Search results for: alkali attack
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 812

Search results for: alkali attack

482 A Saturation Attack Simulation on a Navy Warship Based on Discrete-Event Simulation Models

Authors: Yawei Liang

Abstract:

Threat from cruise missiles is among the most dangerous considerations to a warship in the modern era: anti-ship cruise missiles are fast, accurate, and extremely destructive. In this paper, the goal was to use an object-orientated environment to program a simulation to model a scenario in which a lone frigate is attacked by a wave of missiles fired at given intervals. The parameters of the simulation are modified to examine the relationships between different variables in the situation, and an analysis is performed on various aspects of the defending ship’s equipment. Finally, the results are presented, along with a brief discussion.

Keywords: discrete event simulation, Monte Carlo simulation, naval resource management, weapon-target allocation/assignment

Procedia PDF Downloads 66
481 Rare Earth Doped Alkali Halide Crystals for Thermoluminescence Dosimetry Application

Authors: Pooja Seth, Shruti Aggarwal

Abstract:

The Europium (Eu) doped (0.02-0.1 wt %) lithium fluoride (LiF) crystal in the form of multicrystalline sheet was gown by the edge defined film fed growth (EFG) technique. Crystals were grown in argon gas atmosphere using graphite crucible and stainless steel die. The systematic incorporation of Eu inside the host LiF lattice was confirmed by X-ray diffractometry. Thermoluminescence (TL) glow curve was recorded on annealed (AN) crystals after irradiation with a gamma dose of 15 Gy. The effect of different concentration of Eu in enhancing the thermoluminescence (TL) intensity of LiF was studied. The normalized peak height of the Eu-doped LiF crystal was nearly 12 times that of the LiF crystals. The optimized concentration of Eu in LiF was found to be 0.05wt% at which maximum TL intensity was observed with main TL peak positioned at 185 °C. At higher concentration TL intensity decreases due to the formation of precipitates in the form of clusters or aggregates. The nature of the energy traps in Eu doped LiF was analysed through glow curve deconvolution. The trap depth was found to be in the range of 0.2 – 0.5 eV. These results showed that doping with Eu enhances the TL intensity by creating more defect sites for capturing of electron and holes during irradiation which might be useful for dosimetry application.

Keywords: thermoluminescence, defects, gamma radiation, crystals

Procedia PDF Downloads 306
480 Advances in Natural Fiber Surface Treatment Methodologies for Upgradation in Properties of Their Reinforced Composites

Authors: G. L. Devnani, Shishir Sinha

Abstract:

Natural fiber reinforced polymer composite is a very attractive area among the scientific community because of their low cost, eco-friendly and sustainable in nature. Among all advantages there are few issues which need to be addressed, those issues are the poor adhesion and compatibility between two opposite nature materials that is fiber and matrix and their relatively high water absorption. Therefore, natural fiber modifications are necessary to improve their adhesion with different matrices. Excellent properties could be achieved with the surface treatment of these natural fibers ultimately leads to property up-gradation of their reinforced composites with different polymer matrices. Lot of work is going on to improve the adhesion between reinforced fiber phase and polymer matrix phase to improve the properties of composites. Researchers have suggested various methods for natural fiber treatment like silane treatment, treatment with alkali, acetylation, acrylation, maleate coupling, etc. In this study a review is done on the different methods used for the surface treatment of natural fibers and what are the advance treatment methodologies for natural fiber surface treatment for property improvement of natural fiber reinforced polymer composites.

Keywords: composites, acetylation, natural fiber, surface treatment

Procedia PDF Downloads 387
479 Mechanical, Thermal and Biodegradable Properties of Bioplast-Spruce Green Wood Polymer Composites

Authors: A. Atli, K. Candelier, J. Alteyrac

Abstract:

Environmental and sustainability concerns push the industries to manufacture alternative materials having less environmental impact. The Wood Plastic Composites (WPCs) produced by blending the biopolymers and natural fillers permit not only to tailor the desired properties of materials but also are the solution to meet the environmental and sustainability requirements. This work presents the elaboration and characterization of the fully green WPCs prepared by blending a biopolymer, BIOPLAST® GS 2189 and spruce sawdust used as filler with different amounts. Since both components are bio-based, the resulting material is entirely environmentally friendly. The mechanical, thermal, structural properties of these WPCs were characterized by different analytical methods like tensile, flexural and impact tests, Thermogravimetric Analysis (TGA), Differential Scanning Calorimetry (DSC) and X-ray Diffraction (XRD). Their water absorption properties and resistance to the termite and fungal attacks were determined in relation with different wood filler content. The tensile and flexural moduli of WPCs increased with increasing amount of wood fillers into the biopolymer, but WPCs became more brittle compared to the neat polymer. Incorporation of spruce sawdust modified the thermal properties of polymer: The degradation, cold crystallization, and melting temperatures shifted to higher temperatures when spruce sawdust was added into polymer. The termite, fungal and water absorption resistance of WPCs decreased with increasing wood amount in WPCs, but remained in durability class 1 (durable) concerning fungal resistance and quoted 1 (attempted attack) in visual rating regarding to the termites resistance except that the WPC with the highest wood content (30 wt%) rated 2 (slight attack) indicating a long term durability. All the results showed the possibility to elaborate the easy injectable composite materials with adjustable properties by incorporation of BIOPLAST® GS 2189 and spruce sawdust. Therefore, lightweight WPCs allow both to recycle wood industry byproducts and to produce a full ecologic material.

