Search results for: salt and peppers attacks
912 The Physicochemical Properties of Two Rivers in Eastern Cape South Africa as Relates to Vibrio Spp Density
Authors: Oluwatayo Abioye, Anthony Okoh
Abstract:
In the past view decades; human has experienced outbreaks of infections caused by pathogenic Vibrio spp which are commonly found in aquatic milieu. Asides the well-known Vibrio cholerae, discovery of other pathogens in this genus has been on the increase. While the dynamics of occurrence and distribution of Vibrio spp have been linked to some physicochemical parameters in salt water, data in relation to fresh water is limited. Hence, two rivers of importance in the Eastern Cape, South Africa were selected for this study. In all, eleven sampling sites were systematically identified and relevant physicochemical parameters, as well as Vibrio spp density, were determined for the period of six months using standard instruments and methods. Results were statistically analysed to determined key physicochemical parameters that determine the density of Vibrio spp in the selected rivers. Results: The density of Vibrio spp in all the sampling points ranges between < 1 CFU/mL to 174 x 10-2 CFU/mL. The physicochemical parameters of some of the sampling points were above the recommended standards. The regression analysis showed that Vibrio density in the selected rivers depends on a complex relationship between various physicochemical parameters. Conclusion: This study suggests that Vibrio spp density in fresh water does not depend on only temperature and salinity as suggested by earlier studies on salt water but rather on a complex relationship between several physicochemical parameters.Keywords: vibrio density, physicochemical properties, pathogen, aquatic milieu
Procedia PDF Downloads 261911 Investigation of External Pressure Coefficients on Large Antenna Parabolic Reflector Using Computational Fluid Dynamics
Authors: Varun K, Pramod B. Balareddy
Abstract:
Estimation of wind forces plays a significant role in the in the design of large antenna parabolic reflectors. Reflector surface accuracies are very sensitive to the gain of the antenna system at higher frequencies. Hence accurate estimation of wind forces becomes important, which is primary input for design and analysis of the reflector system. In the present work, numerical simulation of wind flow using Computational Fluid Dynamics (CFD) software is used to investigate the external pressure coefficients. An extensive comparative study has been made between the CFD results and the published wind tunnel data for different wind angle of attacks (α) acting over concave to convex surfaces respectively. Flow simulations using CFD are carried out to estimate the coefficients of Drag, Lift and Moment for the parabolic reflector. Coefficients of pressures (Cp) over the front and the rear face of the reflector are extracted over surface of the reflector to study the net pressure variations. These resultant pressure variations are compared with the published wind tunnel data for different angle of attacks. It was observed from the CFD simulations, both convex and concave face of reflector system experience a band of pressure variations for the positive and negative angle of attacks respectively. In the published wind tunnel data, Pressure variations over convex surfaces are assumed to be uniform and vice versa. Chordwise and spanwise pressure variations were calculated and compared with the published experimental data. In the present work, it was observed that the maximum pressure coefficients for α ranging from +30° to -90° and α=+90° was lower. For α ranging from +45° to +75°, maximum pressure coefficients were higher as compared to wind tunnel data. This variation is due to non-uniform pressure distribution observed over front and back faces of reflector. Variations in Cd, Cl and Cm over α=+90° to α=-90° was in close resemblance with the experimental data.Keywords: angle of attack, drag coefficient, lift coefficient, pressure coefficient
Procedia PDF Downloads 257910 Numerical Study of Steel Structures Responses to External Explosions
Authors: Mohammad Abdallah
Abstract:
Due to the constant increase in terrorist attacks, the research and engineering communities have given significant attention to building performance under explosions. This paper presents a methodology for studying and simulating the dynamic responses of steel structures during external detonations, particularly for accurately investigating the impact of incrementing charge weight on the members total behavior, resistance and failure. Prediction damage method was introduced to evaluate the damage level of the steel members based on five scenarios of explosions. Johnson–Cook strength and failure model have been used as well as ABAQUS finite element code to simulate the explicit dynamic analysis, and antecedent field tests were used to verify the acceptance and accuracy of the proposed material strength and failure model. Based on the structural response, evaluation criteria such as deflection, vertical displacement, drift index, and damage level; the obtained results show the vulnerability of steel columns and un-braced steel frames which are designed and optimized to carry dead and live load to resist and endure blast loading.Keywords: steel structure, blast load, terrorist attacks, charge weight, damage level
Procedia PDF Downloads 364909 Toward an Understanding of the Neurofunctional Dissociation between Animal and Tool Concepts: A Graph Theoretical Analysis
Authors: Skiker Kaoutar, Mounir Maouene
Abstract:
Neuroimaging studies have shown that animal and tool concepts rely on distinct networks of brain areas. Animal concepts depend predominantly on temporal areas while tool concepts rely on fronto-temporo-parietal areas. However, the origin of this neurofunctional distinction for processing animal and tool concepts remains still unclear. Here, we address this question from a network perspective suggesting that the neural distinction between animals and tools might reflect the differences in their structural semantic networks. We build semantic networks for animal and tool concepts derived from Mc Rae and colleagues’s behavioral study conducted on a large number of participants. These two networks are thus analyzed through a large number of graph theoretical measures for small-worldness: centrality, clustering coefficient, average shortest path length, as well as resistance to random and targeted attacks. The results indicate that both animal and tool networks have small-world properties. More importantly, the animal network is more vulnerable to targeted attacks compared to the tool network a result that correlates with brain lesions studies.Keywords: animals, tools, network, semantics, small-world, resilience to damage
