Search results for: water security.
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 3366

Search results for: water security.

3096 Technology Identification, Evaluation and Selection Methodology for Industrial Process Water and Waste Water Treatment Plant of 3x150 MWe Tufanbeyli Lignite-Fired Power Plant

Authors: Cigdem Safak Saglam

Abstract:

Most thermal power plants use steam as working fluid in their power cycle. Therefore, in addition to fuel, water is the other main input for thermal plants. Water and steam must be highly pure in order to protect the systems from corrosion, scaling and biofouling. Pure process water is produced in water treatment plants having many several treatment methods. Treatment plant design is selected depending on raw water source and required water quality. Although working principle of fossil-fuel fired thermal power plants are same, there is no standard design and equipment arrangement valid for all thermal power plant utility systems. Besides that, there are many other technology evaluation and selection criteria for designing the most optimal water systems meeting the requirements such as local conditions, environmental restrictions, electricity and other consumables availability and transport, process water sources and scarcity, land use constraints etc. Aim of this study is explaining the adopted methodology for technology selection for process water preparation and industrial waste water treatment plant in a thermal power plant project located in Tufanbeyli, Adana Province in Turkey. Thermal power plant is fired with indigenous lignite coal extracted from adjacent lignite reserves. This paper addresses all above-mentioned factors affecting the thermal power plant water treatment facilities (demineralization + waste water treatment) design and describes the ultimate design of Tufanbeyli Thermal Power Plant Water Treatment Plant.

Keywords: Thermal power plant, lignite coal, pre-treatment, demineralization, electrodialysis, recycling, waste water, process water.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1703
3095 Access Policy Specification for SCADA Networks

Authors: Rodrigo Chandia, Mauricio Papa

Abstract:

Efforts to secure supervisory control and data acquisition (SCADA) systems must be supported under the guidance of sound security policies and mechanisms to enforce them. Critical elements of the policy must be systematically translated into a format that can be used by policy enforcement components. Ideally, the goal is to ensure that the enforced policy is a close reflection of the specified policy. However, security controls commonly used to enforce policies in the IT environment were not designed to satisfy the specific needs of the SCADA environment. This paper presents a language, based on the well-known XACML framework, for the expression of authorization policies for SCADA systems.

Keywords: Access policy specification, process control systems, network security.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 2304
3094 Measuring the Amount of Eroded Soil and Surface Runoff Water in the Field

Authors: Abdulfatah Faraj Aboufayed

Abstract:

Water erosion is the most important problems of the soil in the Jabel Nefusa area located in northwest of Libya; therefore, erosion station had been established in the Faculty of Veterinary and dryfarming research Station, University of the Al-japel Al-gharbi in Zentan. The length of the station is 72.6 feet, 6 feet width and the percentage of its slope is 3%. The station were established to measure the amount of soil eroded and amount of surface water produced during the seasons 95/96 and 96/97 from each rain storms. The monitoring shows that there was a difference between the two seasons in the number of rainstorms which made differences in the amount of surface runoff water and the amount of soil eroded between the two seasons. Although the slope is low (3%), the soil texture is sandy and the land ploughed twice during each season surface runoff and soil eroded were occurred. The average amount of eroded soil was 3792 grams (gr) per season and the average amount of surface runoff water was 410 liter (L) per season. The amount of surface runoff water would be much greater from Jebel Nefusa upland with steep slopes and collecting of them will save a valuable amount of water which lost as a runoff while this area is in desperate of this water. The regression analysis of variance show strong correlation between rainfall depth and the other two depended variable (the amount of surface runoff water and the amount of eroded soil. It shows also strong correlation between amount of surface runoff water and amount of eroded soil.

Keywords: Rain, Surface runoff water, Soil, Water erosion, Soil erosion.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1989
3093 Design and Implementation of Client Server Network Management System for Ethernet LAN

Authors: May Paing Paing Zaw, Su Myat Marlar Soe

Abstract:

Network Management Systems have played a great important role in information systems. Management is very important and essential in any fields. There are many managements such as configuration management, fault management, performance management, security management, accounting management and etc. Among them, configuration, fault and security management is more important than others. Because these are essential and useful in any fields. Configuration management is to monitor and maintain the whole system or LAN. Fault management is to detect and troubleshoot the system. Security management is to control the whole system. This paper intends to increase the network management functionalities including configuration management, fault management and security management. In configuration management system, this paper specially can support the USB ports and devices to detect and read devices configuration and solve to detect hardware port and software ports. In security management system, this paper can provide the security feature for the user account setting and user management and proxy server feature. And all of the history of the security such as user account and proxy server history are kept in the java standard serializable file. So the user can view the history of the security and proxy server anytime. If the user uses this system, the user can ping the clients from the network and the user can view the result of the message in fault management system. And this system also provides to check the network card and can show the NIC card setting. This system is used RMI (Remote Method Invocation) and JNI (Java Native Interface) technology. This paper is to implement the client/server network management system using Java 2 Standard Edition (J2SE). This system can provide more than 10 clients. And then this paper intends to show data or message structure of client/server and how to work using TCP/IP protocol.

Keywords: TCP/ IP based client server application

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 3595
3092 Effect of Water Hardness and Free Residual Chlorine on Black Tea Brew

Authors: P. Murugesan, G. Venkateswaran, V. A. Shanmuga Selvan

Abstract:

Water used for brewing tea plays a major role in the quality of tea. Water with higher hardness gives very dark coloured brew. This study was conducted to determine the effect of water hardness and free residual chlorine on the quality of black tea liquor. Theaflavin (TF) and Thearubigin (TR) levels are lower in comparison with the tea brewed in distilled water. At the same time, there is an increase in High Polymerized Substance (HPS) and Total Liquor Colour (TLC). While water with higher hardness has a negative impact on tea brew, water with high concentration of free residual chlorine did not affect the quality of tea brew.

Keywords: Theaflavin, Thearubigin, high polymerized substance, total liquor colour, hardness, residual chlorine.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 2470
3091 An Empirical Assessment of Sustainability of an Urban Water Supply Service Delivery

Authors: Olayinka Gafar Okeola, Akinola Muyiwa Moore

Abstract:

Urban population is rapidly increasing in Ilorin, (the capital of Kwara State of Nigeria) along with related increased water demand. The inadequacies of water supply services have forced the populace to depend on dug wells, boreholes, water tankers, street vendors etc. for their water needs. People spend hours daily carrying jerry can all around to collect and queue for water at the public water tap with high opportunity cost both in time and economic wastage. This situation motivated this study to assess the sustainability of an urban water supply services to unravel the factors undermining the effective delivery of services. Contingent Valuation Method was used to place value on water supply services using the Double Bounded Dichotomous Choice format for willingness to pay elicitation. A database was created with Microsoft Excel and Stata 12 Software to model and evaluate the variables that affect household willingness to pay. The results of the study reveal that about 92% of the total households surveyed were connected to the Government water supply out of which 87% reported that they were not satisfied with the existing services. The results furthered revealed that respondents are willing to pay ₦2500 monthly to enjoy sustainable water supply service delivery.

Keywords: Willingness-to-pay, contingent valuation method, Nigeria, service, delivery.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 413
3090 Security Threat and Countermeasure on 3G Network

Authors: Dongwan Kang, Joohyung Oh, Chaetae Im

Abstract:

Recent communications environment significantly expands the mobile environment. The popularization of smartphones with various mobile services has emerged, and smartphone users are rapidly increasing. Because of these symptoms, existing wired environment in a variety of mobile traffic entering to mobile network has threatened the stability of the mobile network. Unlike traditional wired infrastructure, mobile networks has limited radio resources and signaling procedures for complex radio resource management. So these traffic is not a problem in wired networks but mobile networks, it can be a threat. In this paper, we analyze the security threats in mobile networks and provide direction to solve it.

Keywords: 3G, Core Network Security, GTP, Mobile NetworkSecurity

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 2132
3089 Development of Vibration Sensor with Wide Frequency Range Based on Condenser Microphone -Estimation System for Flow Rate in Water Pipes-

Authors: Hironori Kakuta, Kajiro Watanabe, Yosuke Kurihara

Abstract:

Water leakage is a serious problem in the maintenance of a waterworks facility. Monitoring the water flow rate is one way to locate leakage. However, conventional flowmeters such as the wet-type flowmeter and the clamp-on type ultrasonic flowmeter require additional construction for their installation and are therefore quite expensive. This paper proposes a novel estimation system for the flow rate in a water pipeline, which employs a vibration sensor. This assembly can be attached to any water pipeline without the need for additional high-cost construction. The vibration sensor is designed based on a condenser microphone. This sensor detects vibration caused by water flowing through a pipeline. It is possible to estimate the water flow rate by measuring the amplitude of the output signal from the vibration sensor. We confirmed the validity of the proposed sensing system experimentally.

Keywords: Condenser microphone, Flow rate estimation, Piping vibration, Water pipe.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 2313
3088 Water Reallocation Policies – The Importance of Rural and Urban Differences in Alberta, Canada

Authors: Henning Bjornlund, Alec Zuo, Sarah Wheeler, Rob de Loë

Abstract:

There is currently intensive debate in Alberta, Canada, regarding rural to urban water reallocation. This paper explores the demographic and attitudinal influences that are associated with the acceptance of water reallocation policies and whether such acceptance differs between urban and rural residents. We investigate three policy orientations in regards to water policies: i) government intervention; ii) environmental protection; and iii) protecting irrigators- water rights. We find that urban dwellers are more likely to favour government intervention while rural dwellers are more likely to support policies that aim at protecting irrigators- water rights. While urban dwellers are also more likely to favour environmental protection, the difference is not statistically significant. We also find that other factors have a significant impact on policy choice irrespective of residence such as demographic and socioeconomic factors as well as the values people hold toward water and the environment.

Keywords: Canada, rural, urban, water transfers.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1390
3087 Identification of Slum Areas for Improvement Inputs in Lafia Town, Nasarawa State

Authors: Bashayi Obadiah, Barau Daniel

Abstract:

One of the United Nations Millennium Development targets is to 'achieve significant improvement in lives of at least 100 million slum dwellers, by 2020'. To monitor progress on this target a first step is to develop an operational definition to identify slum settlements. The indicators selected are: access to water and sanitation, sufficient living area, a house with durable material on a non-hazardous location and with tenure security. This paper describes the techniques of identifying slums and applied the techniques in identifying slum in Lafia town. The methodology used was selection of one district in Lafia town for this study and the district was zoned into four units. The total of 10% sample size out of 2,482 households of 250 questionnaires was administered using systematic sampling method based on proportion of houses at each zones as 90, 70, 40 and 50 respectively. The result shows that the area is a second order degeneration that needs a major improvement. Recommendations were made in this regard for urgent intervention in improving or upgrading of housing and infrastructural facilities

Keywords: Urban slums, security, safety, degeneration, upgrading.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 3001
3086 Conflicts and Compromise at the Management of Transboundry Water Resources (The Case of the Central Asia)

Authors: Sobir T. Navruzov

Abstract:

The problem of complex use of water resources in Central Asia by taking into consideration the sovereignty of the states and increasing demand on use of water for economic aspects are considered. Complex program with appropriate mathematical software intended for calculation of possible variants of using the Amudarya up-stream water resources according to satisfaction of incompatible requirements of the national economics in irrigation and energy generation is proposed.

Keywords: water resources, national economics, irrigation, transboundry, energy generation, optimal solution, program complex, up-stream, down-stream, compensating services.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1349
3085 Treatment of Eutrophic-lake Water by Free Water Surface Wetland

Authors: Haodong Wu, Ping Huang, Junsan Wang

Abstract:

In China, with the rapid urbanization and industrialization, and highly accelerated economic development have resulted in degradation of water resource. The water quality deterioration usual result from eutrophication in most cases, so how to dispose this type pollution water higher efficiently is an urgent task. Hower, different with traditional technology, constructed wetlands are effective treatment systems that can be very useful because they are simple technology and low operational cost. A pilot-scale treatment including constructed wetlands was constructed at XingYun Lake, Yuxi, China, and operated as primary treatment measure before eutrophic-lake water draining to riverine landscape. Water quality indices were determined during the experiment, the results indicated that treatment removal efficiencies were high for Nitrate nitrogen, Chlorophyll–a and Algae, the final removal efficiency reached to 95.20%, 93.33% and 99.87% respectively, but the removal efficiency of Total phosphorous and Total nitrogen only reach to 68.83% and 50.00% respectively.

Keywords: Constructed wetland, Eutrophic-lake water, Nutrientremoval, Removal efficiency

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1818
3084 A Case Study on Management of Coal Seam Gas By-Product Water

Authors: Mojibul Sajjad, Mohammad G. Rasul, Md. Sharif Imam Ibne Amir

Abstract:

The rate of natural gas dissociation from the Coal Matrix depends on depressurization of reservoir through removing of the cleat water from the coal seam. These waters are similar to brine and aged of very long years. For improving the connectivity through fracking /fracturing, high pressure liquids are pumped off inside the coal body. A significant quantity of accumulated water, a combined mixture of cleat water and fracking fluids (back flow water) is pumped out through gas well. In Queensland, Australia Coal Seam Gas (CSG) industry is in booming state and estimated of 30,000 wells would be active for CSG production forecasting life span of 30 years. Integrated water management along with water softening programs is practiced for subsequent treatment and later on discharge to nearby surface water catchment. Water treatment is an important part of the CSG industry. A case study on a CSG site and review on the test results are discussed for assessing the Standards & Practices for management of CSG by-product water and their subsequent disposal activities. This study was directed toward (i) water management and softening process in Spring Gully CSG field, (ii) Comparative analysis on experimental study and standards and (iii) Disposal of the treated water. This study also aimed for alternative usages and their impact on vegetation, living species as well as long term effects.

Keywords: Coal Seam Gas (CSG), Cleat Water, Hydro-Fracking, Desalination, Reverse Osmosis.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 2681
3083 A Study on the Removal of Trace Organic Matter in Water Treatment Procedures Using Powder-activated Carbon Biofilm

Authors: Rou-Han Lee, Jie, Chung Lou, Huang-Ming Fang

Abstract:

This study uses natural water and the surface properties of powdered activated carbon to acclimatize organics, forming biofilms on the surface of powdered activated carbon. To investigate the influence of different hydraulic retention times on the removal efficacy of trace organics in raw water, and to determine the optimal hydraulic retention time of a biological powdered activated carbon system, this study selects ozone-treated water processed by Feng-shan Advanced Water Purification Plant in southern Taiwan for the experiment. The evaluation indicators include assimilable organic carbon, dissolved organic carbon, and total organic carbon. The results of this study can improve the quality of drinking water treated using advanced water purification procedures.

Keywords: Water Purification Procedures, Biological Powdered Activated Carbon System, Assimilable Organic Carbon

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1619
3082 Performance Evaluation of Thermosiphon Based Solar Water Heater in India

Authors: Dnyandip K. Bhamare, Manish K Rathod, Jyotirmay Banerjee

Abstract:

This paper aims to study performance of a thermosiphon solar water heating system with the help of the proposed analytical model. This proposed model predicts the temperature and mass flow rate in a thermosiphon solar water heating system depending on radiation intensity and ambient temperature. The performance of the thermosiphon solar water heating system is evaluated in the Indian context. For this, eight cities in India are selected considering radiation intensity and geographical positions. Predicted performance at various cities reveals the potential for thermosiphon solar water in India.

Keywords: Collector outlet temperature, India, solar water heater, thermosiphon.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1535
3081 Effect of Evaporator Temperature on the Performance of Water Desalination/Refrigeration Adsorption System Using AQSOA-ZO2

Authors: Peter G. Youssef, Saad M. Mahmoud, Raya K. Al-Dadah

Abstract:

Many water desalination technologies have been developed but in general they are energy intensive and have high cost and adverse environmental impact. Recently, adsorption technology for water desalination has been investigated showing the potential of using low temperature waste heat (50-85oC) thus reducing energy consumption and CO2 emissions. This work mathematically compares the performance of an adsorption cycle that produces two useful effects namely, fresh water and cooling using two different adsorbents, silica-gel and an advanced zeolite material AQSOA-ZO2, produced by Mitsubishi plastics. It was found that at low chilled water temperatures, typically below 20oC, the AQSOA-Z02 is more efficient than silica-gel as the cycle can produce 5.8 m3 of fresh water per day and 50.1 Rton of cooling per tonne of AQSOA-ZO2. Above 20oC silica-gel is still better as the cycle production reaches 8.4 m3 per day and 62.4 Rton per tonne of silica-gel. These results show the potential of using the AQSOA-Z02 at low chilled water temperature for water desalination and cooling applications.

Keywords: Adsorption, desalination, refrigeration, seawater.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 2476
3080 Cyber Warriors for Cyber Security and Information Assurance- An Academic Perspective

Authors: Ronald F. Gonzales, Gordon W. Romney, Pradip Peter Dey, Mohammad Amin, Bhaskar Raj Sinha

Abstract:

A virtualized and virtual approach is presented on academically preparing students to successfully engage at a strategic perspective to understand those concerns and measures that are both structured and not structured in the area of cyber security and information assurance. The Master of Science in Cyber Security and Information Assurance (MSCSIA) is a professional degree for those who endeavor through technical and managerial measures to ensure the security, confidentiality, integrity, authenticity, control, availability and utility of the world-s computing and information systems infrastructure. The National University Cyber Security and Information Assurance program is offered as a Master-s degree. The emphasis of the MSCSIA program uniquely includes hands-on academic instruction using virtual computers. This past year, 2011, the NU facility has become fully operational using system architecture to provide a Virtual Education Laboratory (VEL) accessible to both onsite and online students. The first student cohort completed their MSCSIA training this past March 2, 2012 after fulfilling 12 courses, for a total of 54 units of college credits. The rapid pace scheduling of one course per month is immensely challenging, perpetually changing, and virtually multifaceted. This paper analyses these descriptive terms in consideration of those globalization penetration breaches as present in today-s world of cyber security. In addition, we present current NU practices to mitigate risks.

Keywords: Cyber security, information assurance, mitigate risks, virtual machines, strategic perspective.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1870
3079 Water Quality from a Mixed Land-Use Catchment in Miri, Sarawak

Authors: Carrie Ho, Darshana J. Kumar

Abstract:

Urbanization has been found to impact stormwater runoff quantity and quality. A study catchment with mixed land use, residential and industrial were investigated and the water quality discharged from the catchment were sampled and tested for four basic water quality parameters; BOD5, NH3-N, NO3-N and P. One dry weather flow and several stormwater runoff were sampled. Results were compared to the USEPA stormwater quality benchmark values and the Interim National Water Quality Standards for Malaysia (INWQS). The concentration of the parameters was found to vary significantly between storms and the pollutant of concern was found to be NO3-N.

Keywords: Mixed land-use, urban runoff, water quality.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 2726
3078 Enhanced Genetic Algorithm Approach for Security Constrained Optimal Power Flow Including FACTS Devices

Authors: R.Narmatha Banu, D.Devaraj

Abstract:

This paper presents a genetic algorithm based approach for solving security constrained optimal power flow problem (SCOPF) including FACTS devices. The optimal location of FACTS devices are identified using an index called overload index and the optimal values are obtained using an enhanced genetic algorithm. The optimal allocation by the proposed method optimizes the investment, taking into account its effects on security in terms of the alleviation of line overloads. The proposed approach has been tested on IEEE-30 bus system to show the effectiveness of the proposed algorithm for solving the SCOPF problem.

