Search results for: shoulder surfing attack
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 793

Search results for: shoulder surfing attack

763 Shoulder-Arm Mobility and Upper and Lower Extremity Muscle Function are Impaired in Patients with Systemic Sclerosis

Authors: F. Bringby, A. Nordin, L. Björnådal, E. Svenungsson, C. Boström, H Alexanderson

Abstract:

Patients with systemic sclerosis (SSc) have reduced hand function and self-reported limitations in daily activities. Few studies have explored limitations in shoulder-arm mobility and muscle function, or if there are differences in physical function between diffuse cutaneous (dcSSc) and limited cutaneous (lcSSc) SSc. The purpose of this study was to describe objectively assessed shoulder-arm mobility, lower extremity muscle function and muscle endurance in SSc and evaluate possible differences between lcSSc and dcSSc. 121 patients with SSc were included in this cross sectional study. Shoulder-arm mobility were examined using the Shoulder Function Assessment Scale (SFA) including 5 tasks ,lower extremity muscle function was measured by Timed stands test (TST) and muscle endurance in shoulder- and hip flexors were assessed by the Functional Index 2 (FI-2). Patients with dcSSc had median SFA hand to back score 5 (4-6) and median “hand to seat” score of 5 (4-6) compared to patients with lcSSc with corresponding median values of 6 (4-6) and 6 (5-6) respectively (p<0.01-p<0.05). 50% of both patientsgroups had lower muscle function assessed by the TST compared to age- and gender matched reference values but there were no differences in TST between the two patient groups. There was no difference in FI-2 scores between dcSSc and lcSSc. The whole group had 40 (28-83) % and 38 (32-72) % of maximal FI-2 shoulder flexion score on the right and left sides, and 40 (23-63) % and 37 (23-62) % of maximal FI-2 hip flexion score on the right and left sides. Reference values for the FI-2 indicate that healthy individuals perform in mean 100 % of maximal score. Patients with dcSSc were more limited than patients with lcSSc. Patients with SSc have reduced muscle function compared to reference values. These results highlights the importance of assessing shoulder-arm mobility and muscle function as well as a need for further research to identify exercise interventions to target these limitations.

Keywords: diffuse, limited, mobility, muscle function, physical therapy, systemic sclerosis

Procedia PDF Downloads 368
762 Efficacy of Cool's and Rhythmic Stabilization Exercises on Scapular up Ward Rotation and Ut/Sa Ratio in Patients with Shoulder Impingement Syndrome

Authors: Mohammed Moustafa, Khaled Ayad, Waleed Reda

Abstract:

Shoulder impingement syndrome is the most common disorder of the shoulder, resulting in functional loss and disability. Objective: This study was designed to compare between the effects of scapular muscle training versus rhythmic stabilization exercises in treatment of shoulder impingement syndrome. Methods: Thirty patients participated in this study; they were assigned randomly into two experimental groups. The first experimental group (A) consisted of 15 patients with a mean age (21.87±2.72) years; they received graduated rhythmic stabilization exercises and stretching of the posterior capsule. The second experimental group (B) consisted of 15 patients with a mean age (22.27±2.94) years; they received scapular muscle training exercises in addition to stretching of the posterior capsule. Treatment was given three times per week, every other day, for four consecutive weeks. Patients have been evaluated pretreatment and post treatment for shoulder pain severity and functional disability. Results: Both groups showed highly statistical significant reduction in pain severity and functional disability measured post-treatment when compared with their corresponding values in pretreatment assessment. Conclusion: Both of rhythmic stabilization exercises and scapular muscle training are effective interventions to reduce shoulder pain severity and functional disability.

Keywords: impingement syndrome, scapular exercises, rhythmic stabilization exercises, posterior capsule stretch

Procedia PDF Downloads 214
761 An Attack on the Lucas Based El-Gamal Cryptosystem in the Elliptic Curve Group Over Finite Field Using Greater Common Divisor

Authors: Lee Feng Koo, Tze Jin Wong, Pang Hung Yiu, Nik Mohd Asri Nik Long

Abstract:

Greater common divisor (GCD) attack is an attack that relies on the polynomial structure of the cryptosystem. This attack required two plaintexts differ from a fixed number and encrypted under same modulus. This paper reports a security reaction of Lucas Based El-Gamal Cryptosystem in the Elliptic Curve group over finite field under GCD attack. Lucas Based El-Gamal Cryptosystem in the Elliptic Curve group over finite field was exposed mathematically to the GCD attack using GCD and Dickson polynomial. The result shows that the cryptanalyst is able to get the plaintext without decryption by using GCD attack. Thus, the study concluded that it is highly perilous when two plaintexts have a slight difference from a fixed number in the same Elliptic curve group over finite field.

Keywords: decryption, encryption, elliptic curve, greater common divisor

Procedia PDF Downloads 224
760 Cross Site Scripting (XSS) Attack and Automatic Detection Technology Research

Authors: Tao Feng, Wei-Wei Zhang, Chang-Ming Ding

Abstract:

Cross-site scripting (XSS) is one of the most popular WEB Attacking methods at present, and also one of the most risky web attacks. Because of the population of JavaScript, the scene of the cross site scripting attack is also gradually expanded. However, since the web application developers tend to only focus on functional testing and lack the awareness of the XSS, which has made the on-line web projects exist many XSS vulnerabilities. In this paper, different various techniques of XSS attack are analyzed, and a method automatically to detect it is proposed. It is easy to check the results of vulnerability detection when running it as a plug-in.

Keywords: XSS, no target attack platform, automatic detection,XSS detection

Procedia PDF Downloads 377
759 Cryptographic Attack on Lucas Based Cryptosystems Using Chinese Remainder Theorem

Authors: Tze Jin Wong, Lee Feng Koo, Pang Hung Yiu

Abstract:

Lenstra’s attack uses Chinese remainder theorem as a tool and requires a faulty signature to be successful. This paper reports on the security responses of fourth and sixth order Lucas based (LUC4,6) cryptosystem under the Lenstra’s attack as compared to the other two Lucas based cryptosystems such as LUC and LUC3 cryptosystems. All the Lucas based cryptosystems were exposed mathematically to the Lenstra’s attack using Chinese Remainder Theorem and Dickson polynomial. Result shows that the possibility for successful Lenstra’s attack is less against LUC4,6 cryptosystem than LUC3 and LUC cryptosystems. Current study concludes that LