Search results for: water security.
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 3366

Search results for: water security.

2706 The Use of Information and Communication Technologies in Electoral Procedures: Comments on Electronic Voting Security

Authors: Magdalena Musiał-Karg

Abstract:

The expansion of telecommunication and progress of electronic media constitute important elements of our times. The recent worldwide convergence of information and communication technologies (ICT) and dynamic development of the mass media is leading to noticeable changes in the functioning of contemporary states and societies. Currently, modern technologies play more and more important roles and filter down to almost every field of contemporary human life. It results in the growth of online interactions that can be observed by the inconceivable increase in the number of people with home PCs and Internet access. The proof of it is undoubtedly the emergence and use of concepts such as e-society, e-banking, e-services, e-government, e-government, e-participation and e-democracy. The newly coined word e-democracy evidences that modern technologies have also been widely used in politics. Without any doubt in most countries all actors of political market (politicians, political parties, servants in political/public sector, media) use modern forms of communication with the society. Most of these modern technologies progress the processes of getting and sending information to the citizens, communication with the electorate, and also – which seems to be the biggest advantage – electoral procedures. Thanks to implementation of ICT the interaction between politicians and electorate are improved. The main goal of this text is to analyze electronic voting (e-voting) as one of the important forms of electronic democracy in terms of security aspects. The author of this paper aimed at answering the questions of security of electronic voting as an additional form of participation in elections and referenda.

Keywords: Electronic democracy, electronic participation, electronic voting, security of e-voting, ICT.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1065
2705 Effect of Marginal Quality Groundwater on Yield of Cotton Crop and Soil Salinity Status

Authors: Qureshi, A. L., Mahessar A. A., Dashti, R. K., Yasin S. M.

Abstract:

In this paper, effect of marginal quality groundwater on yield of cotton crop and soil salinity was studied. In this connection, three irrigation treatments each with four replications were applied. These treatments were i) use of canal water (T1), ii) use of marginal quality groundwater from tubewell (T2), and iii) conjunctive use by mixing with the ratio of 1:1 of canal water and marginal quality tubewell water (T3). Water was applied to the crop cultivated in Kharif season 2011; its quantity has been measured using cut-throat flume. Total 11 watering each of 50 mm depth have been applied from 20th April to 20th July, 2011. Further, irrigations were stopped due to monsoon rainfall up to crop harvesting. Maximum crop yield (seed cotton) was observed under T1 which was 1,517 kg/ha followed by T3 (mixed canal and tubewell water) having 1009 kg/ha and T2 i.e. marginal quality groundwater having 709 kg/ha. This concludes that crop yield in T2 and T3 in comparison to T1was reduced by about 53 and 30% respectively. It has been observed that yield of cotton crop is below potential limit for three treatments due to unexpected rainfall at the time of full flowering season; thus the yield was adversely affected. However, salt deposition in soil profiles was not observed that is due to leaching effect of heavy rainfall occurred during monsoon season.

Keywords: Conjunctive Use, Cotton Crop, Groundwater, Soil Salinity Status, Water Use Efficiency (WUE).

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 2363
2704 Controlling Transient Flow in Pipeline Systems by Desurging Tank with Automatic Air Control

Authors: I. Abuiziah, A. Oulhaj, K. Sebari, D. Ouazar

Abstract:

Desurging tank with automatic air control “DTAAC” is a water hammer protection device, operates either an open or closed surge tank according to the water level inside the surge tank, with the volume of air trapped in the filling phase, this protection device has the advantages of its easy maintenance, and does not need to run any external energy source (air compressor). A computer program has been developed based on the characteristic method to simulate flow transient phenomena in pressurized water pipeline systems, it provides the influence of using the protection devices to control the adverse effects due to excessive and low pressure occurring in this phenomena. The developed model applied to a simple main water pipeline system: pump combined with DTAAC connected to a reservoir.  The results obtained provide that the model is an efficient tool for water hammer analysis. Moreover; using the DTAAC reduces the unfavorable effects of the transients.

Keywords: DTAAC, Flow transient, Numerical model, Pipeline system, Protection devices.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 2806
2703 M-band Wavelet and Cosine Transform Based Watermark Algorithm Using Randomization and Principal Component Analysis

Authors: Tong Liu, Xuan Xu, Xiaodi Wang

Abstract:

Computational techniques derived from digital image processing are playing a significant role in the security and digital copyrights of multimedia and visual arts. This technology has the effect within the domain of computers. This research presents discrete M-band wavelet transform (MWT) and cosine transform (DCT) based watermarking algorithm by incorporating the principal component analysis (PCA). The proposed algorithm is expected to achieve higher perceptual transparency. Specifically, the developed watermarking scheme can successfully resist common signal processing, such as geometric distortions, and Gaussian noise. In addition, the proposed algorithm can be parameterized, thus resulting in more security. To meet these requirements, the image is transformed by a combination of MWT & DCT. In order to improve the security further, we randomize the watermark image to create three code books. During the watermark embedding, PCA is applied to the coefficients in approximation sub-band. Finally, first few component bands represent an excellent domain for inserting the watermark.

Keywords: discrete M-band wavelet transform , discrete M-band wavelet transform, randomized watermark, principal component analysis

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 2006
2702 Tsunami Modelling using the Well-Balanced Scheme

Authors: Ahmad Izani M. Ismail, Md. Fazlul Karim, Mai Duc Thanh

Abstract:

A well balanced numerical scheme based on stationary waves for shallow water flows with arbitrary topography has been introduced by Thanh et al. [18]. The scheme was constructed so that it maintains equilibrium states and tests indicate that it is stable and fast. Applying the well-balanced scheme for the one-dimensional shallow water equations, we study the early shock waves propagation towards the Phuket coast in Southern Thailand during a hypothetical tsunami. The initial tsunami wave is generated in the deep ocean with the strength that of Indonesian tsunami of 2004.

Keywords: Tsunami study, shallow water, conservation law, well-balanced scheme, topography. Subject classification: 86 A 05, 86 A 17.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1741
2701 Numerical Simulation of a Single Air Bubble Rising in Water with Various Models of Surface Tension Force

Authors: Afshin Ahmadi Nadooshan, Ebrahim Shirani

Abstract:

Different numerical methods are employed and developed for simulating interfacial flows. A large range of applications belong to this group, e.g. two-phase flows of air bubbles in water or water drops in air. In such problems surface tension effects often play a dominant role. In this paper, various models of surface tension force for interfacial flows, the CSF, CSS, PCIL and SGIP models have been applied to simulate the motion of small air bubbles in water and the results were compared and reviewed. It has been pointed out that by using SGIP or PCIL models, we are able to simulate bubble rise and obtain results in close agreement with the experimental data.

Keywords: Volume-of-Fluid, Bubble Rising, SGIP model, CSS model, CSF model, PCIL model, interface, surface tension force.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1779
2700 Hybrid Intelligent Intrusion Detection System

Authors: Norbik Bashah, Idris Bharanidharan Shanmugam, Abdul Manan Ahmed

Abstract:

Intrusion Detection Systems are increasingly a key part of systems defense. Various approaches to Intrusion Detection are currently being used, but they are relatively ineffective. Artificial Intelligence plays a driving role in security services. This paper proposes a dynamic model Intelligent Intrusion Detection System, based on specific AI approach for intrusion detection. The techniques that are being investigated includes neural networks and fuzzy logic with network profiling, that uses simple data mining techniques to process the network data. The proposed system is a hybrid system that combines anomaly, misuse and host based detection. Simple Fuzzy rules allow us to construct if-then rules that reflect common ways of describing security attacks. For host based intrusion detection we use neural-networks along with self organizing maps. Suspicious intrusions can be traced back to its original source path and any traffic from that particular source will be redirected back to them in future. Both network traffic and system audit data are used as inputs for both.

Keywords: Intrusion Detection, Network Security, Data mining, Fuzzy Logic.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 2127
2699 Two Undetectable On-line Dictionary Attacks on Debiao et al.’s S-3PAKE Protocol

Authors: Sung-Bae Choi, Sang-Yoon Yoon, Eun-Jun Yoon

Abstract:

In 2011, Debiao et al. pointed out that S-3PAKE protocol proposed by Lu and Cao for password-authenticated key exchange in the three-party setting is vulnerable to an off-line dictionary attack. Then, they proposed some countermeasures to eliminate the security vulnerability of the S-3PAKE. Nevertheless, this paper points out their enhanced S-3PAKE protocol is still vulnerable to undetectable on-line dictionary attacks unlike their claim.

Keywords: Authentication, 3PAKE, password, three-party key exchange, network security, dictionary attacks.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1631
2698 Ecosystems of Lake Sevan Basin-s Rivers in Armenia

Authors: Eugenie A. Kachvoryan, Astghik Z. Pepoyan, Maria V. Harutyunova, Anahit M. Manvelyan

Abstract:

Taking into account the importance of Lake Sevan and Lake Sevan basin-s rivers for Armenian economy, the main goals of our investigations were the documentation of water quality and the biodiversity of invertebrates developed in Lake Sevan basin-s rivers and selected tributaries. Moderately satisfied ecological condition for the biodiversity of Lake Sevan basin-s rivers has been established, and the changes in species- composition of zoobenthos in Lake Sevan were detected. A growing tendency of antibiotic resistance among E. coli isolates in water resources has been shown.

