Search results for: pilot contamination attacks
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 2292

Search results for: pilot contamination attacks

1962 Mycoflora and Aflatoxin Contamination of Kokoro: A Nigerian Maize Snack

Authors: D. A. Onifade

Abstract:

Kokoro is maize snack which is very popular among poor masses in Nigeria who consume it along with gari(a cassava product) as lunch on a regular basis. In this study, fungal contaminants of kokoro were characterized and its aflatoxin content determined. A total of 30 fungal isolates were obtained from kokoro samples and they belong to 3 different species. Aspergillus flavus had the highest frequency of occurrence of 73.33% while Penicillium species had the lowest (6.66%). Different concentration of aflatoxin B1 was detected in some of the kokoro samples analyzed. Sample D had the highest concentration of 7.25 parts per billion (ppb). The lowest concentration detected was 0.06 ppb in sample P. No aflatoxin G1 and G2 was detected in all the kokoro samples with exception of sample P which contained 2.54 ppb aflatoxin G1.According to international standards some of the kokoro samples are not suitable for human consumption because of high-level aflatoxin which was above the recommended level. Therefore, production of kokoro should be standardized and appropriate packaging materials utilized to prevent the growth of aflatoxigenic fungi. This is to safeguard the health of many poor Nigerians who consume it on a regular basis.

Keywords: kokoro, maize snack, aflatoxin, contamination, mould, Nigeria

Procedia PDF Downloads 302
1961 Robust Medical Image Watermarking Using Frequency Domain and Least Significant Bits Algorithms

Authors: Volkan Kaya, Ersin Elbasi

Abstract:

Watermarking and stenography are getting importance recently because of copyright protection and authentication. In watermarking we embed stamp, logo, noise or image to multimedia elements such as image, video, audio, animation and text. There are several works have been done in watermarking for different purposes. In this research work, we used watermarking techniques to embed patient information into the medical magnetic resonance (MR) images. There are two methods have been used; frequency domain (Digital Wavelet Transform-DWT, Digital Cosine Transform-DCT, and Digital Fourier Transform-DFT) and spatial domain (Least Significant Bits-LSB) domain. Experimental results show that embedding in frequency domains resist against one type of attacks, and embedding in spatial domain is resist against another group of attacks. Peak Signal Noise Ratio (PSNR) and Similarity Ratio (SR) values are two measurement values for testing. These two values give very promising result for information hiding in medical MR images.

Keywords: watermarking, medical image, frequency domain, least significant bits, security

Procedia PDF Downloads 271
1960 NUX: A Lightweight Block Cipher for Security at Wireless Sensor Node Level

Authors: Gaurav Bansod, Swapnil Sutar, Abhijit Patil, Jagdish Patil

Abstract:

This paper proposes an ultra-lightweight cipher NUX. NUX is a generalized Feistel network. It supports 128/80 bit key length and block length of 64 bit. For 128 bit key length, NUX needs only 1022 GEs which is less as compared to all existing cipher design. NUX design results into less footprint area and minimal memory size. This paper presents security analysis of NUX cipher design which shows cipher’s resistance against basic attacks like Linear and Differential Cryptanalysis. Advanced attacks like Biclique attack is also mounted on NUX cipher design. Two different F function in NUX cipher design results in high diffusion mechanism which generates large number of active S-boxes in minimum number of rounds. NUX cipher has total 31 rounds. NUX design will be best-suited design for critical application like smart grid, IoT, wireless sensor network, where memory size, footprint area and the power dissipation are the major constraints.

Keywords: lightweight cryptography, Feistel cipher, block cipher, IoT, encryption, embedded security, ubiquitous computing

Procedia PDF Downloads 334
1959 Decision Support System for a Pilot Flash Flood Early Warning System in Central Chile

Authors: D. Pinto, L. Castro, M. L. Cruzat, S. Barros, J. Gironás, C. Oberli, M. Torres, C. Escauriaza, A. Cipriano

Abstract:

Flash floods, together with landslides, are a common natural threat for people living in mountainous regions and foothills. One way to deal with this constant menace is the use of Early Warning Systems, which have become a very important mitigation strategy for natural disasters. In this work, we present our proposal for a pilot Flash Flood Early Warning System for Santiago, Chile, the first stage of a more ambitious project that in a future stage shall also include early warning of landslides. To give a context for our approach, we first analyze three existing Flash Flood Early Warning Systems, focusing on their general architectures. We then present our proposed system, with main focus on the decision support system, a system that integrates empirical models and fuzzy expert systems to achieve reliable risk estimations.

Keywords: decision support systems, early warning systems, flash flood, natural hazard

Procedia PDF Downloads 353
1958 Evolution of Bombings against Transportation Infrastructure

Authors: Jonathan K. Hill

Abstract:

The transportation networks throughout Africa remain the only transportation infrastructure system in the world that is attacked by terrorists at a high frequency, so the international community can learn from each attack. The targeting of transportation should be recognized as a direct attack against a civilian population, so the international community should work to better understand the types of attacks utilized, the types of improvised explosive device designs adapted to transportation targets, and the ways the various modes of transportation have been attacked throughout the continent. Some countries have seen grenade attacks that have resulted in only injuries, while some countries have experienced large vehicle bombings that have resulted in hundreds of injuries and numerous deaths. With insurgencies, explosive devices have been small, complex, and generally target an enemy of the insurgency. With terrorist bombings, the explosive devices have been large, brazen, and targeted at civilian populations. And, these civilian populations are easily targeted within the transportation system. The presentation provided by Assess Africa LLC is titled ‘Evolution of Bombings Against Transportation Infrastructure’ and covers improvised explosive device characteristics, how improvised explosive devices have been adapted to transportation targets in Africa, analyses recent incidents, and provides some advice for effective protective measures. A main component of the improvised explosive device characteristics portion of the presentation focuses on the link between explosive device components, the intelligence network, and the bomb-builder’s network. By understanding the components, how the use of various components can be linked to a terrorist group’s capabilities, and how the bomb-builder acquires materials, the analysis of improvised explosive device attacks takes on a new direction – one that focuses on defeating the network instead of merely reviewing incidents of the past.

Keywords: Africa, bombings, critical infrastructure protection, transportation security

Procedia PDF Downloads 398
1957 Work Experience and Employability: Results and Evaluation of a Pilot Training Course on Skills for Company Tutors

Authors: Javier Barraycoa, Olga Lasaga

Abstract:

Work experience placements are one of the main routes to employment and acquiring professional experience for recent graduates. The effectiveness of these work experience placements is conditioned to the training in skills, especially teaching skills, of company tutors. For this reason, a manual specifically designed for training company tutors in these skills has been developed. Similarly, a pilot semi-attendance course to provide the resources that enable tutors to improve their role as instructors was carried out. The course was quantitatively and qualitatively evaluated with the aim of assessing its effectiveness, detecting shortcomings and areas to be improved, and revising the manual contents. One of the biggest achievements was the raising of awareness in the participating tutors of the importance of their work and of the need to develop teaching skills. As a result of this project, we have detected a need to design specific training supplements according to knowledge areas and sectors, to collate good practices and to create easily accessible audiovisual materials.

Keywords: company tutors, employability, teaching skills, work experience

Procedia PDF Downloads 227
1956 Evaluation of Heavy Metal Contamination and Assessment of the Suitability of Water for Irrigation: A Case Study of the Sand River, Limpopo Province, South Africa

Authors: Ngonidzashe Moyo, Mmaditshaba Rapatsa

Abstract:

The primary objective of this study was to determine heavy metal contamination in the water, sediment, grass and fish in Sand River, South Africa. This river passes through an urban area and sewage effluent is discharged into it. Water from the Sand river is subsequently used for irrigation downstream of the sewage treatment works. The suitability of this water and the surrounding boreholes for irrigation was determined. This study was undertaken between January, 2014 and January, 2015. Monthly samples were taken from four sites. Sites 1 was upstream of the Polokwane Wastewater Treatment Plant, sites 2, 3 and 4 were downstream. Ten boreholes in the vicinity of the Sand River were randomly selected and the water was tested for heavy metal contamination. The concentration of heavy metals in Sand River water followed the order Mn>Fe>Pb>Cu≥Zn≥Cd. Manganese concentration averaged 0.34 mg/L. Heavy metal concentration in the sediment, grass and fish followed the order Fe>Mn>Zn>Cu>Pb>Cd. The bioaccumulation factor from grass to fish was highest in manganese (19.25), followed by zinc (16.39) and iron (14.14). Soil permeability index (PI) and sodium adsorption ratio (SAR) were used to determine the suitability of Sand River and borehole water for irrigation. The PI index for Sand River water was 75.1% and this indicates that Sand River water is suitable for irrigation of crops. The PI index for the borehole water ranged from 65.8-72.8% and again this indicates suitability of borehole water for crop irrigation. The sodium adsorption ratio also indicated that both Sand River and borehole water were suitable for irrigation. A risk assessment study is recommended to determine the suitability of the fish for human consumption.

Keywords: bioaccumulation, bioavailability, heavy metals, sodium adsorption ratio

Procedia PDF Downloads 202
1955 Secure Network Coding against Content Pollution Attacks in Named Data Network

Authors: Tao Feng, Xiaomei Ma, Xian Guo, Jing Wang

Abstract:

Named Data Network (NDN) is one of the future Internet architecture, all nodes (i.e., hosts, routers) are allowed to have a local cache, used to satisfy incoming requests for content. However, depending on caching allows an adversary to perform attacks that are very effective and relatively easy to implement, such as content pollution attack. In this paper, we use a method of secure network coding based on homomorphic signature system to solve this problem. Firstly ,we use a dynamic public key technique, our scheme for each generation authentication without updating the initial secret key used. Secondly, employing the homomorphism of hash function, intermediate node and destination node verify the signature of the received message. In addition, when the network topology of NDN is simple and fixed, the code coefficients in our scheme are generated in a pseudorandom number generator in each node, so the distribution of the coefficients is also avoided. In short, our scheme not only can efficiently prevent against Intra/Inter-GPAs, but also can against the content poisoning attack in NDN.

Keywords: named data networking, content polloution attack, network coding signature, internet architecture

Procedia PDF Downloads 313
1954 Modeling Geogenic Groundwater Contamination Risk with the Groundwater Assessment Platform (GAP)

Authors: Joel Podgorski, Manouchehr Amini, Annette Johnson, Michael Berg

Abstract:

One-third of the world’s population relies on groundwater for its drinking water. Natural geogenic arsenic and fluoride contaminate ~10% of wells. Prolonged exposure to high levels of arsenic can result in various internal cancers, while high levels of fluoride are responsible for the development of dental and crippling skeletal fluorosis. In poor urban and rural settings, the provision of drinking water free of geogenic contamination can be a major challenge. In order to efficiently apply limited resources in the testing of wells, water resource managers need to know where geogenically contaminated groundwater is likely to occur. The Groundwater Assessment Platform (GAP) fulfills this need by providing state-of-the-art global arsenic and fluoride contamination hazard maps as well as enabling users to create their own groundwater quality models. The global risk models were produced by logistic regression of arsenic and fluoride measurements using predictor variables of various soil, geological and climate parameters. The maps display the probability of encountering concentrations of arsenic or fluoride exceeding the World Health Organization’s (WHO) stipulated concentration limits of 10 µg/L or 1.5 mg/L, respectively. In addition to a reconsideration of the relevant geochemical settings, these second-generation maps represent a great improvement over the previous risk maps due to a significant increase in data quantity and resolution. For example, there is a 10-fold increase in the number of measured data points, and the resolution of predictor variables is generally 60 times greater. These same predictor variable datasets are available on the GAP platform for visualization as well as for use with a modeling tool. The latter requires that users upload their own concentration measurements and select the predictor variables that they wish to incorporate in their models. In addition, users can upload additional predictor variable datasets either as features or coverages. Such models can represent an improvement over the global models already supplied, since (a) users may be able to use their own, more detailed datasets of measured concentrations and (b) the various processes leading to arsenic and fluoride groundwater contamination can be isolated more effectively on a smaller scale, thereby resulting in a more accurate model. All maps, including user-created risk models, can be downloaded as PDFs. There is also the option to share data in a secure environment as well as the possibility to collaborate in a secure environment through the creation of communities. In summary, GAP provides users with the means to reliably and efficiently produce models specific to their region of interest by making available the latest datasets of predictor variables along with the necessary modeling infrastructure.

Keywords: arsenic, fluoride, groundwater contamination, logistic regression

Procedia PDF Downloads 322
1953 Actor Training in Social Work Education: A Pilot Study of Theatre Workshops to Enhance Clinical Empathy

Authors: Amanda Coleman, Estefanía Gonzalez

Abstract:

Empathy is considered an essential skill for engaging with social work clients. Drawing from developments in medical education, researchers will conduct and evaluate a three-part pilot theatre workshop with master level social work students (n ≈ 30) to evaluate the workshop's ability to enhance empathy among participants. Outcomes will be measured using semi-structured post-intervention interviews with a subset of participants (n ≈ 10) as well post-intervention written reflections and pre-and-post intervention quantitative evaluation of empathy using King and Holosko’s 2011 Empathy Scale for Social Workers. The content of the workshop will differ from traditional role plays, which are common in social work education, in that it will draw from role theory and research on creative empathy to emphasize role reversal with clients. Workshops will be held February and March of 2017 with preliminary findings available by April.

Keywords: education, empathy, social work, theatre

Procedia PDF Downloads 249
1952 The Crossroads of Corruption and Terrorism in the Global South

Authors: Stephen M. Magu

Abstract:

The 9/11 and Christmas bombing attacks in the United States are mostly associated with the inability of intelligence agencies to connect dots based on intelligence that was already available. The 1998, 2002, 2013 and several 2014 terrorist attacks in Kenya, on the other hand, are probably driven by a completely different dynamic: the invisible hand of corruption. The World Bank and Transparency International annually compute the Worldwide Governance Indicators and the Corruption Perception Index respectively. What perhaps is not adequately captured in the corruption metrics is the impact of corruption on terrorism. The World Bank data includes variables such as the control of corruption, (estimates of) government effectiveness, political stability and absence of violence/terrorism, regulatory quality, rule of law and voice and accountability. TI's CPI does not include measures related to terrorism, but it is plausible that there is an expectation of some terrorism impact arising from corruption. This paper, by examining the incidence, frequency and total number of terrorist attacks that have occurred especially since 1990, and further examining the specific cases of Kenya and Nigeria, argues that in addition to having major effects on governance, corruption has an even more frightening impact: that of facilitating and/or violating security mechanisms to the extent that foreign nationals can easily obtain identification that enables them to perpetuate major events, targeting powerful countries' interests in countries with weak corruption-fighting mechanisms. The paper aims to model interactions that demonstrate the cost/benefit analysis and agents' rational calculations as being non-rational calculations, given the ultimate impact. It argues that eradication of corruption is not just a matter of a better business environment, but that it is implicit in national security, and that for anti-corruption crusaders, this is an argument more potent than the economic cost / cost of doing business argument.

Keywords: corruption, global south, identification, passports, terrorism

Procedia PDF Downloads 407
1951 Combination between Intrusion Systems and Honeypots

Authors: Majed Sanan, Mohammad Rammal, Wassim Rammal

Abstract:

Today, security is a major concern. Intrusion Detection, Prevention Systems and Honeypot can be used to moderate attacks. Many researchers have proposed to use many IDSs ((Intrusion Detection System) time to time. Some of these IDS’s combine their features of two or more IDSs which are called Hybrid Intrusion Detection Systems. Most of the researchers combine the features of Signature based detection methodology and Anomaly based detection methodology. For a signature based IDS, if an attacker attacks slowly and in organized way, the attack may go undetected through the IDS, as signatures include factors based on duration of the events but the actions of attacker do not match. Sometimes, for an unknown attack there is no signature updated or an attacker attack in the mean time when the database is updating. Thus, signature-based IDS fail to detect unknown attacks. Anomaly based IDS suffer from many false-positive readings. So there is a need to hybridize those IDS which can overcome the shortcomings of each other. In this paper we propose a new approach to IDS (Intrusion Detection System) which is more efficient than the traditional IDS (Intrusion Detection System). The IDS is based on Honeypot Technology and Anomaly based Detection Methodology. We have designed Architecture for the IDS in a packet tracer and then implemented it in real time. We have discussed experimental results performed: both the Honeypot and Anomaly based IDS have some shortcomings but if we hybridized these two technologies, the newly proposed Hybrid Intrusion Detection System (HIDS) is capable enough to overcome these shortcomings with much enhanced performance. In this paper, we present a modified Hybrid Intrusion Detection System (HIDS) that combines the positive features of two different detection methodologies - Honeypot methodology and anomaly based intrusion detection methodology. In the experiment, we ran both the Intrusion Detection System individually first and then together and recorded the data from time to time. From the data we can conclude that the resulting IDS are much better in detecting intrusions from the existing IDSs.

