Search results for: attack modelling
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 2352

Search results for: attack modelling

2082 Modelling of Passengers Exchange between Trains and Platforms

Authors: Guillaume Craveur

Abstract:

The evaluation of the passenger exchange time is necessary for railway operators in order to optimize and dimension rail traffic. Several influential parameters are identified and studied. Each parameter leads to a modeling completed with the buildingEXODUS software. The objective is the modelling of passenger exchanges measured by passenger counting. Population size is dimensioned using passenger counting files which are a report of the train service and contain following useful informations: number of passengers who get on and leave the train, exchange time. These information are collected by sensors placed at the top of each train door. With passenger counting files it is possible to know how many people are engaged in the exchange and how long is the exchange, but it is not possible to know passenger flow of the door. All the information about observed exchanges are thus not available. For this reason and in order to minimize inaccuracies, only short exchanges (less than 30 seconds) with a maximum of people are performed.

Keywords: passengers exchange, numerical tools, rolling stock, platforms

Procedia PDF Downloads 208
2081 Magnetic Investigation and 2½D Gravity Profile Modelling across the Beattie Magnetic Anomaly in the Southeastern Karoo Basin, South Africa

Authors: Christopher Baiyegunhi, Oswald Gwavava

Abstract:

The location/source of the Beattie magnetic anomaly (BMA) and interconnectivity of geologic structures at depth have been a topic of investigation for over 30 years. Up to now, no relationship between geological structures (interconnectivity of dolerite intrusions) at depth has been established. Therefore, the environmental impact of fracking the Karoo for shale gas could not be assessed despite the fact that dolerite dykes are groundwater localizers in the Karoo. In this paper, we shed more light to the unanswered questions concerning the possible location of the source of the BMA, the connectivity of geologic structures like dolerite dykes and sills at depth and this relationship needs to be established before the tectonic evolution of the Karoo basin can be fully understood and related to fracking of the Karoo for shale gas. The result of the magnetic investigation and modelling of four gravity profiles that crosses the BMA in the study area reveals that the anomaly, which is part of the Beattie magnetic anomaly tends to divide into two anomalies and continue to trend in an NE-SW direction, the dominant gravity signatures is of long wavelength that is due to a deep source/interface inland and shallows towards the coast, the average depth to the top of the shallow and deep magnetic sources was estimated to be approximately 0.6 km and 15 km, respectively. The BMA become stronger with depth which could be an indication that the source(s) is deep possibly a buried body in the basement. The bean-shaped anomaly also behaves in a similar manner like the BMA thus it could possibly share the same source(s) with the BMA.

Keywords: Beattie magnetic anomaly, magnetic sources, modelling, Karoo Basin

Procedia PDF Downloads 528
2080 The Role of Social Media in the Rise of Islamic State in India: An Analytical Overview

Authors: Yasmeen Cheema, Parvinder Singh

Abstract:

The evolution of Islamic State (acronym IS) has an ultimate goal of restoring the caliphate. IS threat to the global security is main concern of international community but has also raised a factual concern for India about the regular radicalization of IS ideology among Indian youth. The incident of joining Arif Ejaz Majeed, an Indian as ‘jihadist’ in IS has set strident alarm in law & enforcement agencies. On 07.03.2017, many people were injured in an Improvised Explosive Device (IED) blast on-board of Bhopal Ujjain Express. One perpetrator of this incident was killed in encounter with police. But, the biggest shock is that the conspiracy was pre-planned and the assailants who carried out the blast were influenced by the ideology perpetrated by the Islamic State. This is the first time name of IS has cropped up in a terror attack in India. It is a red indicator of violent presence of IS in India, which is spreading through social media. The IS have the capacity to influence the younger Muslim generation in India through its brutal and aggressive propaganda videos, social media apps and hatred speeches. It is a well known fact that India is on the radar of IS, as well on its ‘Caliphate Map’. IS uses Twitter, Facebook and other social media platforms constantly. Islamic State has used enticing videos, graphics, and articles on social media and try to influence persons from India & globally that their jihad is worthy. According to arrested perpetrator of IS in different cases in India, the most of Indian youths are victims to the daydreams which are fondly shown by IS. The dreams that the Muslim empire as it was before 1920 can come back with all its power and also that the Caliph and its caliphate can be re-established are shown by the IS. Indian Muslim Youth gets attracted towards these euphemistic ideologies. Islamic State has used social media for disseminating its poisonous ideology, recruitment, operational activities and for future direction of attacks. IS through social media inspired its recruits & lone wolfs to continue to rely on local networks to identify targets and access weaponry and explosives. Recently, a pro-IS media group on its Telegram platform shows Taj Mahal as the target and suggested mode of attack as a Vehicle Born Improvised Explosive Attack (VBIED). Islamic State definitely has the potential to destroy the Indian national security & peace, if timely steps are not taken. No doubt, IS has used social media as a critical mechanism for recruitment, planning and executing of terror attacks. This paper will therefore examine the specific characteristics of social media that have made it such a successful weapon for Islamic State. The rise of IS in India should be viewed as a national crisis and handled at the central level with efficient use of modern technology.

