Search results for: sulfuric acid attacks
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 3935

Search results for: sulfuric acid attacks

3515 DWT-SATS Based Detection of Image Region Cloning

Authors: Michael Zimba

Abstract:

A duplicated image region may be subjected to a number of attacks such as noise addition, compression, reflection, rotation, and scaling with the intention of either merely mating it to its targeted neighborhood or preventing its detection. In this paper, we present an effective and robust method of detecting duplicated regions inclusive of those affected by the various attacks. In order to reduce the dimension of the image, the proposed algorithm firstly performs discrete wavelet transform, DWT, of a suspicious image. However, unlike most existing copy move image forgery (CMIF) detection algorithms operating in the DWT domain which extract only the low frequency sub-band of the DWT of the suspicious image thereby leaving valuable information in the other three sub-bands, the proposed algorithm simultaneously extracts features from all the four sub-bands. The extracted features are not only more accurate representation of image regions but also robust to additive noise, JPEG compression, and affine transformation. Furthermore, principal component analysis-eigenvalue decomposition, PCA-EVD, is applied to reduce the dimension of the features. The extracted features are then sorted using the more computationally efficient Radix Sort algorithm. Finally, same affine transformation selection, SATS, a duplication verification method, is applied to detect duplicated regions. The proposed algorithm is not only fast but also more robust to attacks compared to the related CMIF detection algorithms. The experimental results show high detection rates.

Keywords: affine transformation, discrete wavelet transform, radix sort, SATS

Procedia PDF Downloads 230
3514 Security Design of Root of Trust Based on RISC-V

Authors: Kang Huang, Wanting Zhou, Shiwei Yuan, Lei Li

Abstract:

Since information technology develops rapidly, the security issue has become an increasingly critical for computer system. In particular, as cloud computing and the Internet of Things (IoT) continue to gain widespread adoption, computer systems need to new security threats and attacks. The Root of Trust (RoT) is the foundation for providing basic trusted computing, which is used to verify the security and trustworthiness of other components. Design a reliable Root of Trust and guarantee its own security are essential for improving the overall security and credibility of computer systems. In this paper, we discuss the implementation of self-security technology based on the RISC-V Root of Trust at the hardware level. To effectively safeguard the security of the Root of Trust, researches on security safeguard technology on the Root of Trust have been studied. At first, a lightweight and secure boot framework is proposed as a secure mechanism. Secondly, two kinds of memory protection mechanism are built to against memory attacks. Moreover, hardware implementation of proposed method has been also investigated. A series of experiments and tests have been carried on to verify to effectiveness of the proposed method. The experimental results demonstrated that the proposed approach is effective in verifying the integrity of the Root of Trust’s own boot rom, user instructions, and data, ensuring authenticity and enabling the secure boot of the Root of Trust’s own system. Additionally, our approach provides memory protection against certain types of memory attacks, such as cache leaks and tampering, and ensures the security of root-of-trust sensitive information, including keys.

Keywords: root of trust, secure boot, memory protection, hardware security

Procedia PDF Downloads 216
3513 Spatial and Temporal Evaluations of Disinfection By-Products Formation in Coastal City Distribution Systems of Turkey

Authors: Vedat Uyak

Abstract:

Seasonal variations of trihalomethanes (THMs) and haloacetic acids (HAAs) concentrations were investigated within three distribution systems of a coastal city of Istanbul, Turkey. Moreover, total trihalomethanes and other organics concentration were also analyzed. The investigation was based on an intensive 16 month (2009-2010) sampling program, undertaken during the spring, summer, fall and winter seasons. Four THM (chloroform, dichlorobromomethane, chlorodibromomethane, bromoform), and nine HAA (the most commonly occurring one being dichloroacetic acid (DCAA) and trichloroacetic acid (TCAA); other compounds are monochloroacetic acid (MCAA), monobromoacetic acid (MBAA), dibromoacetic acid (DBAA), tribromoacetic acid (TBAA), bromochloroacetic acid (BCAA), bromodichloroacetic acid (BDCAA) and chlorodibromoacetic acid (CDBAA)) species and other water quality and operational parameters were monitored at points along the distribution system between the treatment plant and the system’s extremity. The effects of coastal water sources, seasonal variation and spatial variation were examined. The results showed that THMs and HAAs concentrations vary significantly between treated waters and water at the distribution networks. When water temperature exceeds 26°C in summer, the THMs and HAAs levels are 0.8 – 1.1, and 0.4 – 0.9 times higher than treated water, respectively. While when water temperature is below 12°C in the winter, the measured THMs and HAAs concentrations at the system’s extremity were very rarely higher than 100 μg/L, and 60 μg/L, respectively. The highest THM concentrations occurred in the Buyukcekmece distribution system, with an average total HAA concentration of 92 μg/L. Moreover, the lowest THM levels were observed in the Omerli distribution network, with a mean concentration of 7 μg/L. For HAA levels, the maximum concentrations again were observed in the Buyukcekmece distribution system, with an average total HAA concentration of 57 μg/l. High spatial and seasonal variation of disinfection by-products in the drinking water of Istanbul was attributed of illegal wastewater discharges to water supplies of Istanbul city.

Keywords: disinfection byproducts, drinking water, trihalomethanes, haloacetic acids, seasonal variation

Procedia PDF Downloads 152
3512 Biohydrogen and Potential Vinegar Production from Agricultural Wastes Using Thermotoga neopolitana

Authors: Nidhi Nalin

Abstract:

This study is theoretical modelling of the fermentation process of glucose in agricultural wastes like discarded peaches to produce hydrogen, acetic acid, and carbon dioxide using Thermotoga neopolitana bacteria. The hydrogen gas produced in this process can be used in hydrogen fuel cells to generate power, and the fermented broth with acetic acid and salts could be utilized as salty vinegar if enough acetic acid is produced. The theoretical modelling was done using SuperPro software, and the results indicated how much sugar (discarded peaches) is required to produce both hydrogen and vinegar for the process to be profitable.

