Search results for: chloride attack
913 Detecting Venomous Files in IDS Using an Approach Based on Data Mining Algorithm
Authors: Sukhleen Kaur
Abstract:
In security groundwork, Intrusion Detection System (IDS) has become an important component. The IDS has received increasing attention in recent years. IDS is one of the effective way to detect different kinds of attacks and malicious codes in a network and help us to secure the network. Data mining techniques can be implemented to IDS, which analyses the large amount of data and gives better results. Data mining can contribute to improving intrusion detection by adding a level of focus to anomaly detection. So far the study has been carried out on finding the attacks but this paper detects the malicious files. Some intruders do not attack directly, but they hide some harmful code inside the files or may corrupt those file and attack the system. These files are detected according to some defined parameters which will form two lists of files as normal files and harmful files. After that data mining will be performed. In this paper a hybrid classifier has been used via Naive Bayes and Ripper classification methods. The results show how the uploaded file in the database will be tested against the parameters and then it is characterised as either normal or harmful file and after that the mining is performed. Moreover, when a user tries to mine on harmful file it will generate an exception that mining cannot be made on corrupted or harmful files.Keywords: data mining, association, classification, clustering, decision tree, intrusion detection system, misuse detection, anomaly detection, naive Bayes, ripper
Procedia PDF Downloads 414912 Parental Perceptions and Practices toward Childhood Asthma
Authors: Amani K. Abu-Shaheen, Abdullah Nofal, Humariya Heena
Abstract:
Introduction: Parental perceptions and practices are important for improving the asthma outcomes in children; indeed, evidence shows that parents of asthmatic children harbor considerable misperceptions of the disease. Objective: To identify the prevalence of asthma and to investigate the perceptions and practices of parents toward asthma and its management in Saudi children. Methods: A two-stage cross-sectional survey of 2000 parents of children aged 3–15 years from schools located in all five districts of Riyadh province located in central Saudi Arabia, was conducted. Data collection was accomplished using a self-administered questionnaire based on information obtained from the literature. Results: Of 1450 children whose parents participated in the study, 600 had asthma, dyspnea, or chest allergy. The overall number of children with parental reports of ever having been diagnosed with asthma was 478 (32.9%). The majority of parents (321, 53.5%) believed that asthma was a hereditary disease. Of these parents, 361 (60.3%) were concerned about side effects of inhaled steroids, and 192 (32%) about development of dependency on asthma medications. Three hundred sixty seven (61.2%) parents reported that they could treat the asthma attack at home and almost 76% of parents went to pediatric emergency department during asthma attack. Conclusions: In this study, the overall prevalence of children whose parents reported that they were diagnosed with asthma was high (32.9%). Furthermore, parents of children with asthma had misperceptions regarding asthma and exhibited ineffective practices in its management. To improve asthma care and compliance, adequate education should be provided to parents.Keywords: asthma, management, parents, quality of life
Procedia PDF Downloads 274911 Long-Term Exposure, Health Risk, and Loss of Quality-Adjusted Life Expectancy Assessments for Vinyl Chloride Monomer Workers
Authors: Tzu-Ting Hu, Jung-Der Wang, Ming-Yeng Lin, Jin-Luh Chen, Perng-Jy Tsai
Abstract:
The vinyl chloride monomer (VCM) has been classified as group 1 (human) carcinogen by the IARC. Workers exposed to VCM are known associated with the development of the liver cancer and hence might cause economical and health losses. Particularly, for those work for the petrochemical industry have been seriously concerned in the environmental and occupational health field. Considering assessing workers’ health risks and their resultant economical and health losses requires the establishment of long-term VCM exposure data for any similar exposure group (SEG) of interest, the development of suitable technologies has become an urgent and important issue. In the present study, VCM exposures for petrochemical industry workers were determined firstly based on the database of the 'Workplace Environmental Monitoring Information Systems (WEMIS)' provided by Taiwan OSHA. Considering the existence of miss data, the reconstruction of historical exposure techniques were then used for completing the long-term exposure data for SEGs with routine operations. For SEGs with non-routine operations, exposure modeling techniques, together with their time/activity records, were adopted for determining their long-term exposure concentrations. The Bayesian decision analysis (BDA) was adopted for conducting exposure and health risk assessments for any given SEG in the petrochemical industry. The resultant excessive cancer risk was then used to determine the corresponding loss of quality-adjusted life expectancy (QALE). Results show that low average concentrations can be found for SEGs with routine operations (e.g., VCM rectification 0.0973 ppm, polymerization 0.306 ppm, reaction tank 0.33 ppm, VCM recovery 1.4 ppm, control room 0.14 ppm, VCM storage tanks 0.095 ppm and wastewater treatment 0.390 ppm), and the above values were much lower than that of the permissible exposure limit (PEL; 3 ppm) of VCM promulgated in Taiwan. For non-routine workers, though their high exposure concentrations, their low exposure time and frequencies result in low corresponding health risks. Through the consideration of exposure assessment results, health risk assessment results, and QALE results simultaneously, it is concluded that the proposed method was useful for prioritizing SEGs for conducting exposure abatement measurements. Particularly, the obtained QALE results further indicate the importance of reducing workers’ VCM exposures, though their exposures were low as in comparison with the PEL and the acceptable health risk.Keywords: exposure assessment, health risk assessment, petrochemical industry, quality-adjusted life years, vinyl chloride monomer
Procedia PDF Downloads 195910 USBware: A Trusted and Multidisciplinary Framework for Enhanced Detection of USB-Based Attacks
Authors: Nir Nissim, Ran Yahalom, Tomer Lancewiki, Yuval Elovici, Boaz Lerner
Abstract:
Background: Attackers increasingly take advantage of innocent users who tend to use USB devices casually, assuming these devices benign when in fact they may carry an embedded malicious behavior or hidden malware. USB devices have many properties and capabilities that have become the subject of malicious operations. Many of the recent attacks targeting individuals, and especially organizations, utilize popular and widely used USB devices, such as mice, keyboards, flash drives, printers, and smartphones. However, current detection tools, techniques, and solutions generally fail to detect both the known and unknown attacks launched via USB devices. Significance: We propose USBWARE, a project that focuses on the vulnerabilities of USB devices and centers on the development of a comprehensive detection framework that relies upon a crucial attack repository. USBWARE will allow researchers and companies to better understand the vulnerabilities and attacks associated with USB devices as well as providing a comprehensive platform for developing detection solutions. Methodology: The framework of USBWARE is aimed at accurate detection of both known and unknown USB-based attacks by a process that efficiently enhances the framework's detection capabilities over time. The framework will integrate two main security approaches in order to enhance the detection of USB-based attacks associated with a variety of USB devices. The first approach is aimed at the detection of known attacks and their variants, whereas the second approach focuses on the detection of unknown attacks. USBWARE will consist of six independent but complimentary detection modules, each detecting attacks based on a different approach or discipline. These modules include novel ideas and algorithms inspired from or already developed within our team's domains of expertise, including cyber security, electrical and signal processing, machine learning, and computational biology. The establishment and maintenance of the USBWARE’s dynamic and up-to-date attack repository will strengthen the capabilities of the USBWARE detection framework. The attack repository’s infrastructure will enable researchers to record, document, create, and simulate existing and new USB-based attacks. This data will be used to maintain the detection framework’s updatability by incorporating knowledge regarding new attacks. Based on our experience in the cyber security domain, we aim to design the USBWARE framework so that it will have several characteristics that are crucial for this type of cyber-security detection solution. Specifically, the USBWARE framework should be: Novel, Multidisciplinary, Trusted, Lightweight, Extendable, Modular and Updatable and Adaptable. Major Findings: Based on our initial survey, we have already found more than 23 types of USB-based attacks, divided into six major categories. Our preliminary evaluation and proof of concepts showed that our detection modules can be used for efficient detection of several basic known USB attacks. Further research, development, and enhancements are required so that USBWARE will be capable to cover all of the major known USB attacks and to detect unknown attacks. Conclusion: USBWARE is a crucial detection framework that must be further enhanced and developed.Keywords: USB, device, cyber security, attack, detection
Procedia PDF Downloads 397909 Proposal of Optimality Evaluation for Quantum Secure Communication Protocols by Taking the Average of the Main Protocol Parameters: Efficiency, Security and Practicality
Authors: Georgi Bebrov, Rozalina Dimova
Abstract:
In the field of quantum secure communication, there is no evaluation that characterizes quantum secure communication (QSC) protocols in a complete, general manner. The current paper addresses the problem concerning the lack of such an evaluation for QSC protocols by introducing an optimality evaluation, which is expressed as the average over the three main parameters of QSC protocols: efficiency, security, and practicality. For the efficiency evaluation, the common expression of this parameter is used, which incorporates all the classical and quantum resources (bits and qubits) utilized for transferring a certain amount of information (bits) in a secure manner. By using criteria approach whether or not certain criteria are met, an expression for the practicality evaluation is presented, which accounts for the complexity of the QSC practical realization. Based on the error rates that the common quantum attacks (Measurement and resend, Intercept and resend, probe attack, and entanglement swapping attack) induce, the security evaluation for a QSC protocol is proposed as the minimum function taken over the error rates of the mentioned quantum attacks. For the sake of clarity, an example is presented in order to show how the optimality is calculated.Keywords: quantum cryptography, quantum secure communcation, quantum secure direct communcation security, quantum secure direct communcation efficiency, quantum secure direct communcation practicality
Procedia PDF Downloads 184908 On the Design of a Secure Two-Party Authentication Scheme for Internet of Things Using Cancelable Biometrics and Physically Unclonable Functions
Authors: Behnam Zahednejad, Saeed Kosari
Abstract:
Widespread deployment of Internet of Things (IoT) has raised security and privacy issues in this environment. Designing a secure two-factor authentication scheme between the user and server is still a challenging task. In this paper, we focus on Cancelable Biometric (CB) as an authentication factor in IoT. We show that previous CB-based scheme fail to provide real two-factor security, Perfect Forward Secrecy (PFS) and suffer database attacks and traceability of the user. Then we propose our improved scheme based on CB and Physically Unclonable Functions (PUF), which can provide real two-factor security, PFS, user’s unlinkability, and resistance to database attack. In addition, Key Compromise Impersonation (KCI) resilience is achieved in our scheme. We also prove the security of our proposed scheme formally using both Real-Or-Random (RoR) model and the ProVerif analysis tool. For the usability of our scheme, we conducted a performance analysis and showed that our scheme has the least communication cost compared to the previous CB-based scheme. The computational cost of our scheme is also acceptable for the IoT environment.Keywords: IoT, two-factor security, cancelable biometric, key compromise impersonation resilience, perfect forward secrecy, database attack, real-or-random model, ProVerif
Procedia PDF Downloads 102907 Phishing Detection: Comparison between Uniform Resource Locator and Content-Based Detection
Authors: Nuur Ezaini Akmar Ismail, Norbazilah Rahim, Norul Huda Md Rasdi, Maslina Daud
Abstract:
A web application is the most targeted by the attacker because the web application is accessible by the end users. It has become more advantageous to the attacker since not all the end users aware of what kind of sensitive data already leaked by them through the Internet especially via social network in shake on ‘sharing’. The attacker can use this information such as personal details, a favourite of artists, a favourite of actors or actress, music, politics, and medical records to customize phishing attack thus trick the user to click on malware-laced attachments. The Phishing attack is one of the most popular attacks for social engineering technique against web applications. There are several methods to detect phishing websites such as Blacklist/Whitelist based detection, heuristic-based, and visual similarity-based detection. This paper illustrated a comparison between the heuristic-based technique using features of a uniform resource locator (URL) and visual similarity-based detection techniques that compares the content of a suspected phishing page with the legitimate one in order to detect new phishing sites based on the paper reviewed from the past few years. The comparison focuses on three indicators which are false positive and negative, accuracy of the method, and time consumed to detect phishing website.Keywords: heuristic-based technique, phishing detection, social engineering and visual similarity-based technique
Procedia PDF Downloads 177906 Development of Biosurfactant-Based Adjuvant for Enhancing Biocontrol Efficiency
Authors: Kanyarat Sikhao, Nichakorn Khondee
Abstract:
