Search results for: nitrate attack
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 974

Search results for: nitrate attack

614 Preparation and Characterization of Lanthanum Aluminate Electrolyte Material for Solid Oxide Fuel Cell

Authors: Onkar Nath Verma, Nitish Kumar Singh, Raghvendra, Pravin Kumar, Prabhakar Singh

Abstract:

The perovskite type electrolyte material LaAlO3 was prepared by solution based auto-combustion method using Al (NO3)3.6H2O, La2O3 with dilute nitrate acid (HNO3) as precursors and citric acid (C6H8O7.H2O) as a fuel. The synthesis protocol gave an easy processing of the LaAlO3 nano-particles. The XRD measurement revealed that the material has single phase with space group R-3c (rhombohedral). Thermal behavior was measured by simultaneous differential thermal analysis and thermo gravimetric analysis (DTA-TGA). The compact pellet density was determined. Also, the surface morphology was studied using scanning electron microscopy (SEM). The conductivity of LaAlO3 was measured employing LCR meter and found to increase with increasing temperature. This increase in conductivity may be attributed to increased mobility of oxide ion.

Keywords: perovskite, LaAlO3, XRD, SEM, DTA-TGA, SOFC

Procedia PDF Downloads 478
613 Evaluation of Water Quality for the Kurtbogazi Dam Outlet and the Streams Feeding the Dam (Ankara, Turkey)

Authors: Gulsen Tozsin, Fatma Bakir, Cemil Acar, Ercument Koc

Abstract:

Kurtbogazi Dam has gained special meaning for Ankara, Turkey for the last decade due to the rapid depletion of nearby resources of drinking water. In this study, the results of the analyses of Kurtbogazi Dam outlet water and the rivers flowing into the Kurtbogazi Dam were discussed for the period of last five years between 2008 and 2012. The quality of these surface water resources were evaluated in terms of pH, temperature, biochemical oxygen demand (BOD5), nitrate, phosphate and chlorine. They were classified according to the Council Directive (75/440/EEC). Moreover, the properties of these surface waters were assessed to determine the quality of water for drinking and irrigation purposes using Piper, US Salinity Laboratory and Wilcox diagrams. The results revealed that the quality of all the investigated water sources are generally at satisfactory level as surface water except for Pazar Stream in terms of ortho-phosphate and BOD5 concentration for 2008.

Keywords: Kurtbogazi dam, water quality assessment, Ankara water, water supply

Procedia PDF Downloads 351
612 A Saturation Attack Simulation on a Navy Warship Based on Discrete-Event Simulation Models

Authors: Yawei Liang

Abstract:

Threat from cruise missiles is among the most dangerous considerations to a warship in the modern era: anti-ship cruise missiles are fast, accurate, and extremely destructive. In this paper, the goal was to use an object-orientated environment to program a simulation to model a scenario in which a lone frigate is attacked by a wave of missiles fired at given intervals. The parameters of the simulation are modified to examine the relationships between different variables in the situation, and an analysis is performed on various aspects of the defending ship’s equipment. Finally, the results are presented, along with a brief discussion.

Keywords: discrete event simulation, Monte Carlo simulation, naval resource management, weapon-target allocation/assignment

Procedia PDF Downloads 68
611 Mechanical, Thermal and Biodegradable Properties of Bioplast-Spruce Green Wood Polymer Composites

Authors: A. Atli, K. Candelier, J. Alteyrac

Abstract:

Environmental and sustainability concerns push the industries to manufacture alternative materials having less environmental impact. The Wood Plastic Composites (WPCs) produced by blending the biopolymers and natural fillers permit not only to tailor the desired properties of materials but also are the solution to meet the environmental and sustainability requirements. This work presents the elaboration and characterization of the fully green WPCs prepared by blending a biopolymer, BIOPLAST® GS 2189 and spruce sawdust used as filler with different amounts. Since both components are bio-based, the resulting material is entirely environmentally friendly. The mechanical, thermal, structural properties of these WPCs were characterized by different analytical methods like tensile, flexural and impact tests, Thermogravimetric Analysis (TGA), Differential Scanning Calorimetry (DSC) and X-ray Diffraction (XRD). Their water absorption properties and resistance to the termite and fungal attacks were determined in relation with different wood filler content. The tensile and flexural moduli of WPCs increased with increasing amount of wood fillers into the biopolymer, but WPCs became more brittle compared to the neat polymer. Incorporation of spruce sawdust modified the thermal properties of polymer: The degradation, cold crystallization, and melting temperatures shifted to higher temperatures when spruce sawdust was added into polymer. The termite, fungal and water absorption resistance of WPCs decreased with increasing wood amount in WPCs, but remained in durability class 1 (durable) concerning fungal resistance and quoted 1 (attempted attack) in visual rating regarding to the termites resistance except that the WPC with the highest wood content (30 wt%) rated 2 (slight attack) indicating a long term durability. All the results showed the possibility to elaborate the easy injectable composite materials with adjustable properties by incorporation of BIOPLAST® GS 2189 and spruce sawdust. Therefore, lightweight WPCs allow both to recycle wood industry byproducts and to produce a full ecologic material.

Keywords: biodegradability, color measurements, durability, mechanical properties, melt flow index, MFI, structural properties, thermal properties, wood-plastic composites, WPCs

Procedia PDF Downloads 119
610 Thermal Energy Storage Based on Molten Salts Containing Nano-Particles: Dispersion Stability and Thermal Conductivity Using Multi-Scale Computational Modelling

Authors: Bashar Mahmoud, Lee Mortimer, Michael Fairweather

Abstract:

New methods have recently been introduced to improve the thermal property values of molten nitrate salts (a binary mixture of NaNO3:KNO3in 60:40 wt. %), by doping them with minute concentration of nanoparticles in the range of 0.5 to 1.5 wt. % to form the so-called: Nano-heat-transfer-fluid, apt for thermal energy transfer and storage applications. The present study aims to assess the stability of these nanofluids using the advanced computational modelling technique, Lagrangian particle tracking. A multi-phase solid-liquid model is used, where the motion of embedded nanoparticles in the suspended fluid is treated by an Euler-Lagrange hybrid scheme with fixed time stepping. This technique enables measurements of various multi-scale forces whose characteristic (length and timescales) are quite different. Two systems are considered, both consisting of 50 nm Al2O3 ceramic nanoparticles suspended in fluids of different density ratios. This includes both water (5 to 95 °C) and molten nitrate salt (220 to 500 °C) at various volume fractions ranging between 1% to 5%. Dynamic properties of both phases are coupled to the ambient temperature of the fluid suspension. The three-dimensional computational region consists of a 1μm cube and particles are homogeneously distributed across the domain. Periodic boundary conditions are enforced. The particle equations of motion are integrated using the fourth order Runge-Kutta algorithm with a very small time-step, Δts, set at 10-11 s. The implemented technique demonstrates the key dynamics of aggregated nanoparticles and this involves: Brownian motion, soft-sphere particle-particle collisions, and Derjaguin, Landau, Vervey, and Overbeek (DLVO) forces. These mechanisms are responsible for the predictive model of aggregation of nano-suspensions. An energy transport-based method of predicting the thermal conductivity of the nanofluids is also used to determine thermal properties of the suspension. The simulation results confirms the effectiveness of the technique. The values are in excellent agreement with the theoretical and experimental data obtained from similar studies. The predictions indicates the role of Brownian motion and DLVO force (represented by both the repulsive electric double layer and an attractive Van der Waals) and its influence in the level of nanoparticles agglomeration. As to the nano-aggregates formed that was found to play a key role in governing the thermal behavior of nanofluids at various particle concentration. The presentation will include a quantitative assessment of these forces and mechanisms, which would lead to conclusions about nanofluids, heat transfer performance and thermal characteristics and its potential application in solar thermal energy plants.

Keywords: thermal energy storage, molten salt, nano-fluids, multi-scale computational modelling

Procedia PDF Downloads 170
609 Network Security Attacks and Defences

Authors: Ranbir Singh, Deepinder Kaur

Abstract:

Network security is an important aspect in every field like government offices, Educational Institute and any business organization. Network security consists of the policies adopted to prevent and monitor forbidden access, misuse, modification, or denial of a computer network. Network security is very complicated subject and deal by only well trained and experienced people. However, as more and more people become wired, an increasing number of people need to understand the basics of security in a networked world. The history of the network security included an introduction to the TCP/IP and interworking. Network security starts with authenticating, commonly with a username and a password. In this paper, we study about various types of attacks on network security and how to handle or prevent this attack.

Keywords: network security, attacks, denial, authenticating

Procedia PDF Downloads 376
608 Investigation Of The Catalyst's Effect On Nickel Sulfide Thin Films

Authors: Randa Slatnia

Abstract:

In this study, the nanostructured stable phase identification elaborated by nickel nitrate hyxahydrate and thiourea compounds. After the preparation of the solution (Stirred mixture with methanol as solvent), a deposition of eight layers of this solution on a glass substrate and annealed at 300 °C for energy applications. The annealed sample was analyzed by X-ray Grazing incidence diffraction (GID) with a Bruker D8 Advance diffractometer using Cu Kα1 radiation at 40 kV and 40 mA (1600 W) and Scanning electron microscopy (Thermo Fisher environmental SEM). The results of XRD-GID analysis for the prepared sample showed the formation of an identified stable phase NiS2 and the XRD-GID pattern of the elaborated sample with eight layers prepared solution and annealed show wide and characteristic peaks of the NiS2 with cubic structure (ICDD card no. PDF 01-078-4702). The morphology of the NiS2 thin films confirmed by XRD-GID analysis was investigated by ESEM showed a surface with a uniform and homogeneous distribution nanostructure.

Keywords: nickel sulfide, thin films, XRD, ESEM

Procedia PDF Downloads 62
607 Application of Chinese Remainder Theorem to Find The Messages Sent in Broadcast

Authors: Ayubi Wirara, Ardya Suryadinata

Abstract:

Improper application of the RSA algorithm scheme can cause vulnerability to attacks. The attack utilizes the relationship between broadcast messages sent to the user with some fixed polynomial functions that belong to each user. Scheme attacks carried out by applying the Chinese Remainder Theorem to obtain a general polynomial equation with the same modulus. The formation of the general polynomial becomes a first step to get back the original message. Furthermore, to solve these equations can use Coppersmith's theorem.

Keywords: RSA algorithm, broadcast message, Chinese Remainder Theorem, Coppersmith’s theorem

Procedia PDF Downloads 321
606 Antimicrobial Activity of Biosynthesized Silver Nanoparticles with Handroanthus Chrysanthus Flower Extract

Authors: Eduardo Padilla, Luis Daniel Rodriguez, Ivan Sanchez, Angelica Sofia Go

Abstract:

The synthesis and application of metallic nanoparticles have increased in recent years. Biological methods go beyond the chemical and physical synthesis that is expensive and not friendly to the environment. Therefore, in this study, silver nanoparticles were synthesized biologically in an environmentally friendly way by Handroanthus chrysanthus flower aqueous extract (AgNPs) that contains phytochemicals capable of reducing silver nitrate. AgNPs were characterized visually by UV-visible spectroscopy and TEM. The antimicrobial activity of the AgNPs was tested by determining the minimum inhibitory concentration (MIC), and minimal bactericidal concentration (MBC) in Escherichia coli and Staphylococcus aureus strains AgNPs showed potent antimicrobial activity against gram-negative and gram-positive bacteria. MIC and MBC values were as low as 41.6, and 83.2 ug/mL using AgNPs biosynthesized by H. chrysanthus flower extract. This nanoparticle could be the basis for the formulation of disinfectants for use in the food and pharmaceutical industry.

Keywords: antimicrobial, silver nanoparticles, flower extract, Handroanthus

Procedia PDF Downloads 75
605 A CM-Based Model for 802.11 Networks Security Policies Enforcement

Authors: Karl Mabiala Dondia, Jing Ma

Abstract:

In recent years, networks based on the 802.11 standards have gained a prolific deployment. The reason for this massive acceptance of the technology by both home users and corporations is assuredly due to the "plug-and-play" nature of the technology and the mobility. The lack of physical containment due to inherent nature of the wireless medium makes maintenance very challenging from a security standpoint. This study examines via continuous monitoring various predictable threats that 802.11 networks can face, how they are executed, where each attack may be executed and how to effectively defend against them. The key goal is to identify the key components of an effective wireless security policy.

Keywords: wireless LAN, IEEE 802.11 standards, continuous monitoring, security policy

Procedia PDF Downloads 353
604 Starting Torque Study of Darrieus Wind Turbine

Authors: M. Douak, Z. Aouachria

Abstract:

The aim of our study is to project an optimized wind turbine of Darrieus type. This type of wind turbine is characterized by a low starting torque in comparison with the Savonius rotor allowing them to operate for a period greater than wind speed. This led us to reconsider the Darrieus rotor to optimize a design which will increase its starting torque. The study of a system of monitoring and control of the angle of attack of blade profile, which allows an auto start to wind speeds as low as possible is presented for the straight blade of Darrieus turbine. The study continues to extend to other configurations namely those of parabolic type.

Keywords: Darrieus turbine, pitch angle, self stating, wind energy

Procedia PDF Downloads 327
603 The Existence of Beauveria bassiana in the Third Generation of Corn Seedling

Authors: Itji Diana Daud, Nuniek Widiayani

Abstract:

The fungus Beauveria bassiana can be endophytic in maize. The fungus was recovered in culture from stems, leaves and roots after a month planting. This phenomenon was shown until the third generation of the corn. The result from laboratory shows that B. bassiana appear in F1, F2 and F3 in order 70, 80 and 90% in the roots, 80% in the stems in all generation, 90, 80 and 70% in leaves. In CFU’s ml-1 of B. bassiana in corn seed, show F1 was 8.9 x 106, F2 was 8.1 x 106 and F3 was 7.8 x 106. The research showed that B. Bassiana as endophyte still remain to the third generation. Innovation to the corn seed which is endophyte seed is essential to protect from the attack of corn borer and to avoid the usage of insecticide.