Keywords: fermentation, thermotoga, hydrogen, vinegar, biofuel

Procedia PDF Downloads 155
3511 Two-Level Graph Causality to Detect and Predict Random Cyber-Attacks

Authors: Van Trieu, Shouhuai Xu, Yusheng Feng

Abstract:

Tracking attack trajectories can be difficult, with limited information about the nature of the attack. Even more difficult as attack information is collected by Intrusion Detection Systems (IDSs) due to the current IDSs having some limitations in identifying malicious and anomalous traffic. Moreover, IDSs only point out the suspicious events but do not show how the events relate to each other or which event possibly cause the other event to happen. Because of this, it is important to investigate new methods capable of performing the tracking of attack trajectories task quickly with less attack information and dependency on IDSs, in order to prioritize actions during incident responses. This paper proposes a two-level graph causality framework for tracking attack trajectories in internet networks by leveraging observable malicious behaviors to detect what is the most probable attack events that can cause another event to occur in the system. Technically, given the time series of malicious events, the framework extracts events with useful features, such as attack time and port number, to apply to the conditional independent tests to detect the relationship between attack events. Using the academic datasets collected by IDSs, experimental results show that the framework can quickly detect the causal pairs that offer meaningful insights into the nature of the internet network, given only reasonable restrictions on network size and structure. Without the framework’s guidance, these insights would not be able to discover by the existing tools, such as IDSs. It would cost expert human analysts a significant time if possible. The computational results from the proposed two-level graph network model reveal the obvious pattern and trends. In fact, more than 85% of causal pairs have the average time difference between the causal and effect events in both computed and observed data within 5 minutes. This result can be used as a preventive measure against future attacks. Although the forecast may be short, from 0.24 seconds to 5 minutes, it is long enough to be used to design a prevention protocol to block those attacks.

Keywords: causality, multilevel graph, cyber-attacks, prediction

Procedia PDF Downloads 156
3510 Screening of Antioxidant Activity of Exopolysaccharides Produced by Lactic Acid Bacteria From Human Origin

Authors: Piña-Ronces Laura Gabriela, Reyes-Escogido María de Lourdes

Abstract:

Exist a large variability in Exopolysaccharides (EPS) produced by LAB depending on carbon source, they have multiple applications in food industry mainly, but they have become important for the health. In this study, we identified EPS-producing strains belonging to the BAL group; they were previously isolated from humans. After that, we extracted and evaluated the antioxidant activity of EPS produced by all strains. Antioxidant activity was determined by DPPH method using ascorbic acid as standard for both comparison and quantification. 31 strains (51.66 %) produced EPS at concentrations between 451 and 1.561 mg/l, 16 of EPS extracted showed antioxidant effect superior to ascorbic acid at the same concentrations. EPS-producing strains were L. plantarum, L. sp and L. fermentum corresponding to Lactobacillus genus and, E. faecium, E. durans, and E. hirae of Enterococcus genus. Antioxidant activity showed by EPS from 3 strains of L. plantarum and 3 strains of E. faecium was different into specie, while the antioxidant activity determined for EPS obtained from the other strains did not show difference at specie level, but was superior to ascorbic acid. EPS produced by L. plantarum and E. hirae had the best activity, it could be considerate for selection them as a possible new alternative for therapy or treatment of diseases related whit oxidative stress. Further studies about biological functions of EPS have to be conducted for new applications in health.

Keywords: oxidative stress, lactic acid bacteria, exopolysaccharides, antioxidant activity

Procedia PDF Downloads 360
3509 Efficient and Timely Mutual Authentication Scheme for RFID Systems

Authors: Hesham A. El Zouka, Mustafa M. Hosni ka

Abstract:

The Radio Frequency Identification (RFID) technology has a diverse base of applications, but it is also prone to security threats. There are different types of security attacks that limit the range of the RFID applications. For example, deploying the RFID networks in insecure environments could make the RFID system vulnerable to many types of attacks such as spoofing attack, location traceability attack, physical attack and many more. Therefore, security is often an important requirement for RFID systems. In this paper, RFID mutual authentication protocol is implemented based on mobile agent technology and timestamp, which are used to provide strong authentication and integrity assurances to both the RFID readers and their corresponding RFID tags. The integration of mobile agent technology and timestamp provides promising results towards achieving this goal and towards reducing the security threats in RFID systems.

Keywords: RFID, security, authentication protocols, privacy, agent-based architecture, time-stamp, digital signature

Procedia PDF Downloads 269
3508 Effect of Chitosan and Ascorbic Acid Coating on the Refrigerated Tilapia Fish Fillet (Oreochromis niliticus)

Authors: Jau-Shya Lee, Rossita Shapawi, Vin Cent Pua

Abstract:

Tilapia is a popular cultured fresh-water fish in Malaysia. The highly perishable nature of the fish and increasing demand for high-quality ready-to-cook fish has intensified the search for better fish preservation method. Chitosan edible coating has been evident to extend the shelf life of fish fillet. This work was attempted to explore the potential of ascorbic acid in enhancing the shelf life extension ability of chitosan coated Tilapia fillet under refrigeration condition (4 ± 1oC). A 3 2 Factorial Design which comprising of three concentrations of chitosan (1, 1.5 and 2%) and two concentrations of ascorbic acids (2.5 and 5%) was used. The fish fillets were analyzed for total viable count, thiobarbituric acid (TBA) value, pH, aw and colour changes at 3-day interval over 15-day storage. The shelf life of chitosan coated (1.5% and 2%) fillet was increased to 15 days as compared to uncoated fish fillet which can only last for nine days. The inhibition of microbial growth of fish fillet was enhanced with the addition of 5% of ascorbic acids in 2% of chitosan. The TBA value, pH and aw for chitosan coated samples were found lower than that of uncoated sample (p<0.05). The colour stability of the fish fillet was also improved by the composite coating. Overall, 2% of chitosan and 5% of ascorbic acid formed the most effective coating to enhance the quality and to lengthen the shelf life of refrigerated Tilapia fillet.

