Search results for: water security
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 10808

Search results for: water security

10598 Human Development as an Integral Part of Human Security within the Responsibility to Rebuild

Authors: Themistoklis Tzimas

Abstract:

The proposed paper focuses on a triangular relationship, between human security, human development and responsibility to rebuild. This relationship constitutes the innovative contribution to the debate about human security. Human security constitutes a generic and legally binding notion, which orientates from an integrated approach the UN Charter principles and of the collective security system. Such an approach brings at the forefront of international law and of international relations not only states but non- state actors as well. Several doctrines attempt to implement the fore-mentioned approach among which the Responsibility to Protect- hereinafter R2P- doctrine and its aspect of Responsibility to Rebuild- hereinafter R2R. In this sense, R2P in general and R2R are supposed to be guided by human security imperatives. Human security because of its human- centered approach encompasses as an integral part of it, human development. Human development constitutes part of the backbone of human security, since it deals with the social and economic root- causes of the threats, which human security attempts to confront. In this sense, doctrines which orientate from human security, such as R2P and its R2R aspect should also take into account human development imperatives, in order to improve their efficiency. On the contrary though, R2R is more often linked with market- orientated policies, which are often imposed under transitional authorities, regardless of local needs. The implementation of such policies can be identified as a cause for striking failures in the framework of R2R. In addition it is a misinterpretation of the essence of human security and subsequently of R2P as well. The findings of the article, on the basis of the fore-mentioned argument is that a change must take place from a market- orientated misinterpretation of R2R to an approach attempting to implement human development doctrines, since the latter lie at the heart of human security and can be proven more effective in dealing with the root- causes of conflicts. Methodologically, the article begins with an examination of human security and of its binding nature on the basis of its orientation from the UN Charter. It also examines its significance in the framework of the collective security system. Then, follows the analysis of why and how human development constitutes an integral part of human security. At the next part it is proven that R2P in general and R2R more specifically constitute or should constitute an attempt to implement human security doctrines within the collective security system. Having built this triangular relationship it is argued that human development is proven to be the most suitable notion, so that the spirit of human security and the scopes of R2P are successfully implemented.

Keywords: human security, un charter, responsibility to protect, responsibility to rebuild, human development

Procedia PDF Downloads 250
10597 Human Security and Human Trafficking Related Corruption

Authors: Ekin D. Horzum

Abstract:

The aim of the proposal is to examine the relationship between human trafficking related corruption and human security. The proposal suggests that the human trafficking related corruption is about willingness of the states to turn a blind eye to the human trafficking cases. Therefore, it is important to approach human trafficking related corruption in terms of human security and human rights violation to find an effective way to fight against human trafficking. In this context, the purpose of this proposal is to examine the human trafficking related corruption as a safe haven in which trafficking thrives for perpetrators.

Keywords: human trafficking, human security, human rights, corruption, organized crime

Procedia PDF Downloads 433
10596 Interactions between Water-Stress and VA Mycorrhizal Inoculation on Plant Growth and Leaf-Water Potential in Tomato

Authors: Parisa Alizadeh Oskuie, Shahram Baghban Ciruse

Abstract:

The influence of arbuscular mycorrhizal (AM) fungus(Glomus mossea) on plant growth and leaf-water potential of tomato (lycopersicum esculentum L.cv.super star) were studied in potted culture water stress stress period of 3 months in greenhouse conditions with the soil matric potential maintained at Fc1, Fc2, Fc3, and Fc4 respectively (0.8,0.7,0.6,0.5 Fc). Seven-day-old seedlings of tomato were transferred to pots containing Glomus mossea or non-AMF. AM colonization significantly stimulated shoot dry matter and leaf-water potential but water stress significantly decreased leaf area, shoot dry matter colonization and leaf-water potential.

Keywords: leaf-water potential, plant growth, tomato, VA mycorrhiza, water-stress

Procedia PDF Downloads 388
10595 Subsea Control Module (SCM) - A Vital Factor for Well Integrity and Production Performance in Deep Water Oil and Gas Fields

Authors: Okoro Ikechukwu Ralph, Fuat Kara

Abstract:

The discoveries of hydrocarbon reserves has clearly drifted offshore, and in deeper waters - areas where the industry still has limited knowledge; and that were hitherto, regarded as being out of reach. This shift presents significant and increased challenges in technology requirements needed to guarantee safety of personnel, environment and equipment; ensure high reliability of installed equipment; and provide high level of confidence in security of investment and company reputation. Nowhere are these challenges more apparent than on subsea well integrity and production performance. The past two decades has witnessed enormous rise in deep and ultra-deep water offshore field developments for the recovery of hydrocarbons. Subsea installed equipment at the seabed has been the technology of choice for these developments. This paper discusses the role of Subsea Control module (SCM) as a vital factor for deep-water well integrity and production performance. A case study for Deep-water well integrity and production performance is analysed.