Keywords: Optimal Power Flow, Genetic Algorithm, FlexibleAC transmission system (FACTS) devices, Severity Index (SI), Security Enhancement, Thyristor controlled series capacitor (TCSC).

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1761
3077 Big Data Analytics and Data Security in the Cloud via Fully Homomorphic Encryption

Authors: Victor Onomza Waziri, John K. Alhassan, Idris Ismaila, Moses Noel Dogonyaro

Abstract:

This paper describes the problem of building secure computational services for encrypted information in the Cloud Computing without decrypting the encrypted data; therefore, it meets the yearning of computational encryption algorithmic aspiration model that could enhance the security of big data for privacy, confidentiality, availability of the users. The cryptographic model applied for the computational process of the encrypted data is the Fully Homomorphic Encryption Scheme. We contribute a theoretical presentations in a high-level computational processes that are based on number theory and algebra that can easily be integrated and leveraged in the Cloud computing with detail theoretic mathematical concepts to the fully homomorphic encryption models. This contribution enhances the full implementation of big data analytics based cryptographic security algorithm.

Keywords: Data Analytics, Security, Privacy, Bootstrapping, and Fully Homomorphic Encryption Scheme.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 3451
3076 Performance of a Transcritical CO2 Heat Pump for Simultaneous Water Cooling and Heating

Authors: J. Sarkar, Souvik Bhattacharyya, M. Ramgopal

Abstract:

This paper presents the experimental as well as the simulated performance studies on the transcritical CO2 heat pumps for simultaneous water cooling and heating; effects of water mass flow rates and water inlet temperatures of both evaporator and gas cooler on the cooling and heating capacities, system COP and water outlets temperatures are investigated. Study shows that both the water mass flow rate and inlet temperature have significant effect on system performances. Test results show that the effect of evaporator water mass flow rate on the system performances and water outlet temperatures is more pronounced (COP increases 0.6 for 1 kg/min) compared to the gas cooler water mass flow rate (COP increases 0.4 for 1 kg/min) and the effect of gas cooler water inlet temperature is more significant (COP decreases 0.48 for given ranges) compared to the evaporator water inlet temperature (COP increases 0.43 for given ranges). Comparisons of experimental values with simulated results show the maximum deviation of 5% for cooling capacity, 10% for heating capacity, 16% for system COP. This study offers useful guidelines for selecting appropriate water mass flow rate to obtain required system performance.

Keywords: CO2 heat pump, experiment, simulation, performance characteristics.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 2717
3075 Towards a Secure Storage in Cloud Computing

Authors: Mohamed Elkholy, Ahmed Elfatatry

Abstract:

Cloud computing has emerged as a flexible computing paradigm that reshaped the Information Technology map. However, cloud computing brought about a number of security challenges as a result of the physical distribution of computational resources and the limited control that users have over the physical storage. This situation raises many security challenges for data integrity and confidentiality as well as authentication and access control. This work proposes a security mechanism for data integrity that allows a data owner to be aware of any modification that takes place to his data. The data integrity mechanism is integrated with an extended Kerberos authentication that ensures authorized access control. The proposed mechanism protects data confidentiality even if data are stored on an untrusted storage. The proposed mechanism has been evaluated against different types of attacks and proved its efficiency to protect cloud data storage from different malicious attacks.

Keywords: Access control, data integrity, data confidentiality, Kerberos authentication, cloud security.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1763
3074 Evaluation of Fluoride Contents of Kirkuk City's Drinking Water and Its Source: Lesser Zab River and Its Effect on Human Health

Authors: Abbas R. Ali, Safa H. Abdulrahman

Abstract:

In this study, forty samples had been collected from water of Lesser Zab River and drinking water to determine fluoride concentration and show the impact of fluoride on general health of society of Kirkuk city. Estimation of fluoride concentration and determination of its proportion in water samples were performed attentively using a fluoride ion selective electrode. The fluoride concentrations in the Lesser Zab River samples were between 0.0265 ppm and 0.0863 ppm with an average of 0.0451 ppm, whereas the average fluoride concentration in drinking water samples was 0.102 ppm and ranged from 0.010 to 0.289 ppm. A comparison between results obtained with World Health Organization (WHO) show a low concentration of fluoride in the samples of the study. Thus, for health concerns we should increase the concentration of this ion in water of Kirkuk city at least to about (1.0 ppm) and this will take place after fluorination process.

Keywords: Fluoride concentration, Lesser Zab River, drinking water, health society, Kirkuk city.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1410
3073 From Risk/Security Analysis via Timespace to a Model of Human Vulnerability and Human Security

Authors: Anders Troedsson

Abstract:

For us humans, risk and insecurity are intimately linked to vulnerabilities - where there is vulnerability, there is potentially risk and insecurity. Reducing vulnerability through compensatory measures means decreasing the likelihood of a certain external event be qualified as a risk/threat/assault, and thus also means increasing the individual’s sense of security. The paper suggests that a meaningful way to approach the study of risk/ insecurity is to organize thinking about the vulnerabilities that external phenomena evoke in humans as perceived by them. Such phenomena are, through a set of given vulnerabilities, potentially translated into perceptions of "insecurity." An ontological discussion about salient timespace characteristics of external phenomena as perceived by humans, including such which potentially can be qualified as risk/threat/assault, leads to the positing of two dimensions which are central for describing what in the paper is called the essence of risk/threat/assault. As is argued, such modeling helps analysis steer free of the subjective factor which is intimately connected to human perception and which mediates between phenomena “out there” potentially identified as risk/threat/assault, and their translation into an experience of security or insecurity. A proposed set of universally given vulnerabilities are scrutinized with the help of the two dimensions, resulting in a modeling effort featuring four realms of vulnerabilities which together represent a dynamic whole. This model in turn informs modeling on human security.

Keywords: Human vulnerabilities, human security, inert-immediate, material-immaterial, timespace.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1040
3072 The Impact of Fish Cages on Water Quality in One Fish Farm in Croatia

Authors: G. Jelic Mrcelic, M. Sliskovic

Abstract:

In Croatia, the majority of cultured marine fish species are reared in net cages. The intensive production of the fish in net cages may generate the considerable amount of bio waste and change water quality especially in enclosed and semi-enclosed coastal areas. The aim of this paper is to assess the potential impact of sea bass (Dicentrarchus labrax L.) cage farm on water quality. The weak relationship between food supply and water quality parameters (nutrient content and phytoplankton biomass) was found, but significant changes in oxygen saturation was observed in the cages during the warmer period of a year especially in the morning (occasionally it dropped below 70 %). Despite of, satisfactory results of water quality parameters, it is necessary to establish comprehensive monitoring process, especially to include quality assessment of fouling communities.

Keywords: Mariculture, monitoring, fish cages, water quality parameters.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 2652
3071 Performance Analysis of a Single-Phase Thermosyphon Solar Water Heating System

Authors: S. Sadhishkumar, T. Balusamy

Abstract:

A single-phase closed thermosyphon has been fabricated and experimented to utilize solar energy for water heating. The working fluid of the closed thermosyphon is heated at the flatplate collector and the hot water goes to the water tank due to density gradient caused by temperature differences. This experimental work was done using insulated water tank and insulated connecting pipe between the tank and the flat-plate collector. From the collected data, performance parameters such as instantaneous collector efficiency and heat removal factor are calculated. In this study, the effects of glazing were also observed. The water temperature rise and the maximum instantaneous efficiency obtained from this experiment with glazing using insulated water tank and insulated connecting pipe are 17°C in a period of 5 hours and 60% respectively. Whereas the water temperature rise and the maximum instantaneous efficiency obtained from this experiment with glazing using non-insulated water tank and non-insulated connecting pipe are 14°C in a period of 5 hours and 39% respectively.

