. The Lebna dam groundwater flow model characterized a spatiotemporal relation between groundwater and surface water.

Keywords: leakage, MODFLOW, saltwater intrusion, surface water-groundwater interaction

Procedia PDF Downloads 111
150 Experimental Investigation of Air Gap Membrane Distillation System with Heat Recovery

Authors: Yasser Elhenaw, A. Farag, Mohamed El-Ghandour, M. Shatat, G. H. Moustafa

Abstract:

This study investigates the performance of two spiral-wound Air Gap Membrane Distillation (AGMD) units. These units are connected in two different configurations in order to be tested and compared experimentally. In AGMD, the coolant water is used to condensate water vapor leaving membrane via condensing plate. The rejected cooling water has a relativity high temperature which can be used, depending on operation parameters, to increase the thermal efficiency and water productivity. In the first configuration, the seawater feed flows parallel and equally through both units then rejected. The coolant water is divided into the two units, and the heat source is divided into the two heat exchangers. In the second one, only the feed of the first unit is heated while the cooling rejected from the unit is used in heating the feed to the second. The performance of the system, estimated by the water productivity as well as the Gain Output Ratio (GOR), is measured for the two configurations at different feed flow rates, temperatures and salinities. The results show that at steady state condition, the heat recovery configurations lead to an increase in water productivity by 25%.

Keywords: membrane distillation, heat transfer, heat recovery, desalination

Procedia PDF Downloads 232
149 Seismic Vulnerability Assessment of High-Rise Structures in Addis Ababa, Ethiopia: Implications for Urban Resilience Along the East African Rift Margin

Authors: Birhanu Abera Kibret

Abstract:

The abstract highlights findings from a seismicity study conducted in the Ethiopian Rift Valley and adjacent cities, including Semera, Adama, and Hawasa, located in Afar and the Main Ethiopian Rift system. The region experiences high seismicity, characterized by small to moderate earthquakes situated in the mid-to-upper crust. Additionally, the capital city of Ethiopia, Addis Ababa, situated in the rift margin, experiences seismic activity, with small to relatively moderate earthquakes observed to the east and southeast of the city, alongside the rift valley. These findings underscore the seismic vulnerability of the region, emphasizing the need for comprehensive seismic risk assessment and mitigation strategies to enhance resilience and preparedness.

Keywords: seismic hazard, seismicity, crustal structure, magmatic intrusion, partial meltung

Procedia PDF Downloads 27
148 A Physical Treatment Method as a Prevention Method for Barium Sulfate Scaling

Authors: M. A. Salman, G. Al-Nuwaibit, M. Safar, M. Rughaibi, A. Al-Mesri

Abstract:

Barium sulfate (BaSO₄) is a hard scaling usually precipitates on the surface of equipment in many industrial systems, as oil and gas production, desalination and cooling and boiler operation. It is a scale that extremely resistance to both chemical and mechanical cleaning. So, BaSO₄ is a problematic and expensive scaling. Although barium ions are present in most natural waters at a very low concentration as low as 0.008 mg/l, it could result of scaling problems in the presence of high concentration of sulfate ion or when mixing with incompatible waters as in oil produced water. The scaling potential of BaSO₄ using seawater at the intake of seven desalination plants in Kuwait, brine water and Kuwait oil produced water was calculated and compared then the best location in regards of barium sulfate scaling was reported. Finally, a physical treatment method (magnetic treatment method) and chemical treatment method were used to control BaSO₄ scaling using saturated solutions at different operating temperatures, flow velocities, feed pHs and different magnetic strengths. The results of the two methods were discussed, and the more economical one with the reasonable performance was recommended, which is the physical treatment method.

Keywords: magnetic field strength, flow velocity, retention time, barium sulfate

Procedia PDF Downloads 237
147 Comparison of Physico-Mechanical Properties of Superplasticizer Stabilized Graphene Oxide and Carbon Nanotubes Reinforced Cement Nanocomposites

Authors: Ramanjit Kaur, N. C. Kothiyal

Abstract:

The present study compares the improved mechanical strength of cement mortar nanocomposites (CNCs) using polycarboxylate superplasticizer (PCE-SP) stabilized graphene oxide or functionalized carbon nanotubes (SP-GO and SP-FCNT) as reinforcing agents. So, in the present study, GO, and FCNT have been sterically stabilized via superplasticizer. The obtained results have shown that a dosage of 0.02 wt% of SP-GO and 0.08 wt% of SP-FCNTs showed an improvement in compressive strength by 23.2% and 16.5%, respectively. On the other hand, incorporation of 0.04% SP-GO and SP-FCNT resulted in an enhanced split tensile strength of 38.5% and 35.8%, respectively, as compared to the control sample at 90 days of curing. Mercury Intrusion Porosimetry (MIP) observations presented a decline in the porosity of 0.02% SP-GO-CNCs and 0.08% SP-FCNT-CNCs by 25% and 31% in comparison to the control sample. The improved hydration of CNCs contributing to the enhancement of physicomechanical strength has also been shown by SEM and XRD studies.

Keywords: graphene oxide, functionalized CNTs, steric stabilization, microstructure, crystalline behavior, pore structure refinement

Procedia PDF Downloads 75
146 The Journey of a Malicious HTTP Request

Authors: M. Mansouri, P. Jaklitsch, E. Teiniker

Abstract:

SQL injection on web applications is a very popular kind of attack. There are mechanisms such as intrusion detection systems in order to detect this attack. These strategies often rely on techniques implemented at high layers of the application but do not consider the low level of system calls. The problem of only considering the high level perspective is that an attacker can circumvent the detection tools using certain techniques such as URL encoding. One technique currently used for detecting low-level attacks on privileged processes is the tracing of system calls. System calls act as a single gate to the Operating System (OS) kernel; they allow catching the critical data at an appropriate level of detail. Our basic assumption is that any type of application, be it a system service, utility program or Web application, “speaks” the language of system calls when having a conversation with the OS kernel. At this level we can see the actual attack while it is happening. We conduct an experiment in order to demonstrate the suitability of system call analysis for detecting SQL injection. We are able to detect the attack. Therefore we conclude that system calls are not only powerful in detecting low-level attacks but that they also enable us to detect high-level attacks such as SQL injection.

Keywords: Linux system calls, web attack detection, interception, SQL

Procedia PDF Downloads 324
145 Reliability Verification of the Performance Evaluation of Multiphase Pump

Authors: Joon-Hyung Kim, Him-Chan Lee, Jin-Hyuk Kim, Yong-Kab Lee, Young-Seok Choi

Abstract:

The crude oil in an oil well exists in various phases such as gas, seawater, and sand, as well as oil. Therefore, a phase separator is needed at the front of a single-phase pump for pressurization and transfer. On the other hand, the application of a multiphase pump can provide such advantages as simplification of the equipment structure and cost savings, because there is no need for a phase separation process. Therefore, the crude oil transfer method using a multiphase pump is being applied to recently developed oil wells. Due to this increase in demand, technical demands for the development of multiphase pumps are sharply increasing, but the progress of research into related technologies is insufficient, due to the nature of multiphase pumps that require high levels of skills. This study was conducted to verify the reliability of pump performance evaluation using numerical analysis, which is the basis of the development of a multiphase pump. For this study, a model was designed by selecting the specifications of the pump under study. The performance of the designed model was evaluated through numerical analysis and experiment, and the results of the performance evaluation were compared to verify the reliability of the result using numerical analysis.

Keywords: multiphase pump, numerical analysis, experiment, performance evaluation, reliability verification

Procedia PDF Downloads 399
144 Iron Removal from Aqueous Solutions by Fabricated Calcite Ooids

Authors: Al-Sayed A. Bakr, W. A. Makled

Abstract:

The precipitated low magnesium calcite ooids in assembled softening unit from natural Mediterranean seawater samples were used as adsorbent media in a comparative study with granular activated carbon media in a two separated single-media filtration vessels (operating in parallel) for removal of iron from aqueous solutions. In each vessel, the maximum bed capacity, which required to be filled, was 13.2 l and the bed filled in the vessels of ooids and GAC were 8.6, and 6.6 l, respectively. The operating conditions applied to the semi-pilot filtration unit were constant pH (7.5), different temperatures (293, 303 and 313 k), different flow rates (20, 30, 40, 50 and 60 l/min), different initial Fe(II) concentrations (15–105 mg/ l) and the calculated adsorbent masses were 34.1 and 123 g/l for GAC and calcite ooids, respectively. At higher temperature (313 k) and higher flow rate (60 l/min), the maximum adsorption capacities for ferrous ions by GAC and calcite ooids filters were 3.87 and 1.29 mg/g and at lower flow rate (20 l/min), the maximum adsorption capacities were 2.21 and 3.95 mg/g, respectively. From the experimental data, Freundlich and Langmuir adsorption isotherms were used to verify the adsorption performance. Therefore, the calcite ooids could act as new highly effective materials in iron removal from aqueous solutions.

Keywords: water treatment, calcite ooids, activated carbon, Fe(II) removal, filtration

Procedia PDF Downloads 122
143 Fluid Inclusions Analysis of Fluorite from the Hammam Jedidi District, North-Eastern Tunisia

Authors: Miladi Yasmine, Bouhlel Salah, Garnit Hechmi

Abstract:

Hydrothermal vein-type deposits of the Hammam Jedidi F-Ba(Pb-Zn-Cu) are hosted in Lower Jurassic, Cretaceous and Tertiary series, and located near a very important structural lineament (NE-SW) corresponding to the Hammam Jedidi Fault in the Tunisian Dorsale. The circulation of the ore forming fluid is triggered by a regional tectonic compressive phase which occurred during the miocène time. Mineralization occurs as stratabound and vein-type orebodies adjacent to the Triassic salt diapirs and within fault in Jurassic limestone. Fluid inclusions data show that two distinct fluids were involved in the mineralisation deposition: a warmer saline fluid (180°C, 20 wt % NaCl equivalent) and cooler less saline fluid (126°C, 5wt%NaCl equivalent). The contrasting salinities and halogen ratios suggest that this two fluid derived from one of the brine originated after the dissolution of halite as suggested by its high salinity. The other end member, as indicated by the low Cl/Br ratios, acquired its low salinity by dilution of Br enriched evaporated seawater. These results are compatible with Mississippi-Valley- type mineralization.

Keywords: Jebel Oust, fluid inclusions, North Eastern Tunisia, mineralization

Procedia PDF Downloads 315
142 A Software Engineering Methodology for Developing Secure Obfuscated Software

Authors: Carlos Gonzalez, Ernesto Linan

Abstract:

We propose a methodology to conciliate two apparently contradictory processes in the development of secure obfuscated software and good software engineered software. Our methodology consists first in the system designers defining the type of security level required for the software. There are four types of attackers: casual attackers, hackers, institution attack, and government attack. Depending on the level of threat, the methodology we propose uses five or six teams to accomplish this task. One Software Engineer Team and one or two software Obfuscation Teams, and Compiler Team, these four teams will develop and compile the secure obfuscated software, a Code Breakers Team will test the results of the previous teams to see if the software is not broken at the required security level, and an Intrusion Analysis Team will analyze the results of the Code Breakers Team and propose solutions to the development teams to prevent the detected intrusions. We also present an analytical model to prove that our methodology is no only easier to use, but generates an economical way of producing secure obfuscated software.