Keywords: offshore reliability, production performance, subsea control module, well integrity

Procedia PDF Downloads 475
10594 Water Demand Modelling Using Artificial Neural Network in Ramallah

Authors: F. Massri, M. Shkarneh, B. Almassri

Abstract:

Water scarcity and increasing water demand especially for residential use are major challenges facing Palestine. The need to accurately forecast water consumption is useful for the planning and management of this natural resource. The main objective of this paper is to (i) study the major factors influencing the water consumption in Palestine, (ii) understand the general pattern of Household water consumption, (iii) assess the possible changes in household water consumption and suggest appropriate remedies and (iv) develop prediction model based on the Artificial Neural Network to the water consumption in Palestinian cities. The paper is organized in four parts. The first part includes literature review of household water consumption studies. The second part concerns data collection methodology, conceptual frame work for the household water consumption surveys, survey descriptions and data processing methods. The third part presents descriptive statistics, multiple regression and analysis of the water consumption in the two Palestinian cities. The final part develops the use of Artificial Neural Network for modeling the water consumption in Palestinian cities.

Keywords: water management, demand forecasting, consumption, ANN, Ramallah

Procedia PDF Downloads 182
10593 Optimizing the Passenger Throughput at an Airport Security Checkpoint

Authors: Kun Li, Yuzheng Liu, Xiuqi Fan

Abstract:

High-security standard and high efficiency of screening seem to be contradictory to each other in the airport security check process. Improving the efficiency as far as possible while maintaining the same security standard is significantly meaningful. This paper utilizes the knowledge of Operation Research and Stochastic Process to establish mathematical models to explore this problem. We analyze the current process of airport security check and use the M/G/1 and M/G/k models in queuing theory to describe the process. Then we find the least efficient part is the pre-check lane, the bottleneck of the queuing system. To improve passenger throughput and reduce the variance of passengers’ waiting time, we adjust our models and use Monte Carlo method, then put forward three modifications: adjust the ratio of Pre-Check lane to regular lane flexibly, determine the optimal number of security check screening lines based on cost analysis and adjust the distribution of arrival and service time based on Monte Carlo simulation results. We also analyze the impact of cultural differences as the sensitivity analysis. Finally, we give the recommendations for the current process of airport security check process.

Keywords: queue theory, security check, stochatic process, Monte Carlo simulation

Procedia PDF Downloads 158
10592 A Framework for Security Risk Level Measures Using CVSS for Vulnerability Categories

Authors: Umesh Kumar Singh, Chanchala Joshi

Abstract:

With increasing dependency on IT infrastructure, the main objective of a system administrator is to maintain a stable and secure network, with ensuring that the network is robust enough against malicious network users like attackers and intruders. Security risk management provides a way to manage the growing threats to infrastructures or system. This paper proposes a framework for risk level estimation which uses vulnerability database National Institute of Standards and Technology (NIST) National Vulnerability Database (NVD) and the Common Vulnerability Scoring System (CVSS). The proposed framework measures the frequency of vulnerability exploitation; converges this measured frequency with standard CVSS score and estimates the security risk level which helps in automated and reasonable security management. In this paper equation for the Temporal score calculation with respect to availability of remediation plan is derived and further, frequency of exploitation is calculated with determined temporal score. The frequency of exploitation along with CVSS score is used to calculate the security risk level of the system. The proposed framework uses the CVSS vectors for risk level estimation and measures the security level of specific network environment, which assists system administrator for assessment of security risks and making decision related to mitigation of security risks.

Keywords: CVSS score, risk level, security measurement, vulnerability category

Procedia PDF Downloads 293
10591 Assessing the Efficacy of Network Mapping, Vulnerability Scanning, and Penetration Testing in Enhancing Security for Academic Networks

Authors: Kenny Onayemi

Abstract:

In an era where academic institutions increasingly rely on information technology, the security of academic networks has emerged as a paramount concern. This comprehensive study delves into the effectiveness of security practices, including network mapping, vulnerability scanning, and penetration testing, within academic networks. Leveraging data from surveys administered to faculty, staff, IT professionals and IT students in the university, the study assesses their familiarity with these practices, perceived effectiveness, and frequency of implementation. The findings reveal that a significant portion of respondents exhibit a strong understanding of network mapping, vulnerability scanning, and penetration testing, highlighting the presence of knowledgeable professionals within academic institutions. Additionally, active scanning using network scanning tools and automated vulnerability scanning tools emerge as highly effective methods. However, concerns arise as the respondents show that the academic institutions conduct these practices rarely or never. Notably, many respondents have reported significant vulnerabilities or security incidents through these security measures within their institution. This study concludes with recommendations to enhance network security awareness and practices among faculty, staff, IT personnel, and students, ultimately fortifying the security posture of academic networks in the digital age.

Keywords: network security, academic networks, vulnerability scanning, penetration testing, information security

Procedia PDF Downloads 16
10590 Extending the AOP Joinpoint Model for Memory and Type Safety

Authors: Amjad Nusayr

Abstract:

Software security is a general term used to any type of software architecture or model in which security aspects are incorporated in this architecture. These aspects are not part of the main logic of the underlying program. Software security can be achieved using a combination of approaches, including but not limited to secure software designs, third part component validation, and secure coding practices. Memory safety is one feature in software security where we ensure that any object in memory has a valid pointer or a reference with a valid type. Aspect-Oriented Programming (AOP) is a paradigm that is concerned with capturing the cross-cutting concerns in code development. AOP is generally used for common cross-cutting concerns like logging and DB transaction managing. In this paper, we introduce the concepts that enable AOP to be used for the purpose of memory and type safety. We also present ideas for extending AOP in software security practices.

Keywords: aspect oriented programming, programming languages, software security, memory and type safety

Procedia PDF Downloads 94
10589 Surface Water Quality in Orchard Area, Amphawa District, Samut Songkram Province, Thailand

Authors: Sisuwan Kaseamsawat, Sivapan Choo-In

Abstract:

This study aimed to evaluated the surface water quality for agriculture and consumption in the district. Surface water quality parameters in this study in cluding water temperature, turbidity, conductivity. salinity, pH, dissolved oxygen, BOD, nitrate, Suspended solids, phosphorus. Total dissolve solids, iron, copper, zinc, manganese, lead and cadmium. Water samples were collected from small excavation, Lychee, Pomelo, and Coconut orchard for 3 season during January to December 2011. The surface water quality from small excavation, Lychee, pomelo, and coconut orchard are meet the type III of surface water quality standard issued by the National Environmental Quality Act B. E. 1992. except the concentration of heavy metal. And did not differ significantly at 0.05 level, except dissolved oxygen. The water is suitable for consumption by the usual sterile and generally improving water quality through the process before. And is suitable for agriculture.

Keywords: water quality, surface water quality, Thailand, water

Procedia PDF Downloads 321
10588 Data Security: An Enhancement of E-mail Security Algorithm to Secure Data Across State Owned Agencies

Authors: Lindelwa Mngomezulu, Tonderai Muchenje

Abstract:

Over the decades, E-mails provide easy, fast and timely communication enabling businesses and state owned agencies to communicate with their stakeholders and with their own employees in real-time. Moreover, since the launch of Microsoft office 365 and many other clouds based E-mail services, many businesses have been migrating from the on premises E-mail services to the cloud and more precisely since the beginning of the Covid-19 pandemic, there has been a significant increase of E-mails utilization, which then leads to the increase of cyber-attacks. In that regard, E-mail security has become very important in the E-mail transportation to ensure that the E-mail gets to the recipient without the data integrity being compromised. The classification of the features to enhance E-mail security for further from the enhanced cyber-attacks as we are aware that since the technology is advancing so at the cyber-attacks. Therefore, in order to maximize the data integrity we need to also maximize security of the E-mails such as enhanced E-mail authentication. The successful enhancement of E-mail security in the future may lessen the frequency of information thefts via E-mails, resulting in the data of South African State-owned agencies not being compromised.

Keywords: e-mail security, cyber-attacks, data integrity, authentication

Procedia PDF Downloads 96
10587 Design and Implementation of Security Middleware for Data Warehouse Signature, Framework

Authors: Mayada Al Meghari

Abstract:

Recently, grid middlewares have provided large integrated use of network resources as the shared data and the CPU to become a virtual supercomputer. In this work, we present the design and implementation of the middleware for Data Warehouse Signature, DWS Framework. The aim of using the middleware in our DWS framework is to achieve the high performance by the parallel computing. This middleware is developed on Alchemi.Net framework to increase the security among the network nodes through the authentication and group-key distribution model. This model achieves the key security and prevents any intermediate attacks in the middleware. This paper presents the flow process structures of the middleware design. In addition, the paper ensures the implementation of security for DWS middleware enhancement with the authentication and group-key distribution model. Finally, from the analysis of other middleware approaches, the developed middleware of DWS framework is the optimal solution of a complete covering of security issues.

Keywords: middleware, parallel computing, data warehouse, security, group-key, high performance

Procedia PDF Downloads 84
10586 Managing Education through, Effective School Community Relationships/Participation for National Security

Authors: Shehu S. Janguza

Abstract:

The need for national security cannot be over Emphasis, which should be pursued by any means. Thus the need for effective management of education through effective school community Relationship/participation. In preparing and implementing only effort to promote community involvement in manning Education, it is importance to understand the whole picture of community participation, how it works, what forms are used, what benefit it can yield and what we should expect in the process of carrying out the efforts finally emphasis will be made on how effective school community relationship/participation and lead to national security.

Keywords: community participation, managing, school community, national security

Procedia PDF Downloads 568
10585 Security Issues and Primary School Participation in Kenya

Authors: Rose Mwanza

Abstract:

This paper investigates security factors influencing primary school pupils’ school participation in Kenya. Schools, communities and the Government all have roles to play in enhancing primary school pupil’s school participation. The effective security system of a country provides the necessary avenues to facilitate improved health services protection of children and allows free movement of the country’s citizens which leads to a conducive atmosphere for school participation. Kenya is a signatory to international commitments and conventions related to security such as the National Policy on Peace Building and Conflict Management, United Nations Development Assistance Framework and Key Security Unity, which enable primary school pupils to participate in education. The paper also looks at the strategies the Government of Kenya has put in place to ensure effective pupil school participation.

Keywords: ethnicity, social media, participation in school, poverty, terrorism

Procedia PDF Downloads 26
10584 Survey on Data Security Issues Through Cloud Computing Amongst Sme’s in Nairobi County, Kenya

Authors: Masese Chuma Benard, Martin Onsiro Ronald

Abstract:

Businesses have been using cloud computing more frequently recently because they wish to take advantage of its advantages. However, employing cloud computing also introduces new security concerns, particularly with regard to data security, potential risks and weaknesses that could be exploited by attackers, and various tactics and strategies that could be used to lessen these risks. This study examines data security issues on cloud computing amongst sme’s in Nairobi county, Kenya. The study used the sample size of 48, the research approach was mixed methods, The findings show that data owner has no control over the cloud merchant's data management procedures, there is no way to ensure that data is handled legally. This implies that you will lose control over the data stored in the cloud. Data and information stored in the cloud may face a range of availability issues due to internet outages; this can represent a significant risk to data kept in shared clouds. Integrity, availability, and secrecy are all mentioned.

Keywords: data security, cloud computing, information, information security, small and medium-sized firms (SMEs)

Procedia PDF Downloads 52
10583 Maintaining User-Level Security in Short Message Service

Authors: T. Arudchelvam, W. W. E. N. Fernando

Abstract:

Mobile phone has become as an essential thing in our life. Therefore, security is the most important thing to be considered in mobile communication. Short message service is the cheapest way of communication via the mobile phones. Therefore, security is very important in the short message service as well. This paper presents a method to maintain the security at user level. Different types of encryption methods are used to implement the user level security in mobile phones. Caesar cipher, Rail Fence, Vigenere cipher and RSA are used as encryption methods in this work. Caesar cipher and the Rail Fence methods are enhanced and implemented. The beauty in this work is that the user can select the encryption method and the key. Therefore, by changing the encryption method and the key time to time, the user can ensure the security of messages. By this work, while users can safely send/receive messages, they can save their information from unauthorised and unwanted people in their own mobile phone as well.