Adjuvant is commonly mixed with agricultural spray solution during foliar application to improve the performance of microbial-based biological control, including better spreading, absorption, and penetration on a plant leaf. This research aims to replace chemical surfactants in adjuvant by biosurfactants for reducing a negative impact on antagonistic microorganisms and crops. Biosurfactant was produced from Brevibacterium casei NK8 and used as a cell-free broth solution containing a biosurfactant concentration of 3.7 g/L. The studies of microemulsion formation and phase behavior were applied to obtain the suitable composition of biosurfactant-based adjuvant, consisting of cell-free broth (70-80%), coconut oil-based fatty alcohol C12-14 (3) ethoxylate (1-7%), and sodium chloride (8-30%). The suitable formula, achieving Winsor Type III microemulsion (bicontinuous), was 80% of cell-free broth, 7% of fatty alcohol C12-14 (3) ethoxylate, and 8% sodium chloride. This formula reduced the contact angle of water on parafilm from 70 to 31 degrees. The non-phytotoxicity against plant seed of Oryza sativa and Brassica rapa subsp. pekinensis were obtained from biosurfactant-based adjuvant (germination index equal and above 80%), while sodium dodecyl sulfate and tween80 showed phytotoxic effects to these plant seeds. The survival of Bacillus subtilis in biosurfactant-based adjuvant was higher than sodium dodecyl sulfate and tween80. The mixing of biosurfactant and plant-based surfactant could be considered as a viable, safer, and acceptable alternative to chemical adjuvant for sustainable organic farming.Keywords: biosurfactant, microemulsion, bio-adjuvant, antagonistic microorganisms
Procedia PDF Downloads 141905 Assessment of the Performance of Fly Ash Based Geo-Polymer Concrete under Sulphate and Acid Attack
Authors: Talakokula Visalakshi
Abstract:
Concrete is the most commonly used construction material across the globe, its usage is second only to water. It is prepared using ordinary Portland cement whose production contributes to 5-8% of total carbon emission in the world. On the other hand the fly ash by product from the power plants is produced in huge quantities is termed as waste and disposed in landfills. In order to address the above issues mentioned, it is essential that other forms of binding material must be developed in place of cement to make concrete. The geo polymer concrete is one such alternative developed by Davidovits in 1980’s. Geopolymer do not form calcium-silicate hydrates for matrix formation and strength but undergo polycondensation of silica and alumina precursors to attain structural strength. Its setting mechanism depends upon polymerization rather than hydration. As a result it is able to achieve its strength in 3-5 days whereas concrete requires about a month to do the same. The objective of this research is to assess the performance of geopolymer concrete under sulphate and acid attack. The assessment is done based on the experiments conducted on geopolymer concrete. The expected outcomes include that if geopolymer concrete is more durable than normal concrete, then it could be a competitive replacement option of concrete and can lead to significant reduction of carbon foot print and have a positive impact on the environment. Fly ash based geopolymer concrete offers an opportunity to completely remove the cement content from concrete thereby making the concrete a greener and future construction material.Keywords: fly ash, geo polymer, geopolymer concrete, construction material
Procedia PDF Downloads 488904 Estimation of Pressure Profile and Boundary Layer Characteristics over NACA 4412 Airfoil
Authors: Anwar Ul Haque, Waqar Asrar, Erwin Sulaeman, Jaffar S. M. Ali
Abstract:
Pressure distribution data of the standard airfoils is usually used for the calibration purposes in subsonic wind tunnels. Results of such experiments are quite old and obtained by using the model in the spanwise direction. In this manuscript, pressure distribution over NACA 4412 airfoil model was presented by placing the 3D model in the lateral direction. The model is made of metal with pressure ports distributed longitudinally as well as in the lateral direction. The pressure model was attached to the floor of the tunnel with the help of the base plate to give the specified angle of attack to the model. Before the start of the experiments, the pressure tubes of the respective ports of the 128 ports pressure scanner are checked for leakage, and the losses due to the length of the pipes were also incorporated in the results for the specified pressure range. Growth rate maps of the boundary layer thickness were also plotted. It was found that with the increase in the velocity, the dynamic pressure distribution was also increased for the alpha seep. Plots of pressure distribution so obtained were overlapped with those obtained by using XFLR software, a low fidelity tool. It was found that at moderate and high angles of attack, the distribution of the pressure coefficients obtained from the experiments is high when compared with the XFLR ® results obtained along with the span of the wing. This under-prediction by XFLR ® is more obvious on the windward than on the leeward side.Keywords: subsonic flow, boundary layer, wind tunnel, pressure testing
Procedia PDF Downloads 320903 Numerical Investigation of the Flow Around Multi-Element Airfoils
Authors: Taylan Ozturk, Osama Maklad
Abstract:
This study examines the aerodynamic and flow properties of a multi-element airfoil using computational fluid dynamics (CFD) research. This computational analysis aims to optimize slat design concerning lift-drag coefficients and to determine the ideal gap size between the main airfoil and the front flap. It examines the influence of varying angles of attack and the effects of varied Reynolds numbers. A NACA 2412 airfoil, equipped with custom-designed front and rear flaps, was modeled in SolidWorks and simulated in ANSYS Fluent utilizing the k-ω SST turbulence model. This study quantifies lift and drag coefficients, turbulent kinetic energy, and vorticity magnitude across various configurations. The results clearly indicate that the slat-optimized design geometry featuring a 4 mm gap provides the best performance regarding both lift and drag, with maximum efficiency achieved at a 4-degree angle of attack. Furthermore, the results indicate the initiation of stall conditions beyond 20 degrees and demonstrate how an increase in Reynolds numbers influences flow separation and turbulence patterns. In addition, the maximum L/D ratio which is 36.18 achieved. These findings enhance the comprehension of multi-element airfoil behavior, directly impacting aircraft design and operation, particularly in high-lift situations.Keywords: multi-element airfoil, CFD simulation, aerodynamic characteristics, Reynolds number analysis
Procedia PDF Downloads 20902 Chloride Ion Channels Play a Role in Mediating Immune Response during Pseudomonas aeruginosa Infection
Authors: Hani M. Alothaid, Louise Robson, Richmond Muimo
Abstract:
Cystic fibrosis (CF) is a disease that affects respiratory function and in EU it affects about 1 in 2,500 live births with an average 40-year life expectancy. This disease caused by mutations within the gene encoding the CFTR (Cystic Fibrosis Transmembrane Conductance Regulator) chloride channel leading to dysregulation of epithelial fluid transport and chronic lung inflammation, suggesting functional alterations of immune cells. In airways, CFTR been found to form a functional complex with S100A10 and AnxA2 in a cAMP/PKA dependent manner. The multiprotein complex of AnxA2-S100A10 and CFTR is also regulated by calcineurin. The aim of this study was i) to investigate whether chloride ion (Cl−) channels are activated by Pseudomonas aeruginosa lipopolysaccharide (LPS from PA), ii) if this activation is regulated by cAMP/PKA/calcineurin pathway and iii) to investigate the role of LPS-activated Cl− channels in the release of pro-inflammatory cytokines by immune cells. Human peripheral blood monocytes were used in the study. Whole-cell patch records showed that LPS from PA can activate Cl− channels, including CFTR and outwardly-rectifying Cl− channel (ORCC). This activation appears to require an intact PKA/calcineurin signalling pathway. The Gout in the presence of LPS was significantly inhibited by diisothiocyanatostilbene-disulfonic acid (DIDS), an ORCC blocker (p<0.001). The Gout was further suppressed by CFTR(inh)-172, a specific inhibitor for CFTR channels (p<0.001). Monocytes pre-incubated with PKA inhibitor or calcineurin inhibitor before stimulated with LPS from PA that were resulted in DIDS and CFTR(inh)-172 insensitive currents. Activation of both ORCC and CFTR was however, observed in response to monocytes exposure to LPS. Additionally, ELISA showed that the CFTR and ORCC play a role in mediating the release of pro-inflammatory cytokines such as IL-1β upon exposure of monocytes to LPS. However, this secretion was significantly inhibited due to CFTR and ORCC inhibition. However, Cl− may play a role in IL-1β release independent of cAMP/PKA/calcineurin signalling due to the enhancement of IL-1β secretion even when cAMP/PKA/calcineurin pathway was inhibited. In conclusion, our data confirmed that LPS from PA activates Cl− channels in human peripheral blood monocytes. Our data also confirmed that Cl− channels were involved in IL-1β release in monocytes upon exposure to LPS. However, it has been found that PKA and calcineurin does not seem to influence the Cl− dependent cytokine release.Keywords: cystic fibrosis, CFTR, Annexin A2, S100A10, PP2B, PKA, outwardly-rectifying Cl− channel, Pseudomonas aeruginosa
Procedia PDF Downloads 177901 Synthesis, Characterization, and Application of Novel Trihexyltetradecyl Phosphonium Chloride for Extractive Desulfurization of Liquid Fuel
Authors: Swapnil A. Dharaskar, Kailas L. Wasewar, Mahesh N. Varma, Diwakar Z. Shende
Abstract:
Owing to the stringent environmental regulations in many countries for production of ultra low sulfur petroleum fractions intending to reduce sulfur emissions results in enormous interest in this area among the scientific community. The requirement of zero sulfur emissions enhances the prominence for more advanced techniques in desulfurization. Desulfurization by extraction is a promising approach having several advantages over conventional hydrodesulphurization. Present work is dealt with various new approaches for desulfurization of ultra clean gasoline, diesel and other liquid fuels by extraction with ionic liquids. In present paper experimental data on extractive desulfurization of liquid fuel using trihexyl tetradecyl phosphonium chloride has been presented. The FTIR, 1H-NMR, and 13C-NMR have been discussed for the molecular confirmation of synthesized ionic liquid. Further, conductivity, solubility, and viscosity analysis of ionic liquids were carried out. The effects of reaction time, reaction temperature, sulfur compounds, ultrasonication, and recycling of ionic liquid without regeneration on removal of dibenzothiphene from liquid fuel were also investigated. In extractive desulfurization process, the removal of dibenzothiophene in n-dodecane was 84.5% for mass ratio of 1:1 in 30 min at 30OC under the mild reaction conditions. Phosphonium ionic liquids could be reused five times without a significant decrease in activity. Also, the desulfurization of real fuels, multistage extraction was examined. The data and results provided in present paper explore the significant insights of phosphonium based ionic liquids as novel extractant for extractive desulfurization of liquid fuels.Keywords: ionic liquid, PPIL, desulfurization, liquid fuel, extraction
Procedia PDF Downloads 609900 Numerical Simulation of the Effect of Single and Dual Synthetic Jet on Stall Phenomenon On NACA (National Advisory Committee for Aeronautics) GA(W)-2 Airfoil
Authors: Abbasali Abouei Mehrizi, Hamid Hassanzadeh Afrouzi
Abstract:
Reducing the drag force increases the efficiency of the aircraft and its better performance. Flow control methods delay the phenomenon of flow separation and consequently reduce the reversed flow phenomenon in the separation region and enhance the performance of the lift force while decreasing the drag force and thus improving the aircraft efficiency. Flow control methods can be divided into active and passive types. The use of synthetic jets actuator (SJA) used in this study for NACA GA (W) -2 airfoil is one of the active flow control methods to prevent stall phenomenon on the airfoil. In this research, the relevant airfoil in different angles of attack with and without jets has been compared by OpenFOAM. Also, after achieving the proper SJA position on the airfoil suction surface, the simultaneous effect of two SJAs has been discussed. It was found to have the best effect at 12% chord (C), close to the airfoil’s leading edge (LE). At 12% chord, SJA decreases the drag significantly with increasing lift, and also, the average lift increase was higher than other situations and was equal to 10.4%. The highest drag reduction was about 5% in SJA=0.25C. Then, due to the positive effects of SJA in the 12% and 25% chord regions, these regions were considered for applying dual jets in two post-stall angles of attack, i.e., 16° and 22°.Keywords: active and passive flow control methods, computational fluid dynamics, flow separation, synthetic jet
Procedia PDF Downloads 83899 Groundwater Quality and Its Suitability for Agricultural Use in the Jeloula Basin, Tunisia
Authors: Intissar Farid
Abstract:
Groundwater quality assessment is crucial for sustainable water use, especially in semi-arid regions like the Jeloula basin in Tunisia, where groundwater is essential for domestic and agricultural needs. The present research aims to characterize the suitability of groundwater for irrigational purposes by considering various parameters: total salt concentration as measured by Electrical Conductivity EC, relative proportions of Na⁺ as expressed by %Na and SAR, Kelly’s ratio, Permeability Index, Magnesium hazard and Residual Sodium chloride. Chemical data indicate that the percent sodium (%Na) in the study area ranged from 26.3 to 45.3%. According to the Wilcox diagram, the quality classification of irrigation water suggests that analyzed groundwaters are suitable for irrigation purposes. The SAR values vary between 2.1 and 5. Most of the groundwater samples plot in the Richards’C3S1 water class and indicate little danger from sodium content to soil and plant growth. The Kelly’s ratio of the analyzed samples ranged from 0.3 to 0.8. These values indicate that the waters are fit for agricultural purposes. Magnesium hazard (MH) values range from 27.5 to 52.6, with an average of 38.9 in the analyzed waters. Hence, the Mg²⁺ content of the groundwater from the shallow aquifer cannot cause any problem to the soil permeability. Permeability index (PI) values computed for the area ranged from 33.6 to 52.7%. The above result, therefore, suggests that most of the water samples fall within class I of the Doneen chart and can be categorized as good irrigation water. The groundwaters collected from the Jeloula shallow aquifer were found to be within the safe limits and thus suitable for irrigation purposes.Keywords: Kelly's ratio, magnesium hazard, permeability index, residual sodium chloride