Keywords: Biodiversity, ecosystem, Lake Sevan, water-quality, zoobenthos.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 3089
2697 Analysis of Polymer Surface Modifications due to Discharges Initiated by Water Droplets under High Electric Fields

Authors: Michael G. Danikas, Ramanujam Sarathi, Pavlos Ramnalis, Stefanos L. Nalmpantis

Abstract:

This paper investigates the influence of various parameters on the behaviour of water droplets on polymeric surfaces under high electric fields. An inclined plane test was carried out to understand the droplet behaviour in strong electric field. Parameters such as water droplet conductivity, droplet volume, polymeric surface roughness and droplet positioning with respect to the electrodes were studied. The flashover voltage is affected by all aforementioned parameters. The droplet positioning is in some cases more vital than the droplet volume. Surface damages were analysed using Scanning Electron Microscopy (SEM) studies and by Energy dispersive X-ray Analysis (EDAX). It is observes that magnitude of discharge have direct influence on amount of surface da

Keywords: Water droplet, polymeric surface, hydrophobicity, partial discharges, SEM, EDAX.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 2025
2696 Pathogen Removal Under the Influence of Iron

Authors: Umapriya.R., S.Shrihari

Abstract:

Drinking water is one of the most valuable resources available to mankind. The presence of pathogens in drinking water is highly undesirable. Because of the Lateritic soil, the iron concentrations were high in ground water. High concentration of iron and other trace elements could restrict bacterial growth and modify their metabolic pattern as well. The bacterial growth rate reduced in the presence of iron in water. This paper presents the results of a controlled laboratory study conducted to assess the inhibition of micro-organism (pathogen) in well waters in the presence of dissolved iron concentrations. Synthetic samples were studied in the laboratory and the results compared with field samples. Predictive model for microbial inhibition in the presence of iron is presented. It was seen that the bore wells, open wells and the field results varied, probably due to the nature of micro-organism utilizing the iron in well waters.

Keywords: Disinfection, Disinfectant, Iron, Laterite.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1880
2695 The Study of Stable Isotopes (18O, 2H & 13C) in Kardeh River and Dam Reservoir, North-Eastern Iran

Authors: Hossein Mohammadzadeh, Mojtaba Heydarizad

Abstract:

Among various water resources, the surface water has a dominant role in providing water supply in the arid and semi-arid region of Iran. Andarokh-Kardeh basin is located in 50 km from Mashhad city - the second biggest city of Iran (NE of Iran), draining by Kardeh river which provides a significant portion of potable and irrigation water needs for Mashhad. The stable isotopes (18O, 2H,13C-DIC, and 13C-DOC), as reliable and precious water fingerprints, have been measured in Kardeh river (Kharket, Mareshk, Jong, All and Kardeh stations) and in Kardeh dam reservoirs (at five different sites S1 to S5) during March to June 2011 and June 2012. On δ18O vs. δ2H diagram, the river samples were plotted between Global and Eastern Mediterranean Meteoric Water lines (GMWL and EMMWL) which demonstrate that various moisture sources are providing humidity for precipitation events in this area. The enriched δ18O and δ2H values (-6.5 ‰ and -44.5 ‰ VSMOW) of Kardeh dam reservoir are compared to Kardeh river (-8.6‰and-54.4‰), and its deviation from Mashhad meteoric water line (MMWL- δ2H=7.16δ18O+11.22) is due to evaporation from the open surface water body. The enriched value of δ 13C-DIC and high amount of DIC values (-7.9 ‰ VPDB and 57.23 ppm) in the river and Kardeh dam reservoir (-7.3 ‰ VPDB and 55.53 ppm) is due to dissolution of Mozdooran Carbonate Formation lithology (Jm1 to Jm3 units) (contains enriched δ13C DIC values of 9.2‰ to 27.7‰ VPDB) in the region. Because of the domination of C3 vegetations in Andarokh_Kardeh basin, the δ13C-DOC isotope of the river (-28.4‰ VPDB) and dam reservoir (-32.3‰ VPDB) demonstrate depleted values. Higher DOC concentration in dam reservoir (2.57 ppm) compared to the river (0.72 ppm) is due to more biologogical activities and organic matters in dam reservoir.

Keywords: Dam reservoir, Iran, Kardeh river, Khorasan razavi, Stable isotopes.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1014
2694 Methods and Algorithms of Ensuring Data Privacy in AI-Based Healthcare Systems and Technologies

Authors: Omar Farshad Jeelani, Makaire Njie, Viktoriia M. Korzhuk

Abstract:

Recently, the application of AI-powered algorithms in healthcare continues to flourish. Particularly, access to healthcare information, including patient health history, diagnostic data, and PII (Personally Identifiable Information) is paramount in the delivery of efficient patient outcomes. However, as the exchange of healthcare information between patients and healthcare providers through AI-powered solutions increases, protecting a person’s information and their privacy has become even more important. Arguably, the increased adoption of healthcare AI has resulted in a significant concentration on the security risks and protection measures to the security and privacy of healthcare data, leading to escalated analyses and enforcement. Since these challenges are brought by the use of AI-based healthcare solutions to manage healthcare data, AI-based data protection measures are used to resolve the underlying problems. Consequently, these projects propose AI-powered safeguards and policies/laws to protect the privacy of healthcare data. The project present the best-in-school techniques used to preserve data privacy of AI-powered healthcare applications. Popular privacy-protecting methods like Federated learning, cryptography techniques, differential privacy methods, and hybrid methods are discussed together with potential cyber threats, data security concerns, and prospects. Also, the project discusses some of the relevant data security acts/laws that govern the collection, storage, and processing of healthcare data to guarantee owners’ privacy is preserved. This inquiry discusses various gaps and uncertainties associated with healthcare AI data collection procedures, and identifies potential correction/mitigation measures.

Keywords: Data privacy, artificial intelligence, healthcare AI, data sharing, healthcare organizations.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 93
2693 Auto-Calibration and Optimization of Large-Scale Water Resources Systems

Authors: Arash Parehkar, S. Jamshid Mousavi, Shoubo Bayazidi, Vahid Karami, Laleh Shahidi, Arash Azaranfar, Ali Moridi, M. Shabakhti, Tayebeh Ariyan, Mitra Tofigh, Kaveh Masoumi, Alireza Motahari

Abstract:

Water resource systems modeling has constantly been a challenge through history for human beings. As the innovative methodological development is evolving alongside computer sciences on one hand, researches are likely to confront more complex and larger water resources systems due to new challenges regarding increased water demands, climate change and human interventions, socio-economic concerns, and environment protection and sustainability. In this research, an automatic calibration scheme has been applied on the Gilan’s large-scale water resource model using mathematical programming. The water resource model’s calibration is developed in order to attune unknown water return flows from demand sites in the complex Sefidroud irrigation network and other related areas. The calibration procedure is validated by comparing several gauged river outflows from the system in the past with model results. The calibration results are pleasantly reasonable presenting a rational insight of the system. Subsequently, the unknown optimized parameters were used in a basin-scale linear optimization model with the ability to evaluate the system’s performance against a reduced inflow scenario in future. Results showed an acceptable match between predicted and observed outflows from the system at selected hydrometric stations. Moreover, an efficient operating policy was determined for Sefidroud dam leading to a minimum water shortage in the reduced inflow scenario.

Keywords: Auto-calibration, Gilan, Large-Scale Water Resources, Simulation.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1789
2692 Effect of Cooling Approaches on Chemical Compositions, Phases, and Acidolysis of Panzhihua Titania Slag

Authors: Bing Song, Kexi Han, Xuewei Lv

Abstract:

Titania slag is a high quality raw material containing titanium in the subsequent process of titanium pigment. The effects of cooling approaches of granulating, water cooling, and air cooling on chemical, phases, and acidolysis of Panzhihua titania slag were investigated. Compared to the original slag which was prepared by the conventional processing route, the results show that the titania slag undergoes oxidation of Ti3+during different cooling ways. The Ti2O3 content is 17.50% in the original slag, but it is 16.55% and 16.84% in water cooled and air-cooled slag, respectively. Especially, the Ti2O3 content in granulated slag is decreased about 27.6%. The content of Fe2O3 in granulated slag is approximately 2.86% also obviously higher than water (<0.5%) or air-cooled slag (<0.5%). Rutile in cooled titania slag was formed because of the oxidation of Ti3+. The rutile phase without a noticeable change in water cooled and air-cooled slag after the titania slag was cooled, but increased significantly in the granulated slag. The rate of sulfuric acid acidolysis of cooled slag is less than the original slag. The rate of acidolysis is 90.61% and 92.46% to the water-cooled slag and air-cooled slag, respectively. However, the rate of acidolysis of the granulated slag is less than that of industry slag about 20%, only 74.72%.