Keywords: SMS, user level security, encryption, decryption, short message service, mobile communication

Procedia PDF Downloads 365
10582 Effect of Demineralized Water Purity on the Corrosion Behavior of Steel Alloys

Authors: A. M. El-Aziz, M. Elsehamy, H. Hussein

Abstract:

Steel or stainless steel have reasonable corrosion behavior in water, their corrosion resistance is significantly dependent on the water purity. It was not expected that demineralized water has an aggressive effect on steel alloys, in this study, the effect of water with different purity on steel X52 and stainless steel 316L was investigated. Weight loss and electrochemical measurements were employed to measure the corrosion behavior. Samples were microscopically investigated after test. It was observed that the higher the water purity the more reactive it is. Comparative analysis of the potentiodynamic curves for different water purity showed the aggressiveness of the demineralised water (conductivity of 0.05 microSiemens per cm) over the distilled water. Whereas, the corrosion rates of stainless steel 858 and 623 nm/y for demi and distilled water respectively. On the other hand, the corrosion rates of carbon steel x52 were estimated about 4.8 and 3.6 µm/y for demi and distilled water, respectively. Open circuit potential (OCP) recorded more positive potentials in case of stainless steel than carbon steel in different water purities. Generally, stainless steel illustrated high pitting resistance than carbon steel alloy, the surface film was investigated by scanning electron microscopy (SEM) and analyzed by energy dispersive X-ray spectroscopy (EDX). This behavior was explained based on that demi and distilled water might be considered as ‘hungry water’ in which it wants to be in equilibrium and will pull ions out of the surrounding metals trying to satisfy its ‘hunger’.

Keywords: corrosion, demineralized water, distilled water, steel alloys

Procedia PDF Downloads 736
10581 Assessment of the Water Quality of the Nhue River in Vietnam and its Suitability for Irrigation Water

Authors: Thi Lan Huong Nguyen, Motohei Kanayama, Takahiro Higashi, Van Chinh Le, Thu Ha Doan, Anh Dao Chu

Abstract:

The Nhue River in Vietnam is the main source of irrigation water for suburban agricultural land and fish farm. Wastewater from the industrial plants located along these rivers has been discharged, which has degraded the water quality of the rivers. The present paper describes the chemical properties of water from the river focusing on heavy metal pollution and the suitability of water quality for irrigation. Water from the river was heavily polluted with heavy metals such as Pb, Cu, Zn, Cr, Cd, and Ni. Dissolved oxygen, COD, and total suspended solids, and the concentrations of all heavy metals exceeded the Vietnamese standard for surface water quality in all investigated sites. The concentrations of some heavy metals such as Cu, Cd, Cr and Ni were over the internationally recommended WHO maximum limits for irrigation water. A wide variation in heavy metal concentration of water due to metal types is the result of wastewater discharged from different industrial sources.

Keywords: heavy metals, stream water, irrigation, industry

Procedia PDF Downloads 365
10580 Applications of AI, Machine Learning, and Deep Learning in Cyber Security

Authors: Hailyie Tekleselase

Abstract:

Deep learning is increasingly used as a building block of security systems. However, neural networks are hard to interpret and typically solid to the practitioner. This paper presents a detail survey of computing methods in cyber security, and analyzes the prospects of enhancing the cyber security capabilities by suggests that of accelerating the intelligence of the security systems. There are many AI-based applications used in industrial scenarios such as Internet of Things (IoT), smart grids, and edge computing. Machine learning technologies require a training process which introduces the protection problems in the training data and algorithms. We present machine learning techniques currently applied to the detection of intrusion, malware, and spam. Our conclusions are based on an extensive review of the literature as well as on experiments performed on real enterprise systems and network traffic. We conclude that problems can be solved successfully only when methods of artificial intelligence are being used besides human experts or operators.

