Search results for: evasion attack
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 661

Search results for: evasion attack

331 A Density Functional Theory Study of Metal-Porphyrin Graphene for CO2 Hydration

Authors: Manju Verma, Parag A. Deshpande

Abstract:

Electronic structure calculations of hydrogen terminated metal-porphyrin graphene were carried out to explore the catalytic activity for CO2 hydration reaction. A ruthenium atom was substituted in place of carbon atom of graphene and ruthenium chelated carbon atoms were replaced by four nitrogen atoms in metal-porphyrin graphene system. Ruthenium atom created the active site for CO2 hydration reaction. Ruthenium-porphyrin graphene followed the mechanism of carbonic anhydrase enzyme for CO2 conversion to HCO3- ion. CO2 hydration reaction over ruthenium-porphyrin graphene proceeded via the elementary steps: OH- formation from H2O dissociation, CO2 bending in presence of nucleophilic attack of OH- ion, HCO3- ion formation from proton migration, HCO3- ion desorption by H2O addition. Proton transfer to yield HCO3- ion was observed as a rate limiting step from free energy landscape.

Keywords: ruthenium-porphyrin graphene, CO2 hydration, carbonic anhydrase, heterogeneous catalyst, density functional theory

Procedia PDF Downloads 261
330 Towards Resilient Cloud Computing through Cyber Risk Assessment

Authors: Hilalah Alturkistani, Alaa AlFaadhel, Nora AlJahani, Fatiha Djebbar

Abstract:

Cloud computing is one of the most widely used technology which provides opportunities and services to government entities, large companies, and standard users. However, cybersecurity risk management studies of cloud computing and resiliency approaches are lacking. This paper proposes resilient cloud cybersecurity risk assessment and management tailored specifically, to Dropbox with two approaches:1) technical-based solution motivated by a cybersecurity risk assessment of cloud services, and 2)a target personnel-based solution guided by cybersecurity-related survey among employees to identify their knowledge that qualifies them withstand to any cyberattack. The proposed work attempts to identify cloud vulnerabilities, assess threats and detect high risk components, to finally propose appropriate safeguards such as failure predicting and removing, redundancy or load balancing techniques for quick recovery and return to pre-attack state if failure happens.

Keywords: cybersecurity risk management plan, resilient cloud computing, cyberattacks, cybersecurity risk assessment

Procedia PDF Downloads 142
329 Efficiency Analysis of Trader in Thailand and Laos Border Trade: Case Study of Textile and Garment Products

Authors: Varutorn Tulnawat, Padcharee Phasuk

Abstract:

This paper investigates the issue of China’s dumping on border trade between Thailand and Laos. From the pass mostly, the border trade goods are traditional textile and garment mainly served locals and tourists which majority of traders is of small and medium size. In the present day the competition is fierce, the volume of trade has expanded far beyond its original intent. The major competitors in Thai-Laos border trade are China, Vietnam and also South Korea. This research measures and compares the efficiency and ability to survive the onslaught of Thai and Laos firm along Thailand (Nong Kai province) and Laos (Vientiane) border. Two attack strategies are observed, price cutting and incense such as full facilitation for big volume order. Data Envelopment Analysis (DEA) is applied to data surveyed from 90 Thai and Laos entrepreneurs. The expected results are the proportion of efficiency and inefficiency firms. Points of inefficiency and suggested improvement are also discussed.

Keywords: border trade, dea, textile, garment

Procedia PDF Downloads 246
328 Mobile Agent Security Using Reference Monitor Based Security Framework

Authors: Sandhya Armoogum

Abstract:

In distributed systems and in open systems such as the Internet, often mobile code has to run on unknown and potentially hostile hosts. Mobile code such as a mobile agent is vulnerable when executing on remote hosts. The mobile agent may be subjected to various attacks such as tampering, inspection, and replay attack by a malicious host. Much research has been done to provide solutions for various security problems, such as authentication of mobile agent and hosts, integrity and confidentiality of the data carried by the mobile agent. Many of such proposed solutions in literature are not suitable for open systems whereby the mobile code arrives and executes on a host which is not known and trusted by the mobile agent owner. In this paper, we propose the adoption of the reference monitor by hosts in an open system for providing trust and security for mobile code execution. A secure protocol for the distribution of the reference monitor entity is described. This reference monitor entity on the remote host may also provide several security services such as authentication and integrity to the mobile code.

Keywords: security, mobile agents, reference monitor, trust

Procedia PDF Downloads 440
327 A Socio-Technical Approach to Cyber-Risk Assessment

Authors: Kitty Kioskli, Nineta Polemi

Abstract:

Evaluating the levels of cyber-security risks within an enterprise is most important in protecting its information system, services and all its digital assets against security incidents (e.g. accidents, malicious acts, massive cyber-attacks). The existing risk assessment methodologies (e.g. eBIOS, OCTAVE, CRAMM, NIST-800) adopt a technical approach considering as attack factors only the capability, intention and target of the attacker, and not paying attention to the attacker’s psychological profile and personality traits. In this paper, a socio-technical approach is proposed in cyber risk assessment, in order to achieve more realistic risk estimates by considering the personality traits of the attackers. In particular, based upon principles from investigative psychology and behavioural science, a multi-dimensional, extended, quantifiable model for an attacker’s profile is developed, which becomes an additional factor in the cyber risk level calculation.

Keywords: attacker, behavioural models, cyber risk assessment, cybersecurity, human factors, investigative psychology, ISO27001, ISO27005

Procedia PDF Downloads 165
326 Comprehensive Ultrasonography During Low-flow Bypass in Patients with Symptomatic Internal Carotid Artery (ICA) Occlusion

Authors: G. K. Guseynova, V. V. Krylov, L. T. Khamidova, N. A. Polunina, V. A. Lukyanchikov

Abstract:

The report presents complex ultrasound diagnostics in patients with symptomatic steno-occlusive lesions of extra- and intracranial branches of brachiocephalic arteries (BCA). The tasks and possibilities of ultrasound diagnostics at different stages of treatment of patients with symptomatic occlusion of internal carotid artery (ICA) are covered in detail; qualitative and quantitative characteristics of blood flow; parameters of the wall and lumen of the main arteries of the head; methods of ultrasound examination of indirect assessment of the functional status are presented. Special attention is paid to the description of indicators that are predictors of the consistency of formed extra-intracranial low-flow shunts, examples of functioning and failed anastomoses are analyzed.

Keywords: CBF, cerebral blood flow; CTA, external carotid artery; ICA, internal carotid artery; MCA, middle cerebral artery; MRA, magnetic resonance angiography; OEF, oxygen extraction fraction; TIA, transient ischaemic attack, ultrasound, low-flow bypass, anastomoses

Procedia PDF Downloads 43
325 Analysis of Sulphur-Oxidizing Bacteria Attack on Concrete Based on Waste Materials

Authors: A. Eštoková, M. Kovalčíková, A. Luptáková, A. Sičáková, M. Ondová

Abstract:

Concrete durability as an important engineering property of concrete, determining the service life of concrete structures very significantly, can be threatened and even lost due to the interactions of concrete with external environment. Bio-corrosion process caused by presence and activities of microorganisms producing sulphuric acid is a special type of sulphate deterioration of concrete materials. The effects of sulphur-oxidizing bacteria Acidithiobacillus thiooxidans on various concrete samples, based on silica fume and zeolite, were investigated in laboratory during 180 days. A laboratory study was conducted to compare the performance of concrete samples in terms of the concrete deterioration influenced by the leaching of calcium and silicon compounds from the cement matrix. The changes in the elemental concentrations of calcium and silicon in both solid samples and liquid leachates were measured by using X – ray fluorescence method. Experimental studies confirmed the silica fume based concrete samples were found out to have the best performance in terms of both silicon and calcium ions leaching.

Keywords: biocorrosion, concrete, leaching, bacteria

Procedia PDF Downloads 451
324 A New Family of Flying Wing Low Reynolds Number Airfoils

Authors: Ciro Sobrinho Campolina Martins, Halison da Silva Pereira, Vitor Mainenti Leal Lopes

Abstract:

Unmanned Aerial vehicles (UAVs) has been used in a wide range of applications, from precise agriculture monitoring for irrigation and fertilization to military attack missions. Long range performance is required for many of these applications. Tailless aircrafts are commonly used as long-range configurations and, due to its small amount of stability, the airfoil shape design of its wings plays a central role on the performance of the airplane. In this work, a new family of flying wing airfoils is designed for low Reynolds number flows, typical of small-middle UAVs. Camber, thickness and their maximum positions in the chord are variables used for the airfoil geometry optimization. Aerodynamic non-dimensional coefficients were obtained by the well-established Panel Method. High efficient airfoils with small pitch moment coefficient are obtained from the analysis described and its aerodynamic polars are plotted.

Keywords: airfoil design, flying wing, low Reynolds number, tailless aircraft, UAV

Procedia PDF Downloads 629
323 Immunomodulatory Role of Heat Killed Mycobacterium indicus pranii against Cervical Cancer

Authors: Priyanka Bhowmik, Subrata Majumdar, Debprasad Chattopadhyay

Abstract:

Background: Cervical cancer is the third major cause of cancer in women and the second most frequent cause of cancer related deaths causing 300,000 deaths annually worldwide. Evasion of immune response by Human Papilloma Virus (HPV), the key contributing factor behind cancer and pre-cancerous lesions of the uterine cervix, makes immunotherapy a necessity to treat this disease. Objective: A Heat killed fraction of Mycobacterium indicus pranii (MIP), a non-pathogenic Mycobacterium has been shown to exhibit cytotoxic effects on different cancer cells, including human cervical carcinoma cell line HeLa. However, the underlying mechanisms remain unknown. The aim of this study is to decipher the mechanism of MIP induced HeLa cell death. Methods: The cytotoxicity of Mycobacterium indicus pranii against HeLa cells was evaluated by 3-(4,5-dimethylthiazol-2-yl)-2,5-diphenyltetrazolium bromide (MTT) assay. Apoptosis was detected by annexin V and Propidium iodide (PI) staining. The assessment of reactive oxygen species (ROS) generation and cell cycle analysis were measured by flow cytometry. The expression of apoptosis associated genes was analyzed by real time PCR. Result: MIP could inhibit the proliferation of HeLa cell in a time and dose dependent manner but caused minor damage to normal cells. The induction of apoptosis was confirmed by the cell surface presentation of phosphatidyl serine, DNA fragmentation, and mitochondrial damage. MIP caused very early (as early as 30 minutes) transcriptional activation of p53, followed by a higher activation (32 fold) at 24 hours suggesting prime importance of p53 in MIP-induced apoptosis in HeLa cell. The up regulation of p53 dependent pro-apoptotic genes Bax, Bak, PUMA, and Noxa followed a lag phase that was required for the transcriptional p53 program. MIP also caused the transcriptional up regulation of Toll like receptor 2 and 4 after 30 minutes of MIP treatment suggesting recognition of MIP by toll like receptors. Moreover, MIP caused the inhibition of expression of HPV anti apoptotic gene E6, which is known to interfere with p53/PUMA/Bax apoptotic cascade. This inhibition might have played a role in transcriptional up regulation of PUMA and subsequently apoptosis. ROS was generated transiently which was concomitant with the highest transcription activation of p53 suggesting a plausible feedback loop network of p53 and ROS in the apoptosis of HeLa cells. Scavenger of ROS, such as N-acetyl-L-cysteine, decreased apoptosis suggesting ROS is an important effector of MIP induced apoptosis. Conclusion: Taken together, MIP possesses full potential to be a novel therapeutic agent in the clinical treatment of cervical cancer.

Keywords: cancer, mycobacterium, immunity, immunotherapy.

Procedia PDF Downloads 249
322 Effect of Nickel Coating on Corrosion of Alloys in Molten Salts

Authors: Divya Raghunandanan, Bhavesh D. Gajbhiye, C. S. Sona, Channamallikarjun S. Mathpati

Abstract:

Molten fluoride salts are considered as potential coolants for next generation nuclear plants where the heat can be utilized for production of hydrogen and electricity. Among molten fluoride salts, FLiNaK (LiF-NaF-KF: 46.5-11.5-42 mol %) is a potential candidate for the coolant due to its superior thermophysical properties such as high temperature stability, boiling point, volumetric heat capacity and thermal conductivity. Major technical challenge in implementation is the selection of structural material which can withstand corrosive nature of FLiNaK. Corrosion study of alloys SS 316L, Hastelloy B, Ni-201 was performed in molten FLiNaK at 650°C. Nickel was found to be more resistant to corrosive attack in molten fluoride medium. Corrosion experiments were performed to study the effect of nickel coating on corrosion of alloys SS 316L and Hastelloy B. Weight loss of the alloys due to corrosion was measured and corrosion rate was estimated. The surface morphology of the alloys was analyzed by Scanning Electron Microscopy.

Keywords: corrosion, FLiNaK, hastelloy, weight loss

Procedia PDF Downloads 441
321 Violence and Unintentional Injuries among Secondary School Students in Jordan

Authors: Malakeh Zuhdi Malak, Mahmoud Taher Kalaldeh

Abstract:

In Jordan, no available data exists regarding violence and unintentional injuries among secondary school students aged 15-19 years. The purpose of this study was to assess the violence and unintentional injuries among those students, and to compare these two behaviors between male and female students. A descriptive cross-sectional design was carried out on randomly selected eight comprehensive secondary schools (four schools for females and four schools for males) from the public school educational directorate located in Amman. A modified Arabic version of the General School Health Survey questionnaire was used to measure violence and unintentional injuries. A sample of 750 secondary school students was studied. The findings showed that 26.8 % of students had been physically attacked. Overall, 43.3 % of students had been involved in a physical fight and 20.1% of them had been bullied. Overall, 45.3% of students were seriously injured. There was a difference between male and female students regarding to physical attack, physical fight, and serious injuries. In conclusion, it is necessary to develop effective training program in life skills for students that functions to reduce risk-taking behaviors that often leading to violence and unintentional injuries.

Keywords: secondary school students, violence, unintentional injuries, bullying

Procedia PDF Downloads 372
320 Exploring Service Performance of Area-Based Bus Service for Dhaka: A Case Study of Dhaka Chaka

Authors: Md. Musfiqur Rahman Bhuiya Nidalia Islam, Hossain Mohiuddin, Md. Kawser Bin Zaman

Abstract:

Dhaka North City Corporation introduced first area-based bus service on 10 August 2016 to run through Gulshan and Banani area to dilute sufferings of the people which started with the ban on movement of the bus in these areas after Holy Artisan terrorist attack. This study explores service quality performance of Dhaka Chaka on the basis of information provided by its riders on a questionnaire survey. Total thirteen service quality indicators have been ranked on a scale of 1-5, and they have been classified under three latent variables based on their correlation using eigenvalue and rotated factor matrix derived through factor analysis process. Mean, and skewness has been calculated for each indicator. It has been found that ticket price and ticketing system have relatively poor average service quality rank than other factors. All other factors have moderately good performance. The study also suggests some recommendation to improve service quality of Dhaka Chaka based on the interrelation between considered parameters.

Keywords: area based bus service, eigen value, factor analysis, correlation

Procedia PDF Downloads 189
319 Investigation of Flow Effects of Soundwaves Incident on an Airfoil

Authors: Thirsa Sherry, Utkarsh Shrivastav, Kannan B. T., Iynthezhuton K.

Abstract:

The field of aerodynamics and aeroacoustics remains one of the most poignant and well-researched fields of today. The current paper aims to investigate the predominant problem concerning the effects of noise of varying frequencies and waveforms on airflow surrounding an airfoil. Using a single speaker beneath the airfoil at different positions, we wish to simulate the effects of sound directly impinging on an airfoil and study its direct effects on airflow. We wish to study the same using smoke visualization methods with incense as our smoke-generating material in a variable-speed subsonic wind tunnel. Using frequencies and wavelengths similar to those of common engine noise, we wish to simulate real-world conditions of engine noise interfering with airflow and document the arising trends. These results will allow us to look into the real-world effects of noise on airflow and how to minimize them and expand on the possible relation between waveforms and noise. The parameters used in the study include frequency, Reynolds number, waveforms, angle of attack, and the effects on airflow when varying these parameters.

Keywords: engine noise, aeroacoustics, acoustic excitation, low speed

Procedia PDF Downloads 93
318 Eco-Friendly Preservative Treated Bamboo Culm: Compressive Strength Analysis

Authors: Perminder JitKaur, Santosh Satya, K. K. Pant, S. N. Naik

Abstract:

Bamboo is extensively used in construction industry. Low durability of bamboo due to fungus infestation and termites attack under storage puts certain constrains for it usage as modern structural material. Looking at many chemical formulations for bamboo treatment leading to severe harmful environment effects, research on eco-friendly preservatives for bamboo treatment has been initiated world-over. In the present studies, eco-friendly preservative for bamboo treatment has been developed. To validate its application for structural purposes, investigation of effect of treatment on compressive strength has been investigated. Neem oil(25%) integrated with copper naphthenate (0.3%) on dilution with kerosene oil impregnated into bamboo culm at 2 bar pressure, has shown weight loss of only 3.15% in soil block analysis method. The results of compressive strength analysis using The results from compressive strength analysis using HEICO Automatic Compression Testing Machine, reveal that preservative treatment has not altered the structural properties of bamboo culms. Compressive strength of control (11.72 N/mm2) and above treated samples (11.71 N/mm2) was found to be comparable.

Keywords: D. strictus, bamboo, neem oil, presure treatment, compressive strength

Procedia PDF Downloads 409
317 Studying Relationship between Local Geometry of Decision Boundary with Network Complexity for Robustness Analysis with Adversarial Perturbations

Authors: Tushar K. Routh

Abstract:

If inputs are engineered in certain manners, they can influence deep neural networks’ (DNN) performances by facilitating misclassifications, a phenomenon well-known as adversarial attacks that question networks’ vulnerability. Recent studies have unfolded the relationship between vulnerability of such networks with their complexity. In this paper, the distinctive influence of additional convolutional layers at the decision boundaries of several DNN architectures was investigated. Here, to engineer inputs from widely known image datasets like MNIST, Fashion MNIST, and Cifar 10, we have exercised One Step Spectral Attack (OSSA) and Fast Gradient Method (FGM) techniques. The aftermaths of adding layers to the robustness of the architectures have been analyzed. For reasoning, separation width from linear class partitions and local geometry (curvature) near the decision boundary have been examined. The result reveals that model complexity has significant roles in adjusting relative distances from margins, as well as the local features of decision boundaries, which impact robustness.

Keywords: DNN robustness, decision boundary, local curvature, network complexity

Procedia PDF Downloads 75
316 WebAppShield: An Approach Exploiting Machine Learning to Detect SQLi Attacks in an Application Layer in Run-time

Authors: Ahmed Abdulla Ashlam, Atta Badii, Frederic Stahl

Abstract:

In recent years, SQL injection attacks have been identified as being prevalent against web applications. They affect network security and user data, which leads to a considerable loss of money and data every year. This paper presents the use of classification algorithms in machine learning using a method to classify the login data filtering inputs into "SQLi" or "Non-SQLi,” thus increasing the reliability and accuracy of results in terms of deciding whether an operation is an attack or a valid operation. A method Web-App auto-generated twin data structure replication. Shielding against SQLi attacks (WebAppShield) that verifies all users and prevents attackers (SQLi attacks) from entering and or accessing the database, which the machine learning module predicts as "Non-SQLi" has been developed. A special login form has been developed with a special instance of data validation; this verification process secures the web application from its early stages. The system has been tested and validated, up to 99% of SQLi attacks have been prevented.

Keywords: SQL injection, attacks, web application, accuracy, database

Procedia PDF Downloads 151
315 Characterization of New Sources of Maize (Zea mays L.) Resistance to Sitophilus zeamais (Coleoptera: Curculionidae) Infestation in Stored Maize

Authors: L. C. Nwosu, C. O. Adedire, M. O. Ashamo, E. O. Ogunwolu

Abstract:

The maize weevil, Sitophilus zeamais Motschulsky is a notorious pest of stored maize (Zea mays L.). The development of resistant maize varieties to manage weevils is a major breeding objective. The study investigated the parameters and mechanisms that confer resistance on a maize variety to S. zeamais infestation using twenty elite maize varieties. Detailed morphological, physical and chemical studies were conducted on whole-maize grain and the grain pericarp. Resistance was assessed at 33, 56, and 90 days post infestation using weevil mortality rate, weevil survival rate, percent grain damage, percent grain weight loss, weight of grain powder, oviposition rate and index of susceptibility as indices rated on a scale developed by the present study and on Dobie’s modified scale. Linear regression models that can predict maize grain damage in relation to the duration of storage were developed and applied. The resistant varieties identified particularly 2000 SYNEE-WSTR and TZBRELD3C5 with very high degree of resistance should be used singly or best in an integrated pest management system for the control of S. zeamais infestation in stored maize. Though increases in the physical properties of grain hardness, weight, length, and width increased varietal resistance, it was found that the bases of resistance were increased chemical attributes of phenolic acid, trypsin inhibitor and crude fibre while the bases of susceptibility were increased protein, starch, magnesium, calcium, sodium, phosphorus, manganese, iron, cobalt and zinc, the role of potassium requiring further investigation. Characters that conferred resistance on the test varieties were found distributed in the pericarp and the endosperm of the grains. Increases in grain phenolic acid, crude fibre, and trypsin inhibitor adversely and significantly affected the bionomics of the weevil on further assessment. The flat side of a maize grain at the point of penetration was significantly preferred by the weevil. Why the south area of the flattened side of a maize grain was significantly preferred by the weevil is clearly unknown, even though grain-face-type seemed to be a contributor in the study. The preference shown to the south area of the grain flat side has implications for seed viability. The study identified antibiosis, preference, antixenosis, and host evasion as the mechanisms of maize post harvest resistance to Sitophilus zeamais infestation.

Keywords: maize weevil, resistant, parameters, mechanisms, preference

Procedia PDF Downloads 307
314 Heart Attack Prediction Using Several Machine Learning Methods

Authors: Suzan Anwar, Utkarsh Goyal

Abstract:

Heart rate (HR) is a predictor of cardiovascular, cerebrovascular, and all-cause mortality in the general population, as well as in patients with cardio and cerebrovascular diseases. Machine learning (ML) significantly improves the accuracy of cardiovascular risk prediction, increasing the number of patients identified who could benefit from preventive treatment while avoiding unnecessary treatment of others. This research examines relationship between the individual's various heart health inputs like age, sex, cp, trestbps, thalach, oldpeaketc, and the likelihood of developing heart disease. Machine learning techniques like logistic regression and decision tree, and Python are used. The results of testing and evaluating the model using the Heart Failure Prediction Dataset show the chance of a person having a heart disease with variable accuracy. Logistic regression has yielded an accuracy of 80.48% without data handling. With data handling (normalization, standardscaler), the logistic regression resulted in improved accuracy of 87.80%, decision tree 100%, random forest 100%, and SVM 100%.

Keywords: heart rate, machine learning, SVM, decision tree, logistic regression, random forest

Procedia PDF Downloads 138
313 Evaluation of Bollworm Tolerance in F1 and F2 BT Cotton under Unprotected Condition

Authors: N. K. Bhute, B. B. Bhosle

Abstract:

Field experiment was conducted during kharif 2005, at the experimental farm of the Department of Genetics and Plant Breeding, College of Agriculture, Marathwada Agricultural University, Parbhani, Maharashtra. F1 and F2 hybrids of 23 Bt and 5 non-Bt hybrids were grown in a randomized block design with two replications. The results showed that among F1 hybrids, open boll damage due to bollworm complex was not noticed in 4233 Bt and 4247 Bt cotton hybrids which were found significantly superior over MECH 6301 Bt (3.2 %), 4255 Bt (3.28 %) and it was at par with rest of the hybrids. Among F2 hybrids minimum open boll damage (3.10 %) was noticed in Proagro 144 Bt, which was found significantly superior over rest of the hybrids except 4234 Bt (4.17 %) and 4254 Bt (4.98 %) which were at par with each other. In respect of seed cotton yield, among F1 hybrids maximum yield (15.51 q/ha) was recorded in 4233 Bt which was found significantly superior over rest of the hybrids except 4237 Bt (15.24 q/ha). Among F2 maximum yield (15.44 q/ha) was recorded in 4233 Bt which was found significantly superior over rest of the hybrids except 4258 Bt (15.41 q/ha), 4239 Bt (15.098 q/ha) which were at par with each other. Thus F2 Bt cotton express Bt protein in segregated pattern in which bollworm attack was more as compared to F1 which affects yield as well as quality of lint.

Keywords: Bt cotton, bollworms, F1 and F2 generations, unprotected condition

Procedia PDF Downloads 299
312 Mixed Natural Adsorbents and Oxides for Oil Remediation

Authors: Cesar Maximo Oliva González, Javier Acevedo Cortez, Boris Kharisov, Thelma Serrano Quezada

Abstract:

The importance of the crude oil refining process is due to the demand for petroleum products such as gasoline, kerosene, asphalt, etc., which are used in daily activities and have a high impact on the global economy. In the processes of oil obtaining and refining, it is common to find problems such as spills on seabed and high energy consumption in processing. In order to quickly and efficiently attack these problems, the use of adsorbents has taken on great importance due to its ease of implementation, as well as the possibility of their regeneration to be reused. In this work, the use of two types of adsorbents is proposed: the first is a natural adsorbent such as aloe vera or nopal, which were lyophilized and hydrophobized to achieve a selectivity in oil adsorption in oil / water mixtures. The second is a mixed iron/nickel oxide, which is specially designed to adsorb the asphaltenes in the heavy fractions of the oil; in addition, this type of adsorbents presents catalytic properties that manage to decompose the heavier fractions of the petroleum in light hydrocarbons, descending thus the energy required for the oil refining process.

Keywords: nanomaterials, oil spills, remediation, natural adsorbents, mixed oxides

Procedia PDF Downloads 241
311 NUX: A Lightweight Block Cipher for Security at Wireless Sensor Node Level

Authors: Gaurav Bansod, Swapnil Sutar, Abhijit Patil, Jagdish Patil

Abstract:

This paper proposes an ultra-lightweight cipher NUX. NUX is a generalized Feistel network. It supports 128/80 bit key length and block length of 64 bit. For 128 bit key length, NUX needs only 1022 GEs which is less as compared to all existing cipher design. NUX design results into less footprint area and minimal memory size. This paper presents security analysis of NUX cipher design which shows cipher’s resistance against basic attacks like Linear and Differential Cryptanalysis. Advanced attacks like Biclique attack is also mounted on NUX cipher design. Two different F function in NUX cipher design results in high diffusion mechanism which generates large number of active S-boxes in minimum number of rounds. NUX cipher has total 31 rounds. NUX design will be best-suited design for critical application like smart grid, IoT, wireless sensor network, where memory size, footprint area and the power dissipation are the major constraints.

Keywords: lightweight cryptography, Feistel cipher, block cipher, IoT, encryption, embedded security, ubiquitous computing

Procedia PDF Downloads 374
310 Performance Investigation of UAV Attitude Control Based on Modified PI-D and Nonlinear Dynamic Inversion

Authors: Ebrahim Hassan Kapeel, Ahmed Mohsen Kamel, Hossan Hendy, Yehia Z. Elhalwagy

Abstract:

Interest in autopilot design has been raised intensely as a result of recent advancements in Unmanned Aerial vehicles (UAVs). Due to the enormous number of applications that UAVs can achieve, the number of applied control theories used for them has increased in recent years. These small fixed-wing UAVs are suffering high non-linearity, sensitivity to disturbances, and coupling effects between their channels. In this work, the nonlinear dynamic inversion (NDI) control lawisdesigned for a nonlinear small fixed-wing UAV model. The NDI is preferable for varied operating conditions, there is no need for a scheduling controller. Moreover, it’s applicable for high angles of attack. For the designed flight controller validation, a nonlinear Modified PI-D controller is performed with our model. A comparative study between both controllers is achieved to evaluate the NDI performance. Simulation results and analysis are proposed to illustrate the effectiveness of the designed controller based on NDI.

Keywords: UAV dynamic model, attitude control, nonlinear PID, dynamic inversion

Procedia PDF Downloads 111
309 The Role of Regional Economic Communities in Fighting Terrorism in Africa: The Case of Inter-Governmental Authority on Development (IGAD)

Authors: Memar Ayalew Demeke, Solomon Gebreyohans Gebru

Abstract:

In Africa, Regional Economic Communities (RECs) were initially established to tackle the economic challenges of the continent. However, overtime, they expanded their mandate to deal with the security threats of the continent such as terrorism. In fact, the fight against terrorism has been internationalized following the September 9/11 terrorist attack in the U.S.A. Since then, RECs have been giving considerable attention to preventing and combating terrorism in their respective regions. Similarly, IGAD has been involved in preventing and combating terrorism. So far, however, little has been done with regard to what IGAD has performed in fighting terrorism. Therefore, this study was intended to describe and analyze the legal and practical activities carried out by IGAD in its fight against terrorism in the region general and in Somalia in particular. Both descriptive and analytical methods were employed and data were analyzed through qualitative approach. Finally, based on the findings, the study argues that, instead of over-reliance on hard power as a means of fighting terrorism, IGAD should invest more on the political and socio-economic problems of its member states so as to address the root causes.

Keywords: regional economic communities, IGAD, terrorism, treaties, conventions

Procedia PDF Downloads 431
308 Fundamental Research Dissension between Hot and Cold Chamber High Pressure Die Casting

Authors: Sahil Kumar, Surinder Pal, Rahul Kapoor

Abstract:

This paper is focused on to define the basic difference between hot and cold chamber high pressure die casting process which is not fully defined in a research before paper which we have studied. The pressure die casting is basically defined into two types (1) Hot chamber Die Casting (2) Cold chamber Die Casting. Cold chamber die casting is used for casting alloys that require high pressure and have a high melting temperature, such as brass, aluminum, magnesium, copper based alloys and other high melting point nonferrous alloys. Hot chamber die casting is suitable for casting zinc, tin, lead, and low melting point alloys. In hot chamber die casting machine, the molten metal is an integral pan of the machine. It mainly consists of hot chamber and gooseneck type metal container made of cast iron. This machine is mainly used for low melting alloys and alloys of metals like zinc, lead etc. Metals and alloys having a high melting point and those which are having an affinity for iron cannot be cast by this machine, which could otherwise attack the shot sleeve and damage the machine.

Keywords: hot chamber die casting, cold chamber die casting, metals and alloys, casting technology

Procedia PDF Downloads 618
307 Performance Investigation of Unmanned Aerial Vehicles Attitude Control Based on Modified PI-D and Nonlinear Dynamic Inversion

Authors: Ebrahim H. Kapeel, Ahmed M. Kamel, Hossam Hendy, Yehia Z. Elhalwagy

Abstract:

Interest in autopilot design has been raised intensely as a result of recent advancements in Unmanned Aerial vehicles (UAVs). Due to the enormous number of applications that UAVs can achieve, the number of applied control theories used for them has increased in recent years. These small fixed-wing UAVs are suffering high non-linearity, sensitivity to disturbances, and coupling effects between their channels. In this work, the nonlinear dynamic inversion (NDI) control law is designed for a nonlinear small fixed-wing UAV model. The NDI is preferable for varied operating conditions, there is no need for a scheduling controller. Moreover, it’s applicable for high angles of attack. For the designed flight controller validation, a nonlinear Modified PI-D controller is performed with our model. A comparative study between both controllers is achieved to evaluate the NDI performance. Simulation results and analysis are proposed to illustrate the effectiveness of the designed controller based on NDI.

Keywords: attitude control, nonlinear PID, dynamic inversion

Procedia PDF Downloads 111
306 A Hybrid Digital Watermarking Scheme

Authors: Nazish Saleem Abbas, Muhammad Haris Jamil, Hamid Sharif

Abstract:

Digital watermarking is a technique that allows an individual to add and hide secret information, copyright notice, or other verification message inside a digital audio, video, or image. Today, with the advancement of technology, modern healthcare systems manage patients’ diagnostic information in a digital way in many countries. When transmitted between hospitals through the internet, the medical data becomes vulnerable to attacks and requires security and confidentiality. Digital watermarking techniques are used in order to ensure the authenticity, security and management of medical images and related information. This paper proposes a watermarking technique that embeds a watermark in medical images imperceptibly and securely. In this work, digital watermarking on medical images is carried out using the Least Significant Bit (LSB) with the Discrete Cosine Transform (DCT). The proposed methods of embedding and extraction of a watermark in a watermarked image are performed in the frequency domain using LSB by XOR operation. The quality of the watermarked medical image is measured by the Peak signal-to-noise ratio (PSNR). It was observed that the watermarked medical image obtained performing XOR operation between DCT and LSB survived compression attack having a PSNR up to 38.98.

Keywords: watermarking, image processing, DCT, LSB, PSNR

Procedia PDF Downloads 48
305 Failure Analysis of a Hydrocarbon Carrying/Piping System

Authors: Esteban Morales Murillo, Ephraim Mokgothu

Abstract:

This paper presents the findings of a study conducted to investigate the wall thinning in a piping system carrying a mix of hydrocarbons in a petrochemical plant. A detailed investigation including optical inspection and several characterisation techniques such as optical microscopy, SEM/EDX, and XRF/C-S analyses was conducted. The examinations revealed that the wall thinning in the piping system was a result of high-temperature H2/H2S corrosion caused by a susceptible material for this mechanism and operating parameters and effluent concentrations beyond the prescribed limits. The sulfide layers found to testify to the large amounts of H2S that led to material degradation. Deposit analysis revealed that it consisted primarily of carbon, oxygen, iron, chromium and sulfur. Metallographic examinations revealed that the attack initiated from the internal surface and that spheroidization of carbides did occur. The article discusses in detail the contribution failure factors on the Couper-Gorman H2/H2S curves to draw conclusions. Recommendations based on the above findings are also discussed.

Keywords: corrosion, Couper-Gorman, high-temperature corrosion, sulfidation, wall thinning, piping system

Procedia PDF Downloads 385
304 A Blockchain-Based Protection Strategy against Social Network Phishing

Authors: Francesco Buccafurri, Celeste Romolo

Abstract:

Nowadays phishing is the most frequent starting point of cyber-attack vectors. Phishing is implemented both via email and social network messages. While a wide scientific literature exists which addresses the problem of contrasting email spam-phishing, no specific countermeasure has been so far proposed for phishing included into private messages of social network platforms. Unfortunately, the problem is severe. This paper proposes an approach against social network phishing, based on a non invasive collaborative information-sharing approach which leverages blockchain. The detection method works by filtering candidate messages, by distilling them by means of a distance-preserving hash function, and by publishing hashes over a public blockchain through a trusted smart contract (thus avoiding denial of service attacks). Phishing detection exploits social information embedded into social network profiles to identify similar messages belonging to disjoint contexts. The main contribution of the paper is to introduce a new approach to contrasting the problem of social network phishing, which, despite its severity, received little attention by both research and industry.

Keywords: phishing, social networks, information sharing, blockchain

Procedia PDF Downloads 328
303 Hybrid Anomaly Detection Using Decision Tree and Support Vector Machine

Authors: Elham Serkani, Hossein Gharaee Garakani, Naser Mohammadzadeh, Elaheh Vaezpour

Abstract:

Intrusion detection systems (IDS) are the main components of network security. These systems analyze the network events for intrusion detection. The design of an IDS is through the training of normal traffic data or attack. The methods of machine learning are the best ways to design IDSs. In the method presented in this article, the pruning algorithm of C5.0 decision tree is being used to reduce the features of traffic data used and training IDS by the least square vector algorithm (LS-SVM). Then, the remaining features are arranged according to the predictor importance criterion. The least important features are eliminated in the order. The remaining features of this stage, which have created the highest level of accuracy in LS-SVM, are selected as the final features. The features obtained, compared to other similar articles which have examined the selected features in the least squared support vector machine model, are better in the accuracy, true positive rate, and false positive. The results are tested by the UNSW-NB15 dataset.

Keywords: decision tree, feature selection, intrusion detection system, support vector machine

Procedia PDF Downloads 266
302 A Computational Approach to Screen Antagonist’s Molecule against Mycobacterium tuberculosis Lipoprotein LprG (Rv1411c)

Authors: Syed Asif Hassan, Tabrej Khan

Abstract:

Tuberculosis (TB) caused by bacillus Mycobacterium tuberculosis (Mtb) continues to take a disturbing toll on human life and healthcare facility worldwide. The global burden of TB remains enormous. The alarming rise of multi-drug resistant strains of Mycobacterium tuberculosis calls for an increase in research efforts towards the development of new target specific therapeutics against diverse strains of M. tuberculosis. Therefore, the discovery of new molecular scaffolds targeting new drug sites should be a priority for a workable plan for fighting resistance in Mycobacterium tuberculosis (Mtb). Mtb non-acylated lipoprotein LprG (Rv1411c) has a Toll-like receptor 2 (TLR2) agonist actions that depend on its association with triacylated glycolipids binding specifically with the hydrophobic pocket of Mtb LprG lipoprotein. The detection of a glycolipid carrier function has important implications for the role of LprG in Mycobacterial physiology and virulence. Therefore, considering the pivotal role of glycolipids in mycobacterial physiology and host-pathogen interactions, designing competitive antagonist (chemotherapeutics) ligands that competitively bind to glycolipid binding domain in LprG lipoprotein, will lead to inhibition of tuberculosis infection in humans. In this study, a unified approach involving ligand-based virtual screening protocol USRCAT (Ultra Shape Recognition) software and molecular docking studies using Auto Dock Vina 1.1.2 using the X-ray crystal structure of Mtb LprG protein was implemented. The docking results were further confirmed by DSX (DrugScore eXtented), a robust program to evaluate the binding energy of ligands bound to the Ligand binding domain of the Mtb LprG lipoprotein. The ligand, which has the higher hypothetical affinity, also has greater negative value. Based on the USRCAT, Lipinski’s values and molecular docking results, [(2R)-2,3-di(hexadecanoyl oxy)propyl][(2S,3S,5S,6R)-3,4,5-trihydroxy-2,6-bis[[(2R,3S,4S,5R,6S)-3,4,5-trihydroxy-6 (hydroxymethyl)tetrahydropyran-2-yl]oxy]cyclohexyl] phosphate (XPX) was confirmed as a promising drug-like lead compound (antagonist) binding specifically to the hydrophobic domain of LprG protein with affinity greater than that of PIM2 (agonist of LprG protein) with a free binding energy of -9.98e+006 Kcal/mol and binding affinity of -132 Kcal/mol, respectively. A further, in vitro assay of this compound is required to establish its potency in inhibiting molecular evasion mechanism of MTB within the infected host macrophages. These results will certainly be helpful in future anti-TB drug discovery efforts against Multidrug-Resistance Tuberculosis (MDR-TB).

Keywords: antagonist, agonist, binding affinity, chemotherapeutics, drug-like, multi drug resistance tuberculosis (MDR-TB), RV1411c protein, toll-like receptor (TLR2)

Procedia PDF Downloads 272