Procedia PDF Downloads 547908 Optimized and Secured Digital Watermarking Using Entropy, Chaotic Grid Map and Its Performance Analysis
Authors: R. Rama Kishore, Sunesh
Abstract:
This paper presents an optimized, robust, and secured watermarking technique. The methodology used in this work is the combination of entropy and chaotic grid map. The proposed methodology incorporates Discrete Cosine Transform (DCT) on the host image. To improve the imperceptibility of the method, the host image DCT blocks, where the watermark is to be embedded, are further optimized by considering the entropy of the blocks. Chaotic grid is used as a key to reorder the DCT blocks so that it will further increase security while selecting the watermark embedding locations and its sequence. Without a key, one cannot reveal the exact watermark from the watermarked image. The proposed method is implemented on four different images. It is concluded that the proposed method is giving better results in terms of imperceptibility measured through PSNR and found to be above 50. In order to prove the effectiveness of the method, the performance analysis is done after implementing different attacks on the watermarked images. It is found that the methodology is very strong against JPEG compression attack even with the quality parameter up to 15. The experimental results are confirming that the combination of entropy and chaotic grid map method is strong and secured to different image processing attacks.Keywords: digital watermarking, discreate cosine transform, chaotic grid map, entropy
Procedia PDF Downloads 252907 Water Problems, Social Mobilization and Migration: A Case Study of Lake Urmia
Authors: Fatemeh Dehghan Khangahi, Hakan Gunes
Abstract:
Transforming a public necessity into a commercial commodity becomes more and more evident as time goes on, and it is one of the issues of water shortage. Development projects of countries, consume the water and waterbeds in various forms, ignoring the concepts such as sustainability and the negative effects they place on the environment, pollute and change the ways of waterways. Throughout these processes, the water basins and all the vital environments sometimes can suffer damage to the irreparable level. In this context, the issue of Lake Urmia that is located in the North West of Iran left alone by drought, has been researched. The lake, which is on the list of UNESCO's biosphere reserves, is now exposed to the danger of desiccation. If the desiccation is fully realized, more than 5.000.000 people that they are living around the lake, will have to migrate as a result of negative living conditions. As a matter of fact, along with the recent years of increasing drought level, regional migrations have begun. In addition to migration issues, it is also necessary to specify the negative effects on human and all-round’s life that depend on the formation of salt storms, mixing of salt into the air and soil, which threaten human health seriously because the lake is salty. The main aim of this work is to raise national and international awareness of this problem, which is an environment and a human tragedy at the same time. This research has two basic questions: 1) In the case of Lake Urmia, what are environmental problems and how they have emerged and what is the role of governments? 2) What is the social consequence of this problem in relation to the first question? In response, after the literature search, having a comparative view of the situation of the Aral Sea and the Great Salt Lake (Utah, USA), which involved the two major international examples. The first, one is related to the terms of population and migration, the second is about biological properties. Then, data and status information that provided after 3 years area research has been evaluated. Towards the end, with the support of qualitative and quantitative methods, the study of social mobilization in the region has been carried out. An example of it is using the public space of TRAXTOR matches like a protests area.Keywords: environment problems, water, social mobilization, Lake Urmia, migration
Procedia PDF Downloads 133906 Effect of Proteoliposome Concentration on Salt Rejection Rate of Polysulfone Membrane Prepared by Incorporation of Escherichia coli and Halomonas elongata Aquaporins
Authors: Aysenur Ozturk, Aysen Yildiz, Hilal Yilmaz, Pinar Ergenekon, Melek Ozkan
Abstract:
Water scarcity is one of the most important environmental problems of the World today. Desalination process is regarded as a promising solution to solve drinking water problem of the countries facing with water shortages. Reverse osmosis membranes are widely used for desalination processes. Nano structured biomimetic membrane production is one of the most challenging research subject for improving water filtration efficiency of the membranes and for reducing the cost of desalination processes. There are several researches in the literature on the development of novel biomimetic nanofiltration membranes by incorporation of aquaporin Z molecules. Aquaporins are cell membrane proteins that allow the passage of water molecules and reject all other dissolved solutes. They are present in cell membranes of most of the living organisms and provide high water passage capacity. In this study, GST (Glutathione S-transferas) tagged E. coli aquaporinZ and H. elongate aquaporin proteins, which were previously cloned and characterized, were purified from E. coli BL21 cells and used for fabrication of modified Polysulphone Membrane (PS). Aquaporins were incorporated on the surface of the membrane by using 1,2-dioleoyl-sn-glycero-3-phosphocholine (DOPC) phospolipids as carrier liposomes. Aquaporin containing proteoliposomes were immobilized on the surface of the membrane with m-phenylene-diamine (MPD) and trimesoyl chloride (TMC) rejection layer. Water flux, salt rejection and glucose rejection performances of the thin film composite membranes were tested by using Dead-End Reactor Cell. In this study, effect of proteoliposome concentration, and filtration pressure on water flux and salt rejection rate of membranes were investigated. Type of aquaporin used for membrane fabrication, flux and pressure applied for filtration were found to be important parameters affecting rejection rates. Results suggested that optimization of concentration of aquaporin carriers (proteoliposomes) on the membrane surface is necessary for fabrication of effective composite membranes used for different purposes.Keywords: aquaporins, biomimmetic membranes, desalination, water treatment
Procedia PDF Downloads 198905 Effect of Salinity and Heavy Metal Toxicity on Gene Expression, and Morphological Characteristics in Stevia rebaudiana Plants
Authors: Umara Nissar Rafiqi, Irum Gul, Nazima Nasrullah, Monica Saifi, Malik Z. Abdin
Abstract:
Background: Stevia rebaudiana, a member of Asteraceae family is an important medicinal plant and produces a commercially used non-caloric natural sweetener, which is also an alternate herbal cure for diabetes. Steviol glycosides are the main sweetening compounds present in these plants. Secondary metabolites are crucial to the adaption of plants to the environment and its overcoming stress conditions. In agricultural procedures, the abiotic stresses like salinity, high metal toxicity and drought, in particular, are responsible for the majority of the reduction that differentiates yield potential from harvestable yield. Salt stress and heavy metal toxicity lead to increased production of reactive oxygen species (ROS). To avoid oxidative damage due to ROS and osmotic stress, plants have a system of anti-oxidant enzymes along with several stress induced enzymes. This helps in scavenging the ROS and relieve the osmotic stress in different cell compartments. However, whether stress induced toxicity modulates the activity of these enzymes in Stevia rebaudiana is poorly understood. Aim: The present study focussed on the effect of salinity, heavy metal toxicity (lead and mercury) on physiological traits and transcriptional profiling of Stevia rebaudiana. Method: Stevia rebaudiana plants were collected from the Central Institute of Medicinal and Aromatic plants (CIMAP), Patnagar, India and maintained under controlled conditions in a greenhouse at Hamdard University, Delhi, India. The plants were subjected to different concentrations of salt (0, 25, 50 and 75 mM respectively) and heavy metals, lead and mercury (0, 100, 200 and 300 µM respectively). The physiological traits such as shoot length, root numbers, leaf growth were evaluated. The samples were collected at different developmental stages and analysed for transcription profiling by RT-PCR. Transcriptional studies in stevia rebaudiana involves important antioxidant enzymes: catalase (CAT), superoxide dismutase (SOD), cytochrome P450 monooxygenase (CYP) and stress induced aquaporin (AQU), auxin repressed protein (ARP-1), Ndhc gene. The data was analysed using GraphPad Prism and expressed as mean ± SD. Result: Low salinity and lower metal toxicity did not affect the fresh weight of the plant. However, this was substantially decreased by 55% at high salinity and heavy metal treatment. With increasing salinity and heavy metal toxicity, the values of all studied physiological traits were significantly decreased. Chlorosis in treated plants was also observed which could be due to changes in Fe:Zn ratio. At low concentrations (upto 25 mM) of NaCl and heavy metals, we did not observe any significant difference in the gene expressions of treated plants compared to control plants. Interestingly, at high salt concentration and high metal toxicity, a significant increase in the expression profile of stress induced genes was observed in treated plants compared to control (p < 0.005). Conclusion: Stevia rebaudiana is tolerant to lower salt and heavy metal concentration. This study also suggests that with the increase in concentrations of salt and heavy metals, harvest yield of S. rebaudiana was hampered.Keywords: Stevia rebaudiana, natural sweetener, salinity, heavy metal toxicity
Procedia PDF Downloads 196904 Enhancement of Transaction's Authentication for the Europay, MasterCard, and Visa Contactless Card Payments
Authors: Ossama Al-Maliki
Abstract:
Europay, MasterCard, and Visa (EMV) is one of the most popular payment protocol in the world. The EMV protocol supports Chip and PIN Transactions, Chip and Signature transactions, and Contactless transactions. This protocol suffers from tens of £ millions of lost per year due to many fraudulent payments. This is due to several reported vulnerable points in the protocols used for such payments that allow skimming, replay, cloning, Mole Point of Sale (POS), relay, and other attacks to be conducted. In this paper, we are focusing on the EMV contactless specification and we have proposed two proposal solutions to the addition of a localization factor to enhance the payment authentication of such transactions designed to prevent relay, cloning, and Mole-POS attacks. Our proposed solution is a back-end localization scheme to help the Issuer-Bank compare the location of the genuine cardholder in relation to the used POS. Our scheme uses 'something you have' which is the Cardholder Smartphone (CSP) to provide the location of the cardholder at the time of the transaction and without impacting the contactless payment time/protocol. The Issuer-bank obtain the CSP Location using tried and tested localization techniques, and independently of the cardholder. Both of our proposal solutions do not require infrastructure changes, and it uses existing EMV/SP protocol messages to communicate our scheme information.Keywords: NFC, RFID, contactless card, authentication, location, EMV
Procedia PDF Downloads 242903 Single Layer Carbon Nanotubes Array as an Efficient Membrane for Desalination: A Molecular Dynamics Study
Authors: Elisa Y. M. Ang, Teng Yong Ng, Jingjie Yeo, Rongming Lin, Zishun Liu, K. R. Geethalakshmi
Abstract:
By stacking carbon nanotubes (CNT) one on top of another, single layer CNT arrays can perform water-salt separation with ultra-high permeability and selectivity. Such outer-wall CNT slit membrane is named as the transverse flow CNT membrane. By adjusting the slit size between neighboring CNTs, the membrane can be configured to sieve out different solutes, right down to the separation of monovalent salt ions from water. Molecular dynamics (MD) simulation results show that the permeability of transverse flow CNT membrane is more than two times that of conventional axial-flow CNT membranes, and orders of magnitude higher than current reverse osmosis membrane. In addition, by carrying out MD simulations with different CNT size, it was observed that the variance in desalination performance with CNT size is small. This insensitivity of the transverse flow CNT membrane’s performance to CNT size is a distinct advantage over axial flow CNT membrane designs. Not only does the membrane operate well under constant pressure desalination operation, but MD simulations further indicate that oscillatory operation can further enhance the membrane’s desalination performance, making it suitable for operation such as electrodialysis reversal. While there are still challenges that need to be overcome, particularly on the physical fabrication of such membrane, it is hope that this versatile membrane design can bring the idea of using low dimensional structures for desalination closer to reality.Keywords: carbon nanotubes, membrane desalination, transverse flow carbon nanotube membrane, molecular dynamics
Procedia PDF Downloads 196902 The Flavonoids for a Plant Grows in the Arid and Semi-Arid Zone of the Northern Sahara of Algeria - Atriplex halimus L.
Authors: O. Smara, H. Dendougui, B. Legseir
Abstract:
Atriplex halimus L. is particularly well adapted to arid and salt-affected areas. In this species, salinity resistance is often attributed to the presence of vesiculated hairs covering leaf surface and containing a large amount of salt. Atriplex halimus L. (Chenopodiaceae) is a perennial shrub native to the Mediterranean basin with excellent tolerance to drought and salinity. The species is present in semiarid to subhumid areas of the north Mediterranean and in arid zones from North Africa and the eastern Mediterranean. The main aim of this study was to identify a medicinal plant used in the Ouargla (Est-southern Algeria) for the treatment of several human pathologies. This plant is an important source for livestock in nitrogenous matter, it is an effective and relatively inexpensive tool in the fight against erosion and desertification and rehabilitation of degraded lands. Phytochemical investigation is applied to the majority of extracts of the powder of the aerial parts of Atriplex halimus L. Different chromatographic methods after liquid-liquid extraction are used; it is the thin layer chromatography (TLC) and paper using multiple systems and chemical revelations. This study followed by an evaluation by the phenol assay the Folin-Ciocalteu method, using gallic acid as a reference for phenols and quercetin for flavonols. Some polar extracts showed an interesting result better than the less polar extracts.Keywords: Atriples halimus L., chenopodiaceae, flavonoids, phenols
Procedia PDF Downloads 304901 Experimental Investigation on Freeze-Concentration Process Desalting for Highly Saline Brines
Authors: H. Al-Jabli
Abstract:
Using the freeze-melting process for the disposing of high saline brines was the aim of the paper by confirming the performance estimation of the treatment system. A laboratory bench scale freezing technique test unit was designed, constructed, and tested at Doha Research Plant (DRP) in Kuwait. The principal unit operations that have been considered for the laboratory study are: ice crystallization, separation, washing, and melting. The applied process is characterized as “the secondary-refrigerant indirect freezing”, which is utilizing normal freezing concept. The high saline brine was used as definite feed water, i.e. average TDS of 250,000 ppm. Kuwait desalination plants were carried out in the experimental study to measure the performance of the proposed treatment system. Experimental analysis shows that the freeze-melting process is capable of dropping the TDS of the feed water from 249,482 ppm to 56,880 ppm of the freeze-melting process in the two-phase’s course, whereas overall recovery results of the salt passage and salt rejection are 31.11%, 19.05%, and 80.95%, correspondingly. Therefore, the freeze-melting process is encouraging for the proposed application, as it shows on the results, which approves the process capability of reducing a major amount of the dissolved salts of the high saline brine with reasonable sensible recovery. This process might be reasonable with other brine disposal processes.Keywords: high saline brine, freeze-melting process, ice crystallization, brine disposal process
Procedia PDF Downloads 268900 Therapeutic Efficacy and Safety Profile of Tolvaptan Administered in Hyponatremia Patients
Authors: Sree Vennela P., V. Samyuktha Bhardwaj
Abstract:
Hyponatremia is an electrolyte disturbance in which the sodium ion concentration in the serum is lower than normal. Sodium is the dominant extracellular cation (positive ion) and cannot freely cross from the interstitial space through the cell membrane, into the cell. Its homeostasis (stability of concentration) inside the cell is vital to the normal function of any cell. Normal serum sodium levels are between 135 and 145 mEq/L. Hyponatremia is defined as a serum level of less than 135 mEq/L and is considered severe when the serum level is below 125 mEq/L. In the vast majority of cases, Hyponatremia occurs as a result of excess body water diluting the serum sodium (salt level in the blood). Hyponatremia is often a complication of other medical illnesses in which excess water accumulates in the body at a higher rate than can be excreted (for example in congestive heart failure, syndrome of inappropriate antidiuretic hormone, SIADH, or polydipsia). Sometimes it may be a result of over-hydration (drinking too much water).Lack of sodium (salt) is very rarely the cause of Hyponatremia, although it can promote Hyponatremia indirectly. In particular, sodium loss can lead to a state of volume depletion (loss of blood volume in the body), with volume depletion serving as a signal for the release of ADH (anti-diuretic hormone). As a result of ADH-stimulated water retention (too much water in the body), blood sodium becomes diluted and Hyponatremia results.Keywords: Tolvaptan, hyponatremia, syndrome of insufficient anti diuretic hormone (SIADH), euvolemic hyponatremia
Procedia PDF Downloads 260899 Multi-Tooled Robotic Hand for Tele-Operation of Explosive Devices
Authors: Faik Derya Ince, Ugur Topgul, Alp Gunay, Can Bayoglu, Dante J. Dorantes-Gonzalez
Abstract:
Explosive attacks are arguably the most lethal threat that may occur in terrorist attacks. In order to counteract this issue, explosive ordnance disposal operators put their lives on the line to dispose of a possible improvised explosive device. Robots can make the disposal process more accurately and saving human lives. For this purpose, there is a demand for more accurate and dexterous manipulating robotic hands that can be teleoperated from a distance. The aim of this project is to design a robotic hand that contains two active and two passive DOF for each finger, as well as a minimum set of tools for mechanical cutting and screw driving within the same robotic hand. Both hand and toolset, are teleoperated from a distance from a haptic robotic glove in order to manipulate dangerous objects such as improvised explosive devices. SolidWorks® Computer-Aided Design, computerized dynamic simulation, and MATLAB® kinematic and static analysis were used for the robotic hand and toolset design. Novel, dexterous and robust solutions for the fingers were obtained, and six servo motors are used in total to remotely control the multi-tooled robotic hand. This project is still undergoing and presents currents results. Future research steps are also presented.Keywords: Explosive Manipulation, Robotic Hand, Tele-Operation, Tool Integration
Procedia PDF Downloads 140898 Detecting and Thwarting Interest Flooding Attack in Information Centric Network
Authors: Vimala Rani P, Narasimha Malikarjunan, Mercy Shalinie S
Abstract:
Data Networking was brought forth as an instantiation of information-centric networking. The attackers can send a colossal number of spoofs to take hold of the Pending Interest Table (PIT) named an Interest Flooding attack (IFA) since the in- interests are recorded in the PITs of the intermediate routers until they receive corresponding Data Packets are go beyond the time limit. These attacks can be detrimental to network performance. PIT expiration rate or the Interest satisfaction rate, which cannot differentiate the IFA from attacks, is the criterion Traditional IFA detection techniques are concerned with. Threshold values can casually affect Threshold-based traditional methods. This article proposes an accurate IFA detection mechanism based on a Multiple Feature-based Extreme Learning Machine (MF-ELM). Accuracy of the attack detection can be increased by presenting the entropy of Internet names, Interest satisfaction rate and PIT usage as features extracted in the MF-ELM classifier. Furthermore, we deploy a queue-based hostile Interest prefix mitigation mechanism. The inference of this real-time test bed is that the mechanism can help the network to resist IFA with higher accuracy and efficiency.Keywords: information-centric network, pending interest table, interest flooding attack, MF-ELM classifier, queue-based mitigation strategy
Procedia PDF Downloads 205897 A Distributed Cryptographically Generated Address Computing Algorithm for Secure Neighbor Discovery Protocol in IPv6
Authors: M. Moslehpour, S. Khorsandi
Abstract:
Due to shortage in IPv4 addresses, transition to IPv6 has gained significant momentum in recent years. Like Address Resolution Protocol (ARP) in IPv4, Neighbor Discovery Protocol (NDP) provides some functions like address resolution in IPv6. Besides functionality of NDP, it is vulnerable to some attacks. To mitigate these attacks, Internet Protocol Security (IPsec) was introduced, but it was not efficient due to its limitation. Therefore, SEND protocol is proposed to automatic protection of auto-configuration process. It is secure neighbor discovery and address resolution process. To defend against threats on NDP’s integrity and identity, Cryptographically Generated Address (CGA) and asymmetric cryptography are used by SEND. Besides advantages of SEND, its disadvantages like the computation process of CGA algorithm and sequentially of CGA generation algorithm are considerable. In this paper, we parallel this process between network resources in order to improve it. In addition, we compare the CGA generation time in self-computing and distributed-computing process. We focus on the impact of the malicious nodes on the CGA generation time in the network. According to the result, although malicious nodes participate in the generation process, CGA generation time is less than when it is computed in a one-way. By Trust Management System, detecting and insulating malicious nodes is easier.Keywords: NDP, IPsec, SEND, CGA, modifier, malicious node, self-computing, distributed-computing
Procedia PDF Downloads 278896 Effects of Blast Load on Historic Stone Masonry Buildings in Canada: A Review and Analytical Study
Authors: Abass Braimah, Maha Hussein Abdallah
Abstract:
The global ascendancy of terrorist attacks on building infrastructure with economic and heritage significance has increased awareness of the possibility of terrorism in Canada. Many structures in Canada that are at risk of terrorist attacks include government buildings, built many years ago of historic stone masonry construction. Although many researchers are investigating ways to retrofit masonry stone buildings to mitigate the effect of blast loadings, lack of knowledge on the dynamic behavior of historic stone masonry structures under blast loads makes it difficult to ascertain the effectiveness of the retrofitting techniques. This paper presents a review of open-source literature for the experimental and numerical stone masonry structures under blast loads. This review yielded very little information of the response of the historic stone masonry structures under blast loads. Thus, a comprehensive study is needed to understand the blast load effects on historic stone masonry buildings. The out-of-plane response of historic masonry structures to blast loads is investigated by using single-degree-of-freedom analysis. This approach presents equations that can be used effectively in the analysis of historic masonry walls to out-of-plane blast loading.Keywords: blast loads, historical buildings, masonry structure, single-degree-of-freedom analysis
Procedia PDF Downloads 184895 A Functional Analysis of the 2016 United States Presidential Debates through the Application of the Functional Theory of Political Campaign Discourse
Authors: Maryam Vaezi
Abstract:
In this study, the Functional Theory of Political Campaign Discourse has been applied in order to investigate the 2016 Clinton-Trump presidential debates. All three kinds of utterances (acclaims, attacks, and defenses) were produced by the candidates supporting the usefulness of the Functional Theory of Political Campaign Discourse for the analysis of the presidential debates as a type of political discourse. Attacks comprised 45% of the candidates’ utterances, followed by acclaims at 33%; defenses were the least common function at 22%. The candidate from the Democratic Party, Hillary Clinton, acclaimed more, whereas the Republican Party presidential candidate, Donald Trump, attacked more. Simple denial was the most common form of defense used by the candidates. Both candidates directed more of their utterances to policy (past deeds, future plans, and general goals) than character (personal qualities, leadership abilities, and ideals). Analyzing debates in terms of the functions performed by the candidates to increase their desirability and chance of winning the election, can lead to a better understanding of these significant political events as well as other forms of political discourse.Keywords: acclaim, attack, defend, character, Democratic Party, Donald Trump, Hillary Clinton, policy, presidential debates, Republican Party
Procedia PDF Downloads 335894 Nanofiltration Membranes with Deposyted Polyelectrolytes: Caracterisation and Antifouling Potential
Authors: Viktor Kochkodan
Abstract:
The main problem arising upon water treatment and desalination using pressure driven membrane processes such as microfiltration, ultrafiltration, nanofiltration and reverse osmosis is membrane fouling that seriously hampers the application of the membrane technologies. One of the main approaches to mitigate membrane fouling is to minimize adhesion interactions between a foulant and a membrane and the surface coating of the membranes with polyelectrolytes seems to be a simple and flexible technique to improve the membrane fouling resistance. In this study composite polyamide membranes NF-90, NF-270, and BW-30 were modified using electrostatic deposition of polyelectrolyte multilayers made from various polycationic and polyanionic polymers of different molecular weights. Different anionic polyelectrolytes such as: poly(sodium 4-styrene sulfonate), poly(vinyl sulfonic acid, sodium salt), poly(4-styrene sulfonic acid-co-maleic acid) sodium salt, poly(acrylic acid) sodium salt (PA) and cationic polyelectrolytes such as poly(diallyldimethylammonium chloride), poly(ethylenimine) and poly(hexamethylene biguanide were used for membrane modification. An effect of deposition time and a number of polyelectrolyte layers on the membrane modification has been evaluated. It was found that degree of membrane modification depends on chemical nature and molecular weight of polyelectrolytes used. The surface morphology of the prepared composite membranes was studied using atomic force microscopy. It was shown that the surface membrane roughness decreases significantly as a number of the polyelectrolyte layers on the membrane surface increases. This smoothening of the membrane surface might contribute to the reduction of membrane fouling as lower roughness most often associated with a decrease in surface fouling. Zeta potentials and water contact angles on the membrane surface before and after modification have also been evaluated to provide addition information regarding membrane fouling issues. It was shown that the surface charge of the membranes modified with polyelectrolytes could be switched between positive and negative after coating with a cationic or an anionic polyelectrolyte. On the other hand, the water contact angle was strongly affected when the outermost polyelectrolyte layer was changed. Finally, a distinct difference in the performance of the noncoated membranes and the polyelectrolyte modified membranes was found during treatment of seawater in the non-continuous regime. A possible mechanism of the higher fouling resistance of the modified membranes has been discussed.Keywords: contact angle, membrane fouling, polyelectrolytes, surface modification
Procedia PDF Downloads 251893 Detecting Venomous Files in IDS Using an Approach Based on Data Mining Algorithm
Authors: Sukhleen Kaur
Abstract:
In security groundwork, Intrusion Detection System (IDS) has become an important component. The IDS has received increasing attention in recent years. IDS is one of the effective way to detect different kinds of attacks and malicious codes in a network and help us to secure the network. Data mining techniques can be implemented to IDS, which analyses the large amount of data and gives better results. Data mining can contribute to improving intrusion detection by adding a level of focus to anomaly detection. So far the study has been carried out on finding the attacks but this paper detects the malicious files. Some intruders do not attack directly, but they hide some harmful code inside the files or may corrupt those file and attack the system. These files are detected according to some defined parameters which will form two lists of files as normal files and harmful files. After that data mining will be performed. In this paper a hybrid classifier has been used via Naive Bayes and Ripper classification methods. The results show how the uploaded file in the database will be tested against the parameters and then it is characterised as either normal or harmful file and after that the mining is performed. Moreover, when a user tries to mine on harmful file it will generate an exception that mining cannot be made on corrupted or harmful files.Keywords: data mining, association, classification, clustering, decision tree, intrusion detection system, misuse detection, anomaly detection, naive Bayes, ripper
Procedia PDF Downloads 414892 Mapping Potential Soil Salinization Using Rule Based Object Oriented Image Analysis
Authors: Zermina Q., Wasif Y., Naeem S., Urooj S., Sajid R. A.
Abstract:
Land degradation, a leading environemtnal problem and a decrease in the quality of land has become a major global issue, caused by human activities. By land degradation, more than half of the world’s drylands are affected. The worldwide scope of main saline soils is approximately 955 M ha, whereas inferior salinization affected approximately 77 M ha. In irrigated areas, a total of 58% of these soils is found. As most of the vegetation types requires fertile soil for their growth and quality production, salinity causes serious problem to the production of these vegetation types and agriculture demands. This research aims to identify the salt affected areas in the selected part of Indus Delta, Sindh province, Pakistan. This particular mangroves dominating coastal belt is important to the local community for their crop growth. Object based image analysis approach has been adopted on Landsat TM imagery of year 2011 by incorporating different mathematical band ratios, thermal radiance and salinity index. Accuracy assessment of developed salinity landcover map was performed using Erdas Imagine Accuracy Assessment Utility. Rain factor was also considered before acquiring satellite imagery and conducting field survey, as wet soil can greatly affect the condition of saline soil of the area. Dry season considered best for the remote sensing based observation and monitoring of the saline soil. These areas were trained with the ground truth data w.r.t pH and electric condutivity of the soil samples. The results were obtained from the object based image analysis of Keti bunder and Kharo chan shows most of the region under low saline soil.Total salt affected soil was measured to be 46,581.7 ha in Keti Bunder, which represents 57.81 % of the total area of 80,566.49 ha. High Saline Area was about 7,944.68 ha (9.86%). Medium Saline Area was about 17,937.26 ha (22.26 %) and low Saline Area was about 20,699.77 ha (25.69%). Where as total salt affected soil was measured to be 52,821.87 ha in Kharo Chann, which represents 55.87 % of the total area of 94,543.54 ha. High Saline Area was about 5,486.55 ha (5.80 %). Medium Saline Area was about 13,354.72 ha (14.13 %) and low Saline Area was about 33980.61 ha (35.94 %). These results show that the area is low to medium saline in nature. Accuracy of the soil salinity map was found to be 83 % with the Kappa co-efficient of 0.77. From this research, it was evident that this area as a whole falls under the category of low to medium saline area and being close to coastal area, mangrove forest can flourish. As Mangroves are salt tolerant plant so this area is consider heaven for mangrove plantation. It would ultimately benefit both the local community and the environment. Increase in mangrove forest control the problem of soil salinity and prevent sea water to intrude more into coastal area. So deforestation of mangrove should be regularly monitored.Keywords: indus delta, object based image analysis, soil salinity, thematic mapper
Procedia PDF Downloads 619891 Malware Beaconing Detection by Mining Large-scale DNS Logs for Targeted Attack Identification
Authors: Andrii Shalaginov, Katrin Franke, Xiongwei Huang
Abstract:
One of the leading problems in Cyber Security today is the emergence of targeted attacks conducted by adversaries with access to sophisticated tools. These attacks usually steal senior level employee system privileges, in order to gain unauthorized access to confidential knowledge and valuable intellectual property. Malware used for initial compromise of the systems are sophisticated and may target zero-day vulnerabilities. In this work we utilize common behaviour of malware called ”beacon”, which implies that infected hosts communicate to Command and Control servers at regular intervals that have relatively small time variations. By analysing such beacon activity through passive network monitoring, it is possible to detect potential malware infections. So, we focus on time gaps as indicators of possible C2 activity in targeted enterprise networks. We represent DNS log files as a graph, whose vertices are destination domains and edges are timestamps. Then by using four periodicity detection algorithms for each pair of internal-external communications, we check timestamp sequences to identify the beacon activities. Finally, based on the graph structure, we infer the existence of other infected hosts and malicious domains enrolled in the attack activities.Keywords: malware detection, network security, targeted attack, computational intelligence
Procedia PDF Downloads 263890 Deciphering Suitability of Rhamnolipids as Emulsifying Agent for Hydrophobic Pollutants
Authors: Asif Jamal, Samia Sakindar, Ramla Rehman
Abstract:
Biosurfactants are amphiphilic surface active compounds obtained from natural resources such as plants and microorganisms. Because of their diverse physicochemical characteristics biosurfactant are replacing synthetic compounds in various commercial applications. In present study, a strain of P. aeruginosa was isolated from crude oil contaminated soil as efficient biosurfactant producers. The biosurfactant production was analyzed as a function of surface tension reduction, oil spreading capacity, emulsification index and hemolysis assay. This bacterial strain showed excellent emulsion activity of EI24 85%, surface tension reduction up to 28.6 mNm-1 and 7.0 mm oil displacement zone. Physicochemical and biological properties of extracted rhamnolipid were also investigated in current study. The chemical composition of product from strain PSS was analyzed by FTIR spectroscopy. The results revealed that extracted biosurfactant was rhamnolipid type in nature having RL-1 and RL-2 homologues. The surface behavior of rhamnolipid in aqueous phase was investigated varying extreme pH, temperature, salt conditions and with various hydrocarbons. The results indicated that biosurfactant produced by strain PSS Which showed stability during high temperature up to 121 C, salt concentrations up to 20% and pH range between (4—14). The emulsification activity with different hydrocarbons was also remarkable. It was concluded that rhamnolipid biosurfactant produced by strain PSS has excellent potential as emulsifying/remediation agent for broad range of hydrophobic pollutants.Keywords: P. aeruginosa, bioremediation, rhamnolipid, surfactants
Procedia PDF Downloads 281889 Proposal of Optimality Evaluation for Quantum Secure Communication Protocols by Taking the Average of the Main Protocol Parameters: Efficiency, Security and Practicality
Authors: Georgi Bebrov, Rozalina Dimova
Abstract:
In the field of quantum secure communication, there is no evaluation that characterizes quantum secure communication (QSC) protocols in a complete, general manner. The current paper addresses the problem concerning the lack of such an evaluation for QSC protocols by introducing an optimality evaluation, which is expressed as the average over the three main parameters of QSC protocols: efficiency, security, and practicality. For the efficiency evaluation, the common expression of this parameter is used, which incorporates all the classical and quantum resources (bits and qubits) utilized for transferring a certain amount of information (bits) in a secure manner. By using criteria approach whether or not certain criteria are met, an expression for the practicality evaluation is presented, which accounts for the complexity of the QSC practical realization. Based on the error rates that the common quantum attacks (Measurement and resend, Intercept and resend, probe attack, and entanglement swapping attack) induce, the security evaluation for a QSC protocol is proposed as the minimum function taken over the error rates of the mentioned quantum attacks. For the sake of clarity, an example is presented in order to show how the optimality is calculated.Keywords: quantum cryptography, quantum secure communcation, quantum secure direct communcation security, quantum secure direct communcation efficiency, quantum secure direct communcation practicality
Procedia PDF Downloads 184888 Utilisation of Sports and Games for Psychosocial Rehabilitation of Internally Displaced Persons in Maiduguri, Nigeria
Authors: Stephen Hamafyelto, Hussaini Garba, Mary Pindar Ndahi
Abstract:
The study was carried out with the intent to mitigate the trauma experienced by victims of insurgent attacks by the so-called Boko Haram militants in Borno state of Nigeria. The area was ridden by the crisis over the past 9 years. As a result, many people were killed, maimed and raped. Some others suffered all manner of inhuman treatment at the hands of their captors. The extent to which this dehumanized treatment has gone and impacted on the people in this area has left most of them traumatised. Victims who survived the attacks have been resettled in camps provided by government where their needs have been cared for. This can never be the same with their natural habitats. Many interventions have also been done by government, non-governmental organisations and corporate and individual bodies. In this regard, social needs of the victims have been the immediate concerns of most organisations, where food, shelter, and clothing were provided. However, there is little that has been done to rehabilitate these victims psychosocially. In this regard, sports and games including the victims’ local games were used to provide psychosocial rehabilitation of victims. The intent was to bring them back to social reality, social inclusion, and stable emotions and peer integration. Descriptive statistics and Multivariate analysis were done. No statistically significant difference was found among male and female children and adults in terms of psychosocial rehabilitation using sports and games.Keywords: social reality, social inclusion, emotional intellegence, peer model
Procedia PDF Downloads 205887 Filtering Intrusion Detection Alarms Using Ant Clustering Approach
Authors: Ghodhbani Salah, Jemili Farah
Abstract:
With the growth of cyber attacks, information safety has become an important issue all over the world. Many firms rely on security technologies such as intrusion detection systems (IDSs) to manage information technology security risks. IDSs are considered to be the last line of defense to secure a network and play a very important role in detecting large number of attacks. However the main problem with today’s most popular commercial IDSs is generating high volume of alerts and huge number of false positives. This drawback has become the main motivation for many research papers in IDS area. Hence, in this paper we present a data mining technique to assist network administrators to analyze and reduce false positive alarms that are produced by an IDS and increase detection accuracy. Our data mining technique is unsupervised clustering method based on hybrid ANT algorithm. This algorithm discovers clusters of intruders’ behavior without prior knowledge of a possible number of classes, then we apply K-means algorithm to improve the convergence of the ANT clustering. Experimental results on real dataset show that our proposed approach is efficient with high detection rate and low false alarm rate.Keywords: intrusion detection system, alarm filtering, ANT class, ant clustering, intruders’ behaviors, false alarms
Procedia PDF Downloads 403886 A Novel Nanocomposite Membrane Designed for the Treatment of Oil/Gas Produced Water
Authors: Zhaoyang Liu, Detao Qin, Darren Delai Sun
Abstract:
The onshore production of oil and gas (for example, shale gas) generates large quantities of wastewater, referred to be ‘produced water’, which contains high contents of oils and salts. The direct discharge of produced water, if not appropriately treated, can be toxic to the environment and human health. Membrane filtration has been deemed as an environmental-friendly and cost-effective technology for treating oily wastewater. However, conventional polymeric membranes have their drawbacks of either low salt rejection rate or high membrane fouling tendency when treating oily wastewater. Recent years, forward osmosis (FO) membrane filtration has emerged as a promising technology with its unique advantages of low operation pressure and less membrane fouling tendency. However, until now there is still no report about FO membranes specially designed and fabricated for treating the oily and salty produced water. In this study, a novel nanocomposite FO membrane was developed specially for treating oil- and salt-polluted produced water. By leveraging the recent advance of nanomaterials and nanotechnology, this nanocomposite FO membrane was designed to be made of double layers: an underwater oleophobic selective layer on top of a nanomaterial infused polymeric support layer. Wherein, graphene oxide (GO) nanosheets were selected to add into the polymeric support layer because adding GO nanosheets can optimize the pore structures of the support layer, thus potentially leading to high water flux for FO membranes. In addition, polyvinyl alcohol (PVA) hydrogel was selected as the selective layer because hydrated and chemically-crosslinked PVA hydrogel is capable of simultaneously rejecting oil and salt. After nanocomposite FO membranes were fabricated, the membrane structures were systematically characterized with the instruments of TEM, FESEM, XRD, ATR-FTIR, surface zeta-potential and Contact angles (CA). The membrane performances for treating produced waters were tested with the instruments of TOC, COD and Ion chromatography. The working mechanism of this new membrane was also analyzed. Very promising experimental results have been obtained. The incorporation of GO nanosheets can reduce internal concentration polarization (ICP) effect in the polymeric support layer. The structural parameter (S value) of the new FO membrane is reduced by 23% from 265 ± 31 μm to 205 ± 23 μm. The membrane tortuosity (τ value) is decreased by 20% from 2.55 ± 0.19 to 2.02 ± 0.13 μm, which contributes to the decrease of S value. Moreover, the highly-hydrophilic and chemically-cross-linked hydrogel selective layer present high antifouling property under saline oil/water emulsions. Compared with commercial FO membrane, this new FO membrane possesses three times higher water flux, higher removal efficiencies for oil (>99.9%) and salts (>99.7% for multivalent ions), and significantly lower membrane fouling tendency (<10%). To our knowledge, this is the first report of a nanocomposite FO membrane with the combined merits of high salt rejection, high oil repellency and high water flux for treating onshore oil/gas produced waters. Due to its outstanding performance and ease of fabrication, this novel nanocomposite FO membrane possesses great application potential in wastewater treatment industry.Keywords: nanocomposite, membrane, polymer, graphene oxide
Procedia PDF Downloads 249885 Bitcoin, Blockchain and Smart Contract: Attacks and Mitigations
Authors: Mohamed Rasslan, Doaa Abdelrahman, Mahmoud M. Nasreldin, Ghada Farouk, Heba K. Aslan
Abstract:
Blockchain is a distributed database that endorses transparency while bitcoin is a decentralized cryptocurrency (electronic cash) that endorses anonymity and is powered by blockchain technology. Smart contracts are programs that are stored on a blockchain. Smart contracts are executed when predetermined conditions are fulfilled. Smart contracts automate the agreement execution in order to make sure that all participants immediate-synchronism of the outcome-certainty, without any intermediary's involvement or time loss. Currently, the Bitcoin market worth billions of dollars. Bitcoin could be transferred from one purchaser to another without the need for an intermediary bank. Network nodes through cryptography verify bitcoin transactions, which are registered in a public-book called “blockchain”. Bitcoin could be replaced by other coins, merchandise, and services. Rapid growing of the bitcoin market-value, encourages its counterparts to make use of its weaknesses and exploit vulnerabilities for profit. Moreover, it motivates scientists to define known vulnerabilities, offer countermeasures, and predict future threats. In his paper, we study blockchain technology and bitcoin from the attacker’s point of view. Furthermore, mitigations for the attacks are suggested, and contemporary security solutions are discussed. Finally, research methods that achieve strict security and privacy protocol are elaborated.Keywords: Cryptocurrencies, Blockchain, Bitcoin, Smart Contracts, Peer-to-Peer Network, Security Issues, Privacy Techniques
Procedia PDF Downloads 82884 A Review on Factors Influencing Implementation of Secure Software Development Practices
Authors: Sri Lakshmi Kanniah, Mohd Naz’ri Mahrin
Abstract:
More and more businesses and services are depending on software to run their daily operations and business services. At the same time, cyber-attacks are becoming more covert and sophisticated, posing threats to software. Vulnerabilities exist in the software due to the lack of security practices during the phases of software development. Implementation of secure software development practices can improve the resistance to attacks. Many methods, models and standards for secure software development have been developed. However, despite the efforts, they still come up against difficulties in their deployment and the processes are not institutionalized. There is a set of factors that influence the successful deployment of secure software development processes. In this study, the methodology and results from a systematic literature review of factors influencing the implementation of secure software development practices is described. A total of 44 primary studies were analysed as a result of the systematic review. As a result of the study, a list of twenty factors has been identified. Some of factors that affect implementation of secure software development practices are: Involvement of the security expert, integration between security and development team, developer’s skill and expertise, development time and communication between stakeholders. The factors were further classified into four categories which are institutional context, people and action, project content and system development process. The results obtained show that it is important to take into account organizational, technical and people issues in order to implement secure software development initiatives.Keywords: secure software development, software development, software security, systematic literature review
Procedia PDF Downloads 377883 Alleviation of Adverse Effects of Salt Stress on Soybean (Glycine max. L.) by Using Osmoprotectants and Compost Application
Authors: Ayman El Sabagh, SobhySorour, AbdElhamid Omar, Adel Ragab, Mohammad Sohidul Islam, Celaleddin Barutçular, Akihiro Ueda, Hirofumi Saneoka
Abstract:
Salinity is one of the major factors limiting crop production in an arid environment. What adds to the concern is that all the legume crops are sensitive to increasing soil salinity. So it is implacable to either search for salinity enhancement of legume plants. The exogenous of osmoprotectants has been found effective in reducing the adverse effects of salinity stress on plant growth. Despite its global importance soybean production suffer the problems of salinity stress causing damages at plant development. Therefore, in the current study we try to clarify the mechanism that might be involved in the ameliorating effects of osmo-protectants such as proline and glycine betaine and compost application on soybean plants grown under salinity stress. Experiments were carried out in the greenhouse of the experimental station, plant nutritional physiology, Hiroshima University, Japan in 2011- 2012. The experiment was arranged in a factorial design with 4 replications at NaCl concentrations (0 and 15 mM). The exogenous, proline and glycine betaine concentrations (0 mM and 25 mM) for each. Compost treatments (0 and 24 t ha-1). Results indicated that salinity stress induced reduction in all growth and physiological parameters (dry weights plant-1, chlorophyll content, N and K+ content) likewise, seed and quality traits of soybean plant compared with those of the unstressed plants. In contrast, salinity stress led to increases in the electrolyte leakage ratio, Na and proline contents. Thus tolerance against salt stress was observed, the improvement of salt tolerance resulted from proline, glycine betaine and compost were accompanied with improved membrane stability, K+, and proline accumulation on contrary, decreased Na+ content. These results clearly demonstrate that could be used to reduce the harmful effect of salinity on both physiological aspects and growth parameters of soybean. They are capable of restoring yield potential and quality of seed and may be useful in agronomic situations where saline conditions are diagnosed as a problem. Consequently, exogenous osmo-protectants combine with compost will effectively solve seasonal salinity stress problem and are a good strategy to increase salinity resistance in the drylands.Keywords: compost, glycine betaine, proline, salinity tolerance, soybean
Procedia PDF Downloads 372