Search results for: water security.
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 3344

Search results for: water security.

2984 Drafting the Design and Development of Micro- Controller Based Portable Soil Moisture Sensor for Advancement in Agro Engineering

Authors: Guneet Mander, Gurinder Pal Singh

Abstract:

Moisture is an important consideration in many aspects ranging from irrigation, soil chemistry, golf course, corrosion and erosion, road conditions, weather predictions, livestock feed moisture levels, water seepage etc. Vegetation and crops always depend more on the moisture available at the root level than on precipitation occurrence. In this paper, design of an instrument is discussed which tells about the variation in the moisture contents of soil. This is done by measuring the amount of water content in soil by finding the variation in capacitance of soil with the help of a capacitive sensor. The greatest advantage of soil moisture sensor is reduced water consumption. The sensor is also be used to set lower and upper threshold to maintain optimum soil moisture saturation and minimize water wilting, contributes to deeper plant root growth ,reduced soil run off /leaching and less favorable condition for insects and fungal diseases. Capacitance method is preferred because, it provides absolute amount of water content and also measures water content at any depth.

Keywords: Capacitive Sensors, aluminum, Water, Irrigation.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1973
2983 Study on the Optimization of Completely Batch Water-using Network with Multiple Contaminants Considering Flow Change

Authors: Jian Du, Shui Hong Hong, Lu Meng, Qing Wei Meng

Abstract:

This work addresses the problem of optimizing completely batch water-using network with multiple contaminants where the flow change caused by mass transfer is taken into consideration for the first time. A mathematical technique for optimizing water-using network is proposed based on source-tank-sink superstructure. The task is to obtain the freshwater usage, recycle assignments among water-using units, wastewater discharge and a steady water-using network configuration by following steps. Firstly, operating sequences of water-using units are determined by time constraints. Next, superstructure is simplified by eliminating the reuse and recycle from water-using units with maximum concentration of key contaminants. Then, the non-linear programming model is solved by GAMS (General Algebra Model System) for minimum freshwater usage, maximum water recycle and minimum wastewater discharge. Finally, numbers of operating periods are calculated to acquire the steady network configuration. A case study is solved to illustrate the applicability of the proposed approach.

Keywords: Completely batch process, flow change, multiple contaminants, water-using network.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1425
2982 Sustainable Use of Laura Lens during Drought

Authors: Kazuhisa Koda, Tsutomu Kobayashi

Abstract:

Laura Island, which is located about 50 km away from downtown, is a source of water supply in Majuro atoll, which is the capital of the Republic of the Marshall Islands. Low and flat Majuro atoll has neither river nor lake. It is very important for Majuro atoll to ensure the conservation of its water resources. However, upconing, which is the process of partial rising of the freshwater-saltwater boundary near the water-supply well, was caused by the excess pumping from it during the severe drought in 1998. Upconing will make the water usage of the freshwater lens difficult. Thus, appropriate water usage is required to prevent up coning in the freshwater lens because there is no other water source during drought. Numerical simulation of water usage applying SEAWAT model was conducted at the central part of Laura Island, including the water supply well, which was affected by upconing. The freshwater lens was created as a result of infiltration of consistent average rainfall. The lens shape was almost the same as the one in 1985. 0 of monthly rainfall and variable daily pump discharge were used to calculate the sustainable pump discharge from the water supply well. Consequently, the total amount of pump discharge was increased as the daily pump discharge was increased, indicating that it needs more time to recover from upconing. Thus, a pump standard to reduce the pump intensity is being proposed, which is based on numerical simulation concerning the occurrence of the up-coning phenomenon in Laura Island during the drought.

Keywords: Freshwater lens, islands, numerical simulation, sustainable water use.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1881
2981 Modeling of Water Erosion in the M'Goun Watershed Using OpenGIS Software

Authors: M. Khal, Ab. Algouti, A. Algouti

Abstract:

Water erosion is the major cause of the erosion that shapes the earth's surface. Modeling water erosion requires the use of software and GIS programs, commercial or closed source. The very high prices for commercial GIS licenses, motivates users and researchers to find open source software as relevant and applicable as the proprietary GIS. The objective of this study is the modeling of water erosion and the hydrogeological and morphophysical characterization of the Oued M'Goun watershed (southern flank of the Central High Atlas) developed by free programs of GIS. The very pertinent results are obtained by executing tasks and algorithms in a simple and easy way. Thus, the various geoscientific and geostatistical analyzes of a digital elevation model (SRTM 30 m resolution) and their combination with the treatments and interpretation of satellite imagery information allowed us to characterize the region studied and to map the area most vulnerable to water erosion.

Keywords: Central High-Atlas, hydrogeology, M’Goun watershed, OpenGIS, water erosion.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 893
2980 Effects of Water Content on Dielectric Properties of Mineral Transformer Oil

Authors: Suwarno, M. Helmi Prakoso

Abstract:

Mineral oil is commonly used for high voltage transformer insulation. The insulation quality of mineral oil is affecting the operation process of high voltage transformer. There are many contaminations which could decrease the insulation quality of mineral oil. One of them is water. This research talks about the effect of water content on dielectric properties, physic properties, and partial discharge pattern on mineral oil. Samples were varied with 10 varieties of water content value. And then all samples would be tested to measure the dielectric properties, physic properties, and partial discharge pattern. The result of this research showed that an increment of water content value would decrease the insulation quality of mineral oil.

Keywords: Dielectric properties, high voltage transformer, mineral oil, water content.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 3587
2979 Secure Cryptographic Operations on SIM Card for Mobile Financial Services

Authors: Kerem Ok, Serafettin Senturk, Serdar Aktas, Cem Cevikbas

Abstract:

Mobile technology is very popular nowadays and it provides a digital world where users can experience many value-added services. Service Providers are also eager to offer diverse value-added services to users such as digital identity, mobile financial services and so on. In this context, the security of data storage in smartphones and the security of communication between the smartphone and service provider are critical for the success of these services. In order to provide the required security functions, the SIM card is one acceptable alternative. Since SIM cards include a Secure Element, they are able to store sensitive data, create cryptographically secure keys, encrypt and decrypt data. In this paper, we design and implement a SIM and a smartphone framework that uses a SIM card for secure key generation, key storage, data encryption, data decryption and digital signing for mobile financial services. Our frameworks show that the SIM card can be used as a controlled Secure Element to provide required security functions for popular e-services such as mobile financial services.

Keywords: SIM Card, mobile financial services, cryptography, secure data storage.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 2030
2978 Water Vapor Plasma Torch: Design, Characteristics and Applications

Authors: A. Tamošiūnas, P. Valatkevičius, V. Grigaitiene, V. Valinčius

Abstract:

The atmospheric pressure plasma torch with a direct current arc discharge stabilized by water vapor vortex was experimentally investigated. Overheated up to 450K water vapor was used as plasma forming gas. Plasma torch design is one of the most important factors leading to a stable operation of the device. The electrical and thermal characteristics of the plasma torch were determined during the experimental investigations. The design and the basic characteristics of the water vapor plasma torch are presented in the paper. Plasma torches with the electric arc stabilized by water vapor vortex provide special performance characteristics in some plasma processing applications such as thermal plasma neutralization and destruction of organic wastes enabling to extract high caloric value synthesis gas as by-product of the process. Syngas could be used as a surrogate fuel partly replacing the dependence on the fossil fuels or used as a feedstock for hydrogen, methanol production.

Keywords: Arc discharge, atmospheric pressure thermal plasma, plasma torch, water vapor.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 4446
2977 Effects of Sea Water Level Fluctuations on Seismic Response of Jacket Type Offshore Platforms

Authors: M. Rad, M. Dolatshahi Pirooz, M. Esmayili

Abstract:

To understand the seismic behavior of the offshore structures, the dynamic interaction of the water-structure-soil should be assessed. In this regard the role of the water dynamic properties in magnifying or reducing of the effects of earthquake induced motions on offshore structures haven't been investigated in precise manner in available literature. In this paper the sea water level fluctuations effects on the seismic behavior of a sample of offshore structures has been investigated by emphasizing on the water-structure interaction phenomenon. For this purpose a two dimensional finite element model of offshore structures as well as surrounded water has been developed using ANSYS software. The effect of soil interaction with embedded pile foundation has been imposed by using a series of nonlinear springs in horizontal and vertical directions in soil-piles contact points. In the model, the earthquake induced motions have been applied on springs and consequently the motions propagated upward to the structure and surrounded water. As a result of numerical study, the horizontal deformations of the offshore deck as well as internal force and buckling coefficient in structural elements have been recorded and controlled with and without water presence. In part of study a parametric study has been accomplished on sea water level fluctuations and effect of this parameter has been studied on the aforementioned numerical results.

Keywords: Fluid-Structure Interaction, Jacket, Sea Water Level, Seismic Loading.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 2061
2976 Security Architecture for At-Home Medical Care Using Sensor Network

Authors: S.S.Mohanavalli, Sheila Anand

Abstract:

This paper proposes a novel architecture for At- Home medical care which enables senior citizens, patients with chronic ailments and patients requiring post- operative care to be remotely monitored in the comfort of their homes. This architecture is implemented using sensors and wireless networking for transmitting patient data to the hospitals, health- care centers for monitoring by medical professionals. Patients are equipped with sensors to measure their physiological parameters, like blood pressure, pulse rate etc. and a Wearable Data Acquisition Unit is used to transmit the patient sensor data. Medical professionals can be alerted to any abnormal variations in these values for diagnosis and suitable treatment. Security threats and challenges inherent to wireless communication and sensor network have been discussed and a security mechanism to ensure data confidentiality and source authentication has been proposed. Symmetric key algorithm AES has been used for encrypting the data and a patent-free, two-pass block cipher mode CCFB has been used for implementing semantic security.

Keywords: data confidentiality, integrity, remotemonitoring, source authentication

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1707
2975 Influential Effect of Self-Healing Treatment on Water Absorption and Electrical Resistance of Normal and Light Weight Aggregate Concretes

Authors: B. Tayebani, N. Hosseinibalam, D. Mostofinejad

Abstract:

Interest in using bacteria in cement materials due to its positive influences has been increased. Cement materials such as mortar and concrete basically suffer from higher porosity and water absorption compared to other building materials such as steel materials. Because of the negative side-effects of certain chemical techniques, biological methods have been proposed as a desired and environmentally friendly strategy for reducing concrete porosity and diminishing water absorption. This paper presents the results of an experimental investigation carried out to evaluate the influence of Sporosarcina pasteurii bacteria on the behaviour of two types of concretes (light weight aggregate concrete and normal weight concrete). The resistance of specimens to water penetration by testing water absorption and evaluating the electrical resistance of those concretes was examined and compared. As a conclusion, 20% increase in electrical resistance and 10% reduction in water absorption of lightweight aggregate concrete (LWAC) and for normal concrete the results show 7% decrease in water absorption and almost 10% increase in electrical resistance.

Keywords: Bacteria, biological method, normal weight concrete, lightweight aggregate concrete, water absorption, electrical resistance.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 958
2974 Maximum Water Hammer Sensitivity Analysis

Authors: Jalil Emadi, Abbas Solemani

Abstract:

Pressure waves and Water Hammer occur in a pumping system when valves are closed or opened suddenly or in the case of sudden failure of pumps. Determination of maximum water hammer is considered one of the most important technical and economical items of which engineers and designers of pumping stations and conveyance pipelines should take care. Hammer Software is a recent application used to simulate water hammer. The present study focuses on determining significance of each input parameter of the application relative to the maximum amount of water hammer estimated by the software. The study determines estimated maximum water hammer variations due to variations of input parameters including water temperature, pipe type, thickness and diameter, electromotor rpm and power, and moment of inertia of electromotor and pump. In our study, Kuhrang Pumping Station was modeled using WaterGEMS Software. The pumping station is characterized by total discharge of 200 liters per second, dynamic height of 194 meters and 1.5 kilometers of steel conveyance pipeline and transports water to Cheshme Morvarid for farmland irrigation. The model was run in steady hydraulic condition and transferred to Hammer Software. Then, the model was run in several unsteady hydraulic conditions and sensitivity of maximum water hammer to each input parameter was calculated. It is shown that parameters to which maximum water hammer is most sensitive are moment of inertia of pump and electromotor, diameter, type and thickness of pipe and water temperature, respectively.

Keywords: Pressure Wave, Water Hammer, Sensitivity Analysis, Hammer Software, Kuhrang, Cheshme Morvarid

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 3251
2973 Attacks Classification in Adaptive Intrusion Detection using Decision Tree

Authors: Dewan Md. Farid, Nouria Harbi, Emna Bahri, Mohammad Zahidur Rahman, Chowdhury Mofizur Rahman

Abstract:

Recently, information security has become a key issue in information technology as the number of computer security breaches are exposed to an increasing number of security threats. A variety of intrusion detection systems (IDS) have been employed for protecting computers and networks from malicious network-based or host-based attacks by using traditional statistical methods to new data mining approaches in last decades. However, today's commercially available intrusion detection systems are signature-based that are not capable of detecting unknown attacks. In this paper, we present a new learning algorithm for anomaly based network intrusion detection system using decision tree algorithm that distinguishes attacks from normal behaviors and identifies different types of intrusions. Experimental results on the KDD99 benchmark network intrusion detection dataset demonstrate that the proposed learning algorithm achieved 98% detection rate (DR) in comparison with other existing methods.

Keywords: Detection rate, decision tree, intrusion detectionsystem, network security.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 3582
2972 Influence of Security on Fan Attendance during Nigeria Professional Football League Matches

Authors: B. O. Diyaolu

Abstract:

The stadium transcends a field of play to cultural heritage of a club especially when there is security of life and property and a conducive environment with exciting media facilities, CCTV and adequate field of play. Football fans love watching their clubs’ matches especially when nothing discourages their presence in the stadium. This study investigated the influence of security on fans’ attendance during Nigeria Professional Football League matches. Descriptive survey research design was used and the population consists of all Nigeria Professional Football League fans. Simple random sampling technique was used to pick a state from the six geo-political zones. 600 respondents comprising male and female fans were sampled from the ten selected vendors’ stands in each selected state. A structured questionnaire on Security and Fan attendance scale (SFAS) was used. The instrument consists of two sections. Section A seeks information on demographic data of the respondents, while section B was used to elicit information on security and fans’ attendance. The modified instrument which consists of 20 items has a reliability coefficient of 0.73. The hypothesis was tested at 0.05 significance level. The completed questionnaire was collated, coded and analyzed using descriptive statistics of frequency counts and percentage and inferential statistics of chi-square (X2). Findings of this study revealed that adequate security significantly influences fan attendance during Nigeria Professional Football League matches. There is no sport that can develop if the facilities in use are inadequate. Improving the condition of the stadium in Nigeria is paramount to the development of the Nigeria Professional Football League. All stakeholders in the organization of the League must put into consideration the need to improve the standard of the stadium as it will help to increase the attendance of fans during matches. Only the standard ones should be used during matches.

Keywords: Adequate Security, fans attendance, football fans, football stadium, Nigeria Professional Football League.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 536
2971 Stress versus Strain Behavior of Geopolymer Cement under Triaxial Stress Conditions in Saline and Normal Water

Authors: Haider M. Giasuddin, Jay G. Sanjayan, P. G. Ranjith

Abstract:

Geopolymer cement was evaluated as wellbore sealing material for carbon dioxide geosequestration application. Curing of cement system in saline water and strength testing in triaxial stress state condition under lateral confinement is relevant to primary cementing in CO2 geosequestration wellbore in saline aquifer. Geopolymer cement was cured in saline water (both at ambient conditions for 28 days and heated (60°C) conditions for 12 hours) and tested for triaxial strength at different levels of lateral confinement. Normal water and few other curing techniques were also studied both for geopolymer and API ‘G’ cement. Results reported were compared to evaluate the suitability of saline water for curing of geopolymer cement. Unconfined compression test results showed higher strength for curing in saline water than normal water. Besides, testing strength under lateral confinement demonstrated the material failure behavior from brittle to plastic.

Keywords: Fly ash, Geopolymer, Geosequestration, Saline water, Strength, Traiaxial test.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 2382
2970 Requirements Driven Multiple View Paradigm for Developing Security Architecture

Authors: K. Chandra Sekaran

Abstract:

This paper describes a paradigmatic approach to develop architecture of secure systems by describing the requirements from four different points of view: that of the owner, the administrator, the user, and the network. Deriving requirements and developing architecture implies the joint elicitation and describing the problem and the structure of the solution. The view points proposed in this paper are those we consider as requirements towards their contributions as major parties in the design, implementation, usage and maintenance of secure systems. The dramatic growth of the technology of Internet and the applications deployed in World Wide Web have lead to the situation where the security has become a very important concern in the development of secure systems. Many security approaches are currently being used in organizations. In spite of the widespread use of many different security solutions, the security remains a problem. It is argued that the approach that is described in this paper for the development of secure architecture is practical by all means. The models representing these multiple points of view are termed the requirements model (views of owner and administrator) and the operations model (views of user and network). In this paper, this multiple view paradigm is explained by first describing the specific requirements and or characteristics of secure systems (particularly in the domain of networks) and the secure architecture / system development methodology.

Keywords: Multiple view paradigms, requirements model, operations model, secure system, owner, administrator, user, network.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1346
2969 Agent-Based Modeling of Power Systems Infrastructure Cyber Security

Authors: Raman Paranjape

Abstract:

We present a new approach to evaluation of Cyber Security in Power Systems using the method of modeling the power systems Infrastructure using software agents. Interfaces between module and the home smart meter are recognized as the primary points of intrusion.

Keywords: Power Systems, Modeling and Simulation, Agent systems.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 2410
2968 Subcritical Water Extraction of Mannitol from Olive Leaves

Authors: S. M. Ghoreishi, R. Gholami Shahrestani, S. H. Ghaziaskar

Abstract:

Subcritical water extraction was investigated as a novel and alternative technology in the food and pharmaceutical industry for the separation of Mannitol from olive leaves and its results was compared with those of Soxhlet extraction. The effects of temperature, pressure, and flow rate of water and also momentum and mass transfer dimensionless variables such as Reynolds and Peclet Numbers on extraction yield and equilibrium partition coefficient were investigated. The 30-110 bars, 60-150°C, and flow rates of 0.2-2 mL/min were the water operating conditions. The results revealed that the highest Mannitol yield was obtained at 100°C and 50 bars. However, extraction of Mannitol was not influenced by the variations of flow rate. The mathematical modeling of experimental measurements was also investigated and the model is capable of predicting the experimental measurements very well. In addition, the results indicated higher extraction yield for the subcritical water extraction in contrast to Soxhlet method.

Keywords: Extraction, Mannitol, Modeling, Olive leaves, Soxhlet extraction, Subcritical water.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 3033
2967 The Behavior of Self-Compacting Light Weight Concrete Produced by Magnetic Water

Authors: Moosa Mazloom, Hojjat Hatami

Abstract:

The aim of this article is to access the optimal mix design of self-compacting light weight concrete. The effects of magnetic water, superplasticizer based on polycarboxylic-ether, and silica fume on characteristics of this type of concrete are studied. The workability of fresh concrete and the compressive strength of hardened concrete are considered here. For this purpose, nine mix designs were studied. The percentages of superplasticizer were 0.5, 1, and 2% of the weight of cement, and the percentages of silica fume were 0, 6, and 10% of the weight of cement. The water to cementitious ratios were 0.28, 0.32, and 0.36. The workability of concrete samples was analyzed by the devices such as slump flow, V-funnel, L box, U box, and Urimet with J ring. Then, the compressive strengths of the mixes at the ages of 3, 7, 28, and 90 days were obtained. The results show that by using magnetic water, the compressive strengths are improved at all the ages. In the concrete samples with ordinary water, more superplasticizer dosages were needed. Moreover, the combination of superplasticizer and magnetic water had positive effects on the mixes containing silica fume and they could flow easily.

Keywords: Magnetic water, self-compacting light weight concrete, silica fume, superplasticizer.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1270
2966 Experimental Investigation of Gas Bubble Behaviours in a Domestic Heat Pump Water Heating System

Authors: J. B. Qin, X. H. Jiang, Y. T. Ge

Abstract:

The growing awareness of global warming potential has internationally aroused interest and demand in reducing greenhouse gas emissions produced by human activity. Much national energy in the UK had been consumed in the residential sector mainly for space heating and domestic hot water production. Currently, gas boilers are mostly applied in the domestic water heating which contribute significantly to excessive CO2 emissions and consumption of primary energy resources. The issues can be solved by popularizing heat pump systems that are attributable to higher performance efficiency than those of traditional gas boilers. Even so, the heat pump system performance can be further enhanced if the dissolved gases in its hot water circuit can be efficiently discharged.  To achieve this target, the bubble behaviors in the heat pump water heating system need to be extensively investigated. In this paper, by varying different experimental conditions, the effects of various heat pump hot water side parameters on gas microbubble diameters were measured and analyzed. Correspondingly, the effect of each parameter has been investigated. These include varied system pressures, water flow rates, saturation ratios and heat outputs. The results measurement showed that the water flow rate is the most significant parameter to influence on gas microbubble productions. The research outcomes can significantly contribute to the understanding of gas bubble behaviors at domestic heat pump water heating systems and thus the efficient way for the discharging of the associated dissolved gases.  