Keywords: biodegradability, color measurements, durability, mechanical properties, melt flow index, MFI, structural properties, thermal properties, wood-plastic composites, WPCs

Procedia PDF Downloads 119
478 Synthesis and Characterisation of Different Blends of Virgin Polyethylene Modified by Naturel Fibres Alfa

Authors: Benalia Kouini

Abstract:

The basic idea of this study is to promote a polyethylene recycle and local vegetable fiber (alfa) in the development and characterization of a new composite material. In this work, different sizes of fiber alfa (<63 microns, between 63 and 125 microns, 125 and 250 microns) were incorporated into the blends (HDPE / recycled HDPE) with different methods elaboration (extruder twin-screw and twin-cylinder mixer). The fiber was modified by sodium hydroxide in order to evaluate the effect of alkaline treatment on the interfacial adhesion and therefore the properties of composites prepared. These were characterized by various techniques: mechanical (tensile and Charpy impact test), Rheological (melt flow), morphological (SEM). The demonstration of the effect of alkali treatment on alfa fiber was examined by FTIR spectroscopy and morphological analysis. The introduction of alfa treated fiber in the (HDPE/recycled HDPE) increased stress, impact strength and Young's modulus on the contrary, the elongation at break decreased. The results of the mechanical properties showed an improvement is better in extrusion twin-screw mixer than two cylinders.

Keywords: naturel fiber, alfa, recycling, blends, polyethylene

Procedia PDF Downloads 120
477 Network Security Attacks and Defences

Authors: Ranbir Singh, Deepinder Kaur

Abstract:

Network security is an important aspect in every field like government offices, Educational Institute and any business organization. Network security consists of the policies adopted to prevent and monitor forbidden access, misuse, modification, or denial of a computer network. Network security is very complicated subject and deal by only well trained and experienced people. However, as more and more people become wired, an increasing number of people need to understand the basics of security in a networked world. The history of the network security included an introduction to the TCP/IP and interworking. Network security starts with authenticating, commonly with a username and a password. In this paper, we study about various types of attacks on network security and how to handle or prevent this attack.

Keywords: network security, attacks, denial, authenticating

Procedia PDF Downloads 374
476 Feasibility of a Biopolymer as Lightweight Aggregate in Perlite Concrete

Authors: Ali A. Sayadi, Thomas R. Neitzert, G. Charles Clifton

Abstract:

Lightweight concrete is being used in the construction industry as a building material in its own right. Ultra-lightweight concrete can be applied as a filler and support material for the manufacturing of composite building materials. This paper is about the development of a stable and reproducible ultra-lightweight concrete with the inclusion of poly-lactic acid (PLA) beads and assessing the feasibility of PLA as a lightweight aggregate that will deliver advantages such as a more eco-friendly concrete and a non-petroleum polymer aggregate. In total, sixty-three samples were prepared and the effectiveness of mineral admixture, curing conditions, water-cement ratio, PLA ratio, EPS ratio and perlite ratio on compressive strength of perlite concrete are studied. The results show that PLA particles are sensitive to alkali environment of cement paste and considerably shrank and lost their strength. A higher compressive strength and a lower density was observed when expanded polystyrene (EPS) particles replaced PLA beads. In addition, a set of equations is proposed to estimate the water-cement ratio, cement content and compressive strength of perlite concrete.

Keywords: perlite concrete, poly-lactic acid (pla), expanded polystyrene (eps), concrete

Procedia PDF Downloads 284
475 Application of Chinese Remainder Theorem to Find The Messages Sent in Broadcast

Authors: Ayubi Wirara, Ardya Suryadinata

Abstract:

Improper application of the RSA algorithm scheme can cause vulnerability to attacks. The attack utilizes the relationship between broadcast messages sent to the user with some fixed polynomial functions that belong to each user. Scheme attacks carried out by applying the Chinese Remainder Theorem to obtain a general polynomial equation with the same modulus. The formation of the general polynomial becomes a first step to get back the original message. Furthermore, to solve these equations can use Coppersmith's theorem.