Keywords: security, intrusion detection, intrusion prevention, honeypot, anomaly-based detection, signature-based detection, cloud computing, kfsensor

Procedia PDF Downloads 353
1950 Headache Masquerading as Common Psychiatric Disorders in Patients of Low Economic Class in a Tertiary Care Setting

Authors: Seema Singh Parmar, Shweta Chauhan

Abstract:

Aims & Objectives: To evaluate the presence of various psychiatric disorders in patients reporting with a headache as the only symptom. Methodology: 200 patients with the chief complain of a headache who visited the psychiatric OPD of a tertiary care were investigated. Out of them 50 who had pure psychiatric illness without any other neurological disease were investigated, and their diagnosis was made. Independent sample t-tests were applied to generate results. Results: The most common psychiatric diagnosis seen in the sample was Depression (64%) out of which 47% showed features of Depression with anxious distress. Other psychiatric disorders seen were Generalized Anxiety Disorder, Panic Attacks, Somatic Symptom Disorder and Obsessive Compulsive Disorder. For pure psychiatry, headache related illnesses female to male ratio was 1.64. Conclusion: The increasing frequency of psychiatric disorders among patients who only visit the doctor seeking treat a headache shows the need for better identification of psychiatric disorders because proper diagnosis and target of psychiatric treatment shall give complete relief to the patient’s symptomatology.

Keywords: anxiety disorders, depression, headache, panic attacks

Procedia PDF Downloads 353
1949 Change through Stillness: Mindfulness Meditation as an Intervention for Men with Self-Perceived Problematic Pornography Use

Authors: Luke Sniewski, Pante Farvid, Phil Carter, Rita Csako

Abstract:

Background and Aims: Self-Perceived Problematic Porn Use (SPPPU) refers to individuals who identify as or perceive themselves to be addicted to porn. These individuals feel they are unable to regulate their porn consumption and experience adverse consequences as a result of their use in everyday life. To the author’s best knowledge, this research represents the first study to intervene with pornography use with mindfulness meditation, and aims to investigate the experiences and challenges of men with SPPPU as they engage in a mindfulness meditation intervention. As meditation is commonly characterized by sitting and observing one’s internal experience with non-reaction and acceptance, the study’s principal hypothesis was that consistent practice of meditation would develop the participant’s capacity to respond to cravings, urges, and unwanted thoughts in less reactive, more productive ways. Method: This 12-mixed method research utilised Single Case Experimental Design (SCED) methodology, with a standard AB design. Each participant was randomly assigned to an initial baseline time period between 2 to 5 weeks before learning the meditation technique and practicing it for the remainder of the 12-week study. The pilot study included 3 participants, while the intervention study included 12. The meditation technique used for the study involved a 15-minute guided breathing exercise in the morning, along with a 15-minute guided concentration meditation in the evening. Results: At the time of submission, only pilot study results were available. Results from the pilot study indicate an improved capacity for self-awareness of the uncomfortable mental and emotional states that drove their participants’ pornography use. Statistically significant reductions were also observed in daily porn use, total weekly time spent viewing porn, as well as lowered Pornography Craving Questionnaire (PCQ) and Problematic Pornography Use Scale (PPUS) scores. Conclusion: Pilot study results suggest that meditation could serve as a complementary tool for health professionals to provide clients in conjunction with therapeutic interventions. Study limitations, directions for future research, and clinical implications to be discussed as well.

Keywords: meditation, behavioural change, pornography, mindfulness

Procedia PDF Downloads 132
1948 Designing a Waitlist Intervention for Adult Patients Awaiting Outpatient Treatment for Eating Disorders: Preliminary Findings from a Pilot Test

Authors: Deanne McArthur, Melinda Wall, Claire Hanlon, Dana Agnolin, Krista Davis, Melanie Dennis, Elizabeth Glidden, Anne Marie Smith, Claudette Thomson

Abstract:

In Canada, as prevalence rates and severity of illness have increased among patients suffering from eating disorders, wait times have grown substantially. Patients in Canada often face wait times in excess of 12 months. It is known that delaying treatment for eating disorders contributes to poor patient outcomes and higher rates of symptom relapse. Improving interim services for adult patients awaiting outpatient treatment is a priority for an outpatient eating disorders clinic in Ontario, Canada. The clinical setting currently provides care for adults diagnosed with anorexia nervosa, bulimia nervosa and binge eating disorder. At present, the only support provided while patients are on the waitlist consists of communication with primary care providers regarding parameters for medical monitoring. The significance of this study will be to test the feasibility, acceptability and efficacy of an intervention to support adult patients awaiting outpatient eating disorder treatment for anorexia nervosa, bulimia nervosa and binge eating disorder. Methods: An intervention including psychoeducation, supportive resources, self-monitoring, and auxiliary referral will be pilot-tested with a group of patients in the summer of 2022 and detailed using a prospective cohort case study research design. The team will host patient focus groups in May 2022 to gather input informing the content of the intervention. The intervention will be pilot tested with newly-referred patients in June and July 2022. Patients who participate in the intervention will be asked to complete a survey evaluating the utility of the intervention and for suggestions, they may have for improvement. Preliminary findings describing the existing literature pertaining to waitlist interventions for patients with eating disorders, data gathered from the focus groups and early pilot testing results will be presented. Data analysis will continue throughout 2022 and early 2023 for follow-up publication and presentation in the summer of 2023. The aim of this study is to contribute to the body of knowledge pertaining to providing interim support to those patients waiting for treatment for eating disorders and, by extension, to improve outcomes for this population.

Keywords: eating disorders, waitlist management, intervention study, pilot test

Procedia PDF Downloads 79
1947 Development of an Instrument: The Contemporary Adolescent Well-Being Scale (CAWBS)

Authors: Camille Rault, Mark Bahr

Abstract:

The aim of the present study was to develop a contemporaneous instrument measuring adolescent’s subjective well-being (SWB). The instrument development underwent a three-phase pilot study. Phase one (N = 31) used a qualitative approach to generate domains of SWB relevant to adolescents. During the second phase (N = 22), items were tested targeting these domains. Finally, the third phase (N = 22) assisted in addition, deletion and refinement according to the first two phases of the pilot. A total of 49 items were retained for the final version of the instrument. The Contemporary Adolescent Well-Being Scale (CAWBS) was administered to 1071 school children (599 girls) aged between ten to 18 years old (M = 14,70; SD = 1.45) from Queensland, Australia. Results confirmed the seven-factor construct hypothesized and explained 45% of the variance. The questionnaire pertained to seven domains of adolescent’s SWB, namely; Overall life satisfaction; Bullying; Body image; Social connectedness; Activities; Control appraisal; and Negative feelings. Reliability was shown to be acceptable with Cronbach’s alpha ranging from .58 to .89. Future research should refine the CAWBS and investigate the psychometric properties of this instrument.

Keywords: adolescence, construct validity, instrument, subjective well-being

Procedia PDF Downloads 251
1946 Vulnerable Paths Assessment for Distributed Denial of Service Attacks in a Cloud Computing Environment

Authors: Manas Tripathi, Arunabha Mukhopadhyay

Abstract:

In Cloud computing environment, cloud servers, sometimes may crash after receiving huge amount of request and cloud services may stop which can create huge loss to users of that cloud services. This situation is called Denial of Service (DoS) attack. In Distributed Denial of Service (DDoS) attack, an attacker targets multiple network paths by compromising various vulnerable systems (zombies) and floods the victim with huge amount of request through these zombies. There are many solutions to mitigate this challenge but most of the methods allows the attack traffic to arrive at Cloud Service Provider (CSP) and then only takes actions against mitigation. Here in this paper we are rather focusing on preventive mechanism to deal with these attacks. We analyze network topology and find most vulnerable paths beforehand without waiting for the traffic to arrive at CSP. We have used Dijkstra's and Yen’s algorithm. Finally, risk assessment of these paths can be done by multiplying the probabilities of attack for these paths with the potential loss.

Keywords: cloud computing, DDoS, Dijkstra, Yen’s k-shortest path, network security

Procedia PDF Downloads 261
1945 Recovery of Rare Earths and Scandium from in situ Leaching Solutions

Authors: Maxim S. Botalov, Svetlana М. Titova, Denis V. Smyshlyaev, Grigory M. Bunkov, Evgeny V. Kirillov, Sergey V. Kirillov, Maxim A. Mashkovtsev, Vladimir N. Rychkov

Abstract:

In uranium production, in-situ leaching (ISL) with its relatively low cost has become an important technology. As the orebody containing uranium most often contains a considerable value of other metals, particularly rare earth metals it has rendered feasible to recover the REM from the barren ISL solutions, from which the major uranium content has been removed. Ural Federal University (UrFU, Ekaterinburg, Russia) have performed joint research on the development of industrial technologies for the extraction of REM and Scandium compounds from Uranium ISL solutions. Leaching experiments at UrFU have been supported with multicomponent solution model. The experimental work combines solvent extraction with advanced ion exchange methodology in a pilot facility capable of treating 500 kg/hr of solids. The pilot allows for the recovery of a 99% concentrate of scandium oxide and collective concentrate with over 50 % REM content, with further recovery of heavy and light REM concentrates (99%).

Keywords: extraction, ion exchange, rare earth elements, scandium

Procedia PDF Downloads 211
1944 Investigation on the Changes in the Chemical Composition and Ecological State of Soils Contaminated with Heavy Metals

Authors: Metodi Mladenov

Abstract:

Heavy metals contamination of soils is a big problem mainly as a result of industrial production. From this point of view, this is of interests the processes for decontamination of soils for crop of production with low content of heavy metals and suitable for consumption from the animals and the peoples. In the current article, there are presented data for established changes in chemical composition and ecological state on soils contaminated from non-ferrous metallurgy manufacturing, for seven years time period. There was done investigation on alteration of pH, conductivity and contain of the next elements: As, Cd, Cu, Cr, Ni, Pb, Zn, Co, Mn and Al. Also, there was done visual observations under the processes of recovery of root-inhabitable soil layer and reforestation. Obtained data show friendly changes for the investigated indicators pH and conductivity and decreasing of content of some form analyzed elements. Visual observations show augmentation of plant cover areas and change in species structure with increase of number of shrubby and wood specimens.

Keywords: conductivity, contamination of soils, chemical composition, inductively coupled plasma–optical emission spectrometry, heavy metals, visual observation

Procedia PDF Downloads 151
1943 Water Quality at a Ventilated Improved Pit Latrine Sludge Entrenchment Site

Authors: Babatunde Femi Bakare

Abstract:

Groundwater quality was evaluated at a site for three years after the site was used for entrenchment of Ventilated Improved Pit (VIP) latrine sludge. Analysis performed on the soil characteristics at the entrenchment site indicated that, the soils at the entrenchment site are predominantly sandy. Depth of the water table at the entrenchment site was found to be approximately five meters. Five monitoring boreholes were dug along the perimeter of the sludge trenches and water samples taken from these monitoring boreholes were analyzed for pH, conductivity, sodium ions, chloride ions, phosphate, nitrate, ammonia, and bacteriological analysis. The results obtained from the analysis conducted were compared with the South African Bureau of Standards for drinking water and it was found that the parameters analyzed falls below the specified range. The data obtained from this study indicate that, given the relatively high sludge loading rates, poor soil quality, and the duration of the groundwater quality monitoring, it is unlikely that contamination of groundwater at the entrenchment site will be a major concern. However, caution is advised in extrapolating these results to other locations.