Keywords: Cooling approaches, titania slag, granulating, sulfuric acid acidolysis,

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 857
2691 Efficient Secured Lossless Coding of Medical Images– Using Modified Runlength Coding for Character Representation

Authors: S. Annadurai, P. Geetha

Abstract:

Lossless compression schemes with secure transmission play a key role in telemedicine applications that helps in accurate diagnosis and research. Traditional cryptographic algorithms for data security are not fast enough to process vast amount of data. Hence a novel Secured lossless compression approach proposed in this paper is based on reversible integer wavelet transform, EZW algorithm, new modified runlength coding for character representation and selective bit scrambling. The use of the lifting scheme allows generating truly lossless integer-to-integer wavelet transforms. Images are compressed/decompressed by well-known EZW algorithm. The proposed modified runlength coding greatly improves the compression performance and also increases the security level. This work employs scrambling method which is fast, simple to implement and it provides security. Lossless compression ratios and distortion performance of this proposed method are found to be better than other lossless techniques.

Keywords: EZW algorithm, lifting scheme, losslesscompression, reversible integer wavelet transform, securetransmission, selective bit scrambling, modified runlength coding .

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1362
2690 Thermal Analysis on Heat Transfer Enhancement and Fluid Flow for Al2O3 Water-Ethylene Glycol Nanofluid in Single PEMFC Mini Channel

Authors: Irnie Zakaria, W. A. N. W Mohamed, W. H. Azmi

Abstract:

Thermal enhancement of a single mini channel in Proton Exchange Membrane Fuel Cell (PEMFC) cooling plate is numerically investigated. In this study, low concentration of Al2O3 in Water - Ethylene Glycol mixtures is used as coolant in single channel of carbon graphite plate to mimic the mini channels in PEMFC cooling plate. A steady and incompressible flow with constant heat flux is assumed in the channel of 1mm x 5mm x 100mm. Nano particle of Al2O3 used ranges from 0.1, 0.3 and 0.5 vol % concentration and then dispersed in 60:40 (water: Ethylene Glycol) mixture. The effect of different flow rates to fluid flow and heat transfer enhancement in Re number range of 20 to 140 was observed. The result showed that heat transfer coefficient was improved by 18.11%, 9.86% and 5.37% for 0.5, 0.3 and 0.1 vol. % Al2O3 in 60:40 (water: EG) as compared to base fluid of 60:40 (water: EG). It is also showed that the higher vol. % concentration of Al2O3 performed better in term of thermal enhancement but at the expense of higher pumping power required due to increase in pressure drop experienced. Maximum additional pumping power of 0.0012W was required for 0.5 vol % Al2O3 in 60:40 (water: EG) at Re number 140.

Keywords: Heat transfer, mini channel, nanofluid, PEMFC.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 2127
2689 Removal of Cationic Heavy Metal and HOC from Soil-Washed Water Using Activated Carbon

Authors: Chi Kyu Ahn, Young Mi Kim, Seung Han Woo, Jong Moon Park

Abstract:

Soil washing process with a surfactant solution is a potential technology for the rapid removal of hydrophobic organic compound (HOC) from soil. However, large amount of washed water would be produced during operation and this should be treated effectively by proper methods. The soil washed water for complex contaminated site with HOC and heavy metals might contain high amount of pollutants such as HOC and heavy metals as well as used surfactant. The heavy metals in the soil washed water have toxic effects on microbial activities thus these should be removed from the washed water before proceeding to a biological waste-water treatment system. Moreover, the used surfactant solutions are necessary to be recovered for reducing the soil washing operation cost. In order to simultaneously remove the heavy metals and HOC from soil-washed water, activated carbon (AC) was used in the present study. In an anionic-nonionic surfactant mixed solution, the Cd(II) and phenanthrene (PHE) were effectively removed by adsorption on activated carbon. The removal efficiency for Cd(II) was increased from 0.027 mmol-Cd/g-AC to 0.142 mmol-Cd/g-AC as the mole ratio of SDS increased in the presence of PHE. The adsorptive capacity of PHE was also increased according to the SDS mole ratio due to the decrement of molar solubilization ratios (MSR) for PHE in an anionic-nonionic surfactant mixture. The simultaneous adsorption of HOC and cationic heavy metals using activated carbon could be a useful method for surfactant recovery and the reduction of heavy metal toxicity in a surfactant-enhanced soil washing process.

Keywords: Activated carbon, Anionic-nonionic surfactant mixture, Cationic heavy metal, HOC, Soil washing

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1726
2688 Strategies for Securing Safety Messages with Fixed Key Infrastructure in Vehicular Network

Authors: Nasser Mozayani, Maryam Barzegar, Hoda Madani

Abstract:

Vehicular communications play a substantial role in providing safety in transportation by means of safety message exchange. Researchers have proposed several solutions for securing safety messages. Protocols based on a fixed key infrastructure are more efficient in implementation and maintain stronger security in comparison with dynamic structures. These protocols utilize zone partitioning to establish distinct key infrastructure under Certificate Authority (CA) supervision in different regions. Secure anonymous broadcasting (SAB) is one of these protocols that preserves most of security aspects but it has some deficiencies in practice. A very important issue is region change of a vehicle for its mobility. Changing regions leads to change of CA and necessity of having new key set to resume communication. In this paper, we propose solutions for informing vehicles about region change to obtain new key set before entering next region. This hinders attackers- intrusion, packet loss and lessons time delay. We also make key request messages secure by confirming old CA-s public key to the message, hence stronger security for safety message broadcasting is attained.

Keywords: Secure broadcasting, Certificate authority (CA), Key exchange, Vehicular network.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1536
2687 “Friction Surfaces” of Airport Emergency Plan

Authors: Jakub Kraus, Vladimír Plos, Peter Vittek

Abstract:

This article focuses on the issue of airport emergency plans, which are documents describing reactions to events with impact on aviation safety or aviation security. The article specifically focuses on the use and creation of emergency plans, where could be found a number of disagreements between different stakeholders, for which the airport emergency plan applies. Those are the friction surfaces of interfaces, which is necessary to identify and ensure them smooth process to avoid dangerous situations or delay.

Keywords: Airport emergency plan, aviation safety, aviation security, comprehensive management system, friction surfaces of airport emergency plan, interfaces of processes.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1944
2686 The Prevalence of Organized Retail Crime in Riyadh, Saudi Arabia

Authors: Saleh Dabil

Abstract:

This study investigates the level of existence of organized retail crime in supermarkets of Riyadh, Saudi Arabia. The store managers, security managers and general employees were asked about the types of retail crimes occur in the stores. Three independent variables were related to the report of organized retail theft. The independent variables are: 1) the supermarket profile (volume, location, standard and type of the store), 2) the social physical environment of the store (maintenance, cleanness and overall organizational cooperation), 3) the security techniques and loss prevention electronics techniques used. The theoretical framework of this study based on the social disorganization theory. This study concluded that the organized retail theft, in specific, organized theft is moderately apparent in Riyadh stores. The general result showed that the environment of the stores has an effect on the prevalence of organized retail theft with relation to the gender of thieves, age groups, working shift, type of stolen items as well as the number of thieves in one case. Among other reasons, some factors of the organized theft are: economic pressure of customers based on the location of the store. The dealing of theft also was investigated to have a clear picture of stores dealing with organized retail theft. The result showed that mostly, thieves sent without any action and sometimes given written warning. Very few cases dealt with by police. There are other factors in the study can be looked up in the text. This study suggests solving the problem of organized theft; first, is "the well distributing of the duties and responsibilities between the employees especially for security purposes". Second "Installation of strong security system" and "Making well-designed store layout". Third is "giving training for general employees" and "to give periodically security skills training of employees". There are other suggestions in the study can be looked up in the text.

Keywords: Organized Crime, Retail, Theft, Loss prevention, Store environment.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 2328
2685 Improve of Evaluation Method for Information Security Levels of CIIP (Critical Information Infrastructure Protection)

Authors: Dong-Young Yoo, Jong-Whoi Shin, Gang Shin Lee, Jae-Il Lee

Abstract:

As the disfunctions of the information society and social development progress, intrusion problems such as malicious replies, spam mail, private information leakage, phishing, and pharming, and side effects such as the spread of unwholesome information and privacy invasion are becoming serious social problems. Illegal access to information is also becoming a problem as the exchange and sharing of information increases on the basis of the extension of the communication network. On the other hand, as the communication network has been constructed as an international, global system, the legal response against invasion and cyber-attack from abroad is facing its limit. In addition, in an environment where the important infrastructures are managed and controlled on the basis of the information communication network, such problems pose a threat to national security. Countermeasures to such threats are developed and implemented on a yearly basis to protect the major infrastructures of information communication. As a part of such measures, we have developed a methodology for assessing the information protection level which can be used to establish the quantitative object setting method required for the improvement of the information protection level.