Keywords: RSA algorithm, broadcast message, Chinese Remainder Theorem, Coppersmith’s theorem

Procedia PDF Downloads 312
474 A CM-Based Model for 802.11 Networks Security Policies Enforcement

Authors: Karl Mabiala Dondia, Jing Ma

Abstract:

In recent years, networks based on the 802.11 standards have gained a prolific deployment. The reason for this massive acceptance of the technology by both home users and corporations is assuredly due to the "plug-and-play" nature of the technology and the mobility. The lack of physical containment due to inherent nature of the wireless medium makes maintenance very challenging from a security standpoint. This study examines via continuous monitoring various predictable threats that 802.11 networks can face, how they are executed, where each attack may be executed and how to effectively defend against them. The key goal is to identify the key components of an effective wireless security policy.

Keywords: wireless LAN, IEEE 802.11 standards, continuous monitoring, security policy

Procedia PDF Downloads 351
473 Starting Torque Study of Darrieus Wind Turbine

Authors: M. Douak, Z. Aouachria

Abstract:

The aim of our study is to project an optimized wind turbine of Darrieus type. This type of wind turbine is characterized by a low starting torque in comparison with the Savonius rotor allowing them to operate for a period greater than wind speed. This led us to reconsider the Darrieus rotor to optimize a design which will increase its starting torque. The study of a system of monitoring and control of the angle of attack of blade profile, which allows an auto start to wind speeds as low as possible is presented for the straight blade of Darrieus turbine. The study continues to extend to other configurations namely those of parabolic type.

Keywords: Darrieus turbine, pitch angle, self stating, wind energy

Procedia PDF Downloads 324
472 The Existence of Beauveria bassiana in the Third Generation of Corn Seedling

Authors: Itji Diana Daud, Nuniek Widiayani

Abstract:

The fungus Beauveria bassiana can be endophytic in maize. The fungus was recovered in culture from stems, leaves and roots after a month planting. This phenomenon was shown until the third generation of the corn. The result from laboratory shows that B. bassiana appear in F1, F2 and F3 in order 70, 80 and 90% in the roots, 80% in the stems in all generation, 90, 80 and 70% in leaves. In CFU’s ml-1 of B. bassiana in corn seed, show F1 was 8.9 x 106, F2 was 8.1 x 106 and F3 was 7.8 x 106. The research showed that B. Bassiana as endophyte still remain to the third generation. Innovation to the corn seed which is endophyte seed is essential to protect from the attack of corn borer and to avoid the usage of insecticide.

Keywords: endophytic, recovered, third generation, Beauveria bassiana

Procedia PDF Downloads 254
471 Is the Addition of Computed Tomography with Angiography Superior to a Non-Contrast Neuroimaging Only Strategy for Patients with Suspected Stroke or Transient Ischemic Attack Presenting to the Emergency Department?

Authors: Alisha M. Ebrahim, Bijoy K. Menon, Eddy Lang, Shelagh B. Coutts, Katie Lin

Abstract:

Introduction: Frontline emergency physicians require clear and evidence-based approaches to guide neuroimaging investigations for patients presenting with suspected acute stroke or transient ischemic attack (TIA). Various forms of computed tomography (CT) are currently available for initial investigation, including non-contrast CT (NCCT), CT angiography head and neck (CTA), and CT perfusion (CTP). However, there is uncertainty around optimal imaging choice for cost-effectiveness, particularly for minor or resolved neurological symptoms. In addition to the cost of CTA and CTP testing, there is also a concern for increased incidental findings, which may contribute to the burden of overdiagnosis. Methods: In this cross-sectional observational study, analysis was conducted on 586 anonymized triage and diagnostic imaging (DI) reports for neuroimaging orders completed on patients presenting to adult emergency departments (EDs) with a suspected stroke or TIA from January-December 2019. The primary outcome of interest is the diagnostic yield of NCCT+CTA compared to NCCT alone for patients presenting to urban academic EDs with Canadian Emergency Department Information System (CEDIS) complaints of “symptoms of stroke” (specifically acute stroke and TIA indications). DI reports were coded into 4 pre-specified categories (endorsed by a panel of stroke experts): no abnormalities, clinically significant findings (requiring immediate or follow-up clinical action), incidental findings (not meeting prespecified criteria for clinical significance), and both significant and incidental findings. Standard descriptive statistics were performed. A two-sided p-value <0.05 was considered significant. Results: 75% of patients received NCCT+CTA imaging, 21% received NCCT alone, and 4% received NCCT+CTA+CTP. The diagnostic yield of NCCT+CTA imaging for prespecified clinically significant findings was 24%, compared to only 9% in those who received NCCT alone. The proportion of incidental findings was 30% in the NCCT only group and 32% in the NCCT+CTA group. CTP did not significantly increase the yield of significant or incidental findings. Conclusion: In this cohort of patients presenting with suspected stroke or TIA, an NCCT+CTA neuroimaging strategy had a higher diagnostic yield for clinically significant findings than NCCT alone without significantly increasing the number of incidental findings identified.

Keywords: stroke, diagnostic yield, neuroimaging, emergency department, CT

Procedia PDF Downloads 78
470 Secure Watermarking not at the Cost of Low Robustness

Authors: Jian Cao

Abstract:

This paper describes a novel watermarking technique which we call the random direction embedding (RDE) watermarking. Unlike traditional watermarking techniques, the watermark energy after the RDE embedding does not focus on a fixed direction, leading to the security against the traditional unauthorized watermark removal attack. In addition, the experimental results show that when compared with the existing secure watermarking, namely natural watermarking (NW), the RDE watermarking gains significant improvement in terms of robustness. In fact, the security of the RDE watermarking is not at the cost of low robustness, and it can even achieve more robust than the traditional spread spectrum watermarking, which has been shown to be very insecure.

Keywords: robustness, spread spectrum watermarking, watermarking security, random direction embedding (RDE)

Procedia PDF Downloads 362
469 The Use of Secondary Crystallization in Cement-Based Composites

Authors: Nikol Žižková, Šárka Keprdová, Rostislav Drochytka

Abstract:

The paper focuses on the study of the properties of cement-based composites produced using secondary crystallization (crystalline additive). In this study, cement mortar made with secondary crystallization was exposed to an aggressive environment and the influence of secondary crystallization on the degradation of the cementitious composite was investigated. The results indicate that the crystalline additive contributed to increasing the resistance of the cement-based composite to the attack of the selected environments (sodium sulphate solution and ammonium chloride solution).

Keywords: secondary crystallization, cement-based composites, durability, degradation of the cementitious composite

Procedia PDF Downloads 375
468 Characterization of Volatiles Botrytis cinerea in Blueberry Using Solid Phase Micro Extraction, Gas Chromatography Mass Spectrometry

Authors: Ahmed Auda, Manjree Agarwala, Giles Hardya, Yonglin Rena

Abstract:

Botrytis cinerea is a major pest for many plants. It can attack a wide range of plant parts. It can attack buds, flowers, and leaves, stems, and fruit. However, B. cinerea can be mixed with other diseases that cause the same damage. There are many species of botrytis and more than one different strains of each. Botrytis might infect the foliage of nursery stock stored through winter in damp conditions. There are no known resistant plants. Botrytis must have nutrients or food source before it infests the plant. Nutrients leaking from wounded plant parts or dying tissue like old flower petals give the required nutrients. From this food, the fungus becomes more attackers and invades healthy tissue. Dark to light brown rot forms in the ill tissue. High humidity conditions support the growth of this fungus. However, we suppose that selection pressure can act on the morphological and neurophysiologic filter properties of the receiver and on both the biochemical and the physiological regulation of the signal. Communication is implied when signal and receiver evolves toward more and more specific matching, culminating. In other hand, receivers respond to portions of a body odor bouquet which is released to the environment not as an (intentional) signal but as an unavoidable consequence of metabolic activity or tissue damage. Each year Botrytis species can cause considerable economic losses to plant crops. Even with the application of strict quarantine and control measures, these fungi can still find their way into crops and cause the imposition of onerous restrictions on exports. Blueberry fruit mould caused by a fungal infection usually results in major losses during post-harvest storage. Therefore, the management of infection in early stages of disease development is necessary to minimize losses. The overall purpose of this study will develop sensitive, cheap, quick and robust diagnostic techniques for the detection of B. cinerea in blueberry. The specific aim was designed to investigate the performance of volatile organic compounds (VOCs) in the detection and discrimination of blueberry fruits infected by fungal pathogens with an emphasis on Botrytis in the early storage stage of post-harvest.

Keywords: botrytis cinerea, blueberry, GC/MS, VOCs

Procedia PDF Downloads 217
467 Parallel Hybrid Honeypot and IDS Architecture to Detect Network Attacks

Authors: Hafiz Gulfam Ahmad, Chuangdong Li, Zeeshan Ahmad

Abstract:

In this paper, we proposed a parallel IDS and honeypot based approach to detect and analyze the unknown and known attack taxonomy for improving the IDS performance and protecting the network from intruders. The main theme of our approach is to record and analyze the intruder activities by using both the low and high interaction honeypots. Our architecture aims to achieve the required goals by combing signature based IDS, honeypots and generate the new signatures. The paper describes the basic component, design and implementation of this approach and also demonstrates the effectiveness of this approach reducing the probability of network attacks.

Keywords: network security, intrusion detection, honeypot, snort, nmap

Procedia PDF Downloads 531
466 Automatic Intelligent Analysis of Malware Behaviour

Authors: Hermann Dornhackl, Konstantin Kadletz, Robert Luh, Paul Tavolato

Abstract:

In this paper we describe the use of formal methods to model malware behaviour. The modelling of harmful behaviour rests upon syntactic structures that represent malicious procedures inside malware. The malicious activities are modelled by a formal grammar, where API calls’ components are the terminals and the set of API calls used in combination to achieve a goal are designated non-terminals. The combination of different non-terminals in various ways and tiers make up the attack vectors that are used by harmful software. Based on these syntactic structures a parser can be generated which takes execution traces as input for pattern recognition.

Keywords: malware behaviour, modelling, parsing, search, pattern matching

Procedia PDF Downloads 308
465 Effect of Carbon Black Nanoparticles Additive on the Qualities of Fly Ash Based Geopolymer

Authors: Maryam Kiani

Abstract:

The aim of this study was to investigate the influence of carbon black additive on the properties of fly ash-based geopolymer. The geopolymer samples were prepared using fly ash as the primary source material, along with an alkali activator solution and different concentrations of carbon black additive. The effects of carbon black on the geopolymer binder were evaluated by analyzing the compressive strength, flexural strength, water absorption, and microstructural properties of the cured samples. The results revealed that the inclusion of carbon black additive significantly enhanced the mechanical properties of the geopolymer binder. The compressive and flexural strengths were found to increase with the addition of carbon black, showing improvements of up to 25% and 15%, respectively. Moreover, the water absorption of the geopolymer samples reduced due to the presence of carbon black, indicating improved resistance against water permeability. Microstructural analysis using scanning electron microscopy (SEM) revealed a more compact and homogenous structure in the geopolymer samples with carbon black. The dispersion of carbon black particles within the geopolymer matrix was observed, suggesting improved interparticle bonding and increased densification. Overall, this study demonstrates the positive impact of carbon black additive on the qualities of fly ash-based geopolymer, emphasizing its potential as an effective enhancer for geopolymer binder applications.

Keywords: fly-ash, carbon black, nanotechnology, geopolymer

Procedia PDF Downloads 68
464 Investigation of the Recycling of Geopolymer Cement Wastes as Fine Aggregates in Mortar Mixes

Authors: Napoleana-Anna Chaliasou, Andrew Heath, Kevin Paine

Abstract:

Fly ash-slag based Geopolymer Cement (GPC) is presenting mechanical properties and environmental advantages that make it the predominant “green” alternative to Portland Cement (PC). Although numerous life-cycle analyses praising its environmental advantages, disposal after the end of its life remains as an issue that has been barely explored. The present study is investigating the recyclability of fly ash-slag GPC as aggregate in mortars. The purpose of the study was to evaluate the effect of GPC fine Recycled Aggregates (RA), at replacement levels of 25% and 50%, on the main mechanical properties of PC and GPC mortar mixes. The results were compared with those obtained by corresponding mixes incorporating natural and PC-RA. The main physical properties of GPC-RA were examined and proven to be comparable to those of PC-RA and slightly inferior to those of natural sand. A negligible effect was observed at 28-day compressive and flexural strength of PC mortars with GPC aggregates having a milder effect than PC. As far as GPC mortars are concerned, the influence of GPC aggregates was enhancing for the investigated mechanical properties. Additionally, a screening test showed that recycled geopolymer aggregates are not prone of inducing alkali silica reaction.

Keywords: concrete recycling, geopolymer cement, fly ash, construction wastes

Procedia PDF Downloads 294
463 Design a Network for Implementation a Hospital Information System

Authors: Abdulqader Rasool Feqi Mohammed, Ergun Erçelebi̇

Abstract:

A large number of hospitals from developed countries are adopting hospital information system to bring efficiency in hospital information system. The purpose of this project is to research on new network security techniques in order to enhance the current network security structure of save a hospital information system (HIS). This is very important because, it will avoid the system from suffering any attack. Security architecture was optimized but there are need to keep researching on best means to protect the network from future attacks. In this final project research, security techniques were uncovered to produce best network security results when implemented in an integrated framework.

Keywords: hospital information system, HIS, network security techniques, internet protocol, IP, network

Procedia PDF Downloads 404
462 Mechanical Properties of Fibre Reinforced High Performance Concrete

Authors: Laura Dembovska, Diana Bajare, Vitalijs Lusis, Genadijs Sahmenko, Aleksandrs Korjakins

Abstract:

This study focused on the mechanical properties of the fibre reinforced High Performance Concrete. The most important benefits of addition of fibres to the concrete mix are the hindrance of the development of microcracks, the delay of the propagation of microcracks to macroscopic cracks and the better ductility after microcracks have been occurred. This work presents an extensive comparative experimental study on six different types of fibres (alkali resistant glass, polyvinyl alcohol fibres, polypropylene fibres and carbon fibres) with the same binding High Performance Concrete matrix. The purpose was to assess the influence of the type of fibre on the mechanical properties of Fibre Reinforced High Performance Concrete. Therefore, in this study three main objectives have been chosen: 1) analyze the structure of the bulk cementitious matrix, 2) determine the influence of fibres and distribution in the matrix on the mechanical properties of fibre reinforced High Performance Concrete and 3) characterize the microstructure of the fibre-matrix interface. Acknowledgement: This study was partially funded by European Regional Development Fund project Nr.1.1.1.1/16/A/007 “A New Concept for Sustainable and Nearly Zero-Energy Buildings” and COST Action TU1404 Conference grants project.

Keywords: high performance concrete, fibres, mechanical properties, microstructure

Procedia PDF Downloads 257
461 Characterization of Coal Fly Ash with Potential Use in the Manufacture Geopolymers to Solidify/Stabilize Heavy Metal Ions

Authors: P. M. Fonseca Alfonso, E. A. Murillo Ruiz, M. Diaz Lagos

Abstract:

Understanding the physicochemical properties and mineralogy of fly ash from a particular source is essential for to protect the environment and considering its possible applications, specifically, in the production of geopolymeric materials that solidify/stabilize heavy metals ions. The results of the characterization of three fly ash samples are shown in this paper. The samples were produced in the TERMOPAIPA IV thermal power plant in the State of Boyaca, Colombia. The particle size distribution, chemical composition, mineralogy, and molecular structure of three samples were analyzed using laser diffraction, X-ray fluorescence, inductively coupled plasma mass spectrometry, X-ray diffraction, and infrared spectroscopy respectively. The particle size distribution of the three samples probably ranges from 0.128 to 211 μm. Approximately 59 elements have been identified in the three samples. It is noticeable that the ashes are made up of aluminum and silicon compounds. Besides, the iron phase in low content was also found. According to the results found in this study, the fly ash samples type F has a great potential to be used as raw material for the manufacture of geopolymers with potential use in the stabilization/solidification of heavy metals; mainly due to the presence of amorphous aluminosilicates typical of this type of ash, which react effectively with alkali-activator.

Keywords: fly ash, geopolymers, molecular structure, physicochemical properties.

Procedia PDF Downloads 98
460 A Method and System for Secure Authentication Using One Time QR Code

Authors: Divyans Mahansaria

Abstract:

User authentication is an important security measure for protecting confidential data and systems. However, the vulnerability while authenticating into a system has significantly increased. Thus, necessary mechanisms must be deployed during the process of authenticating a user to safeguard him/her from the vulnerable attacks. The proposed solution implements a novel authentication mechanism to counter various forms of security breach attacks including phishing, Trojan horse, replay, key logging, Asterisk logging, shoulder surfing, brute force search and others. QR code (Quick Response Code) is a type of matrix barcode or two-dimensional barcode that can be used for storing URLs, text, images and other information. In the proposed solution, during each new authentication request, a QR code is dynamically generated and presented to the user. A piece of generic information is mapped to plurality of elements and stored within the QR code. The mapping of generic information with plurality of elements, randomizes in each new login, and thus the QR code generated for each new authentication request is for one-time use only. In order to authenticate into the system, the user needs to decode the QR code using any QR code decoding software. The QR code decoding software needs to be installed on handheld mobile devices such as smartphones, personal digital assistant (PDA), etc. On decoding the QR code, the user will be presented a mapping between the generic piece of information and plurality of elements using which the user needs to derive cipher secret information corresponding to his/her actual password. Now, in place of the actual password, the user will use this cipher secret information to authenticate into the system. The authentication terminal will receive the cipher secret information and use a validation engine that will decipher the cipher secret information. If the entered secret information is correct, the user will be provided access to the system. Usability study has been carried out on the proposed solution, and the new authentication mechanism was found to be easy to learn and adapt. Mathematical analysis of the time taken to carry out brute force attack on the proposed solution has been carried out. The result of mathematical analysis showed that the solution is almost completely resistant to brute force attack. Today’s standard methods for authentication are subject to a wide variety of software, hardware, and human attacks. The proposed scheme can be very useful in controlling the various types of authentication related attacks especially in a networked computer environment where the use of username and password for authentication is common.

