Search results for: nitrate attack
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 975

Search results for: nitrate attack

555 Rare Earth Metal Ion-Doped SiO2 Nanocomposite Membranes for Gas Separation in Steam Atmosphere

Authors: Md. Hasan Zahir

Abstract:

Y2O3-doped silica membranes were synthesized with the sol-gel method by using a tetraethyl orthosilicate-derived sol mixed with yttrium nitrate hexahydrate. These solutions were used to fabricate hydrogen separation microporous membranes with a sandwich-type structure on γ-Al2O3 supported by tubular α-Al2O3. Pore size distribution measurements were conducted directly on the membranes before and after hydrothermal treatment with a nano-permporometer. The gas permeance properties of the membranes were measured in the temperature range 100–500°C. The Y-doped SiO2 membrane (Si/Y = 3/1) was found to exhibit asymptotically stable permeances of 2.39×10-7 mol m-2 s -1 Pa-1 for He and 6.19 ×10-10 mol m-2 s -1 Pa-1 for CO2, with a high selectivity of 386 (He/CO2) at 500°C for 20 h in the presence of steam. The Y-doped silica membranes exhibit very high gas permeances for molecules with smaller kinetic diameters. The apparent activation energies of the H2 permeance at 400°C were 24.2±0.2 and 21.3±0.7 kJ mol−1 for SiO2 and Si/Y, respectively. Very high permeances were obtained for N2 and O2, 2.2 and 5 × 10-8 mol m-2 s -1 Pa-1 respectively, which demonstrates that these materials are promising air purification and/or separation systems that block larger impurity molecules by molecular sieving effects. Y-doped SiO2 exhibits greater hydrothermal stability at high temperatures and higher selectivity than SiO2 membranes.

Keywords: ceramic membrane, gas separation, hydrothermal stability, rare earth doped-Silica

Procedia PDF Downloads 241
554 HelpMeBreathe: A Web-Based System for Asthma Management

Authors: Alia Al Rayssi, Mahra Al Marar, Alyazia Alkhaili, Reem Al Dhaheri, Shayma Alkobaisi, Hoda Amer

Abstract:

We present in this paper a web-based system called “HelpMeBreathe” for managing asthma. The proposed system provides analytical tools, which allow better understanding of environmental triggers of asthma, hence better support of data-driven decision making. The developed system provides warning messages to a specific asthma patient if the weather in his/her area might cause any difficulty in breathing or could trigger an asthma attack. HelpMeBreathe collects, stores, and analyzes individuals’ moving trajectories and health conditions as well as environmental data. It then processes and displays the patients’ data through an analytical tool that leads to an effective decision making by physicians and other decision makers.

Keywords: asthma, environmental triggers, map interface, web-based systems

Procedia PDF Downloads 279
553 Production of Poly-β-Hydroxybutyrate (PHB) by a Thermophilic Strain of Bacillus and Pseudomonas Species

Authors: Patience Orobosa Olajide

Abstract:

Five hydrocarbon degrading bacterial strains isolated from contaminated environment were investigated with respect to polyhydroxybutyrate (PHB) biosynthesis. Screening for bioplastic production was done on assay mineral salts agar medium containing 0.2% poly (3-hydroxybutyrate) as the sole carbon source. Two of the test bacteria were positive for PHB biosynthesis and were identified based on gram staining, biochemical tests, 16S rRNA gene sequence analysis as Pseudomonas aeruginosa and Bacillus licheniformis which grew at 37 and up to 65 °C respectively, thus suggesting the later to be thermotolerant. In this study, the effects of different carbon and nitrogen sources on PHB production in these strains were investigated. Maximum PHB production was obtained in 48 hr for the two strains and amounted to yields of 72.86 and 62.22 percentages for Bacillus licheniformis and Pseudomonas aeruginosa respectively. In these strains, glycine was the most efficient carbon sources for the production of PHB compared with other carbon (glucose, lactose, sucrose, Arabinose) and nitrogen (L- glycine, L-cysteine, DL-Tryptophan, and Potassium Nitrate) sources. The screening of microbial strains for industrial PHB production should be based on several factors including the cell’s capability to mineralize an inexpensive substrate, rate of growth and the extent of polymer accumulation.

Keywords: bacteria, poly-3-hydroxybutyrate (PHB), hydrocarbon, thermotolerant

Procedia PDF Downloads 178
552 A Neural Network System for Predicting the Hardness of Titanium Aluminum Nitrite (TiAlN) Coatings

Authors: Omar M. Elmabrouk

Abstract:

The cutting tool, in the high-speed machining process, is consistently dealing with high localized stress at the tool tip, tip temperature exceeds 800°C and the chip slides along the rake face. These conditions are affecting the tool wear, the cutting tool performances, the quality of the produced parts and the tool life. Therefore, a thin film coating on the cutting tool should be considered to improve the tool surface properties while maintaining its bulks properties. One of the general coating processes in applying thin film for hard coating purpose is PVD magnetron sputtering. In this paper, the prediction of the effects of PVD magnetron sputtering coating process parameters, sputter power in the range of (4.81-7.19 kW), bias voltage in the range of (50.00-300.00 Volts) and substrate temperature in the range of (281.08-600.00 °C), were studied using artificial neural network (ANN). The results were compared with previously published results using RSM model. It was found that the ANN is more accurate in prediction of tool hardness, and hence, it will not only improve the tool life of the tool but also significantly enhances the efficiency of the machining processes.