Keywords: Information Security Evaluation Methodology, Critical Information Infrastructure Protection.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1656
2684 Effect of Environmental Parameters on the Water Solubility of the Polycyclic Aromatic Hydrocarbons and Derivatives Using Taguchi Experimental Design Methodology

Authors: P. Pimsee, C. Sablayrolles, P. de Caro, J. Guyomarch, N. Lesage, M. Montréjaud-Vignoles

Abstract:

The MIGR’HYCAR research project was initiated to provide decisional tools for risks connected to oil spill drifts in continental waters. These tools aim to serve in the decision-making process once oil spill pollution occurs and/or as reference tools to study scenarios of potential impacts of pollutions on a given site. This paper focuses on the study of the distribution of polycyclic aromatic hydrocarbons (PAHs) and derivatives from oil spill in water as function of environmental parameters. Eight petroleum oils covering a representative range of commercially available products were tested. 41 polycyclic aromatic hydrocarbons (PAHs) and derivates, among them 16 EPA priority pollutants were studied by dynamic tests at laboratory scale. The chemical profile of the water soluble fraction was different from the parent oil profile due to the various water solubility of oil components. Semi-volatile compounds (naphtalenes) constitute the major part of the water soluble fraction. A large variation in composition of the water soluble fraction was highlighted depending on oil type. Moreover, four environmental parameters (temperature, suspended solid quantity, salinity and oil: water surface ratio) were investigated with the Taguchi experimental design methodology. The results showed that oils are divided into three groups: the solubility of Domestic fuel and Jet A1 presented a high sensitivity to parameters studied, meaning they must be taken into account. For Gasoline (SP95-E10) and Diesel fuel, a medium sensitivity to parameters was observed. In fact, the four others oils have shown low sensitivity to parameters studied. Finally, three parameters were found to be significant towards the water soluble fraction.

Keywords: Monitoring, PAHs, SBSE, water soluble fraction, Taguchi experimental design.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1970
2683 Distributed Self-Healing Protocol for Unattended Wireless Sensor Network

Authors: E. Golden Julie, E. Sahaya Rose Vigita, S. Tamil Selvi

Abstract:

Wireless sensor network is vulnerable to a wide range of attacks. Recover secrecy after compromise, to develop technique that can detect intrusions and able to resilient networks that isolates the point(s) of intrusion while maintaining network connectivity for other legitimate users. To define new security metrics to evaluate collaborative intrusion resilience protocol, by leveraging the sensor mobility that allows compromised sensors to recover secure state after compromise. This is obtained with very low overhead and in a fully distributed fashion using extensive simulations support our findings.

Keywords: WSN security, intrusion resilience, compromised sensors, mobility.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1751
2682 Optimum Design of Alkali Activated Slag Concretes for Low Chloride Ion Permeability and Water Absorption Capacity

Authors: Müzeyyen Balçikanli, Erdoğan Özbay, Hakan Tacettin Türker, Okan Karahan, Cengiz Duran Atiş

Abstract:

In this research, effect of curing time (TC), curing temperature (CT), sodium concentration (SC) and silicate modules (SM) on the compressive strength, chloride ion permeability, and water absorption capacity of alkali activated slag (AAS) concretes were investigated. For maximization of compressive strength while for minimization of chloride ion permeability and water absorption capacity of AAS concretes, best possible combination of CT, CTime, SC and SM were determined. An experimental program was conducted by using the central composite design method. Alkali solution-slag ratio was kept constant at 0.53 in all mixture. The effects of the independent parameters were characterized and analyzed by using statistically significant quadratic regression models on the measured properties (dependent parameters). The proposed regression models are valid for AAS concretes with the SC from 0.1% to 7.5%, SM from 0.4 to 3.2, CT from 20 °C to 94 °C and TC from 1.2 hours to 25 hours. The results of test and analysis indicate that the most effective parameter for the compressive strength, chloride ion permeability and water absorption capacity is the sodium concentration.

Keywords: Alkali activation, slag, rapid chloride permeability, water absorption capacity.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1140
2681 Combined Microwaves and Microreactors Plant

Authors: Shigenori Togashi, Mitsuhiro Matsuzawa

Abstract:

A pilot plant for continuous flow microwave-assisted chemical reaction combined with microreactors was developed and water heating tests were conducted for evaluation of the developed plant. We developed a microwave apparatus having a single microwave generator that can heat reaction solutions in four reaction fields simultaneously in order to increase throughput. We also designed a four-branch waveguide using electromagnetic simulation, and found that the transmission efficiency at 99%. Finally, we developed the pilot plant using the developed microwave apparatus and conducted water heating tests. The temperatures in the respective reaction fields were controlled within ±1.1 K at 353.2 K. Moreover, the energy absorption rates by the water were about 90% in the respective reaction fields, whereas the energy absorption rate was about 40% when 100 cm3 of water was heated by a commercially available multimode microwave chemical reactor.

