Abstract: RFID tag is a small and inexpensive microchip which is
capable of transmitting unique identifier through wireless network in a
short distance. If a group of RFID tags can be scanned simultaneously
by one reader, RFID Group proof could be generated. Group proof can
be used in various applications, such as good management which is
usually achieved using barcode system. A lot of RFID group proof
schemes have been proposed by many researchers. In this paper, we
introduce some existing group proof schemes and then analyze their
vulnerabilities to the privacy. Moreover, we propose a new attack
model, which threats the privacy of user by tracking tags in a group.
Abstract: The presence of toxic heavy metals in industrial
effluents is one of the serious threats to the environment. Heavy
metals such as Cadmium, Chromium, Lead, Nickel, Zinc, Mercury,
Copper, Arsenic are found in the effluents of industries such as
foundries, electroplating, petrochemical, battery manufacturing,
tanneries, fertilizer, dying, textiles, metallurgical and metal finishing.
Tremendous increase of industrial copper usage and its presence in
industrial effluents has lead to a growing concern about the fate and
effects of Copper in the environment. Percolation of industrial
effluents through soils leads to contamination of ground water and
soils. The transport of heavy metals and their diffusion into the soils
has therefore, drawn the attention of the researchers.
In this study, an attempt has been made to delineate the
mechanisms of transport and fate of copper in terrestrial
environment. Column studies were conducted using perplex glass
square column of dimension side 15 cm and 1.35 m long. The soil
samples were collected from a natural drain near Mohali (India). The
soil was characterized to be poorly graded sandy loam. The soil was
compacted to the field dry density level of about 1.6 g/cm3. Break
through curves for different depths of the column were plotted. The
results of the column study indicated that the copper has high
tendency to flow in the soils and fewer tendencies to get absorbed on
the soil particles. The t1/2 estimates obtained from the studies can be
used for design copper laden wastewater disposal systems.
Abstract: During the last couple of years, the degree of dependence on IT systems has reached a dimension nobody imagined to be possible 10 years ago. The increased usage of mobile devices (e.g., smart phones), wireless sensor networks and embedded devices (Internet of Things) are only some examples of the dependency of modern societies on cyber space. At the same time, the complexity of IT applications, e.g., because of the increasing use of cloud computing, is rising continuously. Along with this, the threats to IT security have increased both quantitatively and qualitatively, as recent examples like STUXNET or the supposed cyber attack on Illinois water system are proofing impressively. Once isolated control systems are nowadays often publicly available - a fact that has never been intended by the developers. Threats to IT systems don’t care about areas of responsibility. Especially with regard to Cyber Warfare, IT threats are no longer limited to company or industry boundaries, administrative jurisdictions or state boundaries. One of the important countermeasures is increased cooperation among the participants especially in the field of Cyber Defence. Besides political and legal challenges, there are technical ones as well. A better, at least partially automated exchange of information is essential to (i) enable sophisticated situational awareness and to (ii) counter the attacker in a coordinated way. Therefore, this publication performs an evaluation of state of the art Intrusion Detection Message Exchange protocols in order to guarantee a secure information exchange between different entities.
Abstract: The survey and classification of the different security
attacks in structured peer-to-peer (P2P) overlay networks can be
useful to computer system designers, programmers, administrators,
and users. In this paper, we attempt to provide a taxonomy of
structured P2P overlay networks security attacks. We have specially
focused on the way these attacks can arise at each level of the
network. Moreover, we observed that most of the existing systems
such as Content Addressable Network (CAN), Chord, Pastry,
Tapestry, Kademlia, and Viceroy suffer from threats and vulnerability
which lead to disrupt and corrupt their functioning. We hope that our
survey constitutes a good help for who-s working on this area of
research.
Abstract: Frequent machine breakdowns, low plant availability and increased overtime are a great threat to a manufacturing plant as they increase operating costs of an industry. The main aim of this study was to improve Overall Equipment Effectiveness (OEE) at a manufacturing company through the implementation of innovative maintenance strategies. A case study approach was used. The paper focuses on improving the maintenance in a manufacturing set up using an innovative maintenance regime mix to improve overall equipment effectiveness. Interviews, reviewing documentation and historical records, direct and participatory observation were used as data collection methods during the research. Usually production is based on the total kilowatt of motors produced per day. The target kilowatt at 91% availability is 75 Kilowatts a day. Reduced demand and lack of raw materials particularly imported items are adversely affecting the manufacturing operations. The company had to reset its targets from the usual figure of 250 Kilowatt per day to mere 75 per day due to lower availability of machines as result of breakdowns as well as lack of raw materials. The price reductions and uncertainties as well as general machine breakdowns further lowered production. Some recommendations were given. For instance, employee empowerment in the company will enhance responsibility and authority to improve and totally eliminate the six big losses. If the maintenance department is to realise its proper function in a progressive, innovative industrial society, then its personnel must be continuously trained to meet current needs as well as future requirements. To make the maintenance planning system effective, it is essential to keep track of all the corrective maintenance jobs and preventive maintenance inspections. For large processing plants these cannot be handled manually. It was therefore recommended that the company implement (Computerised Maintenance Management System) CMMS.