Keywords: artificial intelligence, machine learning, deep learning, cyber security, big data

Procedia PDF Downloads 94
10579 Examining the Presence of Heterotrophic Aerobic Bacteria (HAB), and Sulphate Reducing Bacteria (SRB) in Some Types of Water from the City of Tripoli, Libya

Authors: Abdulsalam. I. Rafida, Marwa. F. Elalem, Hasna. E. Alemam

Abstract:

This study aimed at testing the various types of water in some areas of the city of Tripoli, Libya for the presence of Heterotrophic Aerobic Bacteria (HAB), and anaerobic Sulphate Reducing Bacteria (SRB). The water samples under investigation included rainwater accumulating on the ground, sewage water (from the city sewage treatment station, sulphate water from natural therapy swimming sites), and sea water (i.e. sea water exposed to pollution by untreated sewage water, and unpolluted sea water from specific locations). A total of 20 samples have been collected distributed as follows: rain water (8 samples), sewage water (6 samples), and sea water (6 samples). An up-to-date method for estimation has been used featuring readymade solutions i.e. (BARTTM test for HAB and BARTTM test for SRB). However, with the exception of one rain water sample, the results have indicated that the target bacteria have been present in all samples. Regarding HAB bacteria the samples have shown a maximum average of 7.0 x 106 cfu/ml featuring sewage and rain water and a minimum average of 1.8 x 104 cuf/ml featuring unpolluted sea water collected from a specific location. As for SRB bacteria; a maximum average of 7.0 x 105 cfu/ml has been shown by sewage and rain water and a minimum average of 1.8 x 104 cfu/ml by sewage and sea water. The above results highlight the relationship between pollution and the presence of bacteria in water particularly water collected from specific locations, and also the presence of bacteria as the result of the use of water provided that a suitable environment exists for its growth.

Keywords: heterotrophic aerobic bacteria (HAB), sulphate reducing bacteria (SRB), water, environmental sciences

Procedia PDF Downloads 448
10578 A CM-Based Model for 802.11 Networks Security Policies Enforcement

Authors: Karl Mabiala Dondia, Jing Ma

Abstract:

In recent years, networks based on the 802.11 standards have gained a prolific deployment. The reason for this massive acceptance of the technology by both home users and corporations is assuredly due to the "plug-and-play" nature of the technology and the mobility. The lack of physical containment due to inherent nature of the wireless medium makes maintenance very challenging from a security standpoint. This study examines via continuous monitoring various predictable threats that 802.11 networks can face, how they are executed, where each attack may be executed and how to effectively defend against them. The key goal is to identify the key components of an effective wireless security policy.

Keywords: wireless LAN, IEEE 802.11 standards, continuous monitoring, security policy

Procedia PDF Downloads 343
10577 Water Saving and Awareness Actions

Authors: R. Morbidelli, C. Saltalippi, A. Flammini, J. Dari

Abstract:

This work analyses what effect systematic awareness-raising of the population on domestic water consumption produces. In a period where the availability of water is continually decreasing due to reduced rainfall, it is of paramount importance to raise awareness among the population. We conducted an experiment on a large sample of homes in urban areas of Central Italy. In a first phase, lasting three weeks, normal per capita water consumption was quantified. Subsequently, instructions were given on how to save water during various uses in the household (showers, cleaning hands, use of water in toilets, watering small green areas, use of water in the kitchen, ...), and small visual messages were posted at water dispensers to remind users to behave properly. Finally, household consumption was assessed again for a further 3 weeks. This experiment made it possible to quantify the effect of the awareness-raising action on the reduction of water consumption without the use of any structural action (replacement of dispensers, improvement of the water system, ...).

Keywords: water saving, urban areas, awareness-raising, climate change

Procedia PDF Downloads 2
10576 Global Peace and Security: The Role of International Peace and Security Organizations and the Need for Institutional and Operational Reforms

Authors: Saint C. Nguedjip

Abstract:

This paper is an analytical review a set of 20 literatures as required by the assignment prompt. The review centers on global peace and security. What role do international organizations play in global peace and security? The review centers around three main points. First, I examine global peace and security impacts on global governance. Secondly, it highlights the role traditional international community and security organizations such as the United Nations (UN), the North Atlantic Treaty Organization (NATO), and others play in providing the globe with peace and collective security. Third, it suggests a way forward as those institutions seek betterment and improvement. The review begins by defining some concepts and addressing the ambivalent meaning of peace and war. Scholars and researchers have conducted extensive research on the importance of international organizations. Yet, there is still a lot to consider if betterment and improvement are on the agenda. The review will shed light on the failures and challenges that these organizations. Those challenges are continuously undermining peacebuilding and peacekeeping actions of a great number among those institutions created with an ultimate mission of keeping the world order organized and coordinated for peace and security regardless of differences, cultures, and backgrounds. Women face violence on a daily basis, while racism and discrimination cause klm; ]]];inflammations worldwide. The chaotic situation in Ukraine is a wake-up call on scholarship and practitioners alike to come up with suggestions as well as recommendations that help mitigate insecurity while promoting peace and security, not only for Ukrainians but also for all countries facing wars and others issues. This paper will point the audience toward the right direction.