Keywords: Microwave, Microreactor, Heating, Electromagnetic Simulation

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1764
2680 Exergy Analysis of Reverse Osmosis for Potable Water and Land Irrigation

Authors: M. Sarai Atab, A. Smallbone, A. P. Roskilly

Abstract:

A thermodynamic study is performed on the Reverse Osmosis (RO) desalination process for brackish water. The detailed RO model of thermodynamics properties with and without an energy recovery device was built in Simulink/MATLAB and validated against reported measurement data. The efficiency of desalination plants can be estimated by both the first and second laws of thermodynamics. While the first law focuses on the quantity of energy, the second law analysis (i.e. exergy analysis) introduces quality. This paper used the Main Outfall Drain in Iraq as a case study to conduct energy and exergy analysis of RO process. The result shows that it is feasible to use energy recovery method for reverse osmosis with salinity less than 15000 ppm as the exergy efficiency increases twice. Moreover, this analysis shows that the highest exergy destruction occurs in the rejected water and lowest occurs in the permeate flow rate accounting 37% for 4.3% respectively.

Keywords: Brackish water, exergy, irrigation, reverse osmosis.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 942
2679 A Modified AES Based Algorithm for Image Encryption

Authors: M. Zeghid, M. Machhout, L. Khriji, A. Baganne, R. Tourki

Abstract:

With the fast evolution of digital data exchange, security information becomes much important in data storage and transmission. Due to the increasing use of images in industrial process, it is essential to protect the confidential image data from unauthorized access. In this paper, we analyze the Advanced Encryption Standard (AES), and we add a key stream generator (A5/1, W7) to AES to ensure improving the encryption performance; mainly for images characterised by reduced entropy. The implementation of both techniques has been realized for experimental purposes. Detailed results in terms of security analysis and implementation are given. Comparative study with traditional encryption algorithms is shown the superiority of the modified algorithm.

Keywords: Cryptography, Encryption, Advanced EncryptionStandard (AES), ECB mode, statistical analysis, key streamgenerator.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 5044
2678 Adsorption of Ferrous and Ferric Ions in Aqueous and Industrial Effluent onto Pongamia pinnata Tree Bark

Authors: M. Mamatha, H. B. Aravinda, E. T. Puttaiah, S. Manjappa

Abstract:

One of the causes of water pollution is the presence of heavy metals in water. In the present study, an adsorbent prepared from the raw bark of the Pongamia pinnata tree is used for the removal of ferrous or ferric ions from aqueous and waste water containing heavy metals. Adsorption studies were conducted at different pH, concentration of metal ion, amount of adsorbent, contact time, agitation and temperature. The Langmuir and Freundlich adsorption isotherm models were applied for the results. The Langmuir isotherms were best fitted by the equilibrium data. The maximum adsorption was found to 146mg/g in waste water at a temperature of 30°C which is in agreement as comparable to the adsorption capacity of different adsorbents reported in literature. Pseudo second order model best fitted the adsorption of both ferrous and ferric ions.

Keywords: Adsorption, Adsorption isotherms, Heavy metals, Industrial effluents.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 3247
2677 Failure Analysis of Methanol Evaporator

Authors: D. Sufi Ahmadi, B. Bagheri

Abstract:

Thermal water hammer is a special type of water hammer which rarely occurs in heat exchangers. In biphasic fluids, if steam bubbles are surrounded by condensate, regarding lower condensate temperature than steam, they will suddenly collapse. As a result, the vacuum caused by an extreme change in volume lead to movement of the condensates in all directions and their collision the force produced by this collision leads to a severe stress in the pipe wall. This phenomenon is a special type of water hammer. According to fluid mechanics, this phenomenon is a particular type of transient flows during which abrupt change of fluid leads to sudden pressure change inside the tube. In this paper, the mechanism of abrupt failure of 80 tubes of 481 tubes of a methanol heat exchanger is discussed. Initially, due to excessive temperature differences between heat transfer fluids and simultaneous failure of 80 tubes, thermal shock was presupposed as the reason of failure. Deeper investigation on cross-section of failed tubes showed that failure was, ductile type of failure, so the first hypothesis was rejected. Further analysis and more accurate experiments revealed that failure of tubes caused by thermal water hammer. Finally, the causes of thermal water hammer and various solutions to avoid such mechanism are discussed.

Keywords: Thermal water hammer, Brittle Failure, Condensate thermal shock

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 2679