Abstract: We propose a novel graphical technique (SVision) for
intrusion detection, which pictures the network as a community of
hosts independently roaming in a 3D space defined by the set of
services that they use. The aim of SVision is to graphically cluster
the hosts into normal and abnormal ones, highlighting only the ones
that are considered as a threat to the network. Our experimental
results using DARPA 1999 and 2000 intrusion detection and
evaluation datasets show the proposed technique as a good candidate
for the detection of various threats of the network such as vertical
and horizontal scanning, Denial of Service (DoS), and Distributed
DoS (DDoS) attacks.
Abstract: The charge-exchange xenon (CEX) ion generated by ion thruster can backflow to the surface of spacecraft and threaten to the safety of spacecraft operation. In order to evaluate the effects of the induced plasma environment in backflow regions on the spacecraft, we designed a spherical single Langmuir probe of 5.8cm in diameter for measuring low-density plasma parameters in backflow region of ion thruster. In practice, the tests are performed in a two-dimensional array (40cm×60cm) composed of 20 sites. The experiment results illustrate that the electron temperature ranges from 3.71eV to 3.96eV, with the mean value of 3.82eV and the standard deviation of 0.064eV. The electron density ranges from 8.30×1012/m3 to 1.66×1013/m3, with the mean value of 1.30×1013/m3 and the standard deviation of 2.15×1012/m3. All data is analyzed according to the “ideal" plasma conditions of Maxwellian distributions.
Abstract: Every organization is continually subject to new damages and threats which can be resulted from their operations or their goal accomplishment. Methods of providing the security of space and applied tools have been widely changed with increasing application and development of information technology (IT). From this viewpoint, information security management systems were evolved to construct and prevent reiterating the experienced methods. In general, the correct response in information security management systems requires correct decision making, which in turn requires the comprehensive effort of managers and everyone involved in each plan or decision making. Obviously, all aspects of work or decision are not defined in all decision making conditions; therefore, the possible or certain risks should be considered when making decisions. This is the subject of risk management and it can influence the decisions. Investigation of different approaches in the field of risk management demonstrates their progress from quantitative to qualitative methods with a process approach.
Abstract: Business continuity management (BCM) identifies
potential external and internal threats to an organization and their
impacts to business operations. The goal of the article is to identify,
based on the analysis of employee turnover in organizations in the
Czech Republic, the role of personnel planning in BCM. The article
is organized as follows. The first part of the article concentrates on
the theoretical background of the topic. The second part of the article
is dedicated to the evaluation of the outcomes of the survey
conducted (questionnaire survey), focusing on the analysis of
employee turnover in organizations in the Czech Republic. The final
part of the article underlines the role of personnel planning in BCM,
since poor planning of staff needs in an organization can represent
a future threat for business continuity ensuring.
Abstract: This article is devoted to the problems of the
disproportional development of regions in the Republic Kazakhstan.
The threats proceeding from problem regions, make strong impact on
the country-s sustainable development, therefore they are necessary
to be considered at the level of national security.
Abstract: Water, soil and sediment contaminated with
metolachlor poses a threat to the environment and human health.
We determined the effectiveness of nano-zerovalent iron (NZVI) to
dechlorinate metolachlor [2-chloro-n-(2-ethyl-6-methyl-phenyl)-n-
(1-methoxypropan-2-yl)acetamide] in pH solution and the presence
of aluminium salt. The optimum dosage of degradation of 100 mlL-1
metolachlor was 1% (w/v) NZVI. The degradation kinetic rate (kobs)
was 0.218×10-3 min-1 and specific first-order rates (kSA) was
8.72×10-7 L m-2min-1. By treating aqueous solutions of metolachlor
with NZVI, metolachlor destruction rate were increased as the pH
decrease from 10 to 4. Lowering solution pH removes Fe (III)
passivating layers from the NZVI and makes it free for reductive
transformations. Destruction kinetic rates were 20.8×10-3 min-1 for
pH4, 18.9×10-3 min-1 for pH7, 13.8×10-3 min-1 for pH10. In addition,
destruction kinetic of metolachlor by NZVI was enhanced when
aluminium sulfate was added. The destruction kinetic rate were
20.4×10-3 min-1 for 0.05% Al(SO4)3 and 60×10-3 min-1 for 0.1%
Al(SO4)3.
Abstract: The concept of e-Learning is now emerging in Sub Saharan African countries like Tanzania. Due to economic constraints and other social and cultural factors faced by these countries, the use of Information and Communication Technology (ICT) is increasing at a very low pace. The digital divide threat has propelled the Government of Tanzania to put in place the national ICT Policy in 2003 which defines the direction of all ICT activities nationally. Among the main focused areas is the use of ICT in education, since for the development of any country, there is a need of creating knowledge based society. This paper discusses the initiatives made so far to introduce the use of ICT tools to some secondary schools using open source software in e-content development to facilitate a self-learning environment
Abstract: Explosion occurs due to sudden release of energy.
Common examples of explosion include chemical, atomic, heat, and
pressure tank (due to ignition) explosions. Petroleum, gas, and
petrochemical industries operations are threatened by natural risks
and processes. Fires and explosions are the greatest process risks
which cause financial damages.
This study aims at designing a single-floor structure for the control
room of a petroleum refinery to be resistant against gas explosion
loads, and the information related to the structure specifications have
been provided regarding the fact that the structure is made on the
ground's surface. In this research, the lateral stiffness of single pile is
calculated by SPPLN.FOR computer program, and its value for
13624 KN/m single pile has been assessed. The analysis used due to
the loading conditions, is dynamic nonlinear analysis with direct
integration method.
Abstract: Cassava is one of the top five crops in Cameroon. Its
evolution has remained constant since the independence period and
the production has more than tripled. It is a crop with multiple
industrial capacities but the sector-s business opportunities are
underexploited. Using Strengths, Weaknesses, Opportunities and
Threats analysis method, this paper examines the cassava actual state.
It appraises the sector-s strengths (S), considers suitable measures to
strengthen weaknesses (W), evaluates strategies to fully benefit from
the sector numerous business opportunities (O) and explore means to
convert threats (T) into opportunities. Data were collected from the
ministry of agriculture and rural development and different actors.
The results show that cassava sector embodies many business
opportunities and stands as a raw material provider for many
industries but ultimately requires challenges to be tackled
appropriately.
Abstract: Environmental contamination is a common problem in ex-industrial and industrial sites. This article gives a brief description of general applied environmental investigation methodologies and possible remediation applications in Latvia. Most of contaminated areas are situated in former and active industrial, military areas and ports. Industrial and logistic activities very often have been with great impact for more than hundred years thus the contamination level with heavy metals, hydrocarbons, pesticides, persistent organic pollutants is high and is threatening health and environment in general. 242 territories now are numbered as contaminated and fixed in the National Register of contaminated territories in Latvia. Research and remediation of contamination in densely populated areas are of important environmental policy domain. Four different investigation case studies of contaminated areas are given describing the history of use, environmental quality assessment as well as planned environmental management actions. All four case study locations are situated in Riga - the capital of the Republic of Latvia. The aim of this paper is to analyze the situation and problems with management of contaminated areas in Latvia, give description of field research methods and recommendations for remediation industry based on scientific data and innovations.
Abstract: The article examines the methods of protection of
citizens' personal data on the Internet using biometric identity
authentication technology. It`s celebrated their potential danger due
to the threat of loss of base biometric templates. To eliminate the
threat of compromised biometric templates is proposed to use neural
networks large and extra-large sizes, which will on the one hand
securely (Highly reliable) to authenticate a person by his biometrics,
and on the other hand make biometrics a person is not available for
observation and understanding. This article also describes in detail
the transformation of personal biometric data access code. It`s formed
the requirements for biometrics converter code for his work with the
images of "Insider," "Stranger", all the "Strangers". It`s analyzed the
effect of the dimension of neural networks on the quality of
converters mystery of biometrics in access code.
Abstract: The stab resistance performance of newly developed
fabric composites composed of hexagonal paper honeycombs, filled
with shear thickening fluid (STF), and woven Kevlar® fabric or
UHMPE was investigated in this study. The STF was prepared by
dispersing submicron SiO2 particles into polyethylene glycol (PEG).
Our results indicate that the STF-Kevlar composite possessed lower
penetration depth than that of neat Kevlar. In other words, the
STF-Kevlar composite can attain the same energy level in
stab-resistance test with fewer layers of Kevlar fabrics than that of the
neat Kevlar fabrics. It also indicates that STF can be used for the
fabrication of flexible body armors and can provide improved
protection against stab threats. We found that the stab resistance of the
STF-Kevlar composite increases with the increase of SiO2
concentration in STF. Moreover, the silica particles functionalized
with silane coupling agent can further improve the stab resistance.
Abstract: As the global climate changes, the threat from
landslides and debris flows increases. Learning how a watershed
initiates landslides under abnormal rainfall conditions and predicting
landslide magnitude and frequency distribution is thus important.
Landslides show a power-law distribution in the frequency-area
distribution. The distribution curve shows an exponent gradient 1.0 in
the Sandpile model test. Will the landslide frequency-area statistics
show a distribution similar to the Sandpile model under extreme
rainfall conditions? The purpose of the study is to identify the extreme
rainfall-induced landslide frequency-area distribution in the Laonong
River Basin in southern Taiwan. Results of the analysis show that a
lower gradient of landslide frequency-area distribution could be
attributed to the transportation and deposition of debris flow areas that
are included in the landslide area.
Abstract: BioEnergy is an archetypal appropriate technology
and alternate source of energy in rural areas of China, and can meet
the basic need for cooking fuel in rural areas. The paper introduces
with an alternate mean of research that can accelerate the biogas
energy production. Tithonia diversifolia or the Tree marigold can be
hailed as mesophillic anaerobic digestion to increase the production
of more Bioenergy. Tithonia diversifolia is very native to Mexico and
Central America, which can be served as ornamental plants- green
manure and can prevent soil erosion. Tithonia diversifolia is widely
grown and known to Asia, Africa, America and Australia as well.
Nowadays, Considering China’s geographical condition it is found
that Tithonia diversifolia is widely growing plant in the many tropical
and subtropical regions of southern Yunnan- which can have great
usage in accelerating and increasing the Bioenergy production
technology. The paper discussed aiming at proving possibility that
Tithonia diversifolia can be applied in biogas fermentation and its
biogas production potential, the research carried experiment on
Tithonia diversifolia biogas fermentation under the mesophilic
condition (35 Celsius Degree). The result revealed that Tithonia
diversifolia can be used as biogas fermentative material, and 6%
concentration can get the best biogas production, with the TS biogas
production rate 656mL/g and VS biogas production rate 801mL/g. It
is well addressed that Tithonia diversifolia grows wildly in 53
Counties and 9 cities of Yunnan Province, which mainly grows in
form of the road side plants, the edge of the field, countryside, forest
edge, open space; of which demersum-natures can form dense
monospecific beds -causing serious harm to agricultural production
landforms threatening the ecological system as a potentially harmful
exotic plant. There are also found the three types of invasive daisy
alien plants -Eupatorium adenophorum, Eupatorium Odorata and
Tithonia diversifolia in Yunnan Province of China-among them the
Tithonia diversifolia is responsible for causing serious harm to
agricultural production. In this paper we have designed the
experimental explanation of Biogas energy production that requires
anaerobic environment and some microbes; Tithonia diversifolia
plant has been taken into consideration while carrying experiments
and with successful resulting of generating more BioEnergy
emphasizing on the practical applications of Tithonia diversifolia.
This paper aims at- to find a new mechanism to provide a more
scientific basis for the development of this plant herbicides in Biogas
energy and to improve the utilization throughout the world as well.
Abstract: The objectives of this research are to search the
management pattern of Nakhon Pathom lodging entrepreneurs for
sufficient economy ways, to know the threat that affects this sector
and design fit arrangement model to sustain their business with
Nakhon Pathom style. What will happen if they do not use this
approach? Will they have a financial crisis? The data and
information are collected by informal discussions with 12 managers
and 400 questionnaires. A mixed method of both qualitative research
and quantitative research are used. Bent Flyvbjerg’s phronesis is
utilized for this analysis. Our research will prove that sufficient
economy can help small business firms to solve their problems. We
think that the results of our research will be a financial model to
solve many problems of the entrepreneurs and this way will can be a
model for other provinces of Thailand.