Keywords: artificial neural network, hardness, prediction, titanium aluminium nitrate coating

Procedia PDF Downloads 538
551 Secure E-Pay System Using Steganography and Visual Cryptography

Authors: K. Suganya Devi, P. Srinivasan, M. P. Vaishnave, G. Arutperumjothi

Abstract:

Today’s internet world is highly prone to various online attacks, of which the most harmful attack is phishing. The attackers host the fake websites which are very similar and look alike. We propose an image based authentication using steganography and visual cryptography to prevent phishing. This paper presents a secure steganographic technique for true color (RGB) images and uses Discrete Cosine Transform to compress the images. The proposed method hides the secret data inside the cover image. The use of visual cryptography is to preserve the privacy of an image by decomposing the original image into two shares. Original image can be identified only when both qualified shares are simultaneously available. Individual share does not reveal the identity of the original image. Thus, the existence of the secret message is hard to be detected by the RS steganalysis.

Keywords: image security, random LSB, steganography, visual cryptography

Procedia PDF Downloads 314
550 Eucalyptus camaldulensis Leaves Attacked by the Gall Wasp Leptocybe invasa: A Phyto-Volatile Constituents Study

Authors: Maged El-Sayed Mohamed

Abstract:

Eucalyptus camaldulensis is one on the most well-known species of the genus Eucalyptus in the Middle east, its importance relay on the high production of its unique volatile constituents which exhibits many medicinal and pharmacological activities. The gall-forming wasp (Leptocybe invasa) has recently come into sight as the main pest attacking E. camaldulensis and causing severe injury. The wasp lays its eggs in the petiole and midrib of leaves and stems of young shoots of E. camaldulensis, which leads to gall formation. Gall formation by L. invasa damages growing shoot and leaves of Eucalyptus, resulting in abscission of leaves and drying. AIM: This study is an attempt to investigate the effect of the gall wasp (Leptocybe invasa) attack on the volatile constitutes of E. camaldulensis. This could help in the control of this wasp through stimulating plant defenses or production of a new allelochemicals or insecticide. The study of volatile constitutes of Eucalyptus before and after attack by the wasp can help the re-use and recycle of the infected Eucalyptus trees for new pharmacological and medicinal activities. Methodology: The fresh gall wasp-attacked and healthy leaves (100 g each) were cut and immediately subjected to hydrodistillation using Clevenger-type apparatus for 3 hours. The volatile fractions isolated were analyzed using Gas chromatography/mass spectrometry (GC/MS). Kovat’s retention indices (RI) were calculated with respect to a set of co-injected standard hydrocarbons (C10-C28). Compounds were identified by comparing their spectral data and retention indices with Wiley Registry of Mass Spectral Data 10th edition (April 2013), NIST 11 Mass Spectral Library (NIST11/2011/EPA/NIH) and literature data. Results: Fifty-nine components representing 89.13 and 88.60% of the total volatile fraction content respectively were quantitatively analyzed. Twenty-six major compounds at an average concentration greater than 0.1 ± 0.02% have been used for the statistical comparison. From those major components, twenty-one were found in both the attacked and healthy Eucalyptus leaves’ fractions in different concentration and five components, mono terpene p-Mentha-2-4(8) diene and the sesquiterpenes δ-elemene, β-elemene, E-caryophyllene and Bicyclogermacrene, were unique and only produced in the attacked-leaves’ fraction. CONCLUSION: Newly produced components or those commonly found in the volatile fraction and changed in concentration could represent a part of the plant defense mechanisms or might be an element of the plant allelopathic and communication mechanisms. Identification of the components of the gall wasp-damaged leaves can help in their recycling for different physiological, pharmacological and medicinal uses.

Keywords: Eucalyptus camaldulensis, eucalyptus recycling, gall wasp, Leptocybe invasa, plant defense mechanisms, Terpene fraction

Procedia PDF Downloads 340
549 Preparation of 1D Nano-Polyaniline/Dendritic Silver Composites

Authors: Wen-Bin Liau, Wan-Ting Wang, Chiang-Jen Hsiao, Sheng-Mao Tseng

Abstract:

In this paper, an interesting and easy method to prepare one-dimensional nanostructured polyaniline/dendritic silver composites is reported. It is well known that the morphology of metal particle is a very important factor to influence the properties of polymer-metal composites. Usually, the dendritic silver is prepared by kinetic control in reduction reaction. It is not a thermodynamically stable structure. It is the goal to reduce silver ion to dendritic silver by polyaniline polymer via kinetic control and form one-dimensional nanostructured polyaniline/dendritic silver composites. The preparation is a two steps sequential reaction. First step, the polyaniline networks composed of nano fibrillar polyaniline are synthesized from aniline monomers aqueous with ammonium persulfate as the initiator at room temperature. In second step, the silver nitrate is added into polyaniline networks dispersed in deionized water. The dendritic silver is formed via reduction by polyaniline networks under the kinetic control. The formation of polyaniline is discussed via transmission electron microscopy (TEM). Nanosheets, nanotubes, nanospheres, nanosticks, and networks are observed via TEM. Then, the mechanism of formation of one-dimensional nanostructured polyaniline/dendritic silver composites is discussed. The formation of dendritic silver is observed by TEM and X-ray diffraction.