Keywords: Solar water heating systems, Single-phase thermosyphon, Flat-plate collector, Insulated tank and pipe.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 3126
3070 Alternative Key Exchange Algorithm Based on Elliptic Curve Digital Signature Algorithm Certificate and Usage in Applications

Authors: A. Andreasyan, C. Connors

Abstract:

The Elliptic Curve Digital Signature algorithm-based X509v3 certificates are becoming more popular due to their short public and private key sizes. Moreover, these certificates can be stored in Internet of Things (IoT) devices, with limited resources, using less memory and transmitted in network security protocols, such as Internet Key Exchange (IKE), Transport Layer Security (TLS) and Secure Shell (SSH) with less bandwidth. The proposed method gives another advantage, in that it increases the performance of the above-mentioned protocols in terms of key exchange by saving one scalar multiplication operation.

Keywords: Cryptography, elliptic curve digital signature algorithm, key exchange, network security protocols.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 588
3069 Design and Implementation of an Image Based System to Enhance the Security of ATM

Authors: Seyed Nima Tayarani Bathaie

Abstract:

In this paper, an image-receiving system was designed and implemented through optimization of object detection algorithms using Haar features. This optimized algorithm served as face and eye detection separately. Then, cascading them led to a clear image of the user. Utilization of this feature brought about higher security by preventing fraud. This attribute results from the fact that services will be given to the user on condition that a clear image of his face has already been captured which would exclude the inappropriate person. In order to expedite processing and eliminating unnecessary ones, the input image was compressed, a motion detection function was included in the program, and detection window size was confined.

Keywords: Face detection algorithm, Haar features, Security of ATM.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 2103
3068 Diversity for Safety and Security of Autonomous Vehicles against Accidental and Deliberate Faults

Authors: Anil Ranjitbhai Patel, Clement John Shaji, Peter Liggesmeyer

Abstract:

Safety and security of Autonomous Vehicles (AVs) is a growing concern, first, due to the increased number of safety-critical functions taken over by automotive embedded systems; second, due to the increased exposure of the software-intensive systems to potential attackers; third, due to dynamic interaction in an uncertain and unknown environment at runtime which results in changed functional and non-functional properties of the system. Frequently occurring environmental uncertainties, random component failures, and compromise security of the AVs might result in hazardous events, sometimes even in an accident, if left undetected. Beyond these technical issues, we argue that the safety and security of AVs against accidental and deliberate faults are poorly understood and rarely implemented. One possible way to overcome this is through a well-known diversity approach. As an effective approach to increase safety and security, diversity has been widely used in the aviation, railway, and aerospace industries. Thus, paper proposes fault-tolerance by diversity model taking into consideration the mitigation of accidental and deliberate faults by application of structure and variant redundancy. The model can be used to design the AVs with various types of diversity in hardware and software-based multi-version system. The paper evaluates the presented approach by employing an example from adaptive cruise control, followed by discussing the case study with initial findings.

Keywords: Autonomous vehicles, diversity, fault-tolerance, adaptive cruise control, safety, security.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 463
3067 Impact of Network Workload between Virtualization Solutions on a Testbed Environment for Cybersecurity Learning

Authors: K´evin Fernagut, Olivier Flauzac, Erick M. Gallegos R, Florent Nolot

Abstract:

The adoption of modern lightweight virtualization often comes with new threats and network vulnerabilities. This paper seeks to assess this with a different approach studying the behavior of a testbed built with tools such as Kernel-based Virtual Machine (KVM), LinuX Containers (LXC) and Docker, by performing stress tests within a platform where students experiment simultaneously with cyber-attacks, and thus observe the impact on the campus network and also find the best solution for cyber-security learning. Interesting outcomes can be found in the literature comparing these technologies. It is, however, difficult to find results of the effects on the global network where experiments are carried out. Our work shows that other physical hosts and the faculty network were impacted while performing these trials. The problems found are discussed, as well as security solutions and the adoption of new network policies.

Keywords: Containerization, containers, cyber-security, cyber-attacks, isolation, performance, security, virtualization, virtual machines.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 549