Keywords: ideology, India, Islamic State, national security, recruitment, social media, terror attack

Procedia PDF Downloads 206
2079 Detecting Venomous Files in IDS Using an Approach Based on Data Mining Algorithm

Authors: Sukhleen Kaur

Abstract:

In security groundwork, Intrusion Detection System (IDS) has become an important component. The IDS has received increasing attention in recent years. IDS is one of the effective way to detect different kinds of attacks and malicious codes in a network and help us to secure the network. Data mining techniques can be implemented to IDS, which analyses the large amount of data and gives better results. Data mining can contribute to improving intrusion detection by adding a level of focus to anomaly detection. So far the study has been carried out on finding the attacks but this paper detects the malicious files. Some intruders do not attack directly, but they hide some harmful code inside the files or may corrupt those file and attack the system. These files are detected according to some defined parameters which will form two lists of files as normal files and harmful files. After that data mining will be performed. In this paper a hybrid classifier has been used via Naive Bayes and Ripper classification methods. The results show how the uploaded file in the database will be tested against the parameters and then it is characterised as either normal or harmful file and after that the mining is performed. Moreover, when a user tries to mine on harmful file it will generate an exception that mining cannot be made on corrupted or harmful files.

Keywords: data mining, association, classification, clustering, decision tree, intrusion detection system, misuse detection, anomaly detection, naive Bayes, ripper

Procedia PDF Downloads 395
2078 An Exploratory Study to Appraise the Current Challenges and Limitations Faced in Applying and Integrating the Historic Building Information Modelling Concept for the Management of Historic Buildings

Authors: Oluwatosin Adewale

Abstract:

The sustainability of built heritage has become a relevant issue in recent years due to the social and economic values associated with these buildings. Heritage buildings provide a means for human perception of culture and represent a legacy of long-existing history; they define the local character of the social world and provide a vital connection to the past with their associated aesthetical and communal benefits. The identified values of heritage buildings have increased the importance of conservation and the lifecycle management of these buildings. The recent developments of digital design technology in engineering and the built environment have led to the adoption of Building Information Modelling (BIM) by the Architecture, Engineering, Construction, and Operations (AECO) industry. BIM provides a platform for the lifecycle management of a construction project through effective collaboration among stakeholders and the analysis of a digital information model. This growth in digital design technology has also made its way into the field of architectural heritage management in the form of Historic Building Information Modelling (HBIM). A reverse engineering process for digital documentation of heritage assets that draws upon similar information management processes as the BIM process. However, despite the several scientific and technical contributions made to the development of the HBIM process, it doesn't remain easy to integrate at the most practical level of heritage asset management. The main objective identified under the scope of the study is to review the limitations and challenges faced by heritage management professionals in adopting an HBIM-based asset management procedure for historic building projects. This paper uses an exploratory study in the form of semi-structured interviews to investigate the research problem. A purposive sample of heritage industry experts and professionals were selected to take part in a semi-structured interview to appraise some of the limitations and challenges they have faced with the integration of HBIM into their project workflows. The findings from this study will present the challenges and limitations faced in applying and integrating the HBIM concept for the management of historic buildings.

Keywords: building information modelling, built heritage, heritage asset management, historic building information modelling, lifecycle management

Procedia PDF Downloads 71
2077 Parental Perceptions and Practices toward Childhood Asthma

Authors: Amani K. Abu-Shaheen, Abdullah Nofal, Humariya Heena

Abstract:

Introduction: Parental perceptions and practices are important for improving the asthma outcomes in children; indeed, evidence shows that parents of asthmatic children harbor considerable misperceptions of the disease. Objective: To identify the prevalence of asthma and to investigate the perceptions and practices of parents toward asthma and its management in Saudi children. Methods: A two-stage cross-sectional survey of 2000 parents of children aged 3–15 years from schools located in all five districts of Riyadh province located in central Saudi Arabia, was conducted. Data collection was accomplished using a self-administered questionnaire based on information obtained from the literature. Results: Of 1450 children whose parents participated in the study, 600 had asthma, dyspnea, or chest allergy. The overall number of children with parental reports of ever having been diagnosed with asthma was 478 (32.9%). The majority of parents (321, 53.5%) believed that asthma was a hereditary disease. Of these parents, 361 (60.3%) were concerned about side effects of inhaled steroids, and 192 (32%) about development of dependency on asthma medications. Three hundred sixty seven (61.2%) parents reported that they could treat the asthma attack at home and almost 76% of parents went to pediatric emergency department during asthma attack. Conclusions: In this study, the overall prevalence of children whose parents reported that they were diagnosed with asthma was high (32.9%). Furthermore, parents of children with asthma had misperceptions regarding asthma and exhibited ineffective practices in its management. To improve asthma care and compliance, adequate education should be provided to parents.

Keywords: asthma, management, parents, quality of life

Procedia PDF Downloads 255
2076 Biotechonomy System Dynamics Modelling: Sustainability of Pellet Production

Authors: Andra Blumberga, Armands Gravelsins, Haralds Vigants, Dagnija Blumberga

Abstract:

The paper discovers biotechonomy development analysis by use of system dynamics modelling. The research is connected with investigations of biomass application for production of bioproducts with higher added value. The most popular bioresource is wood, and therefore, the main question today is about future development and eco-design of products. The paper emphasizes and evaluates energy sector which is open for use of wood logs, wood chips, wood pellets and so on. The main aim for this research study was to build a framework to analyse development perspectives for wood pellet production. To reach the goal, a system dynamics model of energy wood supplies, processing, and consumption is built. Production capacity, energy consumption, changes in energy and technology efficiency, required labour source, prices of wood, energy and labour are taken into account. Validation and verification tests with available data and information have been carried out and indicate that the model constitutes the dynamic hypothesis. It is found that the more is invested into pellets production, the higher the specific profit per production unit compared to wood logs and wood chips. As a result, wood chips production is decreasing dramatically and is replaced by wood pellets. The limiting factor for pellet industry growth is availability of wood sources. This is governed by felling limit set by the government based on sustainable forestry principles.