Keywords: Dissolved gases in water, heat pump, domestic water heating system, microbubble formation.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 814
2965 Water Quality and Freshwater Fish Diversity at Khao Luang National Park, Thailand

Authors: S. Sutin, M. Jaroensutasinee, K. Jaroensutasinee

Abstract:

Water quality and freshwater fish diversity from nine waterfalls at Khao Luang National Park, Thailand was examined. Streams were shallow, fast flowing with clear water and rocky and sandy substrate. The mean water quality of waterfalls at Khao Luang National Park were as following pH 7.50, air temperature 24.27 °C, water temperature 26.37 °C, dissolved oxygen 7.88 mg/l, hardness 4.44-21.33 mg/l, alkalinity 3.55-11.88 mg/(as CaCO3). Twenty fish species were found at Khao Luang National Park belonging to nine families. A cluster analysis of water quality at Khao Luang National Park revealed that waterfalls at Khao Luang National Park were divided into two groups: A and B. Group A composed of two waterfalls (i.e. Aie Kaew and Wangmaipak) that flew to the Gulf of Thailand side. Group B composed of seven waterfalls (i.e. Promlok, Kalom, Nuafa, Suankun, Soidaw, Suanhai, and Thapae) that flew to the Andaman Sea side (Fig. 2) .The Cyprinids represented the major species in all the waterfalls comprising of 45%.

Keywords: Water quality, Freshwater fishes, National Park, Khao Luang, Thailand.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 2044
2964 General Awareness of Teenagers in Information Security

Authors: Magdalena Naplavova, Tomas Ludik, Petr Hruza, Frantisek Bozek

Abstract:

The use of IT equipment has become a part of every day. However, each device that is part of cyberspace should be secured against unauthorized use. It is very important to know the basics of these security devices, but also the basics of safe conduct their owners. This information should be part of every curriculum computer science education in primary and secondary schools. Therefore, the work focuses on the education of pupils in primary and secondary schools on the Internet. Analysis of the current state describes approaches to the education of pupils in security issues on the Internet. The paper presents a questionnaire-based survey which was carried out in the Czech Republic, whose task was to ascertain the level of opinion pupils in primary and secondary schools on the issue of communication in social networks. The research showed that awareness of socio-pathological phenomena on the Internet environment is very low. Based on the results it was proposed appropriate ways of teaching to this issue and its inclusion a proposal of curriculum for primary and secondary schools.

Keywords: Cyberspace, educational system, general awareness, information security, questionnaire, socio-pathological phenomena.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 2322
2963 Analyzing Environmental Emotive Triggers in Terrorist Propaganda

Authors: Travis Morris

Abstract:

The purpose of this study is to measure the intersection of environmental security entities in terrorist propaganda. To the best of author’s knowledge, this is the first study of its kind to examine this intersection within terrorist propaganda. Rosoka, natural language processing software and frame analysis are used to advance our understanding of how environmental frames function as emotive triggers. Violent jihadi demagogues use frames to suggest violent and non-violent solutions to their grievances. Emotive triggers are framed in a way to leverage individual and collective attitudes in psychological warfare. A comparative research design is used because of the differences and similarities that exist between two variants of violent jihadi propaganda that target western audiences. Analysis is based on salience and network text analysis, which generates violent jihadi semantic networks. Findings indicate that environmental frames are used as emotive triggers across both data sets, but also as tactical and information data points. A significant finding is that certain core environmental emotive triggers like “water,” “soil,” and “trees” are significantly salient at the aggregate level across both data sets. All environmental entities can be classified into two categories, symbolic and literal. Importantly, this research illustrates how demagogues use environmental emotive triggers in cyber space from a subcultural perspective to mobilize target audiences to their ideology and praxis. Understanding the anatomy of propaganda construction is necessary in order to generate effective counter narratives in information operations. This research advances an additional method to inform practitioners and policy makers of how environmental security and propaganda intersect.

Keywords: Emotive triggers, environmental security, natural language processing, propaganda analysis.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 925
2962 Soil-Cement Floor Produced with Alum Water Treatment Residues

Authors: Flavio Araujo, Paulo Scalize, Julio Lima, Natalia Vieira, Antonio Albuquerque, Isabela Santos

Abstract:

From a concern regarding the environmental impacts caused by the disposal of residues generated in Water Treatment Plants (WTP's), alternatives ways have been studied to use these residues as raw material for manufacture of building materials, avoiding their discharge on water streams, disposal on sanitary landfills or incineration. This paper aims to present the results of a research work, which is using WTR for replacing the soil content in the manufacturing of soil-cement floor with proportions of 0, 5, 10 and 15%. The samples tests showed a reduction mechanical strength in so far as has increased the amount of waste. The water absorption was below the maximum of 6% required by the standard. The application of WTR contributes to the reduction of the environmental damage in the water treatment industry.