Keywords: ascorbic acid, chitosan, edible coating, fish fillet

Procedia PDF Downloads 394
3507 Analysis of Caffeic Acid from Myrica nagi Leaves by High Performance Liquid Chromatography

Authors: Preeti Panthari, Harsha Kharkwal

Abstract:

Myrica nagi belongs to Myricaceae family. It is known for its therapeutic use since ancient times. The leaves were extracted with methanol and further fractioned with different solvents with increasing polarity. The n-butanol fraction of methanol extract was passed through celite, on separation through silica gel column chromatography yielded ten fractions. For the first time we report isolation of Caffeic acid from n-butanol fraction of Myrica nagi leaves in Chloroform: methanol (70:30) fraction. The mobile phase used for analysis in HPLC was Methanol: water (60:40) at the flow rate of 1 ml/min at wavelength of 280 nm. The retention time was 2.66 mins.

Keywords: Myrica nagi, column chromatography, retention time, caffeic acid

Procedia PDF Downloads 553
3506 Variance-Aware Routing and Authentication Scheme for Harvesting Data in Cloud-Centric Wireless Sensor Networks

Authors: Olakanmi Oladayo Olufemi, Bamifewe Olusegun James, Badmus Yaya Opeyemi, Adegoke Kayode

Abstract:

The wireless sensor network (WSN) has made a significant contribution to the emergence of various intelligent services or cloud-based applications. Most of the time, these data are stored on a cloud platform for efficient management and sharing among different services or users. However, the sensitivity of the data makes them prone to various confidentiality and performance-related attacks during and after harvesting. Various security schemes have been developed to ensure the integrity and confidentiality of the WSNs' data. However, their specificity towards particular attacks and the resource constraint and heterogeneity of WSNs make most of these schemes imperfect. In this paper, we propose a secure variance-aware routing and authentication scheme with two-tier verification to collect, share, and manage WSN data. The scheme is capable of classifying WSN into different subnets, detecting any attempt of wormhole and black hole attack during harvesting, and enforcing access control on the harvested data stored in the cloud. The results of the analysis showed that the proposed scheme has more security functionalities than other related schemes, solves most of the WSNs and cloud security issues, prevents wormhole and black hole attacks, identifies the attackers during data harvesting, and enforces access control on the harvested data stored in the cloud at low computational, storage, and communication overheads.

Keywords: data block, heterogeneous IoT network, data harvesting, wormhole attack, blackhole attack access control

Procedia PDF Downloads 84
3505 Enhancing Email Security: A Multi-Layered Defense Strategy Approach and an AI-Powered Model for Identifying and Mitigating Phishing Attacks

Authors: Anastasios Papathanasiou, George Liontos, Athanasios Katsouras, Vasiliki Liagkou, Euripides Glavas

Abstract:

Email remains a crucial communication tool due to its efficiency, accessibility and cost-effectiveness, enabling rapid information exchange across global networks. However, the global adoption of email has also made it a prime target for cyber threats, including phishing, malware and Business Email Compromise (BEC) attacks, which exploit its integral role in personal and professional realms in order to perform fraud and data breaches. To combat these threats, this research advocates for a multi-layered defense strategy incorporating advanced technological tools such as anti-spam and anti-malware software, machine learning algorithms and authentication protocols. Moreover, we developed an artificial intelligence model specifically designed to analyze email headers and assess their security status. This AI-driven model examines various components of email headers, such as "From" addresses, ‘Received’ paths and the integrity of SPF, DKIM and DMARC records. Upon analysis, it generates comprehensive reports that indicate whether an email is likely to be malicious or benign. This capability empowers users to identify potentially dangerous emails promptly, enhancing their ability to avoid phishing attacks, malware infections and other cyber threats.

Keywords: email security, artificial intelligence, header analysis, threat detection, phishing, DMARC, DKIM, SPF, ai model

Procedia PDF Downloads 59
3504 TMBCoI-SIOT: Trust Management System Based on the Community of Interest for the Social Internet of Things

Authors: Oumaima Ben Abderrahim, Mohamed Houcine Elhedhili, Leila Saidane

Abstract:

In this paper, we propose a trust management system based on clustering architecture for the social internet of things called TMBCO-SIOT. The proposed model integrates numerous factors such as direct and indirect trust; transaction factor; precaution factor; and social modeling of trust. The novelty of our approach can be summed up in two aspects. The first aspect concerns the architecture based on the community of interest (CoT) where each community is headed by an administrator (admin). However, the second aspect is the trust management system that tries to prevent On-Off attacks and mitigates dishonest recommendations using the k-means algorithm and guarantor things. The effectiveness of the proposed system is proved by simulation against malicious nodes.

Keywords: IoT, trust management system, attacks, trust, dishonest recommendations, K-means algorithm

Procedia PDF Downloads 212
3503 Study of Coconut and Babassu Oils with High Acid Content and the Fatty Acids (C6 to C16) Obtained from These Oils

Authors: Flávio A. F. da Ponte, Jackson Q. Malveira, José A. S. Ramos Filho, Monica C. G. Albuquerque

Abstract:

The vegetable oils have many applications in industrial processes and due to this potential have constantly increased the demand for the use of low-quality oils, mainly in the production of biofuel. This work aims to the physicochemical evaluation of babassu oil (Orbinya speciosa) and coconut (Cocos nucifera) of low quality, as well the obtaining the free fatty acids 6 to 16 carbon atoms, with intention to be used as raw material for the biofuels production. The babassu oil and coconut low quality, as well the fatty acids obtained from these oils were characterized as their physicochemical properties and fatty acid composition (using gas chromatography coupled to mass). The NMR technique was used to assess the efficiency of fractional distillation under reduced pressure to obtain the intermediate carbonic chain fatty acids. The results showed that the bad quality in terms of physicochemical evaluation of babassu oils and coconut oils interfere directly in industrial application. However the fatty acids of intermediate carbonic chain (C6 to C16) may be used in cosmetic, pharmaceutical and particularly as the biokerosene fuel. The chromatographic analysis showed that the babassu oil and coconut oil have as major fatty acids are lauric acid (57.5 and 38.6%, respectively), whereas the top phase from distillation of coconut oil showed caprylic acid (39.1%) and major fatty acid.