Keywords: bioenergy, biotechonomy, system dynamics modelling, wood pellets

Procedia PDF Downloads 377
2075 A Biomechanical Model for the Idiopathic Scoliosis Using the Antalgic-Trak Technology

Authors: Joao Fialho

Abstract:

The mathematical modelling of idiopathic scoliosis has been studied throughout the years. The models presented on those papers are based on the orthotic stabilization of the idiopathic scoliosis, which are based on a transversal force being applied to the human spine on a continuous form. When considering the ATT (Antalgic-Trak Technology) device, the existent models cannot be used, as the type of forces applied are no longer transversal nor applied in a continuous manner. In this device, vertical traction is applied. In this study we propose to model the idiopathic scoliosis, using the ATT (Antalgic-Trak Technology) device, and with the parameters obtained from the mathematical modeling, set up a case-by-case individualized therapy plan, for each patient.

Keywords: idiopathic scoliosis, mathematical modelling, human spine, Antalgic-Trak technology

Procedia PDF Downloads 243
2074 USBware: A Trusted and Multidisciplinary Framework for Enhanced Detection of USB-Based Attacks

Authors: Nir Nissim, Ran Yahalom, Tomer Lancewiki, Yuval Elovici, Boaz Lerner

Abstract:

Background: Attackers increasingly take advantage of innocent users who tend to use USB devices casually, assuming these devices benign when in fact they may carry an embedded malicious behavior or hidden malware. USB devices have many properties and capabilities that have become the subject of malicious operations. Many of the recent attacks targeting individuals, and especially organizations, utilize popular and widely used USB devices, such as mice, keyboards, flash drives, printers, and smartphones. However, current detection tools, techniques, and solutions generally fail to detect both the known and unknown attacks launched via USB devices. Significance: We propose USBWARE, a project that focuses on the vulnerabilities of USB devices and centers on the development of a comprehensive detection framework that relies upon a crucial attack repository. USBWARE will allow researchers and companies to better understand the vulnerabilities and attacks associated with USB devices as well as providing a comprehensive platform for developing detection solutions. Methodology: The framework of USBWARE is aimed at accurate detection of both known and unknown USB-based attacks by a process that efficiently enhances the framework's detection capabilities over time. The framework will integrate two main security approaches in order to enhance the detection of USB-based attacks associated with a variety of USB devices. The first approach is aimed at the detection of known attacks and their variants, whereas the second approach focuses on the detection of unknown attacks. USBWARE will consist of six independent but complimentary detection modules, each detecting attacks based on a different approach or discipline. These modules include novel ideas and algorithms inspired from or already developed within our team's domains of expertise, including cyber security, electrical and signal processing, machine learning, and computational biology. The establishment and maintenance of the USBWARE’s dynamic and up-to-date attack repository will strengthen the capabilities of the USBWARE detection framework. The attack repository’s infrastructure will enable researchers to record, document, create, and simulate existing and new USB-based attacks. This data will be used to maintain the detection framework’s updatability by incorporating knowledge regarding new attacks. Based on our experience in the cyber security domain, we aim to design the USBWARE framework so that it will have several characteristics that are crucial for this type of cyber-security detection solution. Specifically, the USBWARE framework should be: Novel, Multidisciplinary, Trusted, Lightweight, Extendable, Modular and Updatable and Adaptable. Major Findings: Based on our initial survey, we have already found more than 23 types of USB-based attacks, divided into six major categories. Our preliminary evaluation and proof of concepts showed that our detection modules can be used for efficient detection of several basic known USB attacks. Further research, development, and enhancements are required so that USBWARE will be capable to cover all of the major known USB attacks and to detect unknown attacks. Conclusion: USBWARE is a crucial detection framework that must be further enhanced and developed.

Keywords: USB, device, cyber security, attack, detection

Procedia PDF Downloads 374
2073 A Modelling Study to Compare the Storm Surge along Oman Coast Due to Ashobaa and Nanauk Cyclones

Authors: R. V. Suresh Reddi, Vishnu S. Das, Mathew Leslie

Abstract:

The weather systems within the Arabian Sea is very dynamic in terms of monsoon and cyclone events. The storms generated in the Arabian Sea are more likely to progress in the north-west or west direction towards Oman. From the database of Joint Typhoon Warning Center (JTWC), the number of cyclones that hit the Oman coast or pass within close vicinity is noteworthy and therefore they must be considered when looking at coastal/port engineering design and development projects. This paper provides a case study of two cyclones, i.e., Nanauk (2014) and Ashobaa (2015) to assess the impact on storm surge off the Oman coast. These two cyclones have been selected since they are comparable in terms of maximum wind, cyclone duration, central pressure and month of occurrence. They are of similar strength but differ in track, allowing the impact of proximity to the coast to be considered. Of the two selected cyclones, Ashobaa is the 'extreme' case with close proximity while Nanauk remains further offshore and is considered as a more typical case. The available 'best-track' data from JTWC is obtained for the 2 selected cyclones, and the cyclone winds are generated using a 'Cyclone Wind Generation Tool' from MIKE (modelling software) from DHI (Danish Hydraulic Institute). Using MIKE 21 Hydrodynamic model powered by DHI the storm surge is estimated at selected offshore locations along the Oman coast.