Keywords: security, peace, global governance, global peace and security, peacekeeping, international organizations, human rights, multilateralism, and unilateralism, gender, women

Procedia PDF Downloads 71
10575 Proactive WPA/WPA2 Security Using DD-WRT Firmware

Authors: Mustafa Kamoona, Mohamed El-Sharkawy

Abstract:

Although the latest Wireless Local Area Network technology Wi-Fi 802.11i standard addresses many of the security weaknesses of the antecedent Wired Equivalent Privacy (WEP) protocol, there are still scenarios where the network security are still vulnerable. The first security model that 802.11i offers is the Personal model which is very cheap and simple to install and maintain, yet it uses a Pre Shared Key (PSK) and thus has a low to medium security level. The second model that 802.11i provide is the Enterprise model which is highly secured but much more expensive and difficult to install/maintain and requires the installation and maintenance of an authentication server that will handle the authentication and key management for the wireless network. A central issue with the personal model is that the PSK needs to be shared with all the devices that are connected to the specific Wi-Fi network. This pre-shared key, unless changed regularly, can be cracked using offline dictionary attacks within a matter of hours. The key is burdensome to change in all the connected devices manually unless there is some kind of algorithm that coordinate this PSK update. The key idea of this paper is to propose a new algorithm that proactively and effectively coordinates the pre-shared key generation, management, and distribution in the cheap WPA/WPA2 personal security model using only a DD-WRT router.

Keywords: Wi-Fi, WPS, TLS, DD-WRT

Procedia PDF Downloads 200
10574 The Effect of Shading on Cooling Tower Performance

Authors: Eitidal Albassam

Abstract:

Cooling towers (CTs) in arid zone countries, used for heat rejection in water-cooled (WC) systems, consume a large quantity of water. Universally, water conservation is an issue because of the scarcity of fresh water and natural resources. Therefore, many studies have aimed to conserve fresh water and limit the water wasted. Nonetheless, all these methods are not related to improving the weather conditions around the entering air to CT. In Kuwait and other arid-zone countries, the dry bulb temperature (DBT) during the summer season is significantly greater than the incoming hot water temperature, and the air undergoes sensible cooling. This high DBT leads to extra heat transfer from air to water, demanding high water vaporization to achieve the required cooling of water. Thus, any reduction in ambient air temperature around the CT will minimize water consumption. This paper aims to discuss theoretically the effect of reducing the DBT around the cooling tower when considering the sun-shading barrier. The theoretical simulation model results show that if the DBT reduces by 2.8 °C approximately, the percentage of water evaporation savings in gallon per minute (GPM) starts from 6.48% when DBT reaches 51.67 °C till 9.80% for 37.78 °C. Moreover, the performance of the cooling tower will be improved when considering the appropriate shading barriers, which will not affect the existing wet-bulb temperature.

Keywords: dry-bulb temperature, entering air, water consumption, water vaporization

Procedia PDF Downloads 108
10573 Evaluation of the Quality Water Irrigation in Region of Lioua (Biskra), Algeria

Authors: F. Hiouani, M. Henouda, A. Masmoudi, M. Rechachi

Abstract:

The objective of this study was to evaluate the quality of irrigation water of some underground water resources in the region of Lioua (Biskra, Algéria). Analysis of cations (Ca++, Mg++, Na+, K+), anions (Cl-, SO4--, CO3--, HCO3-, NO3-), pH and electrical conductivity (EC) of ten water samples taken during March 2015. The resulted showed that water samples are designated salty and very salty. On the other hand, average SAR values show that there is no alkalinity risk of soil. According to Riverside diagram water samples are grouped into five classes (C3-S1, C4-S1, C4-S3, C5-S2 and C5-S3).