Procedia PDF Downloads 26898 Off-Policy Q-learning Technique for Intrusion Response in Network Security
Authors: Zheni S. Stefanova, Kandethody M. Ramachandran
Abstract:
With the increasing dependency on our computer devices, we face the necessity of adequate, efficient and effective mechanisms, for protecting our network. There are two main problems that Intrusion Detection Systems (IDS) attempt to solve. 1) To detect the attack, by analyzing the incoming traffic and inspect the network (intrusion detection). 2) To produce a prompt response when the attack occurs (intrusion prevention). It is critical creating an Intrusion detection model that will detect a breach in the system on time and also challenging making it provide an automatic and with an acceptable delay response at every single stage of the monitoring process. We cannot afford to adopt security measures with a high exploiting computational power, and we are not able to accept a mechanism that will react with a delay. In this paper, we will propose an intrusion response mechanism that is based on artificial intelligence, and more precisely, reinforcement learning techniques (RLT). The RLT will help us to create a decision agent, who will control the process of interacting with the undetermined environment. The goal is to find an optimal policy, which will represent the intrusion response, therefore, to solve the Reinforcement learning problem, using a Q-learning approach. Our agent will produce an optimal immediate response, in the process of evaluating the network traffic.This Q-learning approach will establish the balance between exploration and exploitation and provide a unique, self-learning and strategic artificial intelligence response mechanism for IDS.Keywords: cyber security, intrusion prevention, optimal policy, Q-learning
Procedia PDF Downloads 236897 Sensitivity of Acanthamoeba castellanii-Grown Francisella to Three Different Disinfectants
Authors: M. Knezevic, V. Marecic, M. Ozanic, I. Kelava, M. Mihelcic, M. Santic
Abstract:
Francisella tularensis is a highly infectious, gram-negative intracellular bacterium and the causative agent of tularemia. The bacterium has been isolated from more than 250 wild species, including protozoa cells. Since Francisella is very virulent and persists in the environment for years, the aim of this study was to investigate whether Acanthamoeba castellanii-grown F. novicida exhibits an alteration in the resistance to disinfectants. It has been shown by other intracellular pathogens, including Legionella pneumophila that bacteria grown in amoeba exhibit more resistance to disinfectants. However, there is no data showing Francisella viability behaviour after intracellular life cycle in A. castellani. In this study, the bacterial suspensions of A. castellanii-grown or in vitro-grown Francisella were treated with three different disinfectants, and the bacterial viability after disinfection treatment was determined by a colony-forming unit (CFU) counting method, transmission electron microscopy (TEM), fluorescence microscopy as well as the leakage of intracellular fluid. Our results have shown that didecyldimethylammonium chloride (DDAC) combined with isopropyl alcohol was the most effective in bacterial killing; all in vitro-grown and A. castellanii-grown F. novicida were killed after only 10s. Surprisingly, in comparison to in vitro-grown bacteria, A. castellanii-grown F. novicida was more sensitive to decontamination by the benzalkonium chloride combined with DDAC and formic acid and the polyhexamethylene biguanide (PHMB). We can conclude that the tested disinfectants exhibit antimicrobial activity by causing a loss of structural organization and integrity of the Francisella cell wall and membrane and the subsequent leakage of the intracellular contents. Finally, the results of this study clearly demonstrate that Francisella grown in A. castellanii had become more susceptible to many disinfectants.Keywords: Acanthamoeba, disinfectant, Francisella, sensitivity
Procedia PDF Downloads 100896 Thermophysical Properties of Glycine/L-Alanine in 1-Butyl-3-Methylimidazolium Bromide and in 1-Butyl-3-Methylimidazolium Chloride
Authors: Tarnveer Kaur
Abstract:
Amino acids, as fundamental structural units of peptides and proteins, have an important role in biological systems by affecting solubility, denaturation, and activity of biomolecules. A study of these effects on thermophysical properties of model compounds in the presence of electrolytes solutions provides information about solute-solvent and solute-solute interactions on biomolecules. Ionic liquids (ILs) as organic electrolytes and green solvents are composed of an organic cation and an inorganic anion, which are liquid at ambient conditions. In the past decade, extensive investigations showed that the use of ILs as reaction media for processes involving biologically relevant compounds is promising in view of their successful application in kinetic resolution, biocatalysis, biosynthesis, separation, and purification processes. The scope of this information is valuable to explore the interactions of amino acids in ILs. To reach this purpose, apparent molar volumes of glycine/L-alanine in aqueous solutions of 1-butyl-3-methylimidazolium bromide/chloride were determined from precise density measurements at temperatures T = (288.15-318.15) K and at atmospheric pressure. Positive values for all the studied amino acids indicate the dominance of hydrophilic-ionic interactions between amino acids and Ionic liquids. The effect of temperature on volumetric properties of glycine/L-alanine in solutions has been determined from the partial molar expansibility and second-order partial molar expansibility. Further, volumetric interaction parameters and hydration number have been calculated, which have been interpreted in terms of possible solute-solvent interactions.Keywords: ILs, amino acids, volumetric properties, hydration numbers
Procedia PDF Downloads 168895 Comparison of an Upflow Anaerobic Sludge Blanket and an Anaerobic Filter for Treating Wheat Straw Wash Water
Authors: Syazwani Idrus, Charles Banks, Sonia Heaven
Abstract:
The effect of osmotic stress was carried out to determine the ability for biogas production in two types of digesters; anaerobic sludge blanket and anaerobic filters in treating wheat straw washed water. Two anaerobic filters (AF1 and 2) and two UASB reactors (U1 and 2) with working volumes of 1.5 L were employed at mesophilic temperatures (37°C). Digesters AF1 and two were seeded with an inoculum which had previously been fed on with a synthetic wastewater includingSodium Chloride and Potassium Chloride. Digesters U1 and two were seeded with 1 kg wet weight of granular sludge which had previously been treating paper mill effluent. During the first 48 days, all digesters were successfully acclimated with synthetic wastewater (SW) to organic loading rate (OLR) of 6 g COD l^-1 day-1. Specific methane production (SMP) of 0.333 l CH4 g-1 COD). The feed was then changed to wash water from a washing operation to reduce the salt content of wheat straw (wheat straw wash water, WSW) at the same OLR. SMP fell sharply in all reactors to less than 0.1 l CH4 g^-1 COD, with the AF affected more than the UASB. The OLR was reduced to 2.5 g COD l^-1 day^-1 to allow adaptation to WSW, and both the UASB and the AF reactors achieved an SMP of 0.21 l CH4 g^-1 COD added at 82% of COD removal. This study also revealed the accumulation of potassium (K) inside the UASB granules to a concentration of 4.5 mg K g^-1 wet weight of granular sludge. The phenomenon of lower SMP and accumulation of K indicates the effect of osmotic stress when fed on WSW. This finding is consistent with the theory that methanogenic organisms operate a Potassium pump to maintain ionic equilibrium, and as this is an energy-driven process, it will, therefore, reduce the overall methane yield.Keywords: wheat straw wash water, upflow anaerobic sludge blanket, anaerobic filter, specific methane production, osmotic stress