Keywords: costal engineering, cyclone, storm surge, modelling

Procedia PDF Downloads 129
2072 Proposal of Optimality Evaluation for Quantum Secure Communication Protocols by Taking the Average of the Main Protocol Parameters: Efficiency, Security and Practicality

Authors: Georgi Bebrov, Rozalina Dimova

Abstract:

In the field of quantum secure communication, there is no evaluation that characterizes quantum secure communication (QSC) protocols in a complete, general manner. The current paper addresses the problem concerning the lack of such an evaluation for QSC protocols by introducing an optimality evaluation, which is expressed as the average over the three main parameters of QSC protocols: efficiency, security, and practicality. For the efficiency evaluation, the common expression of this parameter is used, which incorporates all the classical and quantum resources (bits and qubits) utilized for transferring a certain amount of information (bits) in a secure manner. By using criteria approach whether or not certain criteria are met, an expression for the practicality evaluation is presented, which accounts for the complexity of the QSC practical realization. Based on the error rates that the common quantum attacks (Measurement and resend, Intercept and resend, probe attack, and entanglement swapping attack) induce, the security evaluation for a QSC protocol is proposed as the minimum function taken over the error rates of the mentioned quantum attacks. For the sake of clarity, an example is presented in order to show how the optimality is calculated.

Keywords: quantum cryptography, quantum secure communcation, quantum secure direct communcation security, quantum secure direct communcation efficiency, quantum secure direct communcation practicality

Procedia PDF Downloads 161
2071 Assessment of Barriers Influencing the Adoption of Building Information Modelling in the Construction Industry, Lagos State, Nigeria

Authors: Tosin Deborah Akanbi, Adeyemi Oluwaseun Adepoju, Hameed Olusegun Adebambo, Akinloye Fatai Lawal

Abstract:

Building information modelling (BIM) is a process that starts with the development of a sequential 3D design and encourages data administration, organization, and visualization throughout the life span of a facility (drawings, construction, and supervision). The implementation of building information modelling has been slow in recent years, and this is due to some prominent barriers that hinder its adoption. In this regard, the study aims to examine the significant barriers that influence the adoption of building information modelling in the Lagos state construction industry. Data were gathered through a questionnaire survey with 332 construction professionals in the study area. Three online structured interviews were conducted to support and validate the findings of the quantitative analysis. The results revealed that interest (lack of awareness and understanding of BIM, absence of in-house BIM competent professionals, and unavailability of BIM competent professionals in the labour market), legal (lack of policies and regulations on copyright ownership and lack of enforcement from government agencies and industry leaderships) and professional (people’s inability or refusal to learn new technologies and processes, waste in time and human resource and lack of clarity of professional roles in BIM) barriers are the major barriers influencing the adoption of BIM. The results also revealed that six final themes were generated, namely: finance barriers, industry barriers, interest barriers, leadership barriers, legal barriers, and professional barriers. Thus, there is a need for policymakers to design and implement policies (regulatory, economic, and information) to promote financial schemes to support construction firms and professionals and to reduce financial barriers. It is also important for the government to lay down rules and regulations that must be enforced among the construction professionals and firms in the Lagos state construction industry.

Keywords: BIM barriers, BIM adoption characteristics, construction industry, Lagos State Nigeria

Procedia PDF Downloads 18
2070 The Need for Implementing Building Information Modelling (BIM) and Integrated Project Delivery (IPD) in the Construction Project: A Case Study in UAE

Authors: C. W. F. Che Wan Putra, M. Alshawi, M. S. Al Ahbabi, M. Jabakhanji

Abstract:

Much of the waste that is generated throughout the life-cycle of a building is mainly related to project stakeholders not having access to information that others have created. This results in waste and high costs. Over the past decade, however, the industry reacted to these challenges by adopting effective procurement approaches, such as partnering and design and build, to improve collaboration and communication among projects’ stakeholders. Most recently, there is a focus on creating and reusing digital project information of stakeholders throughout the life-cycle to facilitate the exchange of information among partners. This shift is based around BIM (Building Information Modelling) and collaborative environment (IPD). The power of collaborative BIM goes beyond improving efficiency. Sustainability, perhaps the most important challenge for the design and construction community, is at the intersection of BIM and collaborative project delivery, drawing strength from both. Due to these benefits, a research study has been carried out to investigate the need of BIM and IPD, on a large scale construction project which is procured on a traditional approach, i.e. design-bid-build. A qualitative research work including a semi-structured interview with project partners was conducted on a typical project in the UAE, whereby the selected project suffered from severe delays and cost overrun. This paper aims to bring about clear evidence to what most likely to happen to a typical construction project in spite of employing very good consultants, project manager and contractors and how these problems could have been avoided if BIM and IPD were deployed.

Keywords: building information modelling (BIM), integrated project delivery (IPD), collaborative environment, case study

Procedia PDF Downloads 379
2069 Gender Difference in Social Interaction Skills of Autism Using Token Economy and Video Modelling Strategies

Authors: Olusola Akintunde Adediran

Abstract:

This study examined differential effect of Gender difference in social interaction skill of pupils with autism using token economy and video modeling as intervention strategies. A pretest, posttest, control group, quasi-experimental research design was adopted in the study. 17 participants (11 males and 6 females) were selected purposively from 5 centres in Ibadan and randomized into three groups (token economy, video modeling and control groups). Two instruments were used in the study; Autism Spectrum Rating Scale (ASRS) for 299.00 Autistic Disorder (r = 0.82) and Children’s Self-report Social Skill Scale (CS4) (r= 0.93). A descriptive statistics was used to analyse the participants social interaction data based on intervention and gender, while inferential statistics of analysis of covariance (ANCOVA) and scheffe post-hoc measure was used to anlayse three null hypotheses tested at 0.05 level of significance. The results obtained indicated that there was a significant main effect of treatment on social interaction of participants, but there was no significant of main effect of gender on the social interaction of participants, hence, (F(2,14) = .741; p > .05, eta = .050). Lastly, there was no significant interaction effect of treatment and gender of the participants, hence (F(2,10) = 2.177; p > .05, eta 2 = 202). The study has contributed to the frontiers of knowledge by establishing that social interaction of autism is attainable when token economy and video modelling are used as treatment intervention, hence, they should be adopted by the teachers, curriculum planners and other stakeholders.

Keywords: social interaction, token economy, video modelling, autism, gender

Procedia PDF Downloads 120
2068 On the Design of a Secure Two-Party Authentication Scheme for Internet of Things Using Cancelable Biometrics and Physically Unclonable Functions

Authors: Behnam Zahednejad, Saeed Kosari

Abstract:

Widespread deployment of Internet of Things (IoT) has raised security and privacy issues in this environment. Designing a secure two-factor authentication scheme between the user and server is still a challenging task. In this paper, we focus on Cancelable Biometric (CB) as an authentication factor in IoT. We show that previous CB-based scheme fail to provide real two-factor security, Perfect Forward Secrecy (PFS) and suffer database attacks and traceability of the user. Then we propose our improved scheme based on CB and Physically Unclonable Functions (PUF), which can provide real two-factor security, PFS, user’s unlinkability, and resistance to database attack. In addition, Key Compromise Impersonation (KCI) resilience is achieved in our scheme. We also prove the security of our proposed scheme formally using both Real-Or-Random (RoR) model and the ProVerif analysis tool. For the usability of our scheme, we conducted a performance analysis and showed that our scheme has the least communication cost compared to the previous CB-based scheme. The computational cost of our scheme is also acceptable for the IoT environment.

Keywords: IoT, two-factor security, cancelable biometric, key compromise impersonation resilience, perfect forward secrecy, database attack, real-or-random model, ProVerif

Procedia PDF Downloads 77
2067 Chemical Oxygen Demand Fractionation of Primary Wastewater Effluent for Process Optimization and Modelling

Authors: Thandeka Y. S. Jwara, Paul Musonge

Abstract:

Traditionally, the complexity associated with implementing and controlling biological nutrient removal (BNR) in wastewater works (WWW) has been primarily in terms of balancing competing requirements for nitrogen and phosphorus removal, particularly with respect to the use of influent chemical oxygen demand (COD) as a carbon source for the microorganisms. Successful BNR optimization and modelling using WEST (Worldwide Engine for Simulation and Training) depend largely on the accurate fractionation of the influent COD. The different COD fractions have differing effects on the BNR process, and therefore, the influent characteristics need to be well understood. This study presents the fractionation results of primary wastewater effluent COD at one of South Africa’s wastewater works treating 65ML/day of mixed industrial and domestic effluent. The method used for COD fractionation was the oxygen uptake rate/respirometry method. The breakdown of the results of the analysis is as follows: 70.5% biodegradable COD (bCOD) and 29.5% of non-biodegradable COD (iCOD) in terms of the total COD. Further fractionation led to a readily biodegradable soluble fraction (SS) of 75%, a slowly degradable particulate fraction (XS) of 24%, a particulate non-biodegradable fraction (XI) of 50.8% and a non-biodegradable soluble fraction (SI) of 49.2%. The fractionation results demonstrate that the primary effluent has good COD characteristics, as shown by the high level of the bCOD fraction with Ss being higher than Xs. This means that the microorganisms have sufficient substrate for the BNR process and that these components can now serve as inputs to the WEST Model for the plant under study.