Keywords: authentication, QR code, cipher / decipher text, one time password, secret information

Procedia PDF Downloads 247
459 The Use of Waste Fibers as Reinforcement in Biopolymer Green Composites

Authors: Dalila Hammiche, Lisa Klaai, Amar Boukerrou

Abstract:

Following this trend, natural fiber reinforcements have been gaining importance in the composites sector. The effectiveness of natural fiber–reinforced PLA composite as an alternative material to substitute the non-renewable petroleum-based materials has been examined by researchers. In this study, we investigated the physicochemical, particle size and distribution, and thermal behavior of prickly pear seed flour (PPSF). Then, composites were manufactured with 20% in PPSF. Thermal, morphological, and mechanical properties have been studied, and water absorption tests as well. The characterization of this fiber has shown that cellulose is the majority constituent (30%), followed by hemicellulose (27%). To improve the fiber-matrix adhesion, the PPS was chemically treated with alkali treatment. The addition of PPSF decreases the thermal properties, and the study of the mechanical properties showed that the increase in the fiber content from 0 to 20% increased Young’s modulus. According to the results, the mechanical and thermal behaviors of composites are improved after fiber treatment. However, there is an increase in water absorption of composites compared to the PLA matrix. The moisture sensitivity of natural fiber composites limits their use in structural applications. Degradation of the fiber-matrix interface is likely to occur when the material is subjected to variable moisture conditions.

Keywords: biopolymer, composites, alcali treatment, mechanical properties

Procedia PDF Downloads 103
458 Pioneer Synthesis and Characterization of Boron Containing Hard Materials

Authors: Gülşah Çelik Gül, Figen Kurtuluş

Abstract:

The first laboratory synthesis of hard materials such as diamond proceeded to attack of developing materials with high hardness to compete diamond. Boron rich solids are good candidates owing to their short interatomic bond lengths and strong covalent character. Boron containing hard material was synthesized by modified-microwave method under nitrogen atmosphere by using a fuel (glycine or urea), amorphous boron and/or boric acid in appropriate molar ratio. Characterizations were done by x-ray diffraction (XRD), fourier transform infrared (FTIR) spectroscopy, scanning electron microscopy/energy dispersive analyze (SEM/EDS), thermo gravimetric/differantial thermal analysis (TG/DTA).

Keywords: boron containing materials, hard materials, microwave synthesis, powder X-ray diffraction

Procedia PDF Downloads 573
457 A Review of Security Attacks and Intrusion Detection Schemes in Wireless Sensor Networks: A Survey

Authors: Maleh Yassine, Ezzati Abdellah

Abstract:

Wireless Sensor Networks (WSNs) are currently used in different industrial and consumer applications, such as earth monitoring, health related applications, natural disaster prevention, and many other areas. Security is one of the major aspects of wireless sensor networks due to the resource limitations of sensor nodes. However, these networks are facing several threats that affect their functioning and their life. In this paper we present security attacks in wireless sensor networks, and we focus on a review and analysis of the recent Intrusion Detection schemes in WSNs.

Keywords: wireless sensor networks, security attack, denial of service, IDS, cluster-based model, signature based IDS, hybrid IDS

Procedia PDF Downloads 351
456 Identification of Information War in Lithuania

Authors: Vitalijus Leibenka

Abstract:

After 2014 the world of Russia’s actions in annexing Crimea has seen a hybrid war that has helped Russia achieve its goals. The world and NATO nations have pointed out that hybrid action can help achieve not only military but also economic and political goals. One of the weapons of action in hybrid warfare is information warfare tools, the use of which helps to carry out actions in the context of hybrid warfare as a whole. In addition, information war tools can be used alone, over time and for long-term purposes. Although forms of information war, such as propaganda and disinformation, have been used in the past, in old conflicts and wars, new forms of information war have emerged as a result of technological development, making the dissemination of information faster and more efficient. The world understands that information is becoming a weapon, but not everyone understands that both information war and information warfare differ in their essence and full content. In addition, the damage and impact of the use of information war, which may have worse consequences than a brief military conflict, is underestimated. Lithuania is also facing various interpretations of the information war. Some believe that the information attack is an information war and the understanding of the information war is limited to a false message in the press. Others, however, deepen and explain the essence of the information war. Society has formed in such a way that not all people are able to assess the threats of information war, to separate information war from information attack. Recently, the Lithuanian government has been taking measures in the context of the information war, making decisions that allow the development of the activities of the state and state institutions in order to create defense mechanisms in the information war. However, this is happening rather slowly and incompletely. Every military conflict, related to Lithuania in one way or another, forces Lithuanian politicians to take up the theme of information warfare again. As a result, a national cyber security center is being set up, and Russian channels spreading lies are banned. However, there is no consistent development and continuous improvement of action against information threats. Although a sufficiently influential part of society (not a political part) helps to stop the spread of obscure information by creating social projects such as “Demaskuok” and “Laikykis ten su Andriumi tapinu”, it goes without saying that it will not become a key tool in the fight against information threats. Therefore, in order to achieve clean dissemination of information in Lithuania, full-fledged and substantial political decisions are necessary, the adoption of which would change the public perception of the information war, its damage, impact and actions that would allow to combat the spread. Political decisions should cover the educational, military, economic and political areas, which are one of the main and most important in the state, which would allow to fundamentally change the situation against the background of information war.