Keywords: Residue, soil-cement floor, sustainable, WTP.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1219
2961 A Survey on Principal Aspects of Secure Image Transmission

Authors: Ali Soleymani, Zulkarnain Md Ali, Md Jan Nordin

Abstract:

This paper is a review on the aspects and approaches of design an image cryptosystem. First a general introduction given for cryptography and images encryption and followed by different techniques in image encryption and related works for each technique surveyed. Finally, general security analysis methods for encrypted images are mentioned.

Keywords: Image, cryptography, encryption, security, analysis.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 2353
2960 A Performance Analysis Study of an Active Solar Still Integrating Fin at the Basin Plate

Authors: O. Ansari, H. Hafs, A. Bah, M. Asbik, M. Malha, M. Bakhouya

Abstract:

Water is one of the most important and vulnerable natural resources due to human activities and climate change. Water-level continues declining year after year and it is primarily caused by sustained, extensive, and traditional usage methods. Improving water utilization becomes an urgent issue in order satisfy the increasing population needs. Desalination of seawater or brackish water could help in increasing water potential. However, a cost-effective desalination process is required. The most appropriate method for performing this desalination is solar-driven distillation, given its simplicity, low cost and especially the availability of the solar energy source. The main objective of this paper is to demonstrate the influence of coupling integrated basin plate by fins with preheating by solar collector on the performance of solar still. The energy balance equations for the various elements of the solar still are introduced. A numerical example is used to show the efficiency of the proposed solution.

Keywords: Active solar still, Brackisch water, desalination, fins, solar collector.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 781
2959 Governance, Risk Management, and Compliance Factors Influencing the Adoption of Cloud Computing in Australia

Authors: Tim Nedyalkov

Abstract:

A business decision to move to the cloud brings fundamental changes in how an organization develops and delivers its Information Technology solutions. The accelerated pace of digital transformation across businesses and government agencies increases the reliance on cloud-based services. Collecting, managing, and retaining large amounts of data in cloud environments make information security and data privacy protection essential. It becomes even more important to understand what key factors drive successful cloud adoption following the commencement of the Privacy Amendment Notifiable Data Breaches (NDB) Act 2017 in Australia as the regulatory changes impact many organizations and industries. This quantitative correlational research investigated the governance, risk management, and compliance factors contributing to cloud security success. The factors influence the adoption of cloud computing within an organizational context after the commencement of the NDB scheme. The results and findings demonstrated that corporate information security policies, data storage location, management understanding of data governance responsibilities, and regular compliance assessments are the factors influencing cloud computing adoption. The research has implications for organizations, future researchers, practitioners, policymakers, and cloud computing providers to meet the rapidly changing regulatory and compliance requirements.

Keywords: Cloud compliance, cloud security, cloud security governance, data governance, privacy protection.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 867
2958 Impact of Interventions by Consortium for Improving Agriculture-based Livelihoods in Central Africa (CIALCA) on Food and Nutrition Security of Farmer Households

Authors: Ekesa B. Nakhauka, De Lange M., Macharia I., Garming H., Ouma E., Birachi E., Van Asten P., Van-Lauwe B., Blomme G.

Abstract:

Impact of adopting products promoted by the Consortium for Improving Agriculture-based livelihoods in Central Africa (CIALCA) on food and nutrition security was tested. Multi-stage sampling was used to select 7 project mandate areas, 5 villages/mandate area (stratified into action, satellite and control sites) and 913 households. Structured questionnaires were administered; analysis of impact based on comparison between stratums, differences in means tested by ANOVA and significance of difference obtained by Tukey's HSD multiple rank tests. Perception of adequate food sufficiency received a higher rating in action and satellite sites compared to control sites reason being improved agricultural technologies. For >60% of households, worsened food security was due to climatic conditions. Although a higher proportion of households in action and satellite was meeting calorie RDIs in DRC and Burundi the difference was insignificant from control sites. 53% of respondents in control sites indicated a decrease in intake of protein rich foods, this was significantly higher than the proportion in the action (46%) and satellite (41%) sites.

