Search results for: Meier and Staffelbach attack
286 High Temperature Behavior of a 75Cr3C2–25NiCr Coated T91 Boiler Steel in an Actual Industrial Environment of a Coal Fired Boiler
Authors: Buta Singh Sidhu, Sukhpal Singh Chatha, Hazoor Singh Sidhu
Abstract:
In the present investigation, 75Cr3C2-25NiCr coating was deposited on T91 boiler tube steel substrate by high velocity oxy-fuel (HVOF) process to enhance high-temperature corrosion resistance. High-temperature performance of bare, as well as HVOF-coated steel specimens was evaluated for 1500 h under cyclic conditions in the platen superheater zone coal-fired boiler, where the temperature was around 900 °C. Experiments were carried out for 15 cycles each of 100 h duration followed by 1 h cooling at ambient temperature. The performance of the bare and coated specimens was assessed via metal thickness loss corresponding to the corrosion scale formation and the depth of internal corrosion attack. 75Cr3C2-25NiCr coating deposited on T91 steel imparted better hot corrosion resistance than the uncoated steel. Inferior resistance of bare T91 steel is attributed to the formation of pores and loosely bounded oxide scale rich in Fe2O3.Keywords: 75Cr3C2-25NiCr, HVOF process, boiler steel, coal fired boilers
Procedia PDF Downloads 606285 Interrogating the Impact of Insurgency Attacks on Vulnerable Groups in West Africa: Implications for Global Security
Authors: Godiya Atsiya Pius
Abstract:
The recent dimension of terrorist attacks and violence in West Africa and Nigeria in particular has attracted both academic and global concerns. Children, young girls and women are now victims of violent attacks and insurgency in their own country. Today, we have a reverse situation where women and children were spared during violence in the past. Empirical evidence shows that millions of children, young girls and women are caught up in violent attacks in which they are not merely spectatorial, but victims of circumstance. Some fall victims of a general onslaught against civilians by the drivers of such conflicts. Others die as part of a calculated genocide. Still others are taken as hostages as part of a deliberate attack on them. With particular reference to over 200 Chibok school girls that were abducted by the Boko Haram Islamic sect in Maiduguri, Borno state, Nigeria, this study shall attempt a theoretical exploration of the circumstances surrounding the insurgency attacks on these categories of vulnerable groups in Nigeria. This paper also intends to examine the nature, dimensions, causes, effects as well as implications of these attacks on women and children in West Africa. The paper shall sum up with conclusion and possible recommendations that could help the region in the 21st century and beyond.Keywords: insurgency, gender, violence, security, vulnerable groups
Procedia PDF Downloads 470284 An Improved Method on Static Binary Analysis to Enhance the Context-Sensitive CFI
Authors: Qintao Shen, Lei Luo, Jun Ma, Jie Yu, Qingbo Wu, Yongqi Ma, Zhengji Liu
Abstract:
Control Flow Integrity (CFI) is one of the most promising technique to defend Code-Reuse Attacks (CRAs). Traditional CFI Systems and recent Context-Sensitive CFI use coarse control flow graphs (CFGs) to analyze whether the control flow hijack occurs, left vast space for attackers at indirect call-sites. Coarse CFGs make it difficult to decide which target to execute at indirect control-flow transfers, and weaken the existing CFI systems actually. It is an unsolved problem to extract CFGs precisely and perfectly from binaries now. In this paper, we present an algorithm to get a more precise CFG from binaries. Parameters are analyzed at indirect call-sites and functions firstly. By comparing counts of parameters prepared before call-sites and consumed by functions, targets of indirect calls are reduced. Then the control flow would be more constrained at indirect call-sites in runtime. Combined with CCFI, we implement our policy. Experimental results on some popular programs show that our approach is efficient. Further analysis show that it can mitigate COOP and other advanced attacks.Keywords: contex-sensitive, CFI, binary analysis, code reuse attack
Procedia PDF Downloads 321283 Mechanical Strengths of Self-Compacting Mortars Prepared with the Pozzolanic Cement in Aggressive Environments
Authors: M. Saidi, I. Djefour, F. Ait Medjber, A. Melouane, A. Gacem
Abstract:
The objective of this research is to study the physical and mechanical properties and durability of self-compacting mortars prepared by substituting a part of cement up to a percentage of 30% pozzolan according to different Blaine specific surface area (SSB1=7000 cm2/g and SSB=9000 cm2/g)). Order to evaluate durability, mortars were subjected to chemical attacks in various aggressive environments, a solution of a mixture of nitric acid and ammonium nitrate (HNO3 + NH4NO3) and a magnesium sulfate salt solution (MgSO4)) with a concentration of 10%, for a period of one month. This study is complemented by a comparative study of the durability of mortars elaborated with sulphate resistant cement (SRC). The results show that these mortars develop long-term, mechanical and chemical resistance better than mortars based Portland cement with 5% gypsum (CEM 1) and SRC. We found that the mass losses are lowest in mortars elaborated with pozzolanic cement (30% substitution with SSB2) in both of chemical attack solutions (3.28% in the solution acid and 1.16% in the salt solution) and the compressive strength gains of 14.68% and 8.5% respectively in the two media. This is due to the action of pozzolan which fixes portlandite to form hydrated calcium silicate (CSH) from the hydration of tricalcic silicate (C3S).Keywords: aggressive environments, durability, mechanical strengths, pozzolanic cement, self-compacting mortar
Procedia PDF Downloads 233282 A Comprehensive Approach to Mitigate Return-Oriented Programming Attacks: Combining Operating System Protection Mechanisms and Hardware-Assisted Techniques
Authors: Zhang Xingnan, Huang Jingjia, Feng Yue, Burra Venkata Durga Kumar
Abstract:
This paper proposes a comprehensive approach to mitigate ROP (Return-Oriented Programming) attacks by combining internal operating system protection mechanisms and hardware-assisted techniques. Through extensive literature review, we identify the effectiveness of ASLR (Address Space Layout Randomization) and LBR (Last Branch Record) in preventing ROP attacks. We present a process involving buffer overflow detection, hardware-assisted ROP attack detection, and the use of Turing detection technology to monitor control flow behavior. We envision a specialized tool that views and analyzes the last branch record, compares control flow with a baseline, and outputs differences in natural language. This tool offers a graphical interface, facilitating the prevention and detection of ROP attacks. The proposed approach and tool provide practical solutions for enhancing software security.Keywords: operating system, ROP attacks, returning-oriented programming attacks, ASLR, LBR, CFI, DEP, code randomization, hardware-assisted CFI
Procedia PDF Downloads 94281 Numerical Study on Parallel Rear-Spoiler on Super Cars
Authors: Anshul Ashu
Abstract:
Computers are applied to the vehicle aerodynamics in two ways. One of two is Computational Fluid Dynamics (CFD) and other is Computer Aided Flow Visualization (CAFV). Out of two CFD is chosen because it shows the result with computer graphics. The simulation of flow field around the vehicle is one of the important CFD applications. The flow field can be solved numerically using panel methods, k-ε method, and direct simulation methods. The spoiler is the tool in vehicle aerodynamics used to minimize unfavorable aerodynamic effects around the vehicle and the parallel spoiler is set of two spoilers which are designed in such a manner that it could effectively reduce the drag. In this study, the standard k-ε model of the simplified version of Bugatti Veyron, Audi R8 and Porsche 911 are used to simulate the external flow field. Flow simulation is done for variable Reynolds number. The flow simulation consists of three different levels, first over the model without a rear spoiler, second for over model with single rear spoiler, and third over the model with parallel rear-spoiler. The second and third level has following parameter: the shape of the spoiler, the angle of attack and attachment position. A thorough analysis of simulations results has been found. And a new parallel spoiler is designed. It shows a little improvement in vehicle aerodynamics with a decrease in vehicle aerodynamic drag and lift. Hence, it leads to good fuel economy and traction force of the model.Keywords: drag, lift, flow simulation, spoiler
Procedia PDF Downloads 498280 Human Security: The Boko Haram Menace in Northern Nigeria in the 21st Century
Authors: Jimoh Yusuf Amuda
Abstract:
Human security is a great panacea for sustainable development of world societies. Today the whole globe cum human species is living in nightmares of insecurity. This is due to acts of terrorism by various terrorists’ organization worldwide. The situation is on the increase daily. The number of lives and properties lost to religious insurgency cannot be quantifiably analyzed. It is on this note that this paper examine the book haram menace in northern Nigerian vis-à-vis it’s threat to the existence of human lives. The methodology applied for this research is the multi-disciplinary approach, the use journal articles, news papers, magazines, oral interview. Field trips to areas of terrorist attack and the use of text books. The following recommendations were made base on the findings. First of all the Nigerian government should declare total war on the book haram terrorist, then secondly the source of armament coming to this terrorist should be blocked, thirdly the European world should also place an arms embargo on terrorist source arms demands, also security agencies-police, the military, immigration, customs, state security service should work hand-in-hand, in a security tight measures to reduce the penetration of insurgent into the society.Keywords: human, insecurity, security, terrorism
Procedia PDF Downloads 339279 Optimized and Secured Digital Watermarking Using Entropy, Chaotic Grid Map and Its Performance Analysis
Authors: R. Rama Kishore, Sunesh
Abstract:
This paper presents an optimized, robust, and secured watermarking technique. The methodology used in this work is the combination of entropy and chaotic grid map. The proposed methodology incorporates Discrete Cosine Transform (DCT) on the host image. To improve the imperceptibility of the method, the host image DCT blocks, where the watermark is to be embedded, are further optimized by considering the entropy of the blocks. Chaotic grid is used as a key to reorder the DCT blocks so that it will further increase security while selecting the watermark embedding locations and its sequence. Without a key, one cannot reveal the exact watermark from the watermarked image. The proposed method is implemented on four different images. It is concluded that the proposed method is giving better results in terms of imperceptibility measured through PSNR and found to be above 50. In order to prove the effectiveness of the method, the performance analysis is done after implementing different attacks on the watermarked images. It is found that the methodology is very strong against JPEG compression attack even with the quality parameter up to 15. The experimental results are confirming that the combination of entropy and chaotic grid map method is strong and secured to different image processing attacks.Keywords: digital watermarking, discreate cosine transform, chaotic grid map, entropy
Procedia PDF Downloads 252278 Isolation and Characterization White Spot Syndrome Protein Envelope Protein 19 from Black Tiger Shrimp (Penaeus monodon)
Authors: Andi Aliah Hidayani, Asmi Citra Malina A. R. Tassakka, Andi Parenrengi
Abstract:
Vanname Shrimp is one of the high yielding varieties that are more resistant to virus attacks. However, now this shrimp more death due to virus attack such as white spot disease caused by white spot syndrome virus (WSSV). Various efforts have done to prevent the disease, like immunostimulatory, probiotics, and vaccine. White spot syndrome virus (WSSV) envelope protein VP19 gene is important because of its involvement in the system infection of shrimp. This study aimed to isolate and characterize an envelope protein VP19 – encoding gene of WSSV using WSSV infected Vanname Shrimp sample from some areas in South Sulawesi (Pangkep, Barru and Pinrang). The genomic of DNA were isolated from shrimp muscle using DTAB-CTAB method. Isolation of gene encoding envelope protein VP19 WSSV ws successfully performed with the results of the length of DNA fragment was 387 bp. The results of homology analysis using BLASTn homology suggested that these isolates genes from Barru, Pangkep and Pinrang have closest relationship with isolates from Mexican.Keywords: vanname, shrimp, WSSV, viral protein 19
Procedia PDF Downloads 533277 Protective Effect of hsa-miR-124 against to Bacillus anthracis Toxins on Human Macrophage Cells
Authors: Ali Oztuna, Meral Sarper, Deniz Torun, Fatma Bayrakdar, Selcuk Kilic, Mehmet Baysallar
Abstract:
Bacillus anthracis is one of the biological agents most likely to be used in case of bioterrorist attack as well as being the cause of anthrax. The bacterium's major virulence factors are the anthrax toxins and an antiphagocytic polyglutamic capsule. TEM8 (ANTXR1) and CMG2 (ANTXR2) are ubiquitously expressed type I transmembrane proteins, and ANTXR2 is the major receptor for anthrax toxins. MicroRNAs are 21-24 bp small noncoding RNAs that regulate gene expression by base pairing with the 3' UTR (untranslated regions) of their target mRNAs resulting in mRNA degradation and/or translational repression. MicroRNAs contribute to regulation of most biological processes and influence numerous pathological states like infectious disease. In this study, post-exposure (toxins) protective effect of the hsa-miR-124-3p against Bacillus anthracis was examined. In this context, i) THP-1 and U937 cells were differentiated to MΦ macrophage, ii) miRNA transfection efficiencies were evaluated by flow cytometry and qPCR, iii) protection against Bacillus anthracis toxins were investigated by XTT, cAMP ELISA and MEK2 cleavage assays. Acknowledgements: This work was supported by the Scientific and Technological Research Council of Turkey (TUBITAK) under Grant SBAG-218S467.Keywords: ANTXR2, hsa-miR-124-3p, MΦ macrophage, THP-1, U937
Procedia PDF Downloads 151276 Adopting Flocks of Birds Approach to Predator for Anomalies Detection on Industrial Control Systems
Abstract:
Industrial Control Systems (ICS) such as Supervisory Control And Data Acquisition (SCADA) can be seen in many different critical infrastructures, from nuclear management to utility, medical equipment, power, waste and engine management on ships and planes. The role SCADA plays in critical infrastructure has resulted in a call to secure them. Many lives depend on it for daily activities and the attack vectors are becoming more sophisticated. Hence, the security of ICS is vital as malfunction of it might result in huge risk. This paper describes how the application of Prey Predator (PP) approach in flocks of birds could enhance the detection of malicious activities on ICS. The PP approach explains how these animals in groups or flocks detect predators by following some simple rules. They are not necessarily very intelligent animals but their approach in solving complex issues such as detection through corporation, coordination and communication worth emulating. This paper will emulate flocking behavior seen in birds in detecting predators. The PP approach will adopt six nearest bird approach in detecting any predator. Their local and global bests are based on the individual detection as well as group detection. The PP algorithm was designed following MapReduce methodology that follows a Split Detection Convergence (SDC) approach.Keywords: artificial life, industrial control system (ICS), IDS, prey predator (PP), SCADA, SDC
Procedia PDF Downloads 299275 Functional Beverage to Boosting Immune System in Elderly
Authors: Adineh Tajmousavilangerudi, Ali Zein Alabiden Tlais, Raffaella Di Cagno
Abstract:
The SARS-Cov-2 pandemic has exposed our vulnerability to new illnesses and novel viruses that attack our immune systems, particularly in the elderly. The vaccine is being gradually introduced over the world, but new strains of the virus and COVID-19 will emerge and continue to cause illness. Aging is associated with significant changes in intestinal physiology, which increases the production of inflammatory products, alters the gut microbiota, and consequently establish inadequate immune response to minimize symptoms and disease development. In this context, older people who followed a Mediterranean-style diet, rich in polyphenols and dietary fiber, performed better physically and mentally (1,2). This demonstrates the importance of the human gut microbiome in transforming complex dietary macromolecules into the most biologically available and active nutrients, which in turn help to regulate metabolism and both intestinal and systemic immune function (3,4). The role of lactic acid fermentation is prominent also as a powerful tool for improving the nutritional quality of the human diet by releasing nutrients and boosting the complex bioactive compounds and vitamin content. the PhD project aims to design fermented and functional foods/beverages capable of modulating human immune function via the gut microbiome.Keywords: functional bevarage, fermented beverage, gut microbiota functionality, immun system
Procedia PDF Downloads 110274 A Computational Fluid Dynamics Study of Turbulence Flow and Parameterization of an Aerofoil
Authors: Mohamed Z. M. Duwahir, Shian Gao
Abstract:
The main objective of this project was to introduce and test a new scheme for parameterization of subsonic aerofoil, using a function called Shape Function. Python programming was used to create a user interactive environment for geometry generation of aerofoil using NACA and Shape Function methodologies. Two aerofoils, NACA 0012 and NACA 1412, were generated using this function. Testing the accuracy of the Shape Function scheme was done by Linear Square Fitting using Python and CFD modelling the aerofoil in Fluent. NACA 0012 (symmetrical aerofoil) was better approximated using Shape Function than NACA 1412 (cambered aerofoil). The second part of the project involved comparing two turbulent models, k-ε and Spalart-Allmaras (SA), in Fluent by modelling the aerofoils NACA 0012 and NACA 1412 in conditions of Reynolds number of 3 × 106. It was shown that SA modelling is better for aerodynamic purpose. The experimental coefficient of lift (Cl) and coefficient of drag (Cd) were compared with empirical wind tunnel data for a range of angle of attack (AOA). As a further step, this project involved drawing and meshing 3D wings in Gambit. The 3D wing flow was solved and compared with 2D aerofoil section experimental results and wind tunnel data.Keywords: CFD simulation, shape function, turbulent modelling, aerofoil
Procedia PDF Downloads 357273 The Strategy of Orbit Avoidance for Optical Remote Sensing Satellite
Authors: Dianxun Zheng, Wuxing Jing, Lin Hetong
Abstract:
Optical remote sensing satellite, always running on the Sun-synchronous orbit, equipped laser warning equipment to alert CCD camera from laser attack. There have three ways to protect the CCD camera, closing the camera cover satellite attitude maneuver and satellite orbit avoidance. In order to enhance the safety of optical remote sensing satellite in orbit, this paper explores the strategy of satellite avoidance. The avoidance strategy is expressed as the evasion of pre-determined target points in the orbital coordinates of virtual satellite. The so-called virtual satellite is a passive vehicle which superposes a satellite at the initial stage of avoidance. The target points share the consistent cycle time and the same semi-major axis with the virtual satellite, which ensures the properties of the Sun-synchronous orbit remain unchanged. Moreover, to further strengthen the avoidance capability of satellite, it can perform multi-object avoid maneuvers. On occasions of fulfilling the orbit tasks of the satellite, the orbit can be restored back to virtual satellite through orbit maneuvers. There into, the avoid maneuvers adopts pulse guidance. and the fuel consumption is also optimized. The avoidance strategy discussed in this article is applicable to avoidance for optical remote sensing satellite when encounter the laser hostile attacks.Keywords: optical remote sensing satellite, always running on the sun-synchronous
Procedia PDF Downloads 398272 Pulmonary Hydatid Cyst in a 13-Year-Old Child: A Case Report
Authors: Ghada Esheba, Bayan Hafiz, Ashwaq Al-Qarni, Abdulelah AlMalki, Esraa Kaheel
Abstract:
Hydatid disease is caused by genus Echinococcus, it is transmitted to human through sheep and cattle. People who lived in an endemic area should be suspected to have the disease. Pulmonary hydatid disease can be presented by respiratory manifestations as in our case. We report a case of child, 13 years old, who was presented by shortness of breath and non-productive cough 2 months ago. The patient had an attack of hemoptysis 3 months ago but there is no history of fever, other constitutional symptoms or any medical illness. The patient has had a close contact with a horse. On examination, the patient was oriented and vitally stable. Both side of chest were moving equally with decrease air entry on the left side of the chest. Cervical lymph node enlargement was also detected. The case was provisionally diagnosed as tuberculosis. The x-ray was normal, while CT scan showed two cysts in the left side. The patient was treated surgically with resection of both cysts without lobectomy. Broncho-alveolar lavage was done and together with plural effusion and both cysts were sent for histopathology. The patient received the following medication: albendazole 200MG/BID/Orally for 30 days and Cefuroxime 250MG/Q12H/Orally for 10 days.Keywords: Echinococcus granulosus, hydatid disease, pediatrics, pulmonary hydatid cyst
Procedia PDF Downloads 271271 Physical Properties and Elastic Studies of Fluoroaluminate Glasses Based on Alkali
Authors: C. Benhamideche
Abstract:
Fluoroaluminate glasses have been reported as the earliest heavy metal fluoride glasses. By comparison with flurozirconate glasses, they offer a set of similar optical features, but also some differences in their elastic and chemical properties. In practice they have been less developed because their stability against devitrification is smaller than that of the most stable fluoroziconates. The purpose of this study was to investigate glass formation in systems AlF3-YF3-PbF2-MgF2-MF2 (M= Li, Na, K). Synthesis was implemented at room atmosphere using the ammonium fluoride processing. After fining, the liquid was into a preheated brass mold, then annealed below the glass transition temperature for several hours. The samples were polished for optical measurements. Glass formation has been investigated in a systematic way, using pseudo ternary systems in order to allow parameters to vary at the same time. We have chosen the most stable glass compositions for the determination of the physical properties. These properties including characteristic temperatures, density and proprieties elastic. Glass stability increases in multicomponent glasses. Bulk samples have been prepared for physical characterization. These glasses have a potential interest for passive optical fibers because they are less sensitive to water attack than ZBLAN glass, mechanically stronger. It is expected they could have a larger damage threshold for laser power transmission.Keywords: fluoride glass, aluminium fluoride, thermal properties, density, proprieties elastic
Procedia PDF Downloads 239270 Study of the Microflora of Cedar Forests with Different Degrees of Decline in the National Park Belezma (Batna, Algeria)
Authors: Cherak Imen, Sellami Mehdi
Abstract:
The Atlas cedar, Cedrus atlantica, is endemic to the mountains of North Africa. This is one of the most valuable softwood, both economically, ecologically, aesthetically and culturally. In Algeria, the cedar forests currently have worrying symptoms of decline which therefore require special monitoring. Fungal endophytes are involved in various diseases of the Atlas cedar. They attack all organs on which they cause many symptoms. These microflora live in complex interaction with plants. In this study, we identified a total of 09 mycotaxons collected needles Cedarwood at three stations with different degrees of decline (Talmet, Boumerzoug and Tuggurt) in the National Park Belezma (Batna, Algeria). The study conducted on a total of 12 trees were identified 08 mycoendophytes in Talmet station, 04 species in the Boumerzoug station and 03 in Tuggurt station. The total species richness mycoendophytes depending on the types of cedar forests showed that the largest diversity was recorded at the cedar forest healthy, Alternaria is the most common type in all stations. This work should be completed by further detailed studies to identify other endophyte species and better know its interactions with the Atlas cedar.Keywords: Cedrus atlantica, endophytic fungi, microflora, mycotaxons, mycoendophyte
Procedia PDF Downloads 344269 Inherited Intergenerational Trauma – The Society for Black People in South Central Los Angeles
Authors: Kevin R. Collins Sr.
Abstract:
In South Central Los Angeles, Black people have endured various forms of trauma that spans across generations. This includes the horrors of slavery and the aftermaths of the Jim Crow Laws, institutionalized racism, and legislative segregation, just to name a few. The individuals born from the 1900’s until today have continued to transmit the traumas experienced across generations. Parents unconsciously transmit the hidden trauma, and the children take these experiences and apply it to the society they live in. Although there are some who attempt to break the cycle of transmitted trauma, the remninsce still remain and play a huge role in how they interact with others. The attempt of this discussion is to bring these traumatic experiences to the surface and attack them head on. It is important that we do this to allow not only the suffering individuals but the suffering society to heal. As a society, looking at the humane side of it and attempting to stop the racial injustice placed on black people to relieve them of the stress that some. If not all,, endure in this great United States of America. Changing the behavior as a country to create an improved since of common unity within. If we solve our own racial and social issues within this country, maybe we can solve these same issues that have been the footstool to the many wars we see around the world. Thus, breaking the cycle of inherited intergenerational trauma.Keywords: intergenerational trauma, inherited trauma, transmission of trauma, blacks in South central LA, black trauma in America
Procedia PDF Downloads 96268 Survey Based Data Security Evaluation in Pakistan Financial Institutions against Malicious Attacks
Authors: Naveed Ghani, Samreen Javed
Abstract:
In today’s heterogeneous network environment, there is a growing demand for distrust clients to jointly execute secure network to prevent from malicious attacks as the defining task of propagating malicious code is to locate new targets to attack. Residual risk is always there no matter what solutions are implemented or whet so ever security methodology or standards being adapted. Security is the first and crucial phase in the field of Computer Science. The main aim of the Computer Security is gathering of information with secure network. No one need wonder what all that malware is trying to do: It's trying to steal money through data theft, bank transfers, stolen passwords, or swiped identities. From there, with the help of our survey we learn about the importance of white listing, antimalware programs, security patches, log files, honey pots, and more used in banks for financial data protection but there’s also a need of implementing the IPV6 tunneling with Crypto data transformation according to the requirements of new technology to prevent the organization from new Malware attacks and crafting of its own messages and sending them to the target. In this paper the writer has given the idea of implementing IPV6 Tunneling Secessions on private data transmission from financial organizations whose secrecy needed to be safeguarded.Keywords: network worms, malware infection propagating malicious code, virus, security, VPN
Procedia PDF Downloads 355267 Spectrophotometric Determination of Photohydroxylated Products of Humic Acid in the Presence of Salicylate Probe
Authors: Julide Hizal Yucesoy, Batuhan Yardimci, Aysem Arda, Resat Apak
Abstract:
Humic substances produce reactive oxygene species such as hydroxyl, phenoxy and superoxide radicals by oxidizing in a wide pH and reduction potential range. Hydroxyl radicals, produced by reducing agents such as antioxidants and/or peroxides, attack on salicylate probe, and form 2,3-dihydroxybenzoate, 2,4-dihydroxybenzoate and 2,5-dihydroxybenzoate species. These species are quantitatively determined by using HPLC Method. Humic substances undergo photodegradation by UV radiation. As a result of their antioxidant properties, they produce hydroxyl radicals. In the presence of salicylate probe, these hydroxyl radicals react with salicylate molecules to form hydroxylated products (dihidroxybenzoate isomers). In this study, humic acid was photodegraded in a photoreactor at 254 nm (400W), formed hydroxyl radicals were caught by salicylate probe. The total concentration of hydroxylated salicylate species was measured by using spectrophotometric CUPRAC Method. And also, using results of time dependent experiments, kinetic of photohydroxylation was determined at different pHs. This method has been applied for the first time to measure the concentration of hydroxylated products. It allows to achieve the results easier than HPLC Method.Keywords: CUPRAC method, humic acid, photohydroxylation, salicylate probe
Procedia PDF Downloads 205266 Ghana’s Human Sexual Rights and Family Values Bill, 2021, and the Experiences of the LGBTQ+ Community
Authors: Michael Augustus Akagbor
Abstract:
Same-sex relationships have always existed in Ghana. In coastal towns such as James Town in the heart of the country’s capital, persons who were sexually different and attracted to members of their own sex were able to live their lives openly as queer persons without any fear for their lives. Since 2006, this idyllic existence has been under attack, with LGBTQ+ communities suffering violence and discrimination. This paper highlights the lived experiences of the LGBTIQ+ community in Ghana against the backdrop of the anti-gay bill - The Promotion of Proper Human Sexual Rights and Ghanaian Family Values Bill, 2021 (now renamed the Human Sexual Rights and Family Values Bill, 2021), currently before Parliament, introduced by eight members of Parliament as a Private Members’ Bill, and its implications for the LGBTQ+ community. The paper makes recommendations to key stakeholders on strategies to counter the cultural and religious arguments/strategies and activism of the anti-LGBTQ+ movement in Ghana. It relied on secondary data from a variety of sources, including the Bill before Parliament, media reports, and baseline surveys and studies conducted by LGBTQ organizations and other Civil Society Organizations (CSOs) in Ghana and elsewhere.Keywords: sexual rights, promotion, family values, lgbtq+, ghana, discrimination
Procedia PDF Downloads 86265 Developing a Secure Iris Recognition System by Using Advance Convolutional Neural Network
Authors: Kamyar Fakhr, Roozbeh Salmani
Abstract:
Alphonse Bertillon developed the first biometric security system in the 1800s. Today, many governments and giant companies are considering or have procured biometrically enabled security schemes. Iris is a kaleidoscope of patterns and colors. Each individual holds a set of irises more unique than their thumbprint. Every single day, giant companies like Google and Apple are experimenting with reliable biometric systems. Now, after almost 200 years of improvements, face ID does not work with masks, it gives access to fake 3D images, and there is no global usage of biometric recognition systems as national identity (ID) card. The goal of this paper is to demonstrate the advantages of iris recognition overall biometric recognition systems. It make two extensions: first, we illustrate how a very large amount of internet fraud and cyber abuse is happening due to bugs in face recognition systems and in a very large dataset of 3.4M people; second, we discuss how establishing a secure global network of iris recognition devices connected to authoritative convolutional neural networks could be the safest solution to this dilemma. Another aim of this study is to provide a system that will prevent system infiltration caused by cyber-attacks and will block all wireframes to the data until the main user ceases the procedure.Keywords: biometric system, convolutional neural network, cyber-attack, secure
Procedia PDF Downloads 217264 Analysis of Brain Signals Using Neural Networks Optimized by Co-Evolution Algorithms
Authors: Zahra Abdolkarimi, Naser Zourikalatehsamad,
Abstract:
Up to 40 years ago, after recognition of epilepsy, it was generally believed that these attacks occurred randomly and suddenly. However, thanks to the advance of mathematics and engineering, such attacks can be predicted within a few minutes or hours. In this way, various algorithms for long-term prediction of the time and frequency of the first attack are presented. In this paper, by considering the nonlinear nature of brain signals and dynamic recorded brain signals, ANFIS model is presented to predict the brain signals, since according to physiologic structure of the onset of attacks, more complex neural structures can better model the signal during attacks. Contribution of this work is the co-evolution algorithm for optimization of ANFIS network parameters. Our objective is to predict brain signals based on time series obtained from brain signals of the people suffering from epilepsy using ANFIS. Results reveal that compared to other methods, this method has less sensitivity to uncertainties such as presence of noise and interruption in recorded signals of the brain as well as more accuracy. Long-term prediction capacity of the model illustrates the usage of planted systems for warning medication and preventing brain signals.Keywords: co-evolution algorithms, brain signals, time series, neural networks, ANFIS model, physiologic structure, time prediction, epilepsy suffering, illustrates model
Procedia PDF Downloads 281263 Hybrid versus Cemented Fixation in Total Knee Arthroplasty: Mid-Term Follow-Up
Authors: Pedro Gomes, Luís Sá Castelo, António Lopes, Marta Maio, Pedro Mota, Adélia Avelar, António Marques Dias
Abstract:
Introduction: Total Knee Arthroplasty (TKA) has contributed to improvement of patient`s quality of life, although it has been associated with some complications including component loosening and polyethylene wear. To prevent these complications various fixation techniques have been employed. Hybrid TKA with cemented tibial and cementless femoral components have shown favourable outcomes, although it still lack of consensus in the literature. Objectives: To evaluate the clinical and radiographic results of hybrid versus cemented TKA with an average 5 years follow-up and analyse the survival rates. Methods: A retrospective study of 125 TKAs performed in 92 patients at our institution, between 2006 to 2008, with a minimum follow-up of 2 years. The same prosthesis was used in all knees. Hybrid TKA fixation was performed in 96 knees, with a mean follow-up of 4,8±1,7 years (range, 2–8,3 years) and 29 TKAs received fully cemented fixation with a mean follow-up of 4,9±1,9 years (range, 2-8,3 years). Selection for hybrid fixation was nonrandomized and based on femoral component fit. The Oxford Knee Score (OKS 0-48) was evaluated for clinical assessment and Knee Society Roentgenographic Evaluation Scoring System was used for radiographic outcome. The survival rate was calculated using the Kaplan-Meier method, with failures defined as revision of either the tibial or femoral component for aseptic failures and all-causes (aseptic and infection). Analysis of survivorship data was performed using the log-rank test. SPSS (v22) was the computer program used for statistical analysis. Results: The hybrid group consisted of 72 females (75%) and 24 males (25%), with mean age 64±7 years (range, 50-78 years). The preoperative diagnosis was osteoarthritis (OA) in 94 knees (98%), rheumatoid arthritis (RA) in 1 knee (1%) and Posttraumatic arthritis (PTA) in 1 Knee (1%). The fully cemented group consisted of 23 females (79%) and 6 males (21%), with mean age 65±7 years (range, 47-78 years). The preoperative diagnosis was OA in 27 knees (93%), PTA in 2 knees (7%). The Oxford Knee Scores were similar between the 2 groups (hybrid 40,3±2,8 versus cemented 40,2±3). The percentage of radiolucencies seen on the femoral side was slightly higher in the cemented group 20,7% than the hybrid group 11,5% p0.223. In the cemented group there were significantly more Zone 4 radiolucencies compared to the hybrid group (13,8% versus 2,1% p0,026). Revisions for all causes were performed in 4 of the 96 hybrid TKAs (4,2%) and 1 of the 29 cemented TKAs (3,5%). The reason for revision was aseptic loosening in 3 hybrid TKAs and 1 of the cemented TKAs. Revision was performed for infection in 1 hybrid TKA. The hybrid group demonstrated a 7 years survival rate of 93% for all-cause failures and 94% for aseptic loosening. No significant difference in survivorship was seen between the groups for all-cause failures or aseptic failures. Conclusions: Hybrid TKA yields similar intermediate-term results and survival rates as fully cemented total knee arthroplasty and remains a viable option in knee joint replacement surgery.Keywords: hybrid, survival rate, total knee arthroplasty, orthopaedic surgery
Procedia PDF Downloads 592262 Synthesis, Characterization, and Quantum Investigations on [3+2] Cycloaddition Reaction of Nitrile Oxide with 1,5-Benzodiazepine
Authors: Samir Hmaimou, Marouane Ait Lahcen, Mohamed Adardour, Mohamed Maatallah, Abdesselam Baouid
Abstract:
Due to (3 + 2) cycloaddition and condensation reaction, a wide range of synthetic routes can be used to obtain biologically active heterocyclic compounds. Condensation and (3+2) cycloaddition reactions in heterocyclic syntheses are versatile due to the wide variety of possible combinations of several atoms of the reactants. In this article, we first outline the synthesis of benzodiazepine 4 with two dipolarophilic centers (C=C and C=N) by condensation reaction. Then, we use it for cycloaddition reactions (3+2) with nitrile oxides to prepare oxadiazole-benzodiazepines and pyrazole-benzodiazepine compounds. ¹H and ¹³C NMR are used to establish all the structures of the synthesized products. These condensation and cycloaddition reactions were then analyzed using density functional theory (DFT) calculations at the B3LYP/6-311G(d,p) theoretical level. In this study, the mechanism of the one-step cycloaddition reaction was investigated. Molecular electrostatic potential (MEP) was used to identify the electrophilic and nucleophilic attack sites of the molecules studied. Additionally, Fukui investigations (electrophilic f- and nucleophilic f+) in the various reaction centers of the reactants demonstrate that, whether in the condensation reaction or cycloaddition, the reaction proceeds through the atomic centers with the most important Fukui functions, which is in full agreement with experimental observations. In the condensation reaction, thermodynamic control of regio, chemo, and stereoselectivity is observed, while those of cycloaddition are subject to kinetic control.Keywords: cycloaddition reaction, regioselectivity, mechanism reaction, NMR analysis
Procedia PDF Downloads 15261 Stack Overflow Detection and Prevention on Operating Systems Using Machine Learning and Control-Flow Enforcement Technology
Authors: Cao Jiayu, Lan Ximing, Huang Jingjia, Burra Venkata Durga Kumar
Abstract:
The first virus to attack personal computers was born in early 1986, called C-Brain, written by a pair of Pakistani brothers. In those days, people still used dos systems, manipulating computers with the most basic command lines. In the 21st century today, computer performance has grown geometrically. But computer viruses are also evolving and escalating. We never stop fighting against security problems. Stack overflow is one of the most common security vulnerabilities in operating systems. It may result in serious security issues for an operating system if a program in it has a vulnerability with administrator privileges. Certain viruses change the value of specific memory through a stack overflow, allowing computers to run harmful programs. This study developed a mechanism to detect and respond to time whenever a stack overflow occurs. We demonstrate the effectiveness of standard machine learning algorithms and control flow enforcement techniques in predicting computer OS security using generating suspicious vulnerability functions (SVFS) and associated suspect areas (SAS). The method can minimize the possibility of stack overflow attacks occurring.Keywords: operating system, security, stack overflow, buffer overflow, machine learning, control-flow enforcement technology
Procedia PDF Downloads 113260 Improvement of the Traditional Techniques of Artistic Casting through the Development of Open Source 3D Printing Technologies Based on Digital Ultraviolet Light Processing
Authors: Drago Diaz Aleman, Jose Luis Saorin Perez, Cecile Meier, Itahisa Perez Conesa, Jorge De La Torre Cantero
Abstract:
Traditional manufacturing techniques used in artistic contexts compete with highly productive and efficient industrial procedures. The craft techniques and associated business models tend to disappear under the pressure of the appearance of mass-produced products that compete in all niche markets, including those traditionally reserved for the work of art. The surplus value derived from the prestige of the author, the exclusivity of the product or the mastery of the artist, do not seem to be sufficient reasons to preserve this productive model. In the last years, the adoption of open source digital manufacturing technologies in small art workshops can favor their permanence by assuming great advantages such as easy accessibility, low cost, and free modification, adapting to specific needs of each workshop. It is possible to use pieces modeled by computer and made with FDM (Fused Deposition Modeling) 3D printers that use PLA (polylactic acid) in the procedures of artistic casting. Models printed by PLA are limited to approximate minimum sizes of 3 cm, and optimal layer height resolution is 0.1 mm. Due to these limitations, it is not the most suitable technology for artistic casting processes of smaller pieces. An alternative to solve size limitation, are printers from the type (SLS) "selective sintering by laser". And other possibility is a laser hardens, by layers, metal powder and called DMLS (Direct Metal Laser Sintering). However, due to its high cost, it is a technology that is difficult to introduce in small artistic foundries. The low-cost DLP (Digital Light Processing) type printers can offer high resolutions for a reasonable cost (around 0.02 mm on the Z axis and 0.04 mm on the X and Y axes), and can print models with castable resins that allow the subsequent direct artistic casting in precious metals or their adaptation to processes such as electroforming. In this work, the design of a DLP 3D printer is detailed, using backlit LCD screens with ultraviolet light. Its development is totally "open source" and is proposed as a kit made up of electronic components, based on Arduino and easy to access mechanical components in the market. The CAD files of its components can be manufactured in low-cost FDM 3D printers. The result is less than 500 Euros, high resolution and open-design with free access that allows not only its manufacture but also its improvement. In future works, we intend to carry out different comparative analyzes, which allow us to accurately estimate the print quality, as well as the real cost of the artistic works made with it.Keywords: traditional artistic techniques, DLP 3D printer, artistic casting, electroforming
Procedia PDF Downloads 141259 Development of Biodegradable Plastic as Mango Fruit Bag
Authors: Andres M. Tuates Jr., Ofero A. Caparino
Abstract:
Plastics have achieved a dominant position in agriculture because of their transparency, lightness in weight, impermeability to water and their resistance to microbial attack. However, this generates a higher quantity of wastes that are difficult to dispose of by farmers. To address these problems, the project aim to develop and evaluate the biodegradable film for mango fruit bag during development. The PBS and starch were melt-blended in a twin-screw extruder and then blown into film extrusion machine. The physic-chemical-mechanical properties of biodegradable fruit bag were done following standard methods of test. Field testing of fruit bag was also conducted to evaluate its durability and efficiency field condition. The PHilMech-FiC fruit bag is made of biodegradable material measuring 6 x 8 inches with a thickness of 150 microns. The tensile strength is within the range of LDPE while the elongation is within the range of HDPE. It is projected that after thirty-six (36) weeks, the film will be totally degraded. Results of field testing show that the quality of harvested fruits using PHilMech-FiC biodegradable fruit bag in terms of percent marketable, non-marketable and export, peel color at the ripe stage, flesh color, TSS, oBrix, percent edible portion is comparable with the existing bagging materials such as Chinese brown paper bag and old newspaper.Keywords: cassava starch, PBS, biodegradable, chemical, mechanical properties
Procedia PDF Downloads 276258 Deep Learning Approach for Colorectal Cancer’s Automatic Tumor Grading on Whole Slide Images
Authors: Shenlun Chen, Leonard Wee
Abstract:
Tumor grading is an essential reference for colorectal cancer (CRC) staging and survival prognostication. The widely used World Health Organization (WHO) grading system defines histological grade of CRC adenocarcinoma based on the density of glandular formation on whole slide images (WSI). Tumors are classified as well-, moderately-, poorly- or un-differentiated depending on the percentage of the tumor that is gland forming; >95%, 50-95%, 5-50% and <5%, respectively. However, manually grading WSIs is a time-consuming process and can cause observer error due to subjective judgment and unnoticed regions. Furthermore, pathologists’ grading is usually coarse while a finer and continuous differentiation grade may help to stratifying CRC patients better. In this study, a deep learning based automatic differentiation grading algorithm was developed and evaluated by survival analysis. Firstly, a gland segmentation model was developed for segmenting gland structures. Gland regions of WSIs were delineated and used for differentiation annotating. Tumor regions were annotated by experienced pathologists into high-, medium-, low-differentiation and normal tissue, which correspond to tumor with clear-, unclear-, no-gland structure and non-tumor, respectively. Then a differentiation prediction model was developed on these human annotations. Finally, all enrolled WSIs were processed by gland segmentation model and differentiation prediction model. The differentiation grade can be calculated by deep learning models’ prediction of tumor regions and tumor differentiation status according to WHO’s defines. If multiple WSIs were possessed by a patient, the highest differentiation grade was chosen. Additionally, the differentiation grade was normalized into scale between 0 to 1. The Cancer Genome Atlas, project COAD (TCGA-COAD) project was enrolled into this study. For the gland segmentation model, receiver operating characteristic (ROC) reached 0.981 and accuracy reached 0.932 in validation set. For the differentiation prediction model, ROC reached 0.983, 0.963, 0.963, 0.981 and accuracy reached 0.880, 0.923, 0.668, 0.881 for groups of low-, medium-, high-differentiation and normal tissue in validation set. Four hundred and one patients were selected after removing WSIs without gland regions and patients without follow up data. The concordance index reached to 0.609. Optimized cut off point of 51% was found by “Maxstat” method which was almost the same as WHO system’s cut off point of 50%. Both WHO system’s cut off point and optimized cut off point performed impressively in Kaplan-Meier curves and both p value of logrank test were below 0.005. In this study, gland structure of WSIs and differentiation status of tumor regions were proven to be predictable through deep leaning method. A finer and continuous differentiation grade can also be automatically calculated through above models. The differentiation grade was proven to stratify CAC patients well in survival analysis, whose optimized cut off point was almost the same as WHO tumor grading system. The tool of automatically calculating differentiation grade may show potential in field of therapy decision making and personalized treatment.Keywords: colorectal cancer, differentiation, survival analysis, tumor grading
Procedia PDF Downloads 133257 Towards the Management of Cybersecurity Threats in Organisations
Authors: O. A. Ajigini, E. N. Mwim
Abstract:
Cybersecurity is the protection of computers, programs, networks, and data from attack, damage, unauthorised, unintended access, change, or destruction. Organisations collect, process and store their confidential and sensitive information on computers and transmit this data across networks to other computers. Moreover, the advent of internet technologies has led to various cyberattacks resulting in dangerous consequences for organisations. Therefore, with the increase in the volume and sophistication of cyberattacks, there is a need to develop models and make recommendations for the management of cybersecurity threats in organisations. This paper reports on various threats that cause malicious damage to organisations in cyberspace and provides measures on how these threats can be eliminated or reduced. The paper explores various aspects of protection measures against cybersecurity threats such as handling of sensitive data, network security, protection of information assets and cybersecurity awareness. The paper posits a model and recommendations on how to manage cybersecurity threats in organisations effectively. The model and the recommendations can then be utilised by organisations to manage the threats affecting their cyberspace. The paper provides valuable information to assist organisations in managing their cybersecurity threats and hence protect their computers, programs, networks and data in cyberspace. The paper aims to assist organisations to protect their information assets and data from cyberthreats as part of the contributions toward community engagement.Keywords: confidential information, cyberattacks, cybersecurity, cyberspace, sensitive information
Procedia PDF Downloads 258