Keywords: endophytic, recovered, third generation, Beauveria bassiana

Procedia PDF Downloads 256
602 Is the Addition of Computed Tomography with Angiography Superior to a Non-Contrast Neuroimaging Only Strategy for Patients with Suspected Stroke or Transient Ischemic Attack Presenting to the Emergency Department?

Authors: Alisha M. Ebrahim, Bijoy K. Menon, Eddy Lang, Shelagh B. Coutts, Katie Lin

Abstract:

Introduction: Frontline emergency physicians require clear and evidence-based approaches to guide neuroimaging investigations for patients presenting with suspected acute stroke or transient ischemic attack (TIA). Various forms of computed tomography (CT) are currently available for initial investigation, including non-contrast CT (NCCT), CT angiography head and neck (CTA), and CT perfusion (CTP). However, there is uncertainty around optimal imaging choice for cost-effectiveness, particularly for minor or resolved neurological symptoms. In addition to the cost of CTA and CTP testing, there is also a concern for increased incidental findings, which may contribute to the burden of overdiagnosis. Methods: In this cross-sectional observational study, analysis was conducted on 586 anonymized triage and diagnostic imaging (DI) reports for neuroimaging orders completed on patients presenting to adult emergency departments (EDs) with a suspected stroke or TIA from January-December 2019. The primary outcome of interest is the diagnostic yield of NCCT+CTA compared to NCCT alone for patients presenting to urban academic EDs with Canadian Emergency Department Information System (CEDIS) complaints of “symptoms of stroke” (specifically acute stroke and TIA indications). DI reports were coded into 4 pre-specified categories (endorsed by a panel of stroke experts): no abnormalities, clinically significant findings (requiring immediate or follow-up clinical action), incidental findings (not meeting prespecified criteria for clinical significance), and both significant and incidental findings. Standard descriptive statistics were performed. A two-sided p-value <0.05 was considered significant. Results: 75% of patients received NCCT+CTA imaging, 21% received NCCT alone, and 4% received NCCT+CTA+CTP. The diagnostic yield of NCCT+CTA imaging for prespecified clinically significant findings was 24%, compared to only 9% in those who received NCCT alone. The proportion of incidental findings was 30% in the NCCT only group and 32% in the NCCT+CTA group. CTP did not significantly increase the yield of significant or incidental findings. Conclusion: In this cohort of patients presenting with suspected stroke or TIA, an NCCT+CTA neuroimaging strategy had a higher diagnostic yield for clinically significant findings than NCCT alone without significantly increasing the number of incidental findings identified.

Keywords: stroke, diagnostic yield, neuroimaging, emergency department, CT

Procedia PDF Downloads 79
601 Secure Watermarking not at the Cost of Low Robustness

Authors: Jian Cao

Abstract:

This paper describes a novel watermarking technique which we call the random direction embedding (RDE) watermarking. Unlike traditional watermarking techniques, the watermark energy after the RDE embedding does not focus on a fixed direction, leading to the security against the traditional unauthorized watermark removal attack. In addition, the experimental results show that when compared with the existing secure watermarking, namely natural watermarking (NW), the RDE watermarking gains significant improvement in terms of robustness. In fact, the security of the RDE watermarking is not at the cost of low robustness, and it can even achieve more robust than the traditional spread spectrum watermarking, which has been shown to be very insecure.

Keywords: robustness, spread spectrum watermarking, watermarking security, random direction embedding (RDE)

Procedia PDF Downloads 365
600 The Use of Secondary Crystallization in Cement-Based Composites

Authors: Nikol Žižková, Šárka Keprdová, Rostislav Drochytka

Abstract:

The paper focuses on the study of the properties of cement-based composites produced using secondary crystallization (crystalline additive). In this study, cement mortar made with secondary crystallization was exposed to an aggressive environment and the influence of secondary crystallization on the degradation of the cementitious composite was investigated. The results indicate that the crystalline additive contributed to increasing the resistance of the cement-based composite to the attack of the selected environments (sodium sulphate solution and ammonium chloride solution).