Keywords: babassu oil (Orbinya speciosa), coconut oil (Cocos nucifera), fatty acids, biomass

Procedia PDF Downloads 321
3502 Exploratory Study to Obtain a Biolubricant Base from Transesterified Oils of Animal Fats (Tallow)

Authors: Carlos Alfredo Camargo Vila, Fredy Augusto Avellaneda Vargas, Debora Alcida Nabarlatz

Abstract:

Due to the current need to implement environmentally friendly technologies, the possibility of using renewable raw materials to produce bioproducts such as biofuels, or in this case, to produce biolubricant bases, from residual oils (tallow), originating has been studied of the bovine industry. Therefore, it is hypothesized that through the study and control of the operating variables involved in the reverse transesterification method, a biolubricant base with high performance is obtained on a laboratory scale using animal fats from the bovine industry as raw materials, as an alternative for material recovery and environmental benefit. To implement this process, esterification of the crude tallow oil must be carried out in the first instance, which allows the acidity index to be decreased ( > 1 mg KOH/g oil), this by means of an acid catalysis with sulfuric acid and methanol, molar ratio 7.5:1 methanol: tallow, 1.75% w/w catalyst at 60°C for 150 minutes. Once the conditioning has been completed, the biodiesel is continued to be obtained from the improved sebum, for which an experimental design for the transesterification method is implemented, thus evaluating the effects of the variables involved in the process such as the methanol molar ratio: improved sebum and catalyst percentage (KOH) over methyl ester content (% FAME). Finding that the highest percentage of FAME (92.5%) is given with a 7.5:1 methanol: improved tallow ratio and 0.75% catalyst at 60°C for 120 minutes. And although the% FAME of the biodiesel produced does not make it suitable for commercialization, it does ( > 90%) for its use as a raw material in obtaining biolubricant bases. Finally, once the biodiesel is obtained, an experimental design is carried out to obtain biolubricant bases using the reverse transesterification method, which allows the study of the effects of the biodiesel: TMP (Trimethylolpropane) molar ratio and the percentage of catalyst on viscosity and yield as response variables. As a result, a biolubricant base is obtained that meets the requirements of ISO VG (Classification for industrial lubricants according to ASTM D 2422) 32 (viscosity and viscosity index) for commercial lubricant bases, using a 4:1 biodiesel molar ratio: TMP and 0.51% catalyst at 120°C, at a pressure of 50 mbar for 180 minutes. It is necessary to highlight that the product obtained consists of two phases, a liquid and a solid one, being the first object of study, and leaving the classification and possible application of the second one incognito. Therefore, it is recommended to carry out studies of the greater depth that allows characterizing both phases, as well as improving the method of obtaining by optimizing the variables involved in the process and thus achieving superior results.

Keywords: biolubricant base, bovine tallow, renewable resources, reverse transesterification

Procedia PDF Downloads 117
3501 Surface Enhanced Raman Substrate Detection on the Structure of γ-Aminobutyric Acid(GABA) Connected with Modified Gold-Chitosan Nanoparticles by Mercaptopropionic Acid (MPA)

Authors: Bingjie Wang, Su-Yeon Kwon, Ik-Joong Kang

Abstract:

A Surface-enhanced Raman Scattering (SERS) as the principle for enhancing Raman scattering by molecules adsorbed on rough metal surfaces or by nanostructures is used to detect the concentration change of γ-Aminobutyric Acid (GABA). As for the gold-chitosan nanoshell, it is made by using chitosan nanoparticles crosslinking with sodium tripolyphosphate(TPP) for the first step to form the chitosan nanoparticles, which would be covered with the gold sequentially. The size of the fabricated product was around 100nm. Based on the method that the sulfur end of the MPA linked to gold can form the very strong S–Au bond, and the carboxyl group, the other end of the MPA, can easily absorb the GABA. GABA is the mainly inhibitory neurotransmitter in the mammalian central nervous system in the human body. It plays such significant role in reducing neuronal excitability throughout the nervous system. When the system formed, it generated SERS, which made a clear difference in the intensity of Raman scattering within the range of GABA concentration. So it is obtained from the experiment that the calibration curve according to the GABA concentration relevant with the SERS scattering. In this study, DLS, SEM, FT-IR, UV, SERS were used to analyze the products to obtain the conclusion.

Keywords: chitosan-gold nanoshell, mercaptopropionic acid, γ-aminobutyric acid, surface-enhanced Raman scattering

Procedia PDF Downloads 264
3500 An Earth Mover’s Distance Algorithm Based DDoS Detection Mechanism in SDN

Authors: Yang Zhou, Kangfeng Zheng, Wei Ni, Ren Ping Liu

Abstract:

Software-defined networking (SDN) provides a solution for scalable network framework with decoupled control and data plane. However, this architecture also induces a particular distributed denial-of-service (DDoS) attack that can affect or even overwhelm the SDN network. DDoS attack detection problem has to date been mostly researched as entropy comparison problem. However, this problem lacks the utilization of SDN, and the results are not accurate. In this paper, we propose a DDoS attack detection method, which interprets DDoS detection as a signature matching problem and is formulated as Earth Mover’s Distance (EMD) model. Considering the feasibility and accuracy, we further propose to define the cost function of EMD to be a generalized Kullback-Leibler divergence. Simulation results show that our proposed method can detect DDoS attacks by comparing EMD values with the ones computed in the case without attacks. Moreover, our method can significantly increase the true positive rate of detection.