Keywords: information war, information warfare, hybrid war, hybrid warfare, NATO, Lithuania, Russia

Procedia PDF Downloads 40
455 Wet Extraction of Lutein and Lipids from Microalga by Quantitative Determination of Polarity

Authors: Mengyue Gong, Xinyi Li, Amarjeet Bassi

Abstract:

Harvesting by-products while recovering biodiesel is considered a potentially valuable approach to increase the market feasibility of microalgae industry. Lutein is a possible by-product from microalgae that promotes eye health. The extraction efficiency and the expensive drying process of wet algae represent the major challenges for the utilization of microalgae biomass as a feedstock for lipids, proteins, and carotenoids. A wet extraction method was developed to extract lipids and lutein from microalga Chlorella vulgaris. To evaluate different solvent (mixtures) for the extraction, a quantitative analysis was established based on the polarity of solvents using Nile Red as the polarity (ETN) indicator. By the choice of binary solvent system then adding proper amount of water to achieve phase separation, lipids and lutein can be extracted simultaneously. Some other parameters for lipids and lutein production were also studied including saponification time, temperature, choice of alkali, and pre-treatment methods. The extraction efficiency with wet algae was compared with dried algae and shown better pigment recovery. The results indicated that the product pattern in each extracted phase was polarity dependent. Lutein and β-carotene were the main carotenoids extracted with ethanol while lipids come out with hexane.

Keywords: biodiesel, Chlorella vulgaris, extraction, lutein

Procedia PDF Downloads 317
454 Performance of Heifer Camels (Camelus dromedarius) on Native Range Supplemented with Different Energy Levels

Authors: Shehu, B., Muhammad, B. F., Madigawa, I. L., H. A. Alkali

Abstract:

The study was conducted to assess heifer camel behavior and live weight changes on native range supplemented with different energy levels. A total of nine camels aged between 2 and 3 years were randomly allotted into three groups and supplemented with 3400, 3600 and 3800 Kcal and designated A, B and C, respectively. The data obtained was analyzed for variance in a Completely Randomized Design. The heifers utilized average of 371.70 min/day (64% of daylight time) browsing on native pasture and 2.30 min/day (6%) sand bathing. A significantly higher mean time was spent by heifers on browsing Leptadenia hastata (P<0.001), Dichrostachys cinerea (P<0.01), Acacia nilotica (P<0.001) and Ziziphus spina-christi (P<0.05) in early dry season (January). No significant difference was recorded on browsing time on Tamarindus indica, Adansonia digitata, Piliostigma reticulatum, Parkia biglobosaand Azadirachta indica. No significant (P<0.05) liveweight change was recorded on she-camels due to the three energy levels. It was concluded that nutritive browse species in the study area could meet camel nutrient requirements including energy. Further research on effect of period on camel nutrients requirement in different physiological conditions is recommended.

Keywords: heifer, camel, grazing, pasture

Procedia PDF Downloads 523
453 Use of Hierarchical Temporal Memory Algorithm in Heart Attack Detection

Authors: Tesnim Charrad, Kaouther Nouira, Ahmed Ferchichi

Abstract:

In order to reduce the number of deaths due to heart problems, we propose the use of Hierarchical Temporal Memory Algorithm (HTM) which is a real time anomaly detection algorithm. HTM is a cortical learning algorithm based on neocortex used for anomaly detection. In other words, it is based on a conceptual theory of how the human brain can work. It is powerful in predicting unusual patterns, anomaly detection and classification. In this paper, HTM have been implemented and tested on ECG datasets in order to detect cardiac anomalies. Experiments showed good performance in terms of specificity, sensitivity and execution time.

Keywords: cardiac anomalies, ECG, HTM, real time anomaly detection

Procedia PDF Downloads 191