Keywords: boreholes, contamination, entrenchment, groundwater quality, VIP latrines

Procedia PDF Downloads 390
1942 Radionuclides Transport Phenomena in Vadose Zone

Authors: R. Testoni, R. Levizzari, M. De Salve

Abstract:

Radioactive waste management is fundamental to safeguard population and environment by radiological risks. Environmental assessment of a site, where nuclear activities are located, allows understanding the hydro geological system and the radionuclides transport in groundwater and subsoil. Use of dedicated software is the basis of transport phenomena investigation and for dynamic scenarios prediction; this permits to understand the evolution of accidental contamination events, but at the same time the potentiality of the software itself can be verified. The aim of this paper is to perform a numerical analysis by means of HYDRUS 1D code, so as to evaluate radionuclides transport in a nuclear site in Piedmont region (Italy). In particular, the behaviour in vadose zone was investigated. An iterative assessment process was performed for risk assessment of radioactive contamination. The analysis therein developed considers the following aspects: i) hydro geological site characterization; ii) individuation of the main intrinsic and external site factors influencing water flow and radionuclides transport phenomena; iii) software potential for radionuclides leakage simulation purposes.

Keywords: HYDRUS 1D, radionuclides transport phenomena, site characterization, radiation protection

Procedia PDF Downloads 382
1941 Reburning Characteristics of Biomass Syngas in a Pilot Scale Heavy Oil Furnace

Authors: Sang Heon Han, Daejun Chang, Won Yang

Abstract:

NOx reduction characteristics of syngas fuel were numerically investigated for the 2MW pilot scale heavy oil furnace of KITECH (Korea Institute of Industrial Technology). The secondary fuel and syngas was fed into the furnace with two purposes- partial replacement of main fuel and reburning of NOx. Some portion of syngas was fed into the flame zone to partially replace the heavy oil, while the other portion was fed into the furnace downstream to reduce NOx generation. The numerical prediction was verified by comparing it with the experimental results. Syngas of KITECH’s experiment, assumed to be produced from biomass, had very low calorific value and contained 3% hydrocarbon. This study investigated the precise behavior of NOx generation and NOx reduction as well as thermo-fluidic characteristics inside the furnace, which was unavailable with experiment. In addition to 3% hydrocarbon syngas, 5%, and 7% hydrocarbon syngas were numerically tested as reburning fuels to analyze the effect of hydrocarbon proportion to NOx reduction. The prediction showed that the 3% hydrocarbon syngas is as much effective as 7% hydrocarbon syngas in reducing NOx.

Keywords: syngas, reburning, heavy oil, furnace

Procedia PDF Downloads 418
1940 Low-Cost Parking Lot Mapping and Localization for Home Zone Parking Pilot

Authors: Hongbo Zhang, Xinlu Tang, Jiangwei Li, Chi Yan

Abstract:

Home zone parking pilot (HPP) is a fast-growing segment in low-speed autonomous driving applications. It requires the car automatically cruise around a parking lot and park itself in a range of up to 100 meters inside a recurrent home/office parking lot, which requires precise parking lot mapping and localization solution. Although Lidar is ideal for SLAM, the car OEMs favor a low-cost fish-eye camera based visual SLAM approach. Recent approaches have employed segmentation models to extract semantic features and improve mapping accuracy, but these AI models are memory unfriendly and computationally expensive, making deploying on embedded ADAS systems difficult. To address this issue, we proposed a new method that utilizes object detection models to extract robust and accurate parking lot features. The proposed method could reduce computational costs while maintaining high accuracy. Once combined with vehicles’ wheel-pulse information, the system could construct maps and locate the vehicle in real-time. This article will discuss in detail (1) the fish-eye based Around View Monitoring (AVM) with transparent chassis images as the inputs, (2) an Object Detection (OD) based feature point extraction algorithm to generate point cloud, (3) a low computational parking lot mapping algorithm and (4) the real-time localization algorithm. At last, we will demonstrate the experiment results with an embedded ADAS system installed on a real car in the underground parking lot.

Keywords: ADAS, home zone parking pilot, object detection, visual SLAM

Procedia PDF Downloads 48
1939 A Method and System for Secure Authentication Using One Time QR Code

Authors: Divyans Mahansaria

Abstract:

User authentication is an important security measure for protecting confidential data and systems. However, the vulnerability while authenticating into a system has significantly increased. Thus, necessary mechanisms must be deployed during the process of authenticating a user to safeguard him/her from the vulnerable attacks. The proposed solution implements a novel authentication mechanism to counter various forms of security breach attacks including phishing, Trojan horse, replay, key logging, Asterisk logging, shoulder surfing, brute force search and others. QR code (Quick Response Code) is a type of matrix barcode or two-dimensional barcode that can be used for storing URLs, text, images and other information. In the proposed solution, during each new authentication request, a QR code is dynamically generated and presented to the user. A piece of generic information is mapped to plurality of elements and stored within the QR code. The mapping of generic information with plurality of elements, randomizes in each new login, and thus the QR code generated for each new authentication request is for one-time use only. In order to authenticate into the system, the user needs to decode the QR code using any QR code decoding software. The QR code decoding software needs to be installed on handheld mobile devices such as smartphones, personal digital assistant (PDA), etc. On decoding the QR code, the user will be presented a mapping between the generic piece of information and plurality of elements using which the user needs to derive cipher secret information corresponding to his/her actual password. Now, in place of the actual password, the user will use this cipher secret information to authenticate into the system. The authentication terminal will receive the cipher secret information and use a validation engine that will decipher the cipher secret information. If the entered secret information is correct, the user will be provided access to the system. Usability study has been carried out on the proposed solution, and the new authentication mechanism was found to be easy to learn and adapt. Mathematical analysis of the time taken to carry out brute force attack on the proposed solution has been carried out. The result of mathematical analysis showed that the solution is almost completely resistant to brute force attack. Today’s standard methods for authentication are subject to a wide variety of software, hardware, and human attacks. The proposed scheme can be very useful in controlling the various types of authentication related attacks especially in a networked computer environment where the use of username and password for authentication is common.