Keywords: DDoS detection, EMD, relative entropy, SDN

Procedia PDF Downloads 338
3499 Body Mass Index, Components of Metabolic Syndrome and Hyperuricemia among Women in Postmenopausal Period

Authors: Vladyslav Povoroznyuk, Galina Dubetska, Roksolana Povoroznyuk

Abstract:

In recent years, the problem of hyperuricemia is getting a particular importance due to its increased incidence in the world population. The aim of this study was to determine uriс acid level in blood serum, incidence of hyperuricemia among women in postmenopausal period and their association with body mass index and some components of metabolic syndrome (triglyceride, cholesterol, systolic and diastolic pressure). We examined 412 women in postmenopausal period. They were divided in to the following groups: I group (BMI = 18,5-24,9), II group (BMI = 25,0-29,9), III group (BMI = 30,0-34,9), IV group (BMI > 35). We determined uric acid level among women during postmenopausal period depending on their body mass index. The higher level of uric acid was found in patients with the maximal body mass index (BMI > 35). In the I group it was 277,52 ± 8,40; in the II group – 286,81 ± 7,79; in the III group – 291,81 ± 7,56; in the IV group – 327,17 ± 12,17. Incidence of hyperuricemia among women in the I group was 10,2%, in the II group – 15,9%; in the III group – 21,2%, in the IV group – 34,2%. We found an interdependence between an uric acid level and BMI in the examined women (r = 0,21, p < 0,05). We determined that the highest level of triglyceride (F = 18,62, p < 0,05), cholesterol (F = 3,64, p < 0,05), atherogenic coefficient (F = 22,64, p < 0,05), systolic (F = 10,5, p < 0,05) and diastolic pressure (F = 4,30, p < 0,05) was among women with hyperuricemia. It was an interdependence between an uric acid level and triglyceride (r = 0,26, p < 0,05), atherogenic coefficient (r = 0,24, p < 0,05) among women in postmenopausal period.

Keywords: hyperuricemia, uric acid, body mass index, women

Procedia PDF Downloads 130
3498 The Effects of Ellagic Acid on Rat Heart Induced Tobacco Smoke

Authors: Nalan Kaya, D. Ozlem Dabak, Gonca Ozan, Elif Erdem, Enver Ozan

Abstract:

One of the common causes of cardiovascular disease (CVD) is smoking. Moreover, tobacco smoke decreases the amount of oxygen that the blood can carry and increases the tendency for blood clots. Ellagic acid is a powerful antioxidant found especially in red fruits. It was shown to block atherosclerotic process suppressing oxidative stress and inflammation. The aim of this study was to examine the protective effects of ellagic acid against oxidative damage on heart tissues of rats induced by tobacco smoke. Twenty-four male adult (8 weeks old) Spraque-Dawley rats were divided randomly into 4 equal groups: group I (Control), group II (Tobacco smoke), group III (Tobacco smoke + corn oil) and group IV (Tobacco smoke + ellagic acid). The rats in group II, III and IV, were exposed to tobacco smoke 1 hour twice a day for 12 weeks. In addition to tobacco smoke exposure, 12 mg/kg ellagic acid (dissolved in corn oil), was applied to the rats in group IV by oral gavage. An equal amount of corn oil used in solving ellagic acid was applied to the rats by oral gavage in group III. At the end of the experimental period, rats were decapitated. Heart tissues and blood samples were taken. Histological and biochemical analyzes were performed. Vascular congestion, hyperemic areas, inflammatory cell infiltration and increased connective tissue in the perivascular area were observed in tobacco smoke and tobacco smoke + corn oil groups. Increased connective tissue in the perivascular area, hemorrhage and inflammatory cell infiltration were decreased in tobacco smoke + EA group. Group-II GSH level was not changed (significantly), CAT, SOD, GPx activities were significantly higher than group-I. Compared to group-II, group-IV GSH, SOD, CAT, GPx activities were increased, and MDA level was decreased significantly. Group-II and Group-III levels were similar. The results indicate that ellagic acid could protect the heart tissue from the tobacco smoke harmful effects.

Keywords: ellagic acid, heart, rat, tobacco smoke

Procedia PDF Downloads 225
3497 Synthesis and Antibacterial Evaluation of Natural Bioactive 3,4-DihydroisocoumarinAnalogues

Authors: Hummera Rafique, Aamer Saeed

Abstract:

Synthesis of structural analogues of various well known bioactive natural 3,4-dihydroisocoumarins viz. Scorzocreticin, Annulatomarin, Montroumarin, and Thunberginol B, have been carried out starting from 3,5-dimethoxy-4-methylphenyl acetic acid. 3,5-Dimethoxy-4-methylphenyl acetic acid was then condensed with various aryl acid chlorides (a-e) to afford the corresponding 6,8-dimethoxy-7-methyl-3-aryl isocoumarins (5a-e). The alkaline hydrolysis of isocoumarins yields keto-acids (3a-e), which were then reduced to hydroxyacids, followed by cyclodehydration with acetic anhydride furnish corresponding 3,4-dihydroisocoumarins (7a-e). Finally, demethylation of 3,4-dihydroisocoumarins was carried out to afford 6,8-dihydroxy-7-methyl-3-aryl-3,4-dihydroisocoumarins (7a-e). Antibacterial evaluation of all the synthesized compounds were carried out against ten bacterial strains, it was concluded that isocoumarins (5a-e) and 3,4-dihydroisocoumarins (7a-e) are more active against gram positive bacteria then gram negative. However, the 6,8-dihydroxy-3,4-dihydroisocoumarin derivatives (8a-e) are more active against gram negative then gram positive.

Keywords: 3, 5-Dimethoxy-4-methylhomophthalic acid, natural 3, 4-Dihydroisocoumarin analogues, antibacterial activity, isocoumarins, demethylation

Procedia PDF Downloads 403
3496 Case Study on Innovative Aquatic-Based Bioeconomy for Chlorella sorokiniana

Authors: Iryna Atamaniuk, Hannah Boysen, Nils Wieczorek, Natalia Politaeva, Iuliia Bazarnova, Kerstin Kuchta

Abstract:

Over the last decade due to climate change and a strategy of natural resources preservation, the interest for the aquatic biomass has dramatically increased. Along with mitigation of the environmental pressure and connection of waste streams (including CO2 and heat emissions), microalgae bioeconomy can supply food, feed, as well as the pharmaceutical and power industry with number of value-added products. Furthermore, in comparison to conventional biomass, microalgae can be cultivated in wide range of conditions without compromising food and feed production, thus addressing issues associated with negative social and the environmental impacts. This paper presents the state-of-the art technology for microalgae bioeconomy from cultivation process to production of valuable components and by-streams. Microalgae Chlorella sorokiniana were cultivated in the pilot-scale innovation concept in Hamburg (Germany) using different systems such as race way pond (5000 L) and flat panel reactors (8 x 180 L). In order to achieve the optimum growth conditions along with suitable cellular composition for the further extraction of the value-added components, process parameters such as light intensity, temperature and pH are continuously being monitored. On the other hand, metabolic needs in nutrients were provided by addition of micro- and macro-nutrients into a medium to ensure autotrophic growth conditions of microalgae. The cultivation was further followed by downstream process and extraction of lipids, proteins and saccharides. Lipids extraction is conducted in repeated-batch semi-automatic mode using hot extraction method according to Randall. As solvents hexane and ethanol are used at different ratio of 9:1 and 1:9, respectively. Depending on cell disruption method along with solvents ratio, the total lipids content showed significant variations between 8.1% and 13.9 %. The highest percentage of extracted biomass was reached with a sample pretreated with microwave digestion using 90% of hexane and 10% of ethanol as solvents. Proteins content in microalgae was determined by two different methods, namely: Total Kejadahl Nitrogen (TKN), which further was converted to protein content, as well as Bradford method using Brilliant Blue G-250 dye. Obtained results, showed a good correlation between both methods with protein content being in the range of 39.8–47.1%. Characterization of neutral and acid saccharides from microalgae was conducted by phenol-sulfuric acid method at two wavelengths of 480 nm and 490 nm. The average concentration of neutral and acid saccharides under the optimal cultivation conditions was 19.5% and 26.1%, respectively. Subsequently, biomass residues are used as substrate for anaerobic digestion on the laboratory-scale. The methane concentration, which was measured on the daily bases, showed some variations for different samples after extraction steps but was in the range between 48% and 55%. CO2 which is formed during the fermentation process and after the combustion in the Combined Heat and Power unit can potentially be used within the cultivation process as a carbon source for the photoautotrophic synthesis of biomass.

Keywords: bioeconomy, lipids, microalgae, proteins, saccharides

Procedia PDF Downloads 245
3495 Effect of Slag Application to Soil Chemical Properties and Rice Yield on Acid Sulphate Soils with Different Pyrite Depth

Authors: Richardo Y. E. Sihotang, Atang Sutandi, Joshua Ginting

Abstract:

The expansion of marginal soil such as acid sulphate soils for the development of staple crops, including rice was unavoidable. However, acid sulphate soils were less suitable for rice field due to the low fertility and the threats of pyrite oxidation. An experiment using Randomized Complete Block Design was designed to investigate the effect of slag in stabilizing soil reaction (pH), improving soil fertility and rice yield. Experiments were conducted in two locations with different pyrite depth. The results showed that slag application was able to decrease the exchangeable Al and available iron (Fe) as well as increase the soil pH, available-P, soil exchangeable Ca2+, Mg2+, and K+. Furthermore, the slag application increased the plant nutrient uptakes, particularly N, P, K, followed by the increasing of rice yield significantly. Nutrients availability, nutrient uptake, and rice yield were higher in the shallow pyrite soil instead of the deep pyrite soil. In addition, slag application was economically feasible due to the ability to reduce standard fertilizer requirements.

Keywords: acid sulphate soils, available nutrients, pyrite, slag

Procedia PDF Downloads 303
3494 Microwave Assisted Thermal Cracking of Castor Oil Zeolite ZSM-5 as Catalyst for Biofuel Production

Authors: Ghazi Faisal Najmuldeen, Ali Abdul Rahman–Al Ezzi, Tharmathas A/L Alagappan

Abstract:

The aim of this investigation was to produce biofuel from castor oil through microwave assisted thermal cracking with zeolite ZSM-5 as catalyst. The obtained results showed that microwave assisted thermal cracking of castor oil with Zeolite ZSM-5 as catalyst generates products consisting of alcohol, methyl esters and fatty acids. The products obtained from this experimental procedure by the cracking of castor oil are components of biodiesel. Samples of cracked castor oil containing 1, 3 and 5wt % catalyst was analyzed, however, only the sample containing the 5wt % catalyst showed significant presence of condensate. FTIR and GCMS studies show that the condensate obtained is an unsaturated fatty acid, is 9, 12-octadecadienoic acid, suitable for biofuel use. 9, 12-octadecadienoic acid is an unsaturated fatty acid with a molecular weight of 280.445 g/mol. Characterization of the sample demonstrates that functional group for the products from the three samples display a similar peak in the FTIR graph analysis at 1700 cm-1 and 3600 cm-1. The result obtained from GCMS shows that there are 16 peaks obtained from the sample. The compound with the highest peak area is 9, 12-octadecadienoic acid with a retention time of 9.941 and 24.65 peak areas. All these compounds are organic material and can be characterized as biofuel and biodiesel.

Keywords: castor oil, biofuel, biodiesel, thermal cracking, microwave

Procedia PDF Downloads 232
3493 Constructing a Semi-Supervised Model for Network Intrusion Detection

Authors: Tigabu Dagne Akal

Abstract:

While advances in computer and communications technology have made the network ubiquitous, they have also rendered networked systems vulnerable to malicious attacks devised from a distance. These attacks or intrusions start with attackers infiltrating a network through a vulnerable host and then launching further attacks on the local network or Intranet. Nowadays, system administrators and network professionals can attempt to prevent such attacks by developing intrusion detection tools and systems using data mining technology. In this study, the experiments were conducted following the Knowledge Discovery in Database Process Model. The Knowledge Discovery in Database Process Model starts from selection of the datasets. The dataset used in this study has been taken from Massachusetts Institute of Technology Lincoln Laboratory. After taking the data, it has been pre-processed. The major pre-processing activities include fill in missed values, remove outliers; resolve inconsistencies, integration of data that contains both labelled and unlabelled datasets, dimensionality reduction, size reduction and data transformation activity like discretization tasks were done for this study. A total of 21,533 intrusion records are used for training the models. For validating the performance of the selected model a separate 3,397 records are used as a testing set. For building a predictive model for intrusion detection J48 decision tree and the Naïve Bayes algorithms have been tested as a classification approach for both with and without feature selection approaches. The model that was created using 10-fold cross validation using the J48 decision tree algorithm with the default parameter values showed the best classification accuracy. The model has a prediction accuracy of 96.11% on the training datasets and 93.2% on the test dataset to classify the new instances as normal, DOS, U2R, R2L and probe classes. The findings of this study have shown that the data mining methods generates interesting rules that are crucial for intrusion detection and prevention in the networking industry. Future research directions are forwarded to come up an applicable system in the area of the study.