Keywords: groundwater, irrigation, quality, lioua biskra

Procedia PDF Downloads 274
10572 Rethinking Military Aid to Civil Authorities for Internal Security Operations: A Sustainable Solution to Rebuilding Civil Military Relations in Nigeria

Authors: Emmanuela Ngozi Maduka

Abstract:

In Nigeria, civil-military relations is at its lowest point as a result of the challenges emanating from incessant initiation of military aid to civil authorities (MACA) for internal security operations. This paper is concerned with the question whether it is appropriate for the military to handle internal security crisis with exception to terrorism and armed militia. It analyses the legal framework for MACA in internal security operations which appear to be in contradiction with military tactical and equipment training. The paper argues that the expectation that transitional re-training of the military for internal security operations will reconcile these inconsistencies specifically on the issue of use of force is not practicable and will always pose challenges for both the military and the citizens. Accordingly, this paper adopts a socio-legal methodology for better clarity on the interactions between the legal framework on MACA and military internal security operations. The paper also identifies the lack of effective and proficient paramilitary within the security design of Nigeria as the key issue which results in incessant initiation of MACA and advocates for the establishment of an effective and proficient paramilitary to effectively handle internal security crisis within Nigeria.

Keywords: civil-military relations, MACA, military training, operational challenges, paramilitary, use of force

Procedia PDF Downloads 106
10571 The Effect of Awareness-Raising on Household Water Consumption

Authors: R. Morbidelli, C. Saltalippi, A. Flammini, J. Dari

Abstract:

This work analyses what effect systematic awareness-raising of the population on domestic water consumption produces. In a period where the availability of water is continually decreasing due to reduced rainfall, it is of paramount importance to raise awareness among the population. We conducted an experiment on a large sample of homes in urban areas of Central Italy. In the first phase, lasting three weeks, normal per capita, water consumption was quantified. Subsequently, instructions were given on how to save water during various uses in the household (showers, cleaning hands, use of water in toilets, watering small green areas, use of water in the kitchen, ...), and small visual messages were posted at water dispensers to remind users to behave properly. Finally, household consumption was assessed again for a further three weeks. This experiment made it possible to quantify the effect of the awareness-raising action on the reduction of water consumption without the use of any structural action (replacement of dispensers, improvement of the water system, ...).

Keywords: water saving, urban areas, awareness-raising, climate change

Procedia PDF Downloads 80
10570 Modeling of Hydraulic Networking of Water Supply Subsystem Case of Addis Ababa

Authors: Solomon Weldegebriel Gebrelibanos

Abstract:

Water is one of the most important substances in human life that can give a human liberality with its cost and availability. Water comes from rainfall and runoff and reaches the ground as runoff that is stored in a river, ponds, and big water bodies, including sea and ocean and the remaining water portion is infiltrated into the ground to store in the aquifer. Water can serve human beings in various ways, including irrigation, water supply, hydropower and soon. Water supply is the main pillar of the water service to the human being. Water supply distribution in Addis Ababa arises from Legedadi, Akakai, and Gefersa. The objective of the study is to measure the performance of the water supply distribution in Addis Ababa city. The water supply distribution model is developed by computer-aided design software. The model can analyze the operational change, loss of water, and performance of the network. The two design criteria that have been employed to analyze the network system are velocity and pressure. The result shows that the customers are using the water at high pressure with low demand. The water distribution system is older than the expected service life with more leakage. Hence the study recommended that fixing Pressure valves and new distribution facilities can resolve the performance of the water supply system

Keywords: distribution, model, pressure, velocity

Procedia PDF Downloads 81
10569 Application of WebGIS-Based Water Environment Capacity Inquiry and Planning System in Water Resources Management

Authors: Tao Ding, Danjia Yan, Jinye Li, Chao Ren, Xinhua Hu

Abstract:

The paper based on the research background of the current situation of water shortage in China and intelligent management of water resources in the information era. And the paper adopts WebGIS technology, combining the mathematical model of water resources management to develop a WebGIS-based water environment capacity inquiry and polluted water emission planning. The research significance of the paper is that it can inquiry the water environment capacity of Jinhua City in real time and plan how to drain polluted water into the river, so as to realize the effective management of water resources. This system makes sewage planning more convenient and faster. For the planning of the discharge enterprise, the decision on the optimal location of the sewage outlet can be achieved through calculation of the Sewage discharge planning model in the river, without the need for site visits. The system can achieve effective management of water resources and has great application value.

Keywords: sewerage planning, water environment capacity, water resources management, WebGIS

Procedia PDF Downloads 149