Search results for: salt and peppers attacks
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 1260

Search results for: salt and peppers attacks

1230 Fused Salt Electrolysis of Rare-Earth Materials from the Domestic Ore and Preparation of Rare-Earth Hydrogen Storage Alloys

Authors: Jeong-Hyun Yoo, Hanjung Kwon, Sung-Wook Cho

Abstract:

Fused salt electrolysis was studied to make the high purity rare-earth metals using domestic rare-earth ore. The target metals of the fused salt electrolysis were Mm (Misch metal), La, Ce, Nd, etc. Fused salt electrolysis was performed with the supporting salt such as chloride and fluoride at the various temperatures and ampere. The metals made by fused salt electrolysis were analyzed to identify the phase and composition using the methods of XRD and ICP. As a result, the acquired rare-earth metals were the high purity ones which had more than 99% purity. Also, VIM (vacuum induction melting) was studied to make the kg level rare-earth alloy for the use of secondary battery and hydrogen storage. In order to indentify the physicochemical properties such as phase, impurity gas, alloy composition and hydrogen storage, the alloys were investigated. The battery characteristics were also analyzed through the various tests in the real production line of a battery company.

Keywords: domestic rare-earth ore, fused salt electrolysis, rare-earth materials, hydrogen storage alloy, secondary battery

Procedia PDF Downloads 506
1229 In vitro Assessment of Tomato (Lycopersicon esculentum) and Cauliflower (Brassica oleracea) Seedlings Growth and Proline Production under Salt Stress

Authors: Amir Wahid, Fazal Hadi, Amin Ullah Jan

Abstract:

Tomato and Cauliflower seedlings were grown in-vitro under salt concentrations (0, 2, 4, 8, and 10 dSm-1) with objectives to investigate; (1) The effect of salinity on seedling growth and free proline production, (2) the correlation between seedling growth and proline contents, (3) comparative salt tolerance of both species. Different concentrations of salt showed considerable effect on percent (%) germination of seeds, length and biomass of shoot and root and also showed effect on percent water content of both plants seedlings. Germination rate in cauliflower was two times higher than tomato even at highest salt concentration (10 dSm-1). Seedling growth of both species was less effected at low salt concentrations (2 and 4 dSm-1) but at high concentrations (6 and 8 dSm-1) the seedling growth of both species was significantly decreased. Particularly the tomato root was highly significantly reduced. The proline level linearly increased in both species with increasing salt concentrations up-to 4 dSm-1 and then declined. The cauliflower showed higher free proline level than tomato under all salt treatments. Overall, the cauliflower seedlings showed better growth response along with higher proline contents on comparison with tomato seedlings.

Keywords: NaCl (Sodium Chloride), EC (Electrical Conductivity), MS (Murashig and Skoog), ANOVA (Analysis of Variance), LSD (Least Significant Differences)

Procedia PDF Downloads 532
1228 A Systematic Approach for Analyzing Multiple Cyber-Physical Attacks on the Smart Grid

Authors: Yatin Wadhawan, Clifford Neuman, Anas Al Majali

Abstract:

In this paper, we evaluate the resilience of the smart grid system in the presence of multiple cyber-physical attacks on its distinct functional components. We discuss attack-defense scenarios and their effect on smart grid resilience. Through contingency simulations in the Network and PowerWorld Simulator, we analyze multiple cyber-physical attacks that propagate from the cyber domain to power systems and discuss how such attacks destabilize the underlying power grid. The analysis of such simulations helps system administrators develop more resilient systems and improves the response of the system in the presence of cyber-physical attacks.

Keywords: smart grid, gas pipeline, cyber- physical attack, security, resilience

Procedia PDF Downloads 284
1227 A Study of General Attacks on Elliptic Curve Discrete Logarithm Problem over Prime Field and Binary Field

Authors: Tun Myat Aung, Ni Ni Hla

Abstract:

This paper begins by describing basic properties of finite field and elliptic curve cryptography over prime field and binary field. Then we discuss the discrete logarithm problem for elliptic curves and its properties. We study the general common attacks on elliptic curve discrete logarithm problem such as the Baby Step, Giant Step method, Pollard’s rho method and Pohlig-Hellman method, and describe in detail experiments of these attacks over prime field and binary field. The paper finishes by describing expected running time of the attacks and suggesting strong elliptic curves that are not susceptible to these attacks.c

Keywords: discrete logarithm problem, general attacks, elliptic curve, prime field, binary field

Procedia PDF Downloads 201
1226 Study on Network-Based Technology for Detecting Potentially Malicious Websites

Authors: Byung-Ik Kim, Hong-Koo Kang, Tae-Jin Lee, Hae-Ryong Park

Abstract:

Cyber terrors against specific enterprises or countries have been increasing recently. Such attacks against specific targets are called advanced persistent threat (APT), and they are giving rise to serious social problems. The malicious behaviors of APT attacks mostly affect websites and penetrate enterprise networks to perform malevolent acts. Although many enterprises invest heavily in security to defend against such APT threats, they recognize the APT attacks only after the latter are already in action. This paper discusses the characteristics of APT attacks at each step as well as the strengths and weaknesses of existing malicious code detection technologies to check their suitability for detecting APT attacks. It then proposes a network-based malicious behavior detection algorithm to protect the enterprise or national networks.