Keywords: chemical oxygen demand, COD fractionation, wastewater modelling, wastewater optimization

Procedia PDF Downloads 123
2066 Phishing Detection: Comparison between Uniform Resource Locator and Content-Based Detection

Authors: Nuur Ezaini Akmar Ismail, Norbazilah Rahim, Norul Huda Md Rasdi, Maslina Daud

Abstract:

A web application is the most targeted by the attacker because the web application is accessible by the end users. It has become more advantageous to the attacker since not all the end users aware of what kind of sensitive data already leaked by them through the Internet especially via social network in shake on ‘sharing’. The attacker can use this information such as personal details, a favourite of artists, a favourite of actors or actress, music, politics, and medical records to customize phishing attack thus trick the user to click on malware-laced attachments. The Phishing attack is one of the most popular attacks for social engineering technique against web applications. There are several methods to detect phishing websites such as Blacklist/Whitelist based detection, heuristic-based, and visual similarity-based detection. This paper illustrated a comparison between the heuristic-based technique using features of a uniform resource locator (URL) and visual similarity-based detection techniques that compares the content of a suspected phishing page with the legitimate one in order to detect new phishing sites based on the paper reviewed from the past few years. The comparison focuses on three indicators which are false positive and negative, accuracy of the method, and time consumed to detect phishing website.

Keywords: heuristic-based technique, phishing detection, social engineering and visual similarity-based technique

Procedia PDF Downloads 158
2065 Modelling the Anaerobic Digestion of Esparto Paper Industry Wastewater Effluent in a Batch Digester Using IWA Anaerobic Digestion Model No. 1 (ADM1)

Authors: Boubaker Fezzani, Ridha Ben Cheikh, Tarek Rouissi

Abstract:

In this work the original ADM1, implemented in the simulation software package MATLAB/Simulink, was modified and adapted and applied to reproduce the experimental results of the mesophilic anaerobic digestion of Esperto paper industry wastewater in a batch digester. The data set from lab-scale experiment runs were used to calibrate and validate the model. The simulations’ results indicated that the modified ADM1 was able to predict reasonably well the steady state results of gas flows, methane and carbon dioxide contents, pH and total volatile fatty acids (TVFA) observed with all influents concentrations.

Keywords: anaerobic digestion, mathematical modelling, Simulation, ADM1, batch digester, esparto paper industry effluent, mesophilic temperature

Procedia PDF Downloads 380
2064 Assessment of the Performance of Fly Ash Based Geo-Polymer Concrete under Sulphate and Acid Attack

Authors: Talakokula Visalakshi

Abstract:

Concrete is the most commonly used construction material across the globe, its usage is second only to water. It is prepared using ordinary Portland cement whose production contributes to 5-8% of total carbon emission in the world. On the other hand the fly ash by product from the power plants is produced in huge quantities is termed as waste and disposed in landfills. In order to address the above issues mentioned, it is essential that other forms of binding material must be developed in place of cement to make concrete. The geo polymer concrete is one such alternative developed by Davidovits in 1980’s. Geopolymer do not form calcium-silicate hydrates for matrix formation and strength but undergo polycondensation of silica and alumina precursors to attain structural strength. Its setting mechanism depends upon polymerization rather than hydration. As a result it is able to achieve its strength in 3-5 days whereas concrete requires about a month to do the same. The objective of this research is to assess the performance of geopolymer concrete under sulphate and acid attack. The assessment is done based on the experiments conducted on geopolymer concrete. The expected outcomes include that if geopolymer concrete is more durable than normal concrete, then it could be a competitive replacement option of concrete and can lead to significant reduction of carbon foot print and have a positive impact on the environment. Fly ash based geopolymer concrete offers an opportunity to completely remove the cement content from concrete thereby making the concrete a greener and future construction material.

Keywords: fly ash, geo polymer, geopolymer concrete, construction material

Procedia PDF Downloads 474
2063 River Offtake Management Using Mathematical Modelling Tool: A Case Study of the Gorai River, Bangladesh

Authors: Sarwat Jahan, Asker Rajin Rahman

Abstract:

Management of offtake of any fluvial river is very sensitive in terms of long-term sustainability where the variation of water flow and sediment transport range are wide enough throughout a hydrological year. The Gorai River is a major distributary of the Ganges River in Bangladesh and is termed as a primary source of fresh water for the South-West part of the country. Every year, significant siltation of the Gorai offtake disconnects it from the Ganges during the dry season. As a result, the socio-economic and environmental condition of the downstream areas has been deteriorating for a few decades. To improve the overall situation of the Gorai offtake and its dependent areas, a study has been conducted by the Institute of Water Modelling, Bangladesh, in 2022. Using the mathematical morphological modeling tool MIKE 21C of DHI Water & Environment, Denmark, simulated results revealed the need for dredging/river training structures for offtake management at the Gorai offtake to ensure significant dry season flow towards the downstream. The dry season flow is found to increase significantly with the proposed river interventions, which also improves the environmental conditions in terms of salinity of the South-West zone of the country. This paper summarizes the primary findings of the analyzed results of the developed mathematical model for improving the existing condition of the Gorai River.

Keywords: Gorai river, mathematical modelling, offtake, siltation, salinity

Procedia PDF Downloads 68
2062 Retrospective Reconstruction of Time Series Data for Integrated Waste Management

Authors: A. Buruzs, M. F. Hatwágner, A. Torma, L. T. Kóczy

Abstract:

The development, operation and maintenance of Integrated Waste Management Systems (IWMS) affects essentially the sustainable concern of every region. The features of such systems have great influence on all of the components of sustainability. In order to reach the optimal way of processes, a comprehensive mapping of the variables affecting the future efficiency of the system is needed such as analysis of the interconnections among the components and modelling of their interactions. The planning of a IWMS is based fundamentally on technical and economical opportunities and the legal framework. Modelling the sustainability and operation effectiveness of a certain IWMS is not in the scope of the present research. The complexity of the systems and the large number of the variables require the utilization of a complex approach to model the outcomes and future risks. This complex method should be able to evaluate the logical framework of the factors composing the system and the interconnections between them. The authors of this paper studied the usability of the Fuzzy Cognitive Map (FCM) approach modelling the future operation of IWMS’s. The approach requires two input data set. One is the connection matrix containing all the factors affecting the system in focus with all the interconnections. The other input data set is the time series, a retrospective reconstruction of the weights and roles of the factors. This paper introduces a novel method to develop time series by content analysis.