Keywords: authentication, QR code, cipher / decipher text, one time password, secret information

Procedia PDF Downloads 251
1938 Assessment of the State of Hygiene in a Tunisian Hospital Kitchen: Interest of Mycological and Parasitological Samples from Food Handlers and Environment

Authors: Bouchekoua Myriam, Aloui Dorsaf, Trabelsi Sonia

Abstract:

Introduction Food hygiene in hospitals is important, particularly among patients who could be more vulnerable than healthy subjects to microbiological and nutritional risks. The consumption of contaminated food may be responsible for foodborne diseases, which can be severe among hospitalized patients, especially those immunocompromised. The aim of our study was to assess the state of hygiene in the internal catering department of a Tunisian hospital. Methodology and major results: A prospective study was conducted for one year in the Parasitology-Mycology laboratory of Charles Nicolle Hospital. Samples were taken from the kitchen staff, worktops, and cooking utensils used in the internal catering department. Thirty one employees have benefited from stool exams and scotch tape in order to evaluate the degree of infestation of parasites. 35% of stool exams were positive. Protozoa were the only parasites detected. Blastocystis sp was the species mostly found in nine food handlers. Its role as a human pathogen is still controversial. Pathogenic protozoa were detected in two food handlers (Giardia intestinalis in one person and Dientamoeba fragilis in the other one. Non-pathogenic protozoa were found in two cases; among them, only one had digestive symptoms without a statistically significant association with the carriage of intestinal parasites. Moreover, samples were performed from the hands of the staff in order to search for a fungal carriage. Thus, 25 employees (81%) were colonized by fungi, including molds. Besides, mycological examination among food handlers with a suspected dermatomycosis for diagnostic confirmation concluded foot onychomycosis in 32% of cases and interdigital intertrigo in 26%. Only one person had hand onychomycosis. Among the 17 samples taken from worktops and kitchen utensils, fungal contamination was detected in 13 sites. Hot and cold equipment were the most contaminated. Molds were mainly identified as belonging to five different genera. Cladosporium sp was predominant. Conclusion: In the view of the importance of intestinal parasites among food handlers, the intensity of fungi hand carriage among these employees, and the high level of fungal contamination in worktops and kitchen utensils, a reinforcement of hygiene measures is more than essential in order to minimize the alimentary contamination-risk.

Keywords: hospital kitchen, environment, intestinal parasitosis, fungal carriage, fungal contamination

Procedia PDF Downloads 85
1937 Heavy Metal Contamination and Environmental Risk in Surface Sediments along the Coasts of Suez and Aqaba Gulfs, Egypt

Authors: Alaa M. Younis, Ismail S. Ismail, Lamiaa I. Mohamedein, Shimaa F. Ahmed

Abstract:

Sandy surface sediments collected from fourteen sites along the gulfs of Suez and Aqaba coasts, Egypt were analyzed for heavy metals including Iron, Manganese, Zinc, Chromium, Nickel, Lead, Copper and Cadmium in order to evaluate the pollution status and environmental risk assessment of the study area. The obtained results showed that the concentrations of investigated metals are represented in the following sequence; For Gulf of Aqaba sediments Fe > Mn > Zn > Pb > Cr > Ni > Cu > Cd. While for Gulf of Suez Sediments Fe > Mn > Pb > Zn > Cu > Cr > Ni > Cd. The degree of surface sediment contamination using Geo-accumulation index (I geo) and Metal Pollution Index (MPI) was computed. Higher MPI values were observed at the sites III (Nama Bay) and VIII (Rex Beach). According to Sediment quality guidelines (SQGs) approach, Pb and Cu in the gulf of Suez at station IX (Kabanon Beach) had probably adverse ecological effects to marine organisms.

Keywords: heavy metal, environmental risk, Suez gulf, Aqaba gulf

Procedia PDF Downloads 418
1936 Evaluation of the Contamination of Consumed Wheat and Its Derivatives by Ochratoxinogenic Fungi

Authors: Zebiri Saliha

Abstract:

Ochratoxin A (OTA) is a mycotoxin produced by certain species of the genera Aspergillus and Penicillium, primarily found in cereals, coffee, and grapevine products. Its accumulation in the body can lead to nephrotoxic, teratogenic, immunosuppressive, and carcinogenic effects. The objective of this study is to investigate the contamination of consumed wheat and its derivatives by toxic fungi in Algeria. For this purpose, an analysis of 200 samples was conducted, including 90 samples of durum wheat and common wheat and 110 samples of wheat derivatives collected from mills (semolina and flour manufacturers). The results revealed an average fungal contamination rate ranging from 60% to 100%. The identified fungal isolates primarily belonged to the genera Aspergillus (70%), Penicillium (27.5%), Alternaria (40%), and Mucor (19.4%). The density of the fungal flora was higher in products intended for animal consumption, such as durum wheat flour (2525 CFU/g), wheat scraps (3175 CFU/g), and wheat bran (2950 CFU/g). Conversely, low fungal density was observed in fine semolina (900 CFU/g) and flour (800 CFU/g) intended for human consumption. The genus Penicillium was isolated in 46% of the analyzed samples of durum wheat derivatives and in 62.7% of the analyzed samples of common wheat derivatives. The Aspergillus genus dominated the majority of the analyzed samples. Molecular identification of Aspergillus and Penicillium isolates by sequencing ITS1-5.8S-ITS2 regions of DNAr and a part of the calmodulin (CaM) gene indicated that the species involved in the production of OTA in wheat and its derivatives were mainly Aspergillus ochraceus, A. westerdijkia, A. alliaceus, A. carbonarius, and Penicillium islandicus. The amounts of OTA produced by these species were determined by HPLC-FLD and ranged between 0,8.9 and 3033μg/g. Given that food safety and quality are major concerns today, understanding the microbial biodiversity of wheat is crucial because it is a staple food in Algeria.