Procedia PDF Downloads 372894 Salting Effect in Partially Miscible Systems of Water/Acétic Acid/1-Butanol at 298.15k: Experimental Study and Estimation of New Solvent-Solvent and Salt-Solvent Binary Interaction Parameters for NRTL Model
Authors: N. Bourayou, A. -H. Meniai, A. Gouaoura
Abstract:
The presence of salt can either raise or lower the distribution coefficient of a solute acetic acid in liquid- liquid equilibria. The coefficient of solute is defined as the ratio of the composition of solute in solvent rich phase to the composition of solute in diluents (water) rich phase. The phenomena are known as salting–out or salting-in, respectively. The effect of monovalent salt, sodium chloride and the bivalent salt, sodium sulfate on the distribution of acetic acid between 1-butanol and water at 298.15K were experimentally shown to be effective in modifying the liquid-liquid equilibrium of water/acetic acid/1-butanol system in favour of the solvent extraction of acetic acid from an aqueous solution with 1-butanol, particularly at high salt concentrations of both salts. All the two salts studied are found to have to salt out effect for acetic acid in varying degrees. The experimentally measured data were well correlated by Eisen-Joffe equation. NRTL model for solvent mixtures containing salts was able to provide good correlation of the present liquid-liquid equilibrium data. Using the regressed salt concentration coefficients for the salt-solvent interaction parameters and the solvent-solvent interaction parameters obtained from the same system without salt. The calculated phase equilibrium was in a quite good agreement with the experimental data, showing the ability of NRTL model to correlate salt effect on the liquid-liquid equilibrium.Keywords: activity coefficient, Eisen-Joffe, NRTL model, sodium chloride
Procedia PDF Downloads 283893 Role of Chloride Ions on The Properties of Electrodeposited ZnO Nanostructures
Authors: L. Mentar, O. Baka, M. R. Khelladi, A. Azizi
Abstract:
Zinc oxide (ZnO), as a transparent semiconductor with a wide band gap of 3.4 eV and a large exciton binding energy of 60 meV at room temperature, is one of the most promising materials for a wide range of modern applications. With the development of film growth technologies and intense recent interest in nanotechnology, several varieties of ZnO nanostructured materials have been synthesized almost exclusively by thermal evaporation methods, particularly chemical vapor deposition (CVD), which generally require a high growth temperature above 550 °C. In contrast, wet chemistry techniques such as hydrothermal synthesis and electro-deposition are promising alternatives to synthesize ZnO nanostructures, especially at a significantly lower temperature (below 200°C). In this study, the electro-deposition method was used to produce zinc oxide (ZnO) nanostructures on fluorine-doped tin oxide (FTO)-coated conducting glass substrate from chloride bath. We present the influence of KCl concentrations on the electro-deposition process, morphological, structural and optical properties of ZnO nanostructures. The potentials of electro-deposition of ZnO were determined using the cyclic voltammetry. From the Mott-Schottky measurements, the flat-band potential and the donor density for the ZnO nanostructure are determined. Field emission scanning electron microscopy (FESEM) images showed different sizes and morphologies of the nanostructures which depends on the concentrations of Cl-. Very netted hexagonal grains are observed for the nanostructures deposited at 0.1M of KCl. X-ray diffraction (XRD) study confirms the Wurtzite phase of the ZnO nanostructures with a preferred oriented along (002) plane normal to the substrate surface. UV-Visible spectra showed a significant optical transmission (~80%), which decreased with low Cl-1 concentrations. The energy band gap values have been estimated to be between 3.52 and 3.80 eV.Keywords: Cl-, electro-deposition, FESEM, Mott-Schottky, XRD, ZnO
Procedia PDF Downloads 289892 Evaluation of Groundwater and Seawater Intrusion at Tajoura Area, NW, Libya
Authors: Abdalraheem Huwaysh, Khalil Al Samarrai, Yasmin ElAhmar
Abstract:
Water quality is an important factor that determines its usage for domestic, agricultural and industrial uses. This study was carried out through the Tajoura Area, Jifarah Plain, Northwest Libya. Chemical and physical parameters were measured and analyzed for groundwater samples collected in 2021 from twenty-six wells distributed throughout the investigation area. Overexploitation of groundwater caused considerable deterioration in the water quality, especially at Tajoura Town (20 Km east of Tripoli). The aquifer shows an increase in salinization, which has reached an alarming level in many places during the past 25 years as a result of the seawater intrusion. The chemical composition of the water samples was compared with the drinking water standards of WHO and Libyan Standards. Groundwater from this area was not suitable to be a source for direct drinking based on Total Dissolved Solids. The dominant cation is sodium, while the dominant anion is chloride. Based on the Piper trilinear diagram, most of the groundwater samples (90%) were identified as sodium chloride type. The best groundwater quality exists at the southern part of the study area. Serious degradation in the water quality, expressed in salinity increase, occurs as we go towards the coastline. The abundance of NaCl waters is strong evidence to attribute the successive deterioration of the water quality to the seawater intrusion. Considering the values of Cl- concentration and the ratio of Cl-/HCO3-, about 70% of the groundwater samples were strongly affected by the saline water. Car wash stations in the study area as well as the unlined disposal pond used for the collection of untreated wastewater, contribute significantly to the deterioration of water quality. The water quality in this area needs to be monitored regularly and it is crucial to treat the water before consumption.Keywords: Tajoura, groundwater, seawater intrusion, water quality
Procedia PDF Downloads 104891 Adhesion of Staphylococcus epidermidis and Staphylococcus aureus to Intravascular cannulae
Authors: Ghadah Abusalim, Suliman Alharbi, Hesham Khalil, Milton Wainwright, Mohammad A. Khiyami
Abstract:
The use of implantable foreign devices in medicine has recently increased dramatically. Intravascular cannulae and catheters are used to administer fluids, medications, parenteral nutrition, and blood products in order to monitor hemodynamic status and also to provide hemodialysis. The early and late failure of inserted or implanted devices is largely the result of bacterial infection and may lead to the disruption of integration between the device and the tissues which surround it. Staphylococcus aureus and Staphylococcus epidermidis are widely considered to be the most common organisms causing device-related infection. Our study showed that S. aureus and S. epidermidis adhered to intravascular cannulae made up of PTFE, SPTFE and vialon. Adhesion of S. epidermidis and S. aureus to intravascular cannulae varied significantly depending upon the type of material used and the presence of coating materials. Both bacteria adhered less to PTFE followed by Vialon and SPTFE and the adhesion capacity of S. aureus and S. epidermidis increased over time. Coating intravascular cannulae with human serum albumin inhibited the adhesion of S. aureus and S. epidermidis to these cannulae, and pretreatment of cannulae with fibronectin inhibited the adhesion of S. epidermidis but increased the adhesion of S. aureus to all types of cannulae. Pretreatment of cannulae surface with potassium chloride or calcium chloride increased the adhesion of S. aureus and S. epidermidis to cannulae, suggesting a role for electrostatic forces in the mechanism of such adhesion. This study will hopefully clarify the mechanism of adhesion and provide possible means of preventing such adhesion either by the use of better material coatings or by interfering with the process of adhesion by targeting bacterial structures responsible for it. Currently we recommend the use of PTFE cannulae as they exhibit a lower bacterial adhesion capacity compared to the other tested cannulae.Keywords: Staphylococcus epidermidis, Staphylococcus aureus, adhesion, cannulae, PTFE, Vialon
Procedia PDF Downloads 348890 Aerodynamic Modelling of Unmanned Aerial System through Computational Fluid Dynamics: Application to the UAS-S45 Balaam
Authors: Maxime A. J. Kuitche, Ruxandra M. Botez, Arthur Guillemin
Abstract:
As the Unmanned Aerial Systems have found diverse utilities in both military and civil aviation, the necessity to obtain an accurate aerodynamic model has shown an enormous growth of interest. Recent modeling techniques are procedures using optimization algorithms and statistics that require many flight tests and are therefore extremely demanding in terms of costs. This paper presents a procedure to estimate the aerodynamic behavior of an unmanned aerial system from a numerical approach using computational fluid dynamic analysis. The study was performed using an unstructured mesh obtained from a grid convergence analysis at a Mach number of 0.14, and at an angle of attack of 0°. The flow around the aircraft was described using a standard k-ω turbulence model. Thus, the Reynold Averaged Navier-Stokes (RANS) equations were solved using ANSYS FLUENT software. The method was applied on the UAS-S45 designed and manufactured by Hydra Technologies in Mexico. The lift, the drag, and the pitching moment coefficients were obtained at different angles of attack for several flight conditions defined in terms of altitudes and Mach numbers. The results obtained from the Computational Fluid Dynamics analysis were compared with the results obtained by using the DATCOM semi-empirical procedure. This comparison has indicated that our approach is highly accurate and that the aerodynamic model obtained could be useful to estimate the flight dynamics of the UAS-S45.Keywords: aerodynamic modelling, CFD Analysis, ANSYS FLUENT, UAS-S45
Procedia PDF Downloads 374889 Synthesis and Physiochemical Properties of 3-Propanenitrile Imidazolium - Based Dual Functionalized Ionic Liquids Incorporating Dioctyl Sulfosuccinate Anion
Authors: Abobakr Khidir Ziyada, Cecilia Devi Wilfred
Abstract:
In the present work, a new series of 3-propanenitrile imidazolium-based Room Temperature Ionic Liquids (RTILs), incorporating dioctyl sulfosuccinate (DOSS) were prepared by reacting imidazole with acrylonitrile and then reacting the product with allyl chloride, 2-chloroethanol, and benzyl chloride. After the reaction had been completed, metathesis reaction was carried out using sodium dioctyl sulfosuccinate. The densities and viscosities of the present RTILs were measured at atmospheric pressure at T=293.15 to 353.15 K, the refractive index was measured at T=293.15 to 333.15 K, whereas, the start and decomposition temperatures were determined at heating rate 10°C. min^-1. The thermal expansion coefficient, densities at a range of temperatures and pressures, molecular volume, molar refraction, standard entropy and the lattice energy of these RTILs were also estimated. The present RTILs showed higher densities, similar refractive indices, and higher viscosities compared to the other 1-alkyl-3-propanenitrile imidazolium-based RTILs. The densities of the present synthesized RTILs are lower compared to the other nitrile-functionalized ILs. These present RTILs showed a weak temperature dependence on the thermal expansion coefficients, αp=5.0 × 10^−4 to 7.50 × 10−4 K^-1. Empirical correlations were proposed to represent the present data on the physical properties. The lattice energy for the present RTILs was similar to other nitrile–based imidazolium RTILs. The present RTILs showed very high molar refraction when compared similar RTILs incorporating other anions.Keywords: dioctyl sulfosuccinate, nitrile ILs, 3-propanenitrile, anion, room temperature ionic liquids, RTIL
Procedia PDF Downloads 337888 Understanding the Effect of Material and Deformation Conditions on the “Wear Mode Diagram”: A Numerical Study
Authors: A. Mostaani, M. P. Pereira, B. F. Rolfe
Abstract:
The increasing application of Advanced High Strength Steel (AHSS) in the automotive industry to fulfill crash requirements has introduced higher levels of wear in stamping dies and parts. Therefore, understanding wear behaviour in sheet metal forming is of great importance as it can help to reduce the high costs currently associated with tool wear. At the contact between the die and the sheet, the tips of hard tool asperities interact with the softer sheet material. Understanding the deformation that occurs during this interaction is important for our overall understanding of the wear mechanisms. For these reasons, the scratching of a perfectly plastic material by a rigid indenter has been widely examined in the literature; with finite element modelling (FEM) used in recent years to further understand the behaviour. The ‘wear mode diagram’ has been commonly used to classify the deformation regime of the soft work-piece during scratching, into three modes: ploughing, wedge formation, and cutting. This diagram, which is based on 2D slip line theory and upper bound method for perfectly plastic work-piece and rigid indenter, relates different wear modes to attack angle and interfacial strength. This diagram has been the basis for many wear studies and wear models to date. Additionally, it has been concluded that galling is most likely to occur during the wedge formation mode. However, there has been little analysis in the literature of how the material behaviour and deformation conditions associated with metal forming processes influence the wear behaviour. Therefore, the first aim of this work is first to use a commercial FEM package (Abaqus/Explicit) to build a 3D model to capture wear modes during scratching with indenters with different attack angles and different interfacial strengths. The second goal is to utilise the developed model to understand how wear modes might change in the presence of bulk deformation of the work-piece material as a result of the metal forming operation. Finally, the effect of the work-piece material properties, including strain hardening, will be examined to understand how these influence the wear modes and wear behaviour. The results show that both strain hardening and substrate deformation can change the critical attack angle at which the wedge formation regime is activated.Keywords: finite element, pile-up, scratch test, wear mode