Keywords: secondary crystallization, cement-based composites, durability, degradation of the cementitious composite

Procedia PDF Downloads 378
599 Characterization of Volatiles Botrytis cinerea in Blueberry Using Solid Phase Micro Extraction, Gas Chromatography Mass Spectrometry

Authors: Ahmed Auda, Manjree Agarwala, Giles Hardya, Yonglin Rena

Abstract:

Botrytis cinerea is a major pest for many plants. It can attack a wide range of plant parts. It can attack buds, flowers, and leaves, stems, and fruit. However, B. cinerea can be mixed with other diseases that cause the same damage. There are many species of botrytis and more than one different strains of each. Botrytis might infect the foliage of nursery stock stored through winter in damp conditions. There are no known resistant plants. Botrytis must have nutrients or food source before it infests the plant. Nutrients leaking from wounded plant parts or dying tissue like old flower petals give the required nutrients. From this food, the fungus becomes more attackers and invades healthy tissue. Dark to light brown rot forms in the ill tissue. High humidity conditions support the growth of this fungus. However, we suppose that selection pressure can act on the morphological and neurophysiologic filter properties of the receiver and on both the biochemical and the physiological regulation of the signal. Communication is implied when signal and receiver evolves toward more and more specific matching, culminating. In other hand, receivers respond to portions of a body odor bouquet which is released to the environment not as an (intentional) signal but as an unavoidable consequence of metabolic activity or tissue damage. Each year Botrytis species can cause considerable economic losses to plant crops. Even with the application of strict quarantine and control measures, these fungi can still find their way into crops and cause the imposition of onerous restrictions on exports. Blueberry fruit mould caused by a fungal infection usually results in major losses during post-harvest storage. Therefore, the management of infection in early stages of disease development is necessary to minimize losses. The overall purpose of this study will develop sensitive, cheap, quick and robust diagnostic techniques for the detection of B. cinerea in blueberry. The specific aim was designed to investigate the performance of volatile organic compounds (VOCs) in the detection and discrimination of blueberry fruits infected by fungal pathogens with an emphasis on Botrytis in the early storage stage of post-harvest.

Keywords: botrytis cinerea, blueberry, GC/MS, VOCs

Procedia PDF Downloads 219
598 Parallel Hybrid Honeypot and IDS Architecture to Detect Network Attacks

Authors: Hafiz Gulfam Ahmad, Chuangdong Li, Zeeshan Ahmad

Abstract:

In this paper, we proposed a parallel IDS and honeypot based approach to detect and analyze the unknown and known attack taxonomy for improving the IDS performance and protecting the network from intruders. The main theme of our approach is to record and analyze the intruder activities by using both the low and high interaction honeypots. Our architecture aims to achieve the required goals by combing signature based IDS, honeypots and generate the new signatures. The paper describes the basic component, design and implementation of this approach and also demonstrates the effectiveness of this approach reducing the probability of network attacks.

Keywords: network security, intrusion detection, honeypot, snort, nmap

Procedia PDF Downloads 532
597 Automatic Intelligent Analysis of Malware Behaviour

Authors: Hermann Dornhackl, Konstantin Kadletz, Robert Luh, Paul Tavolato

Abstract:

In this paper we describe the use of formal methods to model malware behaviour. The modelling of harmful behaviour rests upon syntactic structures that represent malicious procedures inside malware. The malicious activities are modelled by a formal grammar, where API calls’ components are the terminals and the set of API calls used in combination to achieve a goal are designated non-terminals. The combination of different non-terminals in various ways and tiers make up the attack vectors that are used by harmful software. Based on these syntactic structures a parser can be generated which takes execution traces as input for pattern recognition.

Keywords: malware behaviour, modelling, parsing, search, pattern matching

Procedia PDF Downloads 310
596 An Attempt on Antimicrobial Studies of Lanthanide Schiff Base Complexes

Authors: Lekha Logu

Abstract:

The coordination behavior of the newly synthesized Schiff base ligands, 4-bromo-2-((p-tolyl imino) methyl) phenol obtained by condensing para-toluidine with 5-bromo salicylaldehyde and N-(3,4-dichloro benzylidene)-4-methylbenzenamine obtained by condensing Para-toluidine with 3,4-dichloro benzaldehyde in ethanolic medium has been explored in this current study. The synthesized Schiff’s base ligands were complexed with lanthanide nitrate salts yielding [LnL(NO3)2(H2O)2]NO3, (Ln=Pr, Sm). Elemental analysis, conductance measurement, and spectral techniques like Nuclear Magnetic Resonance (NMR), Ultraviolet-visible (UV-Vis) and Fourier Transform Infrared (FTIR) have been used to characterize Schiff’s base ligands and their lanthanide metal complexes. An attempt has been made on these complexes for their antimicrobial activity against the gram-positive and gram-negative bacterial species like Escherichia coli, Staphylococcus aureus, Bacillus subtilis, Klebsiella pneumonia and fungal species like Canadida and Aspergillus.