Keywords: wheat derivatives, Aspergillus, microbial biodiversity, OTA

Procedia PDF Downloads 29
1935 Piracy in Southeast Asian Waters: Problems, Legal Measures and Way Forward

Authors: Ahmad Almaududy Amri

Abstract:

Southeast Asia is considered as an area which is important in terms of piratical studies. There are several reasons to this argument: firstly, it has the second highest figure of piracy attacks in the world from 2008 to 2012. Only the African Region transcends the number of piracies that were committed in Southeast Asia. Secondly, the geographical location of the region is very important to world trade. There are several sea lanes and straits which are normally used for international navigation mainly for trade purposes. In fact, there are six out of 25 busiest ports all over the world located in Southeast Asia. In ancient times, the main drivers of piracy were raiding for plunder and capture of slaves; however, in modern times, developments in politics, economics and even military technology have drastically altered the universal crime of piracy. There are a variety of motives behind modern day piracy including economic gains from receiving ransoms from government or ship companies, political and even terrorist reasons. However, it cannot be denied that piratical attacks persist and continue. States have taken measures both at the international and regional level in order to eradicate piratical attacks. The United Nations Convention on the Law of the Sea and the Convention on the Suppression of Unlawful Act against the Safety of Navigation served as the two main international legal frameworks in combating piracy. At the regional level, Regional Cooperation Agreement against Piracy and Armed Robbery and ASEAN measures are regard as prominent in addressing the piracy problem. This paper will elaborate the problems of piracy in Southeast Asia and examine the adequacy of legal frameworks at both the international and regional levels in order address the current legal measures in combating piracy. Furthermore, it will discuss current challenges in the implementation of anti-piracy measures at the international and regional levels as well as the way forward in addressing the issue.

Keywords: piracy, Southeast Asia, maritime security, legal frameworks

Procedia PDF Downloads 480
1934 Pilot Study of the Psychometric Properties of the Test of Predisposition towards the Bullying

Authors: Rosana Choy, Fabiola Henostroza

Abstract:

Actual theory suggests social-ecological factors as the main framework of bullying. Most previous research in this phenomenon is focused on the identification of bullying attitudes and conducts in puberty and adolescence periods. For this reason, this study is considered as a contribution to the existing knowledge in measuring matters, because of its non-traditional way of evaluation (graphic items), and because of its approach to a distinctive age group, children from 7 to 9 years-old, not regularly examined in current studies in this field. The research used a transversal descriptive investigation design for the development of a graphic test for bullying predisposition. The process began with the operationalization of the variable bullying predisposition, the structuring of the factors and variable indicators of a pilot instrument, evaluation by experts of the items representation, and finally it continued with the test application to children of two types of regular school population in Lima-Peru: private and public schools. The reliability level was 0.85 and the validity of the test corroborated the three-factor structure proposed by the researchers.

Keywords: bullying, graphic test, reliability, validity

Procedia PDF Downloads 251
1933 AI-Based Information System for Hygiene and Safety Management of Shared Kitchens

Authors: Jongtae Rhee, Sangkwon Han, Seungbin Ji, Junhyeong Park, Byeonghun Kim, Taekyung Kim, Byeonghyeon Jeon, Jiwoo Yang

Abstract:

The shared kitchen is a concept that transfers the value of the sharing economy to the kitchen. It is a type of kitchen equipped with cooking facilities that allows multiple companies or chefs to share time and space and use it jointly. These shared kitchens provide economic benefits and convenience, such as reduced investment costs and rent, but also increase the risk of safety management, such as cross-contamination of food ingredients. Therefore, to manage the safety of food ingredients and finished products in a shared kitchen where several entities jointly use the kitchen and handle various types of food ingredients, it is critical to manage followings: the freshness of food ingredients, user hygiene and safety and cross-contamination of cooking equipment and facilities. In this study, it propose a machine learning-based system for hygiene safety and cross-contamination management, which are highly difficult to manage. User clothing management and user access management, which are most relevant to the hygiene and safety of shared kitchens, are solved through machine learning-based methodology, and cutting board usage management, which is most relevant to cross-contamination management, is implemented as an integrated safety management system based on artificial intelligence. First, to prevent cross-contamination of food ingredients, we use images collected through a real-time camera to determine whether the food ingredients match a given cutting board based on a real-time object detection model, YOLO v7. To manage the hygiene of user clothing, we use a camera-based facial recognition model to recognize the user, and real-time object detection model to determine whether a sanitary hat and mask are worn. In addition, to manage access for users qualified to enter the shared kitchen, we utilize machine learning based signature recognition module. By comparing the pairwise distance between the contract signature and the signature at the time of entrance to the shared kitchen, access permission is determined through a pre-trained signature verification model. These machine learning-based safety management tasks are integrated into a single information system, and each result is managed in an integrated database. Through this, users are warned of safety dangers through the tablet PC installed in the shared kitchen, and managers can track the cause of the sanitary and safety accidents. As a result of system integration analysis, real-time safety management services can be continuously provided by artificial intelligence, and machine learning-based methodologies are used for integrated safety management of shared kitchens that allows dynamic contracts among various users. By solving this problem, we were able to secure the feasibility and safety of the shared kitchen business.

Keywords: artificial intelligence, food safety, information system, safety management, shared kitchen

Procedia PDF Downloads 46