Keywords: development methodology, obfuscated software, secure software development, software engineering

Procedia PDF Downloads 224
141 Corrosion Inhibition of AA2024 Alloy with Graphene Oxide Derivative: Electrochemical and Surface Analysis

Authors: Nisrine Benzbiria, Abderrahmane Thoume, Mustapha Zertoubi

Abstract:

The goal of this research is to investigate the corrosion inhibition potential of functionalized graphene oxide (GO) with oxime derivative on AA2024-T3 surface in synthetic seawater. The utilization of functionalized graphene oxide is creating a category of corrosion inhibitors known as organically modified nanomaterials. In our work, the functionalization of GO by chalcone oxime enables graphene oxide to have enhanced water solubility and a good corrosion mitigation capacity. Fourier-transform infrared (FT-IR) spectroscopy was utilized to evaluate the main functional groups of the inhibitor. Electrochemical impedance spectroscopy (EIS) and potentiodynamic polarization curves (PDP) showed that the inhibitor acts as a mixed-type inhibitor. The inhibitory efficiency (IE) improved as the concentration increased to a value of 96% after one hour of exposure to a medium containing 60 mg/L ppm of the inhibitor. According to thermodynamic calculations, the adsorption of the inhibitor on the AA2024-T3 surface in 3% NaCl followed the Langmuir isotherm. The formation of a barrier layer was further confirmed by surface analysis. The protective film prevented the alloy dissolution and limited the accessibility of attacking ions, as evinced by solution analysis techniques.

Keywords: AA2024-T3, NaCl, electrochemical methods, FT-IR, SEM/AFM, DFT, MC simulation

Procedia PDF Downloads 27
140 Reinforcement of an Electric Vehicle Battery Pack Using Honeycomb Structures

Authors: Brandon To, Yong S. Park

Abstract:

As more battery electric vehicles are being introduced into the automobile industry, continuous advancements are constantly made in the electric vehicle space. Improvements in lithium-ion battery technology allow electric vehicles to be capable of traveling long distances. The batteries are capable of being charged faster, allowing for a sufficient range in shorter amounts of time. With increased reliance on battery technology and the changes in vehicle power trains, new challenges arise from this. Resulting electric vehicle fires caused by collisions are potentially more dangerous than those of the typical internal combustion engine. To further reduce the battery failures involved with side collisions, this project intends to reinforce an existing battery pack of an electric vehicle with honeycomb structures such that intrusion into the batteries can be minimized with weight restrictions in place. Honeycomb structures of hexagonal geometry are implemented into the side extrusions of the battery pack. With the use of explicit dynamics simulations performed in ANSYS, quantitative results such as deformation, strain, and stress are used to compare the performance of the battery pack with and without the implemented honeycomb structures.

Keywords: battery pack, electric vehicle, honeycomb, side impact

Procedia PDF Downloads 80
139 Addressing Security and Privacy Issues in a Smart Environment by Using Block-Chain as a Preemptive Technique

Authors: Shahbaz Pervez, Aljawharah Almuhana, Zahida Parveen, Samina Naz, Hira Tariq, Seyed Hosseini, Muhammad Awais Azam

Abstract:

With the latest development in the field of cutting-edge technologies, there is a rapid increase in the use of technology-oriented gadgets. In a recent scenario of the tech era, there is increasing demand to fulfill our day-to-day routine tasks with the help of technological gadgets. We are living in an era of technology where trends have been changing, and a race to introduce a new technology gadget has already begun. Smart cities are getting more popular with every passing day; city councils and governments are under enormous pressure to provide the latest services for their citizens and equip them with all the latest facilities. Thus, ultimately, they are going more into smart cities infrastructure building, providing services to their inhabitants with a single click from their smart devices. This trend is very exciting, but on the other hand, if some incident of security breach happens due to any weaker link, the results would be catastrophic. This paper addresses potential security and privacy breaches with a possible solution by using Blockchain technology in IoT enabled environment.

Keywords: blockchain, cybersecurity, DDOS, intrusion detection, IoT, RFID, smart devices security, smart services

Procedia PDF Downloads 84