Keywords: lanthanide complexes, Schiff's base, antimicrobial assay, synthesis, characterization

Procedia PDF Downloads 47
595 Design a Network for Implementation a Hospital Information System

Authors: Abdulqader Rasool Feqi Mohammed, Ergun Erçelebi̇

Abstract:

A large number of hospitals from developed countries are adopting hospital information system to bring efficiency in hospital information system. The purpose of this project is to research on new network security techniques in order to enhance the current network security structure of save a hospital information system (HIS). This is very important because, it will avoid the system from suffering any attack. Security architecture was optimized but there are need to keep researching on best means to protect the network from future attacks. In this final project research, security techniques were uncovered to produce best network security results when implemented in an integrated framework.

Keywords: hospital information system, HIS, network security techniques, internet protocol, IP, network

Procedia PDF Downloads 404
594 Isolation of Vibrio harveyi and Vibrio alginolyticus Strains from Cultured Seabass (Dicentrarchus labrax L.) and Seabream (Sparus auratus L.) in Egypt

Authors: M. Khallaf, R. Khalil, H. Ghetas

Abstract:

In the present study, V. harveyi and V. alginolyticus were isolated from cultured seabass and seabream at Damietta Governorate, Egypt, during summer season. Isolates were biochemically and molecularly identified using primers for Vhh and Collagenase genes. The most prominent clinical observations of diseased fish were exophthalmia, abdominal distension, and multifocal cutaneous hemorrhagic ulceration on the dorsal musculature and caudal peduncle. Physicochemical characteristics of water samples indicated that the unionized ammonia, nitrate, and hydrogen sulphate concentrations were higher than the acceptable limits. Heavy metals concentrations in water samples exhibited higher concentrations than the permissible levels for fish culture, which was considered as chemical stressors that increase the prevalence of these bacterial diseases. Immune parameters were lower in diseased seabass and seabream than apparently healthy fish. Lesions of different fish organs were identified histopathologically.

Keywords: seabass, seabream, Vibrio alginolyticus, Vibrio harveyi

Procedia PDF Downloads 98
593 Surface Water Quality in Orchard Area, Amphawa District, Samut Songkram Province, Thailand

Authors: Sisuwan Kaseamsawat, Sivapan Choo-In

Abstract:

This study aimed to evaluated the surface water quality for agriculture and consumption in the district. Surface water quality parameters in this study in cluding water temperature, turbidity, conductivity. salinity, pH, dissolved oxygen, BOD, nitrate, Suspended solids, phosphorus. Total dissolve solids, iron, copper, zinc, manganese, lead and cadmium. Water samples were collected from small excavation, Lychee, Pomelo, and Coconut orchard for 3 season during January to December 2011. The surface water quality from small excavation, Lychee, pomelo, and coconut orchard are meet the type III of surface water quality standard issued by the National Environmental Quality Act B. E. 1992. except the concentration of heavy metal. And did not differ significantly at 0.05 level, except dissolved oxygen. The water is suitable for consumption by the usual sterile and generally improving water quality through the process before. And is suitable for agriculture.

Keywords: water quality, surface water quality, Thailand, water

Procedia PDF Downloads 334
592 A Method and System for Secure Authentication Using One Time QR Code

Authors: Divyans Mahansaria

Abstract:

User authentication is an important security measure for protecting confidential data and systems. However, the vulnerability while authenticating into a system has significantly increased. Thus, necessary mechanisms must be deployed during the process of authenticating a user to safeguard him/her from the vulnerable attacks. The proposed solution implements a novel authentication mechanism to counter various forms of security breach attacks including phishing, Trojan horse, replay, key logging, Asterisk logging, shoulder surfing, brute force search and others. QR code (Quick Response Code) is a type of matrix barcode or two-dimensional barcode that can be used for storing URLs, text, images and other information. In the proposed solution, during each new authentication request, a QR code is dynamically generated and presented to the user. A piece of generic information is mapped to plurality of elements and stored within the QR code. The mapping of generic information with plurality of elements, randomizes in each new login, and thus the QR code generated for each new authentication request is for one-time use only. In order to authenticate into the system, the user needs to decode the QR code using any QR code decoding software. The QR code decoding software needs to be installed on handheld mobile devices such as smartphones, personal digital assistant (PDA), etc. On decoding the QR code, the user will be presented a mapping between the generic piece of information and plurality of elements using which the user needs to derive cipher secret information corresponding to his/her actual password. Now, in place of the actual password, the user will use this cipher secret information to authenticate into the system. The authentication terminal will receive the cipher secret information and use a validation engine that will decipher the cipher secret information. If the entered secret information is correct, the user will be provided access to the system. Usability study has been carried out on the proposed solution, and the new authentication mechanism was found to be easy to learn and adapt. Mathematical analysis of the time taken to carry out brute force attack on the proposed solution has been carried out. The result of mathematical analysis showed that the solution is almost completely resistant to brute force attack. Today’s standard methods for authentication are subject to a wide variety of software, hardware, and human attacks. The proposed scheme can be very useful in controlling the various types of authentication related attacks especially in a networked computer environment where the use of username and password for authentication is common.

Keywords: authentication, QR code, cipher / decipher text, one time password, secret information

Procedia PDF Downloads 248
591 Study on Constitutive Model of Particle Filling Material Considering Volume Expansion

Authors: Xu Jinsheng, Tong Xin, Zheng Jian, Zhou Changsheng

Abstract:

The NEPE (nitrate ester plasticized polyether) propellant is a kind of particle filling material with relatively high filling fraction. The experimental results show that the microcracks, microvoids and dewetting can cause the stress softening of the material. In this paper, a series of mechanical testing in inclusion with CCD technique were conducted to analyze the evolution of internal defects of propellant. The volume expansion function of the particle filling material was established by measuring of longitudinal and transverse strain with optical deformation measurement system. By analyzing the defects and internal damages of the material, a visco-hyperelastic constitutive model based on free energy theory was proposed incorporating damage function. The proposed constitutive model could accurately predict the mechanical properties of uniaxial tensile tests and tensile-relaxation tests.

Keywords: dewetting, constitutive model, uniaxial tensile tests, visco-hyperelastic, nonlinear

Procedia PDF Downloads 269
590 Reducing Metabolism Residues in Maintenance Goldfish (Carrasius auratus auratus) by Phytoremediation Plant

Authors: Anna Nurkhasanah, Hamzah Muhammad Ihsan, Nurul Wulandari

Abstract:

Water quality affects the body condition of aquatic organisms. One of the methods to manage water quality, usually called phytoremediation, involves using aquatic plants. The purpose of this study is to find out the best aquatic plants to reducing metabolism residues from aquatic organism. 5 aquariums (40x30x30 cm) containing 100 grams from each 4 different plants such as water hyacinth (Eichhornia crassipes), salvinia (Salvinia molesta), cabomba (Cabomba caroliniana), and hydrilla (Hydrilla verticillata), thirteen goldfis (Carrasius auratus auratus) are maintained. The maintenance is conducted through a week and water quality measurements are performed three times. The results show that pH value tends to range between 7,22-8,72. The temperature varies between 25-26 °C. DO values varies between 5,2-10,5 mg/L. Amoniac value is between 0,005–5,2 mg/L. Nitrite value is between 0,005 mg/L-2,356 mg/L. Nitrate value is between 0,791 mg/L-1,737 mg/L. CO2 value is between 2,2 mg/L-6,1 mg/L. The result of survival rate of goldfish for all treatments is 100%. Based on this study, the best aquatic plant to reduce metabolism residues is hydrilla.

Keywords: phytoremediation, goldfish, aquatic plants, water quality

Procedia PDF Downloads 499
589 Pioneer Synthesis and Characterization of Boron Containing Hard Materials

Authors: Gülşah Çelik Gül, Figen Kurtuluş

Abstract:

The first laboratory synthesis of hard materials such as diamond proceeded to attack of developing materials with high hardness to compete diamond. Boron rich solids are good candidates owing to their short interatomic bond lengths and strong covalent character. Boron containing hard material was synthesized by modified-microwave method under nitrogen atmosphere by using a fuel (glycine or urea), amorphous boron and/or boric acid in appropriate molar ratio. Characterizations were done by x-ray diffraction (XRD), fourier transform infrared (FTIR) spectroscopy, scanning electron microscopy/energy dispersive analyze (SEM/EDS), thermo gravimetric/differantial thermal analysis (TG/DTA).

Keywords: boron containing materials, hard materials, microwave synthesis, powder X-ray diffraction

Procedia PDF Downloads 574
588 Identifying Dominant Anaerobic Microorganisms for Degradation of Benzene

Authors: Jian Peng, Wenhui Xiong, Zheng Lu

Abstract:

An optimal recipe of amendment (nutrients and electron acceptors) was developed and dominant indigenous benzene-degrading microorganisms were characterized in this study. Lessons were learnt from the development of the optimal amendment recipe: (1) salinity and substantial initial concentration of benzene were detrimental for benzene biodegradation; (2) large dose of amendments can shorten the lag time for benzene biodegradation occurrence; (3) toluene was an essential co-substance for promoting benzene degradation activity. The stable isotope probing study identified incorporation 13C from 13C-benzene into microorganisms, which can be considered as a direct evidence of the occurrence of benzene biodegradation. The dominant mechanism for benzene removal was identified by quantitative polymerase chain reaction analysis to be nitrate reduction. Microbial analyses (denaturing gradient gel electrophoresis and 16S ribosomal RNA) demonstrated that members of genus Dokdonella spp., Pusillimonas spp., and Advenella spp. were predominant within the microbial community and involved in the anaerobic benzene bioremediation.