Keywords: intrusion detection, data mining, computer science, data mining

Procedia PDF Downloads 296
3492 Feasibility Study of Mine Tailing’s Treatment by Acidithiobacillus thiooxidans DSM 26636

Authors: M. Gómez-Ramírez, A. Rivas-Castillo, I. Rodríguez-Pozos, R. A. Avalos-Zuñiga, N. G. Rojas-Avelizapa

Abstract:

Among the diverse types of pollutants produced by anthropogenic activities, metals represent a serious threat, due to their accumulation in ecosystems and their elevated toxicity. The mine tailings of abandoned mines contain high levels of metals such as arsenic (As), zinc (Zn), copper (Cu), and lead (Pb), which do not suffer any degradation process, they are accumulated in environment. Abandoned mine tailings potentially could contaminate rivers and aquifers representing a risk for human health due to their high metal content. In an attempt to remove the metals and thereby mitigate the environmental pollution, an environmentally friendly and economical method of bioremediation has been introduced. Bioleaching has been actively studied over the last several years, and it is one of the bioremediation solutions used to treat heavy metals contained in sewage sludge, sediment and contaminated soil. Acidithiobacillus thiooxidans, an extremely acidophilic, chemolithoautotrophic, gram-negative, rod shaped microorganism, which is typically related to Cu mining operations (bioleaching), has been well studied for industrial applications. The sulfuric acid produced plays a major role in bioleaching. Specifically, Acidithiobacillus thiooxidans strain DSM 26636 has been able to leach Al, Ni, V, Fe, Mg, Si, and Ni contained in slags from coal combustion wastes. The present study reports the ability of A. thiooxidans DSM 26636 for the bioleaching of metals contained in two different mine tailing samples (MT1 and MT2). It was observed that Al, Fe, and Mn were removed in 36.3±1.7, 191.2±1.6, and 4.5±0.2 mg/kg for MT1, and in 74.5±0.3, 208.3±0.5, and 20.9±0.1 for MT2. Besides, < 1.5 mg/kg of Au and Ru were also bioleached from MT1; in MT2, bioleaching of Zn was observed at 55.7±1.3 mg/kg, besides removal of < 1.5 mg/kg was observed for As, Ir, Li, and 0.6 for Os in this residue. These results show the potential of strain DSM 26636 for the bioleaching of metals that came from different mine tailings.

Keywords: A. thiooxidans, bioleaching, metals, mine tailings

Procedia PDF Downloads 294
3491 Biosorption of Nickel by Penicillium simplicissimum SAU203 Isolated from Indian Metalliferous Mining Overburden

Authors: Suchhanda Ghosh, A. K. Paul

Abstract:

Nickel, an industrially important metal is not mined in India, due to the lack of its primary mining resources. But, the chromite deposits occurring in the Sukinda and Baula-Nuasahi region of Odhisa, India, is reported to contain around 0.99% of nickel entrapped in the goethite matrix of the lateritic iron rich ore. Weathering of the dumped chromite mining overburden often leads to the contamination of the ground as well as the surface water with toxic nickel. Microbes inherent to this metal contaminated environment are reported to be capable of removal as well as detoxification of various metals including nickel. Nickel resistant fungal isolates obtained in pure form from the metal rich overburden were evaluated for their potential to biosorb nickel by using their dried biomass. Penicillium simplicissimum SAU203 was the best nickel biosorbant among the 20 fungi tested and was capable to sorbing 16.85 mg Ni/g biomass from a solution containing 50 mg/l of Ni. The identity of the isolate was confirmed using 18S rRNA gene analysis. The sorption capacity of the isolate was further standardized following Langmuir and Freundlich adsorption isotherm models and the results reflected energy efficient sorption. Fourier-transform infrared spectroscopy studies of the nickel loaded and control biomass in a comparative basis revealed the involvement of hydroxyl, amine and carboxylic groups in Ni binding. The sorption process was also optimized for several standard parameters like initial metal ion concentration, initial sorbet concentration, incubation temperature and pH, presence of additional cations and pre-treatment of the biomass by different chemicals. Optimisation leads to significant improvements in the process of nickel biosorption on to the fungal biomass. P. simplicissimum SAU203 could sorb 54.73 mg Ni/g biomass with an initial Ni concentration of 200 mg/l in solution and 21.8 mg Ni/g biomass with an initial biomass concentration of 1g/l solution. Optimum temperature and pH for biosorption was recorded to be 30°C and pH 6.5 respectively. Presence of Zn and Fe ions improved the sorption of Ni(II), whereas, cobalt had a negative impact. Pre-treatment of biomass with various chemical and physical agents has affected the proficiency of Ni sorption by P. simplicissimum SAU203 biomass, autoclaving as well as treatment of biomass with 0.5 M sulfuric acid and acetic acid reduced the sorption as compared to the untreated biomass, whereas, NaOH and Na₂CO₃ and Twin 80 (0.5 M) treated biomass resulted in augmented metal sorption. Hence, on the basis of the present study, it can be concluded that P. simplicissimum SAU203 has the potential for the removal as well as detoxification of nickel from contaminated environments in general and particularly from the chromite mining areas of Odhisa, India.