Keywords: 1D nanostructured polyaniline, dendritic silver, synthesis

Procedia PDF Downloads 484
548 Blast Resistance Enhancement of Structures Subjected to Improvised Explosive Devices Attack: A Numerical Study

Authors: Michael I. Okereke, Ambrose I. Akpoyomare

Abstract:

This paper presents a numerical study of the impact mechanic of metallic and sandwich structures incorporate with blast resistance enhancements. The study focuses on structures that have been exposed to improvised explosives devices (IEDs) attacks. The results show numerical conclusions on mechanisms to ensure blast resistance enhancement for the applications studied in this work. The work has identified optimal panel configuration both in geometry and configurations to ensure optimal blast resistance response to such IEDs discharges. Findings from this work will drive improvements in especially military and civilian vehicles in countries where blast attacks on vehicular occupants are quite rampant like Pakistan and Afghanistan.

Keywords: blast resistance, blast enhancement, explosives, material behavior

Procedia PDF Downloads 354
547 Red Green Blue Image Encryption Based on Paillier Cryptographic System

Authors: Mamadou I. Wade, Henry C. Ogworonjo, Madiha Gul, Mandoye Ndoye, Mohamed Chouikha, Wayne Patterson

Abstract:

In this paper, we present a novel application of the Paillier cryptographic system to the encryption of RGB (Red Green Blue) images. In this method, an RGB image is first separated into its constituent channel images, and the Paillier encryption function is applied to each of the channels pixel intensity values. Next, the encrypted image is combined and compressed if necessary before being transmitted through an unsecured communication channel. The transmitted image is subsequently recovered by a decryption process. We performed a series of security and performance analyses to the recovered images in order to verify their robustness to security attack. The results show that the proposed image encryption scheme produces highly secured encrypted images.

Keywords: image encryption, Paillier cryptographic system, RBG image encryption, Paillier

Procedia PDF Downloads 217
546 Benign Recurrent Unilateral Abducens (6th) Nerve Palsy in 14 Months Old Girl: A Case Report

Authors: Khaled Alabduljabbar

Abstract:

Background: Benign, isolated, recurrent sixth nerve palsy is very rare in children. Here we report a case of recurrent abducens nerve palsy with no obvious etiology. It is a diagnosis of exclusion. A recurrent benign form of 6th nerve palsy, a rarer still palsy, has been described in the literature, and it is of most likely secondary to inflammatory causes, e.g, following viral and bacterial infections. Purpose: To present a case of 14 months old girl with recurrent attacks of isolated left sixth cranial nerve palsy following upper respiratory tract infection. Observation: The patient presented to opthalmology clinic with sudden onset of inward deviation (esotropia) of the left eye with a compensatory left face turn one week following signs of upper respiratory tract infection. Ophthalmological examination revealed large angle esotropia of the left eye in primary position, with complete limitation of abduction of the left eye, no palpebral fissure changes, and abnormal position of the head (left face turn). Visual acuity was normal, and no significant refractive error on cycloplegic refraction for her age. Fundus examination was normal with no evidence of papilledema. There was no relative afferent pupillary defect (RAPD) and no anisocoria. Past medical history and family history were unremarkable, with no history of convulsion attacks or head trauma. Additional workout include CBC. Erythrocyte sedimentation rate, Urgent magnetic resonance imaging (MRI), and angiography of the brain were performed and demonstrated the absence of intracranial and orbital lesions. Referral to pediatric neurologist was also done and concluded no significant finding. The patient showed improvement of the left sixth cranial nerve palsy and left face turn over a period of two months. Seven months since the first attack, she experienced a recurrent attack of left eye esotropia with left face turn concurrent with URTI. The rest of eye examination was again unremarkable. CT scan and MRI scan of brain and orbit were performed and showed only signs of sinusitis with no intracranial pathology. The palsy resolved spontaneously within two months. A third episode of left 6th nerve palsy occurred 6 months later, whichrecovered over one month. Examination and neuroimagingwere unremarkable. A diagnosis of benign recurrent left 6th cranial nerve palsy was made. Conclusion: Benign sixth cranial nerve palsy is always a diagnosis of exclusion given the more serious and life-threatening alternative causes. It seems to have a good prognosis with only supportive measures. The likelihood of benign 6th cranial nerve palsy to resolve completely and spontaneously is high. Observation for at least 6 months without intervention is advisable.

Keywords: 6th nerve pasy, abducens nerve pasy, recurrent nerve palsy, cranial nerve palsy

Procedia PDF Downloads 74
545 An investigation of Leading Edge and Trailing Edge Corrugation for Low Reynolds Number Application

Authors: Syed Hassan Raza Shah, Mohammad Mohammad Ali

Abstract:

The flow over a smoothly profiled airfoil at a low Reynolds number is highly susceptible to separate even at a very low angle of attack. An investigation was made to study the effect of leading-edge and trailing-edge corrugation with the spanwise change in the ridges resulted due to the change in the chord length for an infinite wing. The wind tunnel results using NACA0018 wings revealed that leading and trailing edge corrugation did not have any benefit in terms of aerodynamic efficiency or delayed stall. The leading edge and trailing edge corrugation didn't change the lift curve slope, with the leading edge corrugation wing stalling first in the range of Reynolds number of 50,000 to 125,000.