Keywords: benzene, enhanced anaerobic bioremediation, stable isotope probing, biosep biotrap

Procedia PDF Downloads 322
587 A Review of Security Attacks and Intrusion Detection Schemes in Wireless Sensor Networks: A Survey

Authors: Maleh Yassine, Ezzati Abdellah

Abstract:

Wireless Sensor Networks (WSNs) are currently used in different industrial and consumer applications, such as earth monitoring, health related applications, natural disaster prevention, and many other areas. Security is one of the major aspects of wireless sensor networks due to the resource limitations of sensor nodes. However, these networks are facing several threats that affect their functioning and their life. In this paper we present security attacks in wireless sensor networks, and we focus on a review and analysis of the recent Intrusion Detection schemes in WSNs.

Keywords: wireless sensor networks, security attack, denial of service, IDS, cluster-based model, signature based IDS, hybrid IDS

Procedia PDF Downloads 355
586 Identification of Information War in Lithuania

Authors: Vitalijus Leibenka

Abstract:

After 2014 the world of Russia’s actions in annexing Crimea has seen a hybrid war that has helped Russia achieve its goals. The world and NATO nations have pointed out that hybrid action can help achieve not only military but also economic and political goals. One of the weapons of action in hybrid warfare is information warfare tools, the use of which helps to carry out actions in the context of hybrid warfare as a whole. In addition, information war tools can be used alone, over time and for long-term purposes. Although forms of information war, such as propaganda and disinformation, have been used in the past, in old conflicts and wars, new forms of information war have emerged as a result of technological development, making the dissemination of information faster and more efficient. The world understands that information is becoming a weapon, but not everyone understands that both information war and information warfare differ in their essence and full content. In addition, the damage and impact of the use of information war, which may have worse consequences than a brief military conflict, is underestimated. Lithuania is also facing various interpretations of the information war. Some believe that the information attack is an information war and the understanding of the information war is limited to a false message in the press. Others, however, deepen and explain the essence of the information war. Society has formed in such a way that not all people are able to assess the threats of information war, to separate information war from information attack. Recently, the Lithuanian government has been taking measures in the context of the information war, making decisions that allow the development of the activities of the state and state institutions in order to create defense mechanisms in the information war. However, this is happening rather slowly and incompletely. Every military conflict, related to Lithuania in one way or another, forces Lithuanian politicians to take up the theme of information warfare again. As a result, a national cyber security center is being set up, and Russian channels spreading lies are banned. However, there is no consistent development and continuous improvement of action against information threats. Although a sufficiently influential part of society (not a political part) helps to stop the spread of obscure information by creating social projects such as “Demaskuok” and “Laikykis ten su Andriumi tapinu”, it goes without saying that it will not become a key tool in the fight against information threats. Therefore, in order to achieve clean dissemination of information in Lithuania, full-fledged and substantial political decisions are necessary, the adoption of which would change the public perception of the information war, its damage, impact and actions that would allow to combat the spread. Political decisions should cover the educational, military, economic and political areas, which are one of the main and most important in the state, which would allow to fundamentally change the situation against the background of information war.

Keywords: information war, information warfare, hybrid war, hybrid warfare, NATO, Lithuania, Russia

Procedia PDF Downloads 43
585 Structural and Ion Exchange Studies of Terpolymer Resin Derived from 4, 4'-Biphenol-4,4'-Oxydianiline-Formaldehyde

Authors: Pawan P. Kalbende, Anil B. Zade

Abstract:

A novel terpolymer resin has been synthesized by condensation polymerization reaction of 4,4’-biphenol and 4,4’-oxydianiline with formaldehyde in presence of 2M hydrochloric acid as catalyst. Composition of resin was determined on the basis of their elemental analysis and further characterized by UV-Visible, infra-red and nuclear magnetic resonance spectroscopy to confine the most probable structure of synthesized terpolymer. Newly synthesized terpolymer was proved to be a selective chelating ion-exchanger for certain metal ions and were studied for Fe3+, Cu2+, Ni2+, Co2+, Zn2+, Cd2+, Hg2+ and Pb2+ ions using their metal nitrate solutions. A batch equilibrium method was employed to study the selectivity of metal ions uptake involving the measurements of the distribution of a given metal ion between the terpolymer sample and a solution containing the metal ion. The study was carried out over a wide pH range, shaking time and in media of different electrolytes at different ionic strengths. Distribution ratios of metal ions were found to be increased by rising pH of the solutions. Hence, it can be used to recover certain metal ions from waste water for the purpose of purification of water and removal of iron from boiler water.

Keywords: terpolymers, ion-exchangers, distribution ratio, metal ion uptake

Procedia PDF Downloads 278