Keywords: Advanced Persistent Threat (APT), malware, network security, network packet, exploit kits

Procedia PDF Downloads 338
1225 Comparing the SALT and START Triage System in Disaster and Mass Casualty Incidents: A Systematic Review

Authors: Hendri Purwadi, Christine McCloud

Abstract:

Triage is a complex decision-making process that aims to categorize a victim’s level of acuity and the need for medical assistance. Two common triage systems have been widely used in Mass Casualty Incidents (MCIs) and disaster situation are START (Simple triage algorithm and rapid treatment) and SALT (sort, asses, lifesaving, intervention, and treatment/transport). There is currently controversy regarding the effectiveness of SALT over START triage system. This systematic review aims to investigate and compare the effectiveness between SALT and START triage system in disaster and MCIs setting. Literatures were searched via systematic search strategy from 2009 until 2019 in PubMed, Cochrane Library, CINAHL, Scopus, Science direct, Medlib, ProQuest. This review included simulated-based and medical record -based studies investigating the accuracy and applicability of SALT and START triage systems of adult and children population during MCIs and disaster. All type of studies were included. Joana Briggs institute critical appraisal tools were used to assess the quality of reviewed studies. As a result, 1450 articles identified in the search, 10 articles were included. Four themes were identified by review, they were accuracy, under-triage, over-triage and time to triage per individual victim. The START triage system has a wide range and inconsistent level of accuracy compared to SALT triage system (44% to 94. 2% of START compared to 70% to 83% of SALT). The under-triage error of START triage system ranged from 2.73% to 20%, slightly lower than SALT triage system (7.6 to 23.3%). The over-triage error of START triage system was slightly greater than SALT triage system (START ranged from 2% to 53% compared to 2% to 22% of SALT). The time for applying START triage system was faster than SALT triage system (START was 70-72.18 seconds compared to 78 second of SALT). Consequently; The START triage system has lower level of under-triage error and faster than SALT triage system in classifying victims of MCIs and disaster whereas SALT triage system is known slightly more accurate and lower level of over-triage. However, the magnitude of these differences is relatively small, and therefore the effect on the patient outcomes is not significance. Hence, regardless of the triage error, either START or SALT triage system is equally effective to triage victims of disaster and MCIs.

Keywords: disaster, effectiveness, mass casualty incidents, START triage system, SALT triage system

Procedia PDF Downloads 110
1224 Solar Pond: Some Issues in Their Management and Mathematical Description

Authors: A. A. Abdullah, K. A. Lindsay

Abstract:

The management of a salt-gradient is investigated with respect to the interaction between the solar pond and its associated evaporation pond. Issues considered are the impact of precipitation and the operation of the flushing system with particular reference to the case in which the flushing fluid is pure water. Results suggest that a management strategy based on a flushing system that simply replaces evaporation losses of water from the solar pond and evaporation pond will be optimally efficient. Such a management strategy will maintain the operational viability of a salt-gradient solar pond as a reservoir of cheap heat while simultaneously ensuring that the associated evaporation pond can feed the storage zone of the solar pond with sufficient saturated brine to balance the effect of salt diffusion. Other findings are, first, that once near saturation is achieved in the evaporation pond, the efficacy of the proposed management strategy is relatively insensitive to both the size of the evaporation pond or its depth, and second, small changes in the extraction of heat from the storage zone of a salt-gradient solar pond have an amplified effect on the temperature of that zone. The possibility of boiling of the storage zone cannot be ignored in a well-configured salt-gradient solar pond.

Keywords: aqueous sodium chloride, constitutive expression, solar pond, salt-gradient

Procedia PDF Downloads 303
1223 Salting Effect in Partially Miscible Systems of Water/Acétic Acid/1-Butanol at 298.15k: Experimental Study and Estimation of New Solvent-Solvent and Salt-Solvent Binary Interaction Parameters for NRTL Model

Authors: N. Bourayou, A. -H. Meniai, A. Gouaoura

Abstract:

The presence of salt can either raise or lower the distribution coefficient of a solute acetic acid in liquid- liquid equilibria. The coefficient of solute is defined as the ratio of the composition of solute in solvent rich phase to the composition of solute in diluents (water) rich phase. The phenomena are known as salting–out or salting-in, respectively. The effect of monovalent salt, sodium chloride and the bivalent salt, sodium sulfate on the distribution of acetic acid between 1-butanol and water at 298.15K were experimentally shown to be effective in modifying the liquid-liquid equilibrium of water/acetic acid/1-butanol system in favour of the solvent extraction of acetic acid from an aqueous solution with 1-butanol, particularly at high salt concentrations of both salts. All the two salts studied are found to have to salt out effect for acetic acid in varying degrees. The experimentally measured data were well correlated by Eisen-Joffe equation. NRTL model for solvent mixtures containing salts was able to provide good correlation of the present liquid-liquid equilibrium data. Using the regressed salt concentration coefficients for the salt-solvent interaction parameters and the solvent-solvent interaction parameters obtained from the same system without salt. The calculated phase equilibrium was in a quite good agreement with the experimental data, showing the ability of NRTL model to correlate salt effect on the liquid-liquid equilibrium.

Keywords: activity coefficient, Eisen-Joffe, NRTL model, sodium chloride

Procedia PDF Downloads 263
1222 WebAppShield: An Approach Exploiting Machine Learning to Detect SQLi Attacks in an Application Layer in Run-time

Authors: Ahmed Abdulla Ashlam, Atta Badii, Frederic Stahl

Abstract:

In recent years, SQL injection attacks have been identified as being prevalent against web applications. They affect network security and user data, which leads to a considerable loss of money and data every year. This paper presents the use of classification algorithms in machine learning using a method to classify the login data filtering inputs into "SQLi" or "Non-SQLi,” thus increasing the reliability and accuracy of results in terms of deciding whether an operation is an attack or a valid operation. A method Web-App auto-generated twin data structure replication. Shielding against SQLi attacks (WebAppShield) that verifies all users and prevents attackers (SQLi attacks) from entering and or accessing the database, which the machine learning module predicts as "Non-SQLi" has been developed. A special login form has been developed with a special instance of data validation; this verification process secures the web application from its early stages. The system has been tested and validated, up to 99% of SQLi attacks have been prevented.

Keywords: SQL injection, attacks, web application, accuracy, database

Procedia PDF Downloads 123
1221 Cloud Computing: Deciding Whether It Is Easier or Harder to Defend Against Cyber Attacks

Authors: Emhemed Shaklawoon, Ibrahim Althomali

Abstract:

We propose that we identify different defense mechanisms that were used before the introduction of the cloud and compare if their protection mechanisms are still valuable and to what degree. Note that in order to defend against vulnerability, we must know how this vulnerability is abused in an attack. Only then, we will be able to recognize if it is easier or harder to defend against cyber attacks.

Keywords: cloud computing, privacy, cyber attacks, defend the cloud

Procedia PDF Downloads 398
1220 Tamper Resistance Evaluation Tests with Noise Resources

Authors: Masaya Yoshikawa, Toshiya Asai, Ryoma Matsuhisa, Yusuke Nozaki, Kensaku Asahi

Abstract:

Recently, side-channel attacks, which estimate secret keys using side-channel information such as power consumption and compromising emanations of cryptography circuits embedded in hardware, have become a serious problem. In particular, electromagnetic analysis attacks against cryptographic circuits between information processing and electromagnetic fields, which are related to secret keys in cryptography circuits, are the most threatening side-channel attacks. Therefore, it is important to evaluate tamper resistance against electromagnetic analysis attacks for cryptography circuits. The present study performs basic examination of the tamper resistance of cryptography circuits using electromagnetic analysis attacks with noise resources.

Keywords: tamper resistance, cryptographic circuit, hardware security evaluation, noise resources

Procedia PDF Downloads 471
1219 Development of Al Foam by a Low-Cost Salt Replication Method for Industrial Applications

Authors: B. Soni, S. Biswas

Abstract:

Metal foams of Al find diverse applications in several industrial sectors such as in automotive and sports equipment industry as impact, acoustic and vibration absorbers, the aerospace industry as structural components in turbines and spatial cones, in the naval industry as low frequency vibration absorbers, and in construction industry as sound barriers inside tunnels, as fire proof materials and structure protection systems against explosions and even in heat exchangers, orthopedic components, and decorative items. Here, we report on the development of Al foams by a low cost and convenient technique of salt replication method with efficient control over size, geometry and distribution of the pores. Sodium bicarbonate was used as the foaming agent to form the porous refractory salt pattern. The mixed refractory salt slurry was microwave dried followed by sintering for selected time periods. Molten Al was infiltrated into the salt pattern in an inert atmosphere at a pressure of 2 bars. The final products were obtained by leaching out the refractory salt pattern. Mechanical properties of the derived samples were studied with a universal testing machine. The results were analyzed in correlation with their microstructural features evaluated with a scanning electron microscope (SEM).

Keywords: metal foam, Al, salt replication method, mechanical properties, SEM

Procedia PDF Downloads 334
1218 Effect of Moisture Removal from Molten Salt on Corrosion of Alloys

Authors: Bhavesh D. Gajbhiye, Divya Raghunandanan, C. S. Sona, Channamallikarjun S. Mathpati

Abstract:

Molten fluoride salt FLiNaK (LiF-NaF-KF: 46.5-11.5-42 mol %) is a promising candidate as high temperature coolant for next generation nuclear reactors due to its superior thermophysical properties. Corrosion of alloys in molten FLiNaK has however been recognized as a serious issue in the selection of structural materials. Corrosion experiments of alloys Inconel-625 (Fe-Ni alloy) and Hastelloy-B (Ni-Mo alloy) were performed in FLiNaK salt. The tests were carried out at a temperature of 650°C in graphite crucibles for 60 hours under inert atmosphere. Corrosion experiments were performed to study the effect of moisture removal in the salt by pre heating and vacuum drying. Weight loss of the alloy samples due to corrosion was measured and corrosion rate was estimated. The surface morphology of the alloy samples was analyzed by Scanning Electron Microscopy. A significant decrease in the corrosion rate was observed for the alloys studied in moisture removed salt.

Keywords: FLiNaK, hastelloy, inconel, weight loss

Procedia PDF Downloads 457
1217 Kinetic Studies of Bioethanol Production from Salt-Pretreated Sugarcane Leaves

Authors: Preshanthan Moodley, E. B. Gueguim Kana

Abstract:

This study examines the kinetics of S. cerevisiae BY4743 growth and bioethanol production from sugarcane leaf waste (SLW), utilizing two different optimized pretreatment regimes; under two fermentation modes: steam salt-alkali filtered enzymatic hydrolysate (SSA-F), steam salt-alkali unfiltered (SSA-U), microwave salt-alkali filtered (MSA-F) and microwave salt-alkali unfiltered (MSA-U). The kinetic coefficients were determined by fitting the Monod, modified Gompertz, and logistic models to the experimental data with high coefficients of determination R² > 0.97. A maximum specific growth rate (µₘₐₓ) of 0.153 h⁻¹ was obtained under SSA-F and SSA-U whereas, 0.150 h⁻¹ was observed with MSA-F and MSA-U. SSA-U gave a potential maximum bioethanol concentration (Pₘ) of 31.06 g/L compared to 30.49, 23.26 and 21.79g/L for SSA-F, MSA-F and MSA-U respectively. An insignificant difference was observed in the μmax and Pm for the filtered and unfiltered enzymatic hydrolysate for both SSA and MSA pretreatments, thus potentially reducing a unit operation. These findings provide significant insights for process scale up.

Keywords: lignocellulosic bioethanol, microwave pretreatment, sugarcane leaves, kinetics

Procedia PDF Downloads 91
1216 Anatomical Adaptations of Three Astragalus Species under Salt Stress

Authors: Faycal Boughalleb, Raoudha Abdellaoui

Abstract:

The effect of NaCl stress on root and leaf anatomy was investigated in three Astragalus species grown in 0-300 mM NaCl for 30 days under greenhouse conditions. Root cross section and cortex thickness was reduced under salt stress in both species while A. tenuifolius showed thinner cortex and the root cross section was unchanged. The epidermis stele thickness was unaffected by salinity in A. armatus and A. tenuifolius and was reduced in A. mareoticus with smaller xylem vessel size. In addition, vessel density and wall thickness of xylem was increased under salt conditions in the studies species. The entire lamina and mesophyll of the three species were thinner in salt-stressed plants. A. armatus and A. tenuifolius showed the higher thickness with increased size of the lower epidermis. NaCl (300 mM) reduced leaf water content by 41.5 % in A. mareoticus while it was unchanged in the other species. The size of the vascular bundle increased under salinity in A. tenuifolius leaves and it was unchanged in the other ones. A longer distance between leaf vascular bundle was occurred in A. mareoticus. The effects of NaCl on root and leaf ultrastructure are discussed in relation to the degree of salt resistance of these species. The unchanged biomass production under salt stress confirmed the higher tolerance oft A. tenuifolius to salinity. A. armatus was moderately salt tolerant with decrease of biomass production by 14.2 % while A. mareoticus was considered as salt sensitive plant when the decrease in biomass production reached 56.8%.

Keywords: Astragalus species, leaf ultrastructure, root anatomy, salt stress

Procedia PDF Downloads 365
1215 Evolution of Mineral Nutrition in Two Species of Atriplex (halimus and canescens) under Salt Stress

Authors: Z. Mahi, L. Marousset, C. Roudaut, M. Belkhodja, R. Lemoine

Abstract:

The strong accumulation of salts in the soil as well as in irrigation water greatly disrupts the growth and development of almost all plants. The study of these disturbances in halophytes helps provide better guidance on the deteriorating effect of salinity. Evaluation of salt stress in two species of Atriplex (halimus and canescens) through the study of mineral nutrition (dosage of sodium and potassium) shows a variability of responses. The results show that the Na+ ion accumulates in the three organs whatever the applied concentration. This accumulation increases with the high salt concentrations in halimus whereas in canescens, 600 mM treatment shows a reduction of the amount of this element. A decrease in the amount of potassium is observed for all organs except halimus rods 100 mM. Unlike halimus, canescens K + accumulates in high concentrations of salt at the roots and leaves. The ratio Na+/K+ decreases the salt by halimus against it increases in levels canescens roots and treated with high concentrations of NaCl (600 mM) leaves.

Keywords: Atriplex, canescens, halimus, Na +, K +, Na Cl, tolerance

Procedia PDF Downloads 328
1214 SIP Flooding Attacks Detection and Prevention Using Shannon, Renyi and Tsallis Entropy

Authors: Neda Seyyedi, Reza Berangi

Abstract:

Voice over IP (VOIP) network, also known as Internet telephony, is growing increasingly having occupied a large part of the communications market. With the growth of each technology, the related security issues become of particular importance. Taking advantage of this technology in different environments with numerous features put at our disposal, there arises an increasing need to address the security threats. Being IP-based and playing a signaling role in VOIP networks, Session Initiation Protocol (SIP) lets the invaders use weaknesses of the protocol to disable VOIP service. One of the most important threats is denial of service attack, a branch of which in this article we have discussed as flooding attacks. These attacks make server resources wasted and deprive it from delivering service to authorized users. Distributed denial of service attacks and attacks with a low rate can mislead many attack detection mechanisms. In this paper, we introduce a mechanism which not only detects distributed denial of service attacks and low rate attacks, but can also identify the attackers accurately. We detect and prevent flooding attacks in SIP protocol using Shannon (FDP-S), Renyi (FDP-R) and Tsallis (FDP-T) entropy. We conducted an experiment to compare the percentage of detection and rate of false alarm messages using any of the Shannon, Renyi and Tsallis entropy as a measure of disorder. Implementation results show that, according to the parametric nature of the Renyi and Tsallis entropy, by changing the parameters, different detection percentages and false alarm rates will be gained with the possibility to adjust the sensitivity of the detection mechanism.

Keywords: VOIP networks, flooding attacks, entropy, computer networks

Procedia PDF Downloads 376
1213 A Review Paper for Detecting Zero-Day Vulnerabilities

Authors: Tshegofatso Rambau, Tonderai Muchenje

Abstract:

Zero-day attacks (ZDA) are increasing day by day; there are many vulnerabilities in systems and software that date back decades. Companies keep discovering vulnerabilities in their systems and software and work to release patches and updates. A zero-day vulnerability is a software fault that is not widely known and is unknown to the vendor; attackers work very quickly to exploit these vulnerabilities. These are major security threats with a high success rate because businesses lack the essential safeguards to detect and prevent them. This study focuses on the factors and techniques that can help us detect zero-day attacks. There are various methods and techniques for detecting vulnerabilities. Various companies like edges can offer penetration testing and smart vulnerability management solutions. We will undertake literature studies on zero-day attacks and detection methods, as well as modeling approaches and simulations, as part of the study process.

Keywords: zero-day attacks, exploitation, vulnerabilities

Procedia PDF Downloads 73
1212 Deradicalization for Former Terrorists through Entrepreneurship Program

Authors: Jamal Wiwoho, Pujiyono, Triyanto

Abstract:

Terrorism is a real enemy for all countries, including Indonesia. Bomb attacks in some parts of Indonesia are proof that Indonesia has serious problems with terrorism. Perpetrators of terror are arrested and imprisoned, and some of them were executed. However, this method did not succeed in stopping the terrorist attacks. Former terrorists continue to carry out bomb attacks. Therefore, this paper proposes a program towards deradicalization efforts of former terrorists through entrepreneurship. This is necessary because it is impossible to change their radical ideology. The program is also motivated by understanding that terrorists generally come from poor families. This program aims to occupy their time with business activities so there is no time to plan and carry out bomb attacks. This research is an empirical law study. Data were collected by literature study, observation, and in-depth interviews. Data were analyzed with the Miles and Huberman interactive model. The results show that the entrepreneurship program is effective to prevent terrorist attack. Former terrorists are busy with their business. Therefore, they have no time to carry out bomb attacks.

Keywords: deradicalization, terrorism, terrorists, entrepreneurship

Procedia PDF Downloads 241
1211 Salinity Response of Some Chickpea (Cicer arietinum L.) Genotypes in Germination and Seedling Growth of Periods

Authors: Onder Aldemir, Ercan Ceyhan

Abstract:

The research was conducted to determine effects of salt concentrations on emergence and seedling development of chickpea genotypes. Trials were performed during the year of 2013 on the laboratory and greenhouse of Agricultural Faculty, Selcuk University. Emergency trial was set up according to ‘Randomized Plots Design’ by two factors and four replications; greenhouse trial was also set up according to ‘Randomized Plots Design’ by two factors with three replications. The chickpea genotypes; CA119, CA132, CA149, CA150, CA215, CA222, CA235, CA261, Bozkır and Gokce were used as material for both of the trials. Effects of the five doses of salt concentrations (control, 30 mM, 60 mM, 90 mM and 120 mM) on the ratio of emergency, speed of emergency, average time for emergency, index of sensibility, length of shoot and root, fresh weight of shoot and root, dry weight of shoot and root, index of salt tolerance were evaluated. Responses of the chickpea genotypes for salt concentrations were found different. Comparing to the control, all of the investigated characteristics on the chickpea genotypes showed significant reduction by depending on the increasing salt level. According to the effects of salt application, the chickpea genotypes Gokce, CA215 and CA222 were the most tolerant in respect to plant dry weights while the chickpea genotypes CA149 and CA150 were the most sensitive.

Keywords: chickpea, emergence, salt tolerant, seedling development

Procedia PDF Downloads 203
1210 Dissolution Kinetics of Chevreul’s Salt in Ammonium Cloride Solutions

Authors: Mustafa Sertçelik, Turan Çalban, Hacali Necefoğlu, Sabri Çolak

Abstract:

In this study, Chevreul’s salt solubility and its dissolution kinetics in ammonium chloride solutions were investigated. Chevreul’s salt that we used in the studies was obtained by using the optimum conditions (ammonium sulphide concentration; 0,4 M, copper sulphate concentration; 0,25 M, temperature; 60°C, stirring speed; 600 rev/min, pH; 4 and reaction time; 15 mins) determined by T. Çalban et al. Chevreul’s salt solubility in ammonium chloride solutions and the kinetics of dissolution were investigated. The selected parameters that affect solubility were reaction temperature, concentration of ammonium chloride, stirring speed, and solid/liquid ratio. Correlation of experimental results had been achieved using linear regression implemented in the statistical package program statistica. The effect of parameters on Chevreul’s salt solubility was examined and integrated rate expression of dissolution rate was found using kinetic models in solid-liquid heterogeneous reactions. The results revealed that the dissolution rate of Chevreul’s salt was decreasing while temperature, concentration of ammonium chloride and stirring speed were increasing. On the other hand, dissolution rate was found to be decreasing with the increase of solid/liquid ratio. Based on result of the applications of the obtained experimental results to the kinetic models, we can deduce that Chevreul’s salt dissolution rate is controlled by diffusion through the ash (or product layer). Activation energy of the reaction of dissolution was found as 74.83 kJ/mol. The integrated rate expression along with the effects of parameters on Chevreul's salt solubility was found to be as follows: 1-3(1-X)2/3+2(1-X)= [2,96.1013.(CA)3,08 .(S/L)-038.(W)1,23 e-9001,2/T].t

Keywords: Chevreul's salt, copper, ammonium chloride, ammonium sulphide, dissolution kinetics

Procedia PDF Downloads 277
1209 4P-Model of Information Terrorism

Authors: Nataliya Venelinova

Abstract:

The paper proposes a new interdisciplinary model of reconsidering the role of mass communication effects by coverage of terrorism. The idea of 4P model is based on the synergy, created by the information strategy of threat, predominantly used by terrorist groups, the effects of mediating the symbolic action of the terrorist attacks or the taking of responsibility of any attacks, and the reshaped public perception for security after the attacks being mass communicated. The paper defines the mass communication cycle of terrorism, which leads not only to re-agenda setting of the societies, but also spirally amplifying the effect of propagating fears by over-informing on terrorism attacks. This finally results in the outlining of the so called 4P-model of information terrorism: mass propaganda, panic, paranoia and pandemic.

Keywords: information terrorism, mass communication cycle, public perception, security

Procedia PDF Downloads 145
1208 Effect of Salt Forms and Concentrations on the Alveograph and Extensigraph Parameters of Rye Flour

Authors: Péter Sipos, Gerda Diósi, Mariann Móré, Zsófia Szigeti

Abstract:

Several medical research found that the sodium is one of the main risk factor of high blood pressure and reason for different cardiovascular diseases, while sodium chloride is one of the most ancient food additives. As people consume much more sodium chloride as the recommended value several salt reduction programs started worldwide in the last years. The cereal products are the main source of sodium, and the bakery products are one of the main targets of these programs. In this paper we have evaluated the effects of different concentrations of sodium chloride on the alveo graphical and extensi graphical parameters of rye flours to determine whether it has the same strengthening effect on the dough texture as it was found in the case of wheat flours and these effects were compared to the effects of other salt forms. We found that while the strength of rye flours are similar to the ones of wheat flour, rye flours are much less extensible. The effects of salt concentrations are less significant on the rheological properties of rye flour than on the wheat flour and there is no significant difference between the effects of different salts.

Keywords: alveograph, extensigraph, rye flour, salt

Procedia PDF Downloads 461
1207 Effect of Different Salt Concentrations and Temperatures on Seed Germination and Seedling Characters in Safflower (Carthamus tinctorius L.) Genotypes

Authors: Rahim Ada, Zamari Temory, Hasan Dalgic

Abstract:

Germination and seedling responses of seven safflower seed genotypes (Dinçer, Remzibey, Black Sun2 cultivars and A19, F4, I1, J19 lines) to different salinity concentrations (0, 5, 10, and 20 g l-1) and temperatures (10 and 20 oC) evaluated in Completely Randomized Factorial Designs in Department of Field Crops of Selcuk University, Konya, Turkey. Seeds in the control (distilled water) had at 10 and 20 oC the highest germination percentage (93.88 and 94.32 %), shoot length (4.60 and 8.72 cm), root length (4.27 and 6.54 cm), shoot dry weight (22.37 mg and 25.99 mg), and root dry weight (2.22 and 2.47 mg). As the salt concentration increased, values of all characters were decreased. In this experiment, in 20 g l-1 salt concentration found germination percentage (21.28 and 26.66 %), shoot (1.32 and 1.35 cm) and root length (1.04 and 1.10 cm), shoot (8.05 mg and 7.49 mg) and root dry weight (0.83 and 0.98 mg) at 10, and 20 oC.

Keywords: safflower, NaCl, temperature, shoot and root length, salt concentration

Procedia PDF Downloads 263
1206 Deep Learning and Accurate Performance Measure Processes for Cyber Attack Detection among Web Logs

Authors: Noureddine Mohtaram, Jeremy Patrix, Jerome Verny

Abstract:

As an enormous number of online services have been developed into web applications, security problems based on web applications are becoming more serious now. Most intrusion detection systems rely on each request to find the cyber-attack rather than on user behavior, and these systems can only protect web applications against known vulnerabilities rather than certain zero-day attacks. In order to detect new attacks, we analyze the HTTP protocols of web servers to divide them into two categories: normal attacks and malicious attacks. On the other hand, the quality of the results obtained by deep learning (DL) in various areas of big data has given an important motivation to apply it to cybersecurity. Deep learning for attack detection in cybersecurity has the potential to be a robust tool from small transformations to new attacks due to its capability to extract more high-level features. This research aims to take a new approach, deep learning to cybersecurity, to classify these two categories to eliminate attacks and protect web servers of the defense sector which encounters different web traffic compared to other sectors (such as e-commerce, web app, etc.). The result shows that by using a machine learning method, a higher accuracy rate, and a lower false alarm detection rate can be achieved.

Keywords: anomaly detection, HTTP protocol, logs, cyber attack, deep learning

Procedia PDF Downloads 182
1205 Surface Modification of Cotton Using Slaughterhouse Wastes

Authors: Granch Berhe Tseghai, Lodrick Wangatia Makokha

Abstract:

Cotton dyeing using reactive dyes is one of the major water polluter; this is due to large amount of dye and salt remaining in effluent. Recent adverse climate change and its associated effect to human life have lead to search for more sustainable industrial production. Cationization of cotton to improve its affinity for reactive dye has been earmarked as a major solution for dyeing of cotton with no or less salt. Synthetic cationizing agents of ammonium salt have already been commercialized. However, in nature there are proteinous products which are rich in amino and ammonium salts which can be carefully harnessed to be used as cationizing agent for cotton. The hoofs and horns have successfully been used to cationize cotton so as to improve cotton affinity to the dye. The cationization action of the hoof and horn extract on cotton was confirmed by dyeing the pretreated fabric without salt and comparing it with conventionally dyed and untreated salt free dyed fabric. UV-VIS absorption results showed better dye absorption (62.5% and 50% dye bath exhaustion percentage for cationized and untreated respectively) while K/S values of treated samples were similar to conventional sample.

Keywords: cationization, cotton, proteinous products, reactive dyes

Procedia PDF Downloads 317
1204 Interrogating the Impact of Insurgency Attacks on Vulnerable Groups in West Africa: Implications for Global Security

Authors: Godiya Atsiya Pius

Abstract:

The recent dimension of terrorist attacks and violence in West Africa and Nigeria in particular has attracted both academic and global concerns. Children, young girls and women are now victims of violent attacks and insurgency in their own country. Today, we have a reverse situation where women and children were spared during violence in the past. Empirical evidence shows that millions of children, young girls and women are caught up in violent attacks in which they are not merely spectatorial, but victims of circumstance. Some fall victims of a general onslaught against civilians by the drivers of such conflicts. Others die as part of a calculated genocide. Still others are taken as hostages as part of a deliberate attack on them. With particular reference to over 200 Chibok school girls that were abducted by the Boko Haram Islamic sect in Maiduguri, Borno state, Nigeria, this study shall attempt a theoretical exploration of the circumstances surrounding the insurgency attacks on these categories of vulnerable groups in Nigeria. This paper also intends to examine the nature, dimensions, causes, effects as well as implications of these attacks on women and children in West Africa. The paper shall sum up with conclusion and possible recommendations that could help the region in the 21st century and beyond.

Keywords: insurgency, gender, violence, security, vulnerable groups

Procedia PDF Downloads 444
1203 Genetic Diversity in Capsicum Germplasm Based on Inter Simple Sequence Repeat Markers

Authors: Siwapech Silapaprayoon, Januluk Khanobdee, Sompid Samipak

Abstract:

Chili peppers are the fruits of Capsicum pepper plants well known for their fiery burning sensation on the tongue after consumption. They are members of the Solanaceae or common nightshade family along with potato, tomato and eggplant. Thai cuisine has gained popularity for its distinct flavors due to usages of various spices and its heat from the addition of chili pepper. Though being used in little quantity for each dish, chili pepper holds a special place in Thai cuisine. There are many varieties of chili peppers in Thailand, and thirty accessions were collected at Rajamangala University of Technology Lanna, Lampang, Thailand. To effectively manage any germplasm it is essential to know the diversity and relationships among members. Thirty-six Inter Simple Sequence Repeat (ISSRs) DNA markers were used to analyze the germplasm. Total of 335 polymorphic bands was obtained giving the average of 9.3 alleles per marker. Unweighted pair-group mean arithmetic method (UPGMA) clustering of data using NTSYS-pc software indicated that the accessions showed varied levels of genetic similarity ranging from 0.57-1.00 similarity coefficient index indicating significant levels of variation. At SM coefficient of 0.81, the germplasm was separated into four groups. Phenotypic variation was discussed in context of phylogenetic tree clustering.

Keywords: diversity, germplasm, Chili pepper, ISSR

Procedia PDF Downloads 128
1202 To Ensure Maximum Voter Privacy in E-Voting Using Blockchain, Convolutional Neural Network, and Quantum Key Distribution

Authors: Bhaumik Tyagi, Mandeep Kaur, Kanika Singla

Abstract:

The advancement of blockchain has facilitated scholars to remodel e-voting systems for future generations. Server-side attacks like SQL injection attacks and DOS attacks are the most common attacks nowadays, where malicious codes are injected into the system through user input fields by illicit users, which leads to data leakage in the worst scenarios. Besides, quantum attacks are also there which manipulate the transactional data. In order to deal with all the above-mentioned attacks, integration of blockchain, convolutional neural network (CNN), and Quantum Key Distribution is done in this very research. The utilization of blockchain technology in e-voting applications is not a novel concept. But privacy and security issues are still there in a public and private blockchains. To solve this, the use of a hybrid blockchain is done in this research. This research proposed cryptographic signatures and blockchain algorithms to validate the origin and integrity of the votes. The convolutional neural network (CNN), a normalized version of the multilayer perceptron, is also applied in the system to analyze visual descriptions upon registration in a direction to enhance the privacy of voters and the e-voting system. Quantum Key Distribution is being implemented in order to secure a blockchain-based e-voting system from quantum attacks using quantum algorithms. Implementation of e-voting blockchain D-app and providing a proposed solution for the privacy of voters in e-voting using Blockchain, CNN, and Quantum Key Distribution is done.

Keywords: hybrid blockchain, secure e-voting system, convolutional neural networks, quantum key distribution, one-time pad

Procedia PDF Downloads 57
1201 A Comprehensive Approach to Mitigate Return-Oriented Programming Attacks: Combining Operating System Protection Mechanisms and Hardware-Assisted Techniques

Authors: Zhang Xingnan, Huang Jingjia, Feng Yue, Burra Venkata Durga Kumar

Abstract:

This paper proposes a comprehensive approach to mitigate ROP (Return-Oriented Programming) attacks by combining internal operating system protection mechanisms and hardware-assisted techniques. Through extensive literature review, we identify the effectiveness of ASLR (Address Space Layout Randomization) and LBR (Last Branch Record) in preventing ROP attacks. We present a process involving buffer overflow detection, hardware-assisted ROP attack detection, and the use of Turing detection technology to monitor control flow behavior. We envision a specialized tool that views and analyzes the last branch record, compares control flow with a baseline, and outputs differences in natural language. This tool offers a graphical interface, facilitating the prevention and detection of ROP attacks. The proposed approach and tool provide practical solutions for enhancing software security.

Keywords: operating system, ROP attacks, returning-oriented programming attacks, ASLR, LBR, CFI, DEP, code randomization, hardware-assisted CFI

Procedia PDF Downloads 59