Keywords: nickel, fungal biosorption, Penicillium simplicissimum SAU203, Indian chromite mines, mining overburden

Procedia PDF Downloads 191
3490 Production of Soy Yoghurt Using Soymilk-Based Lactic Acid Bacteria as Starter Culture

Authors: Ayobami Solomon Popoola, Victor N. Enujiugha

Abstract:

Production of soy-yogurt by fermentation of soymilk with lactic acid bacteria isolated from soymilk was studied. Soymilk was extracted from dehulled soybean seeds and pasteurized at 95 °C for 15 min. The soymilk was left to naturally ferment (temperature 40 °C; time 8 h) and lactic acid bacteria were isolated, screened and selected for yogurt production. Freshly prepared soymilk was pasteurized (95 °C, 15 min), inoculated with the lactic acid bacteria isolated (3% w/v starter culture) and incubated at 40 °C for 8 h. The yogurt produced was stored at 4 °C. Investigations were carried out with the aim of improving the sensory qualities and acceptability of soy yogurt. Commercial yogurt was used as a control. The percentage of soymilk inoculated was 70% of the broth. Soy-yoghurt samples produced were subsequently subjected to biochemical and microbiological assays which included total viable counts of fresh milk and soy-based yoghurt; proximate composition of functional soy-based yoghurt fermented with Lactobacillus plantarum; changes in pH, Titratable acidity, and lactic acid bacteria during a 14 day period of storage; as well as morphological and biochemical characteristics of lactic acid bacteria isolated. The results demonstrated that using Lactobacillus plantarum to inoculate soy milk for yogurt production takes about 8 h. The overall acceptability of the soy-based yogurt produced was not significantly different from that of the control sample. The use of isolate from soymilk had the added advantage of reducing the cost of yogurt starter culture, thereby making soy-yogurt, a good source of much desired good quality protein. However, more experiments are needed to improve the sensory qualities such as beany or astringent flavor and color.

Keywords: soy, soymilk, yoghurt, starter culture

Procedia PDF Downloads 263
3489 Polyacrylates in Poly (Lactic Acid) Matrix, New Biobased Polymer Material

Authors: Irena Vuković-Kwiatkowska, Halina Kaczmarek

Abstract:

Poly (lactic acid) is well known polymer, often called green material because of its origin (renewable resources) and biodegradability. This biopolymer can be used in the packaging industry very often. Poor resistance to permeation of gases is the disadvantage of poly (lactic acid). The permeability of gases and vapor through the films applied for packages and bottles generally should be very low to prolong products shelf-life. We propose innovation method of PLA gas barrier modification using electromagnetic radiation in ultraviolet range. Poly (lactic acid) (PLA) and multifunctional acrylate monomers were mixed in different composition. Final films were obtained by photochemical reaction (photocrosslinking). We tested permeability to water vapor and carbon dioxide through these films. Also their resistance to UV radiation was also studied. The samples were conditioned in the activated sludge and in the natural soil to test their biodegradability. An innovative method of PLA modification allows to expand its usage, and can reduce the future costs of waste management what is the result of consuming such materials like PET and HDPE. Implementation of our material for packaging will contribute to the protection of the environment from the harmful effects of extremely difficult to biodegrade materials made from PET or other plastic

Keywords: interpenetrating polymer network, packaging films, photocrosslinking, polyacrylates dipentaerythritol pentaacrylate DPEPA, poly (lactic acid), polymer biodegradation

Procedia PDF Downloads 478
3488 The Study of Security Techniques on Information System for Decision Making

Authors: Tejinder Singh

Abstract:

Information system is the flow of data from different levels to different directions for decision making and data operations in information system (IS). Data can be violated by different manner like manual or technical errors, data tampering or loss of integrity. Security system called firewall of IS is effected by such type of violations. The flow of data among various levels of Information System is done by networking system. The flow of data on network is in form of packets or frames. To protect these packets from unauthorized access, virus attacks, and to maintain the integrity level, network security is an important factor. To protect the data to get pirated, various security techniques are used. This paper represents the various security techniques and signifies different harmful attacks with the help of detailed data analysis. This paper will be beneficial for the organizations to make the system more secure, effective, and beneficial for future decisions making.

Keywords: information systems, data integrity, TCP/IP network, vulnerability, decision, data

Procedia PDF Downloads 307
3487 Attack Redirection and Detection using Honeypots

Authors: Chowduru Ramachandra Sharma, Shatunjay Rawat

Abstract:

A false positive state is when the IDS/IPS identifies an activity as an attack, but the activity is acceptable behavior in the system. False positives in a Network Intrusion Detection System ( NIDS ) is an issue because they desensitize the administrator. It wastes computational power and valuable resources when rules are not tuned properly, which is the main issue with anomaly NIDS. Furthermore, most false positives reduction techniques are not performed during the real-time of attempted intrusions; instead, they have applied afterward on collected traffic data and generate alerts. Of course, false positives detection in ‘offline mode’ is tremendously valuable. Nevertheless, there is room for improvement here; automated techniques still need to reduce False Positives in real-time. This paper uses the Snort signature detection model to redirect the alerted attacks to Honeypots and verify attacks.

Keywords: honeypot, TPOT, snort, NIDS, honeybird, iptables, netfilter, redirection, attack detection, docker, snare, tanner

Procedia PDF Downloads 156
3486 Metabolic Engineering of Yarrowia Lipolytica for the Simultaneous Production of Succinic Acid (SA) and Polyhydroxyalkanoates (PHAs)

Authors: Qingsheng Qi, Cuijuan Gao, Carol Sze Ki Lin

Abstract:

Food waste can be defined as a by-product of food processing by industries and consumers, which has not been recycled or used for other purposes. Stringent waste regulations worldwide are pushing local companies and sectors towards higher sustainability standards. The development of novel strategies for food waste re-use is economically and environmentally sound, as it solves a waste management issue and represents an inexpensive nutrient source for biotechnological processes. For example, Yarrowia lipolytica is a yeast which can utilize hydrophobic substrates, such as fatty acids, lipids, and alkanes and simple carbon sources, such as glucose and glycerol, which can all be found in food waste. This broad substrate range makes Y. lipolytica a promising candidate for the degradation and valorisation of food waste, and for the production of organic acids, such as citric and α-ketoglutaric acids. Current research conducted in our group demonstrated that Y. lipolytica was shown to be able to produce succinic acid. In this talk, we will focus on the application of genetically modified yeast Y. lipolytica for fermentative succinic acid production with an aim to increase productivity and yield.

Keywords: food waste, succinic acid, Yarrowia lipolytica, bioplastic

Procedia PDF Downloads 291