Procedia PDF Downloads 327887 Direct and Indirect Impacts of Predator Conflict in Kanha National Park, India
Authors: Diane H. Dotson, Shari L. Rodriguez
Abstract:
Habitat for predators is on the decline worldwide, which often brings humans and predators into conflict over remaining shared space and common resources. While the direct impacts of human predator conflict on humans (i.e., attacks on livestock or humans resulting in injury or death) are well documented, the indirect impacts of conflict on humans (i.e., downstream effects such as fear, stress, opportunity costs, PTSD) have not been addressed. We interviewed 437 people living in 54 villages on the periphery of Kanha National Park, India, to assess the amount and severity of direct and indirect impacts of predator conflict. While 58% of livestock owners believed that predator attacks on livestock guards occurred frequently and 62% of those who collect forest products believed that predator attacks on those collecting occurred frequently, less than 20% of all participants knew of someone who had experienced an attack. Data related to indirect impacts suggest that such impacts are common; 76% of participants indicated they were afraid a predator will physically injure them. Livestock owners reported that livestock guarding took time away from their primary job (61%) and getting enough sleep (73%), and believed that it increased their vulnerability to illnesses (80%). These results suggest that the perceptions of risk of predator attack are likely inflated, yet the costs of human predator impacts may be substantially higher than previously estimated, particularly related to human well-being, making the implementation of appropriate and effective conservation and conflict mitigation strategies and policies increasingly urgent.Keywords: direct impacts, indirect impacts, human-predator conflict, India
Procedia PDF Downloads 156886 Controlling Cocoa Pod Borer, Conopomorpha cramerella (Snell.) and Cost Analysis Production at Cacao Plantation
Authors: Alam Anshary, Flora Pasaru, Shahabuddin
Abstract:
The Cocoa Pod Borer (CPB), Conopomorpha cramerella (Snell.) is present on most of the larger cocoa producing islands in Indonesia. Various control measures CPB has been carried out by the farmers, but the results have not been effective. This study aims to determine the effect of application of Beauveria bassiana treatments and pruning technique to the control of CPB in the cocoa plantation people. Research using completely randomized design with 4 treatments and 3 replications, treatment consists of B.bassiana, Pruning, B. bassiana+pruning (Bb + Pr), as well as the control. The results showed that the percentage of PBK attack on cocoa pods in treatment (Bb + Pr) 3.50% the lowest compared to other treatments. CPB attack percentage in treatment B.bassiana 6.15%; pruning 8.75%, and 15.20% control. Results of the analysis of production estimates, the known treatments (Bb + Pr) have the highest production (1.95 tonnes / ha). The model results estimated production is Y= 0,20999 + 0,53968X1 + 0,34298X2+ 0,31410X3 + 0,35629X4 + 0,08345X5 + 0,29732X6. Farm production costs consist of fixed costs and variable costs, fixed costs are costs incurred by the farmer that the size does not affect the results, such as taxes and depreciation of production equipment. Variable costs are costs incurred by farmers who used up in one year cocoa farming activities. The cost of production in farming cocoa without integrated techniques control of CPB is Rp. 9.205.550 million/ha, while the cost of production with integrated techniques control is Rp. 6.666.050 million/ha.Keywords: cacao, cocoa pod borer, pruning, Beauveria bassiana, production costs
Procedia PDF Downloads 283885 Feature Based Unsupervised Intrusion Detection
Authors: Deeman Yousif Mahmood, Mohammed Abdullah Hussein
Abstract:
The goal of a network-based intrusion detection system is to classify activities of network traffics into two major categories: normal and attack (intrusive) activities. Nowadays, data mining and machine learning plays an important role in many sciences; including intrusion detection system (IDS) using both supervised and unsupervised techniques. However, one of the essential steps of data mining is feature selection that helps in improving the efficiency, performance and prediction rate of proposed approach. This paper applies unsupervised K-means clustering algorithm with information gain (IG) for feature selection and reduction to build a network intrusion detection system. For our experimental analysis, we have used the new NSL-KDD dataset, which is a modified dataset for KDDCup 1999 intrusion detection benchmark dataset. With a split of 60.0% for the training set and the remainder for the testing set, a 2 class classifications have been implemented (Normal, Attack). Weka framework which is a java based open source software consists of a collection of machine learning algorithms for data mining tasks has been used in the testing process. The experimental results show that the proposed approach is very accurate with low false positive rate and high true positive rate and it takes less learning time in comparison with using the full features of the dataset with the same algorithm.Keywords: information gain (IG), intrusion detection system (IDS), k-means clustering, Weka
Procedia PDF Downloads 296884 The Ethio-Eritrea Claims Commission on Use of Force: Issue of Self-Defense or Violation of Sovereignty
Authors: Isaias Teklia Berhe
Abstract:
A decision that deals with international disputes, be it arbitral or judicial, has to properly reflect objectivity and coherence with existing rules of international law. This paper shows the decision of the Ethio-Eritrea Claims Commission on the jus ad bellum case is bereft of objectivity and coherence, which contributed a disservice to international law on many aspects. The Commission’s decision that holds Eritrea in contravention to Art 2(4) of the UN Charter based on Ethiopia’s contention is flawed. It fails to consider: the illegitimacy of an actual authority established over contested territory through hostile acts, the proper determination of effectivites under international law, the sanctity of colonially determined boundaries, Ethiopia’s prior firm political recognition and undergirds to respect colonial boundary, and Ethio-Eritrea Border Commission’s decision. The paper will also argue that the Commission confused Eritrea’s right of self-defense with the rule against the non-use of force to settle territorial disputes; wherefore its decision sanitizes or sterilizes unlawful change of territory resulted through unlawful use of force to the effect of advantaging aggressions. The paper likewise argues that the decision is so sacrilegious that it disregards the ossified legal finality of colonial boundaries. Moreover, its approach toward armed attack does not reflect the peculiarity of the jus ad bellum case rather it brings about definitional uncertainties and sustains the perception that the law on self-defense is unsettled.Keywords: armed attack, Eritrea, Ethiopia, self-defense, territorial integrity, use of force
Procedia PDF Downloads 278