Keywords: Food security, Farmer-households, Nutrition security

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1984
2957 Development of Total Maximum Daily Load Using Water Quality Modelling as an Approach for Watershed Management in Malaysia

Authors: S. A. Che Osmi, W. M. F. Wan Ishak, H. Kim, M. A. Azman, M. A. Ramli

Abstract:

River is one of important water sources for many activities including industrial and domestic usage such as daily usage, transportation, power supply and recreational activities. However, increasing activities in a river has grown the sources of pollutant enters the water bodies, and degraded the water quality of the river. It becomes a challenge to develop an effective river management to ensure the water sources of the river are well managed and regulated. In Malaysia, several approaches for river management have been implemented such as Integrated River Basin Management (IRBM) program for coordinating the management of resources in a natural environment based on river basin to ensure their sustainability lead by Department of Drainage and Irrigation (DID), Malaysia. Nowadays, Total Maximum Daily Load (TMDL) is one of the best approaches for river management in Malaysia. TMDL implementation is regulated and implemented in the United States. A study on the development of TMDL in Malacca River has been carried out by doing water quality monitoring, the development of water quality model by using Environmental Fluid Dynamic Codes (EFDC), and TMDL implementation plan. The implementation of TMDL will help the stakeholders and regulators to control and improve the water quality of the river. It is one of the good approaches for river management in Malaysia.

Keywords: EFDC, river management, TMDL, water quality modelling.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1523
2956 Physicochemical Parameters of Tap Water in Dhahran, Saudi Arabia: An Empirical Assessment

Authors: Ahmed A. Hassan, Bassam Tawabini

Abstract:

In this study, the physicochemical parameters of Dhahran tap water were assessed to determine its suitability for drinking purposes. A total of 45 water samples were collected from different locations. The results indicate temperature ranges of 19.76 to 22.86 °C, pH (6.5 to 8.23), dissolved oxygen (4.21 to 8.32 mg/L), conductivity (232 to 2586 uS/cm), turbidity (0.17 to 0.37 Nephelometric Turbidity unit (NTU)), total dissolved solids (93 to 1671 mg/L), total alkalinity (4.11 to 24.04 mg/L), calcium (0.02 to 164 mg/L), magnesium (0 .6 to 77.9 mg/L), chloride (32.7 to 568.7 mg/L), nitrate (0.02 to 3 mg/L), fluoride (0.001 to 0.591 mg/L), sodium (18.4 to 232 mg/L), potassium (0.5 to 26.4 mg/L), and sulphate (2.39 to 258 mg/L). The results were compared with the drinking water standards recommended by the World Health Organization (WHO) and the United States Environmental Protection Agency (USEPA). The study determined that though the levels of most of the physicochemical parameters comply with the standards, however, slight deviations exist. This is evident in the values of the physical parameters (conductivity and total dissolved solids), and the chemical parameters (sulphate, chloride, and sodium) recorded at a few sample sites.

Keywords: Physicochemical parameters, tap water, water quality, Dhahran.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 468
2955 Secure Protocol for Short Message Service

Authors: Shubat S. Ahmeda, Ashraf M. Ali Edwila

Abstract:

Short Message Service (SMS) has grown in popularity over the years and it has become a common way of communication, it is a service provided through General System for Mobile Communications (GSM) that allows users to send text messages to others. SMS is usually used to transport unclassified information, but with the rise of mobile commerce it has become a popular tool for transmitting sensitive information between the business and its clients. By default SMS does not guarantee confidentiality and integrity to the message content. In the mobile communication systems, security (encryption) offered by the network operator only applies on the wireless link. Data delivered through the mobile core network may not be protected. Existing end-to-end security mechanisms are provided at application level and typically based on public key cryptosystem. The main concern in a public-key setting is the authenticity of the public key; this issue can be resolved by identity-based (IDbased) cryptography where the public key of a user can be derived from public information that uniquely identifies the user. This paper presents an encryption mechanism based on the IDbased scheme using Elliptic curves to provide end-to-end security for SMS. This mechanism has been implemented over the standard SMS network architecture and the encryption overhead has been estimated and compared with RSA scheme. This study indicates that the ID-based mechanism has advantages over the RSA mechanism in key distribution and scalability of increasing security level for mobile service.

Keywords: Elliptic Curve Cryptography (ECC), End-to-end Security, Identity-based Cryptography, Public Key, RSA, SMS Protocol.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 2195