Keywords: content analysis, factors, integrated waste management system, time series

Procedia PDF Downloads 309
2061 The Fiscal-Monetary Policy and Economic Growth in Algeria: VECM Approach

Authors: K. Bokreta, D. Benanaya

Abstract:

The objective of this study is to examine the relative effectiveness of monetary and fiscal policy in Algeria using the econometric modelling techniques of cointegration and vector error correction modelling to analyse and draw policy inferences. The chosen variables of fiscal policy are government expenditure and net taxes on products, while the effect of monetary policy is presented by the inflation rate and the official exchange rate. From the results, we find that in the long-run, the impact of government expenditures is positive, while the effect of taxes is negative on growth. Additionally, we find that the inflation rate is found to have little effect on GDP per capita but the impact of the exchange rate is insignificant. We conclude that fiscal policy is more powerful then monetary policy in promoting economic growth in Algeria.

Keywords: economic growth, monetary policy, fiscal policy, VECM

Procedia PDF Downloads 291
2060 Estimation of Pressure Profile and Boundary Layer Characteristics over NACA 4412 Airfoil

Authors: Anwar Ul Haque, Waqar Asrar, Erwin Sulaeman, Jaffar S. M. Ali

Abstract:

Pressure distribution data of the standard airfoils is usually used for the calibration purposes in subsonic wind tunnels. Results of such experiments are quite old and obtained by using the model in the spanwise direction. In this manuscript, pressure distribution over NACA 4412 airfoil model was presented by placing the 3D model in the lateral direction. The model is made of metal with pressure ports distributed longitudinally as well as in the lateral direction. The pressure model was attached to the floor of the tunnel with the help of the base plate to give the specified angle of attack to the model. Before the start of the experiments, the pressure tubes of the respective ports of the 128 ports pressure scanner are checked for leakage, and the losses due to the length of the pipes were also incorporated in the results for the specified pressure range. Growth rate maps of the boundary layer thickness were also plotted. It was found that with the increase in the velocity, the dynamic pressure distribution was also increased for the alpha seep. Plots of pressure distribution so obtained were overlapped with those obtained by using XFLR software, a low fidelity tool. It was found that at moderate and high angles of attack, the distribution of the pressure coefficients obtained from the experiments is high when compared with the XFLR ® results obtained along with the span of the wing. This under-prediction by XFLR ® is more obvious on the windward than on the leeward side.

Keywords: subsonic flow, boundary layer, wind tunnel, pressure testing

Procedia PDF Downloads 303
2059 Agent-Base Modeling of IoT Applications by Using Software Product Line

Authors: Asad Abbas, Muhammad Fezan Afzal, Muhammad Latif Anjum, Muhammad Azmat

Abstract:

The Internet of Things (IoT) is used to link up real objects that use the internet to interact. IoT applications allow handling and operating the equipment in accordance with environmental needs, such as transportation and healthcare. IoT devices are linked together via a number of agents that act as a middleman for communications. The operation of a heat sensor differs indoors and outside because agent applications work with environmental variables. In this article, we suggest using Software Product Line (SPL) to model IoT agents and applications' features on an XML-based basis. The contextual diversity within the same domain of application can be handled, and the reusability of features is increased by XML-based feature modelling. For the purpose of managing contextual variability, we have embraced XML for modelling IoT applications, agents, and internet-connected devices.

Keywords: IoT agents, IoT applications, software product line, feature model, XML

Procedia PDF Downloads 71
2058 Modelling the Effects of External Factors Affecting Concrete Carbonation

Authors: Abhishek Mangal, Kunal Tongaria, S. Mandal, Devendra Mohan

Abstract:

Carbonation of reinforced concrete structures has emerged as one of the major challenges for Civil engineers across the world. With increasing emissions from various activities, carbon dioxide concentration in the atmosphere has been eve rising, enhancing its penetration in porous concrete, reaching steel bars and ultimately leading to premature failure. Several literatures have been published dealing with the various interdependent variables related to carbonation. However, with innumerable variability a generalization of these data proves to be a troublesome task. This paper looks into this carbonation anomaly in concrete structures caused by various external variables such as relative humidity, concentration of CO2, curing period and ambient temperature. Significant discussions and comparisons have been presented on the basis of various studies conducted with an aim to predict the depth of carbonation as a function of these multidimensional parameters using various numerical and statistical modelling techniques.

Keywords: carbonation, curing, exposure conditions, relative humidity

Procedia PDF Downloads 232
2057 Modelling the Spread of HIV/AIDS Epidemic with Condom Campaign and Treatment

Authors: Marsudi, Noor Hidayat, Ratno Bagus Edy Wibowo

Abstract:

This paper considers a deterministic model for the transmission dynamics of HIV/AIDS in which condom campaign and treatment are both important for the disease management. In modelling of the spread of AIDS, the population is divided into six subpopulations, namely susceptible population, susceptible population who change their behavior due to education condom campaign, infected population, pre-AIDS population, treated population and full-blown AIDS population. We calculate the effective reproduction number using the next generation matrix method and investigate the existence and stability of the equilibrium points. A sensitivity analysis discovers parameters that have a high impact on effective reproduction number and should be targeted by intervention strategies. Numerical simulations are given to illustrate and verify our analytic results.

Keywords: HIV/AIDS, condom campaign, antiretroviral treatment, effective reproduction number, stability and sensitivity analysis

Procedia PDF Downloads 237
2056 Ground-Structure Interaction Analysis of Aged Tunnels

Authors: Behrang Dadfar, Hossein Bidhendi, Jimmy Susetyo, John Paul Abbatangelo

Abstract:

Finding structural demand under various conditions that a structure may experience during its service life is an important step towards structural life-cycle analysis. In this paper, structural demand for the precast concrete tunnel lining (PCTL) segments of Toronto’s 60-year-old subway tunnels is investigated. Numerical modelling was conducted using FLAC3D, a finite difference-based software capable of simulating ground-structure interaction and ground material’s flow in three dimensions. The specific structural details of the segmental tunnel lining, such as the convex shape of the PCTL segments at radial joints and the PCTL segment pockets, were considered in the numerical modelling. Also, the model was developed in a way to accommodate the flexibility required for the simulation of various deterioration scenarios, shapes, and patterns that have been observed over more than 20 years. The soil behavior was simulated by using plastic-hardening constitutive model of FLAC3D. The effect of the depth of the tunnel, the coefficient of lateral earth pressure as well as the patterns of deterioration of the segments were studied. The structural capacity under various deterioration patterns and the existing loading conditions was evaluated using axial-flexural interaction curves that were developed for each deterioration pattern. The results were used to provide recommendations for the next phase of tunnel lining rehabilitation program.

Keywords: precast concrete tunnel lining, ground-structure interaction, numerical modelling, deterioration, tunnels

Procedia PDF Downloads 142
2055 New Desiccant Solar Unit for Air Conditioning and Desalination: Study of the Compartments of Desalination and Water Condensation

Authors: Zied Guidara, Alexander Morgenstern, Aref Maalej

Abstract:

In this paper, a new desiccant solar unit for air conditioning and desalination is presented first. Secondly, a dynamic modelling study of the desiccant wheel is developed. After that, a simulation study and an experimental investigation of the behaviour of the desiccant wheel are developed. The experimental investigation is done in the chamber of commerce in Freiburg-Germany. Indeed, the variations of calculated and measured temperatures and specific humidity of dehumidified and rejected air are presented where a good agreement is found when comparing the model predictions with experimental data under the considered range of operating conditions. Finally, the study of the compartments of desalination and water condensation shows that the unit can produce an acceptable quantity of water at the same time of the air conditioning operation.

Keywords: air conditioning, desalination, condensation, design, desiccant wheel, modelling, experimental investigation

Procedia PDF Downloads 367
2054 Influence of Surface Area on Dissolution of Additively Manufactured Polyvinyl Alcohol Tablets

Authors: Seyedebrahim Afkhami, Meisam Abdi, Reza Baserinia

Abstract:

Additive manufacturing is revolutionising production in different industries, including pharmaceuticals. This case study explores the influence of surface area on the dissolution of additively manufactured polyvinyl alcohol parts as a polymer candidate. Specimens of different geometries and constant mass were fabricated using a Fused Deposition Modelling 3D printer. The dissolution behaviour of these samples was compared with respect to their surface area. Improved and accelerated dissolution was observed for samples with a larger surface area. This study highlights the capabilities of additive manufacturing to produce samples of complex geometries that cannot be manufactured otherwise to control the dissolution behaviour for pharmaceutical and biopharmaceutical applications.

Keywords: additive manufacturing, polymer dissolution, fused deposition modelling, geometry optimization

Procedia PDF Downloads 73
2053 Thermodynamic Modelling of Liquid-Liquid Equilibria (LLE) in the Separation of p-Cresol from the Coal Tar by Solvent Extraction

Authors: D. S. Fardhyanti, Megawati, W. B. Sediawan

Abstract:

Coal tar is a liquid by-product of the process of coal gasification and carbonation. This liquid oil mixture contains various kinds of useful compounds such as aromatic compounds and phenolic compounds. These compounds are widely used as raw material for insecticides, dyes, medicines, perfumes, coloring matters, and many others. This research investigates thermodynamic modelling of liquid-liquid equilibria (LLE) in the separation of phenol from the coal tar by solvent extraction. The equilibria are modeled by ternary components of Wohl, Van Laar, and Three-Suffix Margules models. The values of the parameters involved are obtained by curve-fitting to the experimental data. Based on the comparison between calculated and experimental data, it turns out that among the three models studied, the Three-Suffix Margules seems to be the best to predict the LLE of p-Cresol mixtures for those system.

Keywords: coal tar, phenol, Wohl, Van Laar, Three-Suffix Margules

Procedia PDF Downloads 236