Keywords: leading and trailing edge corrugations, low reynolds number, wind tunnel testing, NACA0018

Procedia PDF Downloads 265
544 Potentiostatic Electrodeposition of Cu₂O Films as P-Type Electrode at Room Temperature

Authors: M. M. Moharam, E. M. Elsayed, M. M. Rashad

Abstract:

Single phase Cu₂O films have been prepared via an electrodeposition technique onto ITO glass substrates at room temperature. Likewise, Cu₂O films were deposited using a potentiostatic process from an alkaline electrolyte containing copper (II) nitrate and 1M sodium citrate. Single phase Cu₂O films were electrodeposited at a cathodic deposition potential of 500mV for a reaction period of 90 min, and pH of 12 to yield a film thickness of 0.49 µm. The mechanism for nucleation of Cu₂O films was found to vary with deposition potential. Applying the Scharifker and Hills model at -500 and -600 mV to describe the mechanism of nucleation for the electrochemical reaction, the nucleation mechanism consisted of a mix between instantaneous and progressive growth mechanisms at -500 mV, while above -600 mV the growth mechanism was instantaneous. Using deposition times from 30 to 90 min at -500 mV deposition potential, pure Cu2O films with different microstructures were electrodeposited. Changing the deposition time from 30 to 90 min varied the microstructure from cubic to more complex polyhedra. The transmittance of electrodeposited Cu₂O films ranged from 20-70% in visible range, and samples exhibited a 2.4 eV band gap. The electrical resistivity for electrodeposited Cu₂O films was found to decrease with increasing deposition time from 0.854 x 105 Ω-cm at 30 min to 0.221 x 105 Ω-cm at 90 min without any thermal treatment following the electrodeposition process.

Keywords: Cu₂O, electrodeposition, film thickness, characterization, optical properties

Procedia PDF Downloads 197
543 Toxicity Depletion Rates of Water Lettuce (Pistia stratoites) in an Aquaculture Effluent Hydroponic System

Authors: E. A. Kiridi, A. O. Ogunlela

Abstract:

The control of ammonia build-up and its by-product is a limiting factor for a successful commercial aquaculture in a developing country like Nigeria. The technology for an advanced treatment of fish tank effluent is uneconomical to local fish farmers which have led to indiscriminate disposal of aquaculture wastewater, thereby increasing the concentrations of these nitrogenous compound and other contaminants in surface and groundwater above the permissible level. Phytoremediation using water lettuce could offer cheaper and sustainable alternative. On the first day of experimentation, approximately 100 g of water lettuce were replicated in four hydroponic units containing aquaculture effluents. The water quality parameters measured were concentration of ammonium–nitrogen (NH4+-N), nitrite-nitrogen (NO2--N), nitrate-nitrogen (NO3--N), and phosphate–phosphorus (PO43--P). Others were total suspended solids (TSS), pH, electrical conductivity (EC), and biomass value. At phytoremediation intervals of 7, 14, 21 and 28 days, the biomass recorded were 361.2 g, 498.7 g, 561.2 g, and 623.7 g. Water lettuce was able to reduce the pollutant concentration of all the selected parameter. The percentage reduction of pH ranged from 3.9% to 14.4%, EC from 49.8% to 96.2%, TDS from 50.4% to 96.2%, TSS from 38.3% to 81.7%, NH4+-N from 38.9% to 90.7%, NO2--N from 0% to 74.9%, NO3--N from 63.2% to 95.9% and PO43--P from 0% to 76.3%. At 95% confidence level, the analysis of variance shows that F(critical) is less than F(cal) and p < 0.05; therefore, it can be concluded statistically that the inequality between the pre-treatment and post-treatment values are significant. This suggests the potency of water lettuce for remediation of aquaculture effluent.

Keywords: aquaculture effluent, nitrification, phytoremediation, water lettuce

Procedia PDF Downloads 196
542 Experimental and Numerical Investigation of Flow Control Using a Novel Active Slat

Authors: Basman Elhadidi, Islam Elqatary, Osama Saaid, Hesham Othman

Abstract:

An active slat is developed to increase the lift and delay the separation for a DU96-W180 airfoil. The active slat is a fixed slat that can be closed, fully opened or intermittently opened by a rotating vane depending on the need. Experimental results show that the active slat has reduced the mean pressure and increased the mean velocity on the suction side of the airfoil for all positive angles of attack, indicating an increase of lift. The experimental data and numerical simulations also show that the direction of actuator vane rotation can influence the mixing of the flow streams on the suction side and hence influence the aerodynamic performance.

Keywords: active slat, flow control, experimental investigation, aerodynamic performance

Procedia PDF Downloads 413
541 Facebook Spam and Spam Filter Using Artificial Neural Networks

Authors: A. Fahim, Mutahira N. Naseem

Abstract:

SPAM is any unwanted electronic message or material in any form posted to many people. As the world is growing as global world, social networking sites play an important role in making world global providing people from different parts of the world a platform to meet and express their views. Among different social networking sites facebook become the leading one. With increase in usage different users start abusive use of facebook by posting or creating ways to post spam. This paper highlights the potential spam types nowadays facebook users faces. This paper also provide the reason how user become victim to spam attack. A methodology is proposed in the end discusses how to handle different types of spam.

Keywords: artificial neural networks, facebook spam, social networking sites, spam filter

Procedia PDF Downloads 352
540 Impact of Calcium Carbide Waste Dumpsites on Soil Chemical and Microbial Characteristics

Authors: C. E. Ihejirika, M. I. Nwachukwu, R. F. Njoku-Tony, O. C. Ihejirika, U. O. Enwereuzoh, E. O. Imo, D. C. Ashiegbu

Abstract:

Disposal of industrial solid wastes in the environment is a major environmental challenge. This study investigated the effects of calcium carbide waste dumpsites on soil quality. Soil samples were collected with hand auger from three different dumpsites at varying depths and made into composite samples. Samples were subjected to standard analytical procedures. pH varied from 10.38 to 8.28, nitrate from 5.6mg/kg to 9.3mg/kg, phosphate from 8.8mg/kg to 12.3mg/kg, calcium carbide reduced from 10% to to 3%. Calcium carbide was absent in control soil samples. Bacterial counts from dumpsites ranged from 1.8 x 105cfu/g - 2.5 x 105cfu/g while fungal ranged from 0.8 x 103cfu/g - 1.4 x 103cfu/g. Bacterial isolates included Pseudomonas spp, Flavobacterium spp, and Achromobacter spp, while fungal isolates include Penicillium notatum, Aspergillus niger, and Rhizopus stolonifer. No organism was isolated from the dumpsites at soil depth of 0-15 cm, while there were isolates from other soil depths. Toxicity might be due to alkaline condition of the dumpsite. Calcium carbide might be bactericidal and fungicidal leading to cellular physiology, growth retardation, death, general loss of biodiversity and reduction of ecosystem processes. Detoxification of calcium carbide waste before disposal on soil might be the best option in management.

Keywords: biodiversity, calcium-carbide, denitrification, toxicity

Procedia PDF Downloads 526
539 Robust Control of Cyber-Physical System under Cyber Attacks Based on Invariant Tubes

Authors: Bruno Vilić Belina, Jadranko Matuško

Abstract:

The rapid development of cyber-physical systems significantly influences modern control systems introducing a whole new range of applications of control systems but also putting them under new challenges to ensure their resiliency to possible cyber attacks, either in the form of data integrity attacks or deception attacks. This paper presents a model predictive approach to the control of cyber-physical systems robust to cyber attacks. We assume that a cyber attack can be modelled as an additive disturbance that acts in the measuring channel. For such a system, we designed a tube-based predictive controller based. The performance of the designed controller has been verified in Matlab/Simulink environment.

Keywords: control systems, cyber attacks, resiliency, robustness, tube based model predictive control

Procedia PDF Downloads 49
538 Secure Optimized Ingress Filtering in Future Internet Communication

Authors: Bander Alzahrani, Mohammed Alreshoodi

Abstract:

Information-centric networking (ICN) using architectures such as the Publish-Subscribe Internet Technology (PURSUIT) has been proposed as a new networking model that aims at replacing the current used end-centric networking model of the Internet. This emerged model focuses on what is being exchanged rather than which network entities are exchanging information, which gives the control plane functions such as routing and host location the ability to be specified according to the content items. The forwarding plane of the PURSUIT ICN architecture uses a simple and light mechanism based on Bloom filter technologies to forward the packets. Although this forwarding scheme solve many problems of the today’s Internet such as the growth of the routing table and the scalability issues, it is vulnerable to brute force attacks which are starting point to distributed- denial-of-service (DDoS) attacks. In this work, we design and analyze a novel source-routing and information delivery technique that keeps the simplicity of using Bloom filter-based forwarding while being able to deter different attacks such as denial of service attacks at the ingress of the network. To achieve this, special forwarding nodes called Edge-FW are directly attached to end user nodes and used to perform a security test for malicious injected random packets at the ingress of the path to prevent any possible attack brute force attacks at early stage. In this technique, a core entity of the PURSUIT ICN architecture called topology manager, that is responsible for finding shortest path and creating a forwarding identifiers (FId), uses a cryptographically secure hash function to create a 64-bit hash, h, over the formed FId for authentication purpose to be included in the packet. Our proposal restricts the attacker from injecting packets carrying random FIds with a high amount of filling factor ρ, by optimizing and reducing the maximum allowed filling factor ρm in the network. We optimize the FId to the minimum possible filling factor where ρ ≤ ρm, while it supports longer delivery trees, so the network scalability is not affected by the chosen ρm. With this scheme, the filling factor of any legitimate FId never exceeds the ρm while the filling factor of illegitimate FIds cannot exceed the chosen small value of ρm. Therefore, injecting a packet containing an FId with a large value of filling factor, to achieve higher attack probability, is not possible anymore. The preliminary analysis of this proposal indicates that with the designed scheme, the forwarding function can detect and prevent malicious activities such DDoS attacks at early stage and with very high probability.

Keywords: forwarding identifier, filling factor, information centric network, topology manager

Procedia PDF Downloads 134
537 MULTI-FLGANs: Multi-Distributed Adversarial Networks for Non-Independent and Identically Distributed Distribution

Authors: Akash Amalan, Rui Wang, Yanqi Qiao, Emmanouil Panaousis, Kaitai Liang

Abstract:

Federated learning is an emerging concept in the domain of distributed machine learning. This concept has enabled General Adversarial Networks (GANs) to benefit from the rich distributed training data while preserving privacy. However, in a non-IID setting, current federated GAN architectures are unstable, struggling to learn the distinct features, and vulnerable to mode collapse. In this paper, we propose an architecture MULTI-FLGAN to solve the problem of low-quality images, mode collapse, and instability for non-IID datasets. Our results show that MULTI-FLGAN is four times as stable and performant (i.e., high inception score) on average over 20 clients compared to baseline FLGAN.

Keywords: federated learning, generative adversarial network, inference attack, non-IID data distribution

Procedia PDF Downloads 136
536 Effect of Nitrogen Source on Production of CMCase by Bacillus megaterium 1295S Isolated from Sewage Treatment Plants

Authors: Adel A. S. Al-Gheethi, M. O. Abdul-Monem

Abstract:

Cellulase-producing bacteria were isolated from wastewater and sludge, and identified as Bacillus megaterium 1295S, Sporosarcina pasteurii 586S, Bacillus subtilis 117S, Burkholderia cepacia 120S and Staphylococcus xylosus 222W. Among bacteria, B. megaterium 1295S was the best cellulase producer under the catabolic repression and was therefore selected to study the factors affecting cellulase production. The optimum conditions for cellulase production were observed in CMC-Yeast Extract (CYE) agar medium (pH 6.5) inoculated with 0.4 mL of bacterial culture and incubated at 45˚C for 72 h. Twenty amino acids were introduced into the production medium as nitrogen source to investigate the production of cellulase in presence of amino acids in comparison to peptone (as an organic source) and sodium nitrate (as an inorganic source). The results found that the maximum production of cellulase was recorded at 50 ppm when L-hydroxy proline, L-arginine, glycine, L-histidine, L-leucine, DL-isoleucine, DL-β-phenylalanine were used as sole nitrogen sources and at 100 ppm when DL-threonine, L-ornithine 12.29, L-proline were used as sole nitrogen sources. The highest biomass yield was found when glycine 5 ppm and DL-serine 100 ppm used as a nitrogen source.

Keywords: CMCase, Bacillus megaterium 1295S, factors, amino acids

Procedia PDF Downloads 430
535 Contribution to the Study of the Use of Pesticides in the Regions of Tizi Ouzou

Authors: Ramdane Gaouir

Abstract:

Farmers in the two regions of Tizi-Ouzou, DBK and Tadmait, face different crop pests, namely, fungal diseases, insect attack as well as different types of deficiencies. To fight against all these threats, they resort to the use of a wide variety of chemicals. Our survey carried out in these two regions, aims to identify the different types of pesticides used, the method of management of the packaging generated by these phytosanitary products as well as the evaluation of the effect of these products on the farmers' health and the environment. The results obtained highlighted the use of two types of pesticides with a very wide application, namely fungicides and insecticides. The two most widely identified chemical families are neonicotoids and organophosphates, which are among the most toxic and persistent pesticides in the environment. The management method of packaging and the application of products by spraying reflect the lack of training and the unawareness of farmers vis-à-vis the impact of pesticides on their health and on the environment.

Keywords: farmers, crops, pesticides, fungicides, neonicotinoids, organochlorines

Procedia PDF Downloads 67
534 Riparian Buffer Strips’ Capability of E. coli Removal in New York Streams

Authors: Helen Sanders, Joshua Cousins

Abstract:

The purpose of this study is to ascertain whether riparian buffer strips could be used to reduce Escherichia Coli (E. coli) runoff into streams in Central New York. Mainstream methods currently utilized to reduce E. coli runoff include fencing and staggered fertilizing plans for agriculture. These methods still do not significantly limit E. coli and thus, pose a serious health risk to individuals who swim in contaminated waters or consume contaminated produce. One additional method still in research development involves the planting of vegetated riparian buffers along waterways. Currently, riparian buffer strips are primarily used for filtration of nitrate and phosphate runoff to slow erosion, regulate pH and, improve biodiversity within waterways. For my research, four different stream sites were selected for the study, in which rainwater runoff was collected at both the riparian buffer and the E. coli sourced runoff upstream. Preliminary results indicate that there is an average 70% decrease in E. coli content in streams at the riparian buffer strips compared to upstream runoff. This research could be utilized to include vegetated buffer planting as a method to decrease manure runoff into essential waterways.

Keywords: Escherichia coli, riparian buffer strips, vegetated riparian buffers, runoff, filtration

Procedia PDF Downloads 157
533 Experimental and Numerical Investigation of Flow Control Using a Novel Active Slat

Authors: Basman Elhadidi, Islam Elqatary, Osama Mohamady, Hesham Othman

Abstract:

An active slat is developed to increase the lift and delay the separation for a DU96-W180 airfoil. The active slat is a fixed slat that can be closed, fully opened or intermittently opened by a rotating vane depending on the need. Experimental results show that the active slat has reduced the mean pressure and increased the mean velocity on the suction side of the airfoil for all positive angles of attack, indicating an increase of lift. The experimental data and numerical simulations also show that the direction of actuator vane rotation can influence the mixing of the flow streams on the suction side and hence influence the aerodynamic performance.

Keywords: active slat, flow control, DU96-W180 airfoil, flow streams

Procedia PDF Downloads 359
532 Clicking Based Graphical Password Scheme Resistant to Spyware

Authors: Bandar Alahmadi

Abstract:

The fact that people tend to remember pictures better than texts, motivates researchers to develop graphical passwords as an alternative to textual passwords. Graphical passwords as such were introduced as a possible alternative to traditional text passwords, in which users prove their identity by clicking on pictures rather than typing alphanumerical text. In this paper, we present a scheme for graphical passwords that are resistant to shoulder surfing attacks and spyware attacks. The proposed scheme introduces a clicking technique to chosen images. First, the users choose a set of images, the images are then included in a grid where users can click in the cells around each image, the location of the click and the number of clicks are saved. As a result, the proposed scheme can be safe from shoulder surface and spyware attacks.

Keywords: security, password, authentication, attack, applications

Procedia PDF Downloads 148
531 Combination of Artificial Neural Network Model and Geographic Information System for Prediction Water Quality

Authors: Sirilak Areerachakul

Abstract:

Water quality has initiated serious management efforts in many countries. Artificial Neural Network (ANN) models are developed as forecasting tools in predicting water quality trend based on historical data. This study endeavors to automatically classify water quality. The water quality classes are evaluated using 6 factor indices. These factors are pH value (pH), Dissolved Oxygen (DO), Biochemical Oxygen Demand (BOD), Nitrate Nitrogen (NO3N), Ammonia Nitrogen (NH3N) and Total Coliform (T-Coliform). The methodology involves applying data mining techniques using multilayer perceptron (MLP) neural network models. The data consisted of 11 sites of Saen Saep canal in Bangkok, Thailand. The data is obtained from the Department of Drainage and Sewerage Bangkok Metropolitan Administration during 2007-2011. The results of multilayer perceptron neural network exhibit a high accuracy multilayer perception rate at 94.23% in classifying the water quality of Saen Saep canal in Bangkok. Subsequently, this encouraging result could be combined with GIS data improves the classification accuracy significantly.

Keywords: artificial neural network, geographic information system, water quality, computer science

Procedia PDF Downloads 324
530 Evaluation of Gesture-Based Password: User Behavioral Features Using Machine Learning Algorithms

Authors: Lakshmidevi Sreeramareddy, Komalpreet Kaur, Nane Pothier

Abstract:

Graphical-based passwords have existed for decades. Their major advantage is that they are easier to remember than an alphanumeric password. However, their disadvantage (especially recognition-based passwords) is the smaller password space, making them more vulnerable to brute force attacks. Graphical passwords are also highly susceptible to the shoulder-surfing effect. The gesture-based password method that we developed is a grid-free, template-free method. In this study, we evaluated the gesture-based passwords for usability and vulnerability. The results of the study are significant. We developed a gesture-based password application for data collection. Two modes of data collection were used: Creation mode and Replication mode. In creation mode (Session 1), users were asked to create six different passwords and reenter each password five times. In replication mode, users saw a password image created by some other user for a fixed duration of time. Three different duration timers, such as 5 seconds (Session 2), 10 seconds (Session 3), and 15 seconds (Session 4), were used to mimic the shoulder-surfing attack. After the timer expired, the password image was removed, and users were asked to replicate the password. There were 74, 57, 50, and 44 users participated in Session 1, Session 2, Session 3, and Session 4 respectfully. In this study, the machine learning algorithms have been applied to determine whether the person is a genuine user or an imposter based on the password entered. Five different machine learning algorithms were deployed to compare the performance in user authentication: namely, Decision Trees, Linear Discriminant Analysis, Naive Bayes Classifier, Support Vector Machines (SVMs) with Gaussian Radial Basis Kernel function, and K-Nearest Neighbor. Gesture-based password features vary from one entry to the next. It is difficult to distinguish between a creator and an intruder for authentication. For each password entered by the user, four features were extracted: password score, password length, password speed, and password size. All four features were normalized before being fed to a classifier. Three different classifiers were trained using data from all four sessions. Classifiers A, B, and C were trained and tested using data from the password creation session and the password replication with a timer of 5 seconds, 10 seconds, and 15 seconds, respectively. The classification accuracies for Classifier A using five ML algorithms are 72.5%, 71.3%, 71.9%, 74.4%, and 72.9%, respectively. The classification accuracies for Classifier B using five ML algorithms are 69.7%, 67.9%, 70.2%, 73.8%, and 71.2%, respectively. The classification accuracies for Classifier C using five ML algorithms are 68.1%, 64.9%, 68.4%, 71.5%, and 69.8%, respectively. SVMs with Gaussian Radial Basis Kernel outperform other ML algorithms for gesture-based password authentication. Results confirm that the shorter the duration of the shoulder-surfing attack, the higher the authentication accuracy. In conclusion, behavioral features extracted from the gesture-based passwords lead to less vulnerable user authentication.

Keywords: authentication, gesture-based passwords, machine learning algorithms, shoulder-surfing attacks, usability

Procedia PDF Downloads 85
529 Corrosion Investigation of Superalloys, Molybdenum and TZM in Chloride Molten Salts

Authors: Craig Jantzen, Tim Abram, Dirk Engelberg, Hugues Lambert, Daniel Cooper

Abstract:

Molten salts are of high interest for use as coolants in nuclear reactors due to favourable high temperature and thermodynamic properties. The corrosive behaviour of molten salts however pose a materials integrity challenge. Three Ni / Ni-Fe based and two Mo based alloys have been exposed to molten eutectics (LiCl-KCl at 59.5:40.5 mol% and KCl-MgCl2 at 68:32 mol%) at 600°C and 800°C for durations up to 500hrs. Corrosion was observed to preferentially attack alloy constituents in order of their reactivity, with chromium the most vulnerable and depleted element. Alloy weight-loss per unit area was calculated to give linear corrosion rates, discounting any initial rapid corrosion of impurities. Further analysis was carried out using ICP-MS, SEM and EDX techniques to give a more detailed view of the corrosion mechanisms.

Keywords: molten salt, salt, corrosion, high temperature, licl, KCL, MgCl, molybdenum, nickel, superalloys

Procedia PDF Downloads 423
528 Black-Box-Base Generic Perturbation Generation Method under Salient Graphs

Authors: Dingyang Hu, Dan Liu

Abstract:

DNN (Deep Neural Network) deep learning models are widely used in classification, prediction, and other task scenarios. To address the difficulties of generic adversarial perturbation generation for deep learning models under black-box conditions, a generic adversarial ingestion generation method based on a saliency map (CJsp) is proposed to obtain salient image regions by counting the factors that influence the input features of an image on the output results. This method can be understood as a saliency map attack algorithm to obtain false classification results by reducing the weights of salient feature points. Experiments also demonstrate that this method can obtain a high success rate of migration attacks and is a batch adversarial sample generation method.

Keywords: adversarial sample, gradient, probability, black box

Procedia PDF Downloads 74
527 Groundwater Pollution Models for Hebron/Palestine

Authors: Hassan Jebreen

Abstract:

These models of a conservative pollutant in groundwater do not include representation of processes in soils and in the unsaturated zone, or biogeochemical processes in groundwater, These demonstration models can be used as the basis for more detailed simulations of the impacts of pollution sources at a local scale, but such studies should address processes related to specific pollutant species, and should consider local hydrogeology in more detail, particularly in relation to possible impacts on shallow systems which are likely to respond more quickly to changes in pollutant inputs. The results have demonstrated the interaction between groundwater flow fields and pollution sources in abstraction areas, and help to emphasise that wadi development is one of the key elements of water resources planning. The quality of groundwater in the Hebron area indicates a gradual increase in chloride and nitrate with time. Since the aquifers in Hebron districts are highly vulnerable due to their karstic nature, continued disposal of untreated domestic and industrial wastewater into the wadi will lead to unacceptably poor water quality in drinking water, which may ultimately require expensive treatment if significant health problems are to be avoided. Improvements are required in wastewater treatment at the municipal and domestic levels, the latter requiring increased public awareness of the issues, as well as improved understanding of the hydrogeological behaviour of the aquifers.

Keywords: groundwater, models, pollutants, wadis, hebron

Procedia PDF Downloads 416
526 Reuse of Wastewater from the Treated Water Pre-treatment Plant for Agricultural Purposes

Authors: Aicha Assal, El Mostapha Lotfi

Abstract:

According to data from the Directorate General of Meteorology (DGM), the average amount of precipitation recorded nationwide between September 1, 2021, and January 31, 2022, is 38.8 millimeters. This is well below the climatological normal of 106.8 millimeters for the same period between 1981 and 2010. This situation is becoming increasingly worrying, particularly for farmers who are finding it difficult to irrigate their land and feed their livestock. Drought is greatly influenced by the effects of climate change, mainly caused by pollution and greenhouse gases (GHGs). The aim of this work is to contribute to the purification of wastewater (considered as polluting) in order to reuse it for irrigation in agricultural areas or for livestock watering. This will be achieved once physico-chemical treatment tests on these waters have been carried out and validated. The main parameters analyzed in this study, after carrying out discoloration tests on domestic wastewater, include COD (chemical oxygen demand), BOD5 (biochemical oxygen demand), pH, conductivity, dissolved oxygen, suspended solids (SS), phosphate, nitrate, nitrite and ammonium ions, faecal and total coliforms, as well as monitoring heavy metal concentrations. This work is also aimed at reclaiming the sludge produced by the decantation process, which will enable the waste to be transformed and reused as compost in agriculture and gardening.

Keywords: wastewater, irrigation, COD, COB, SS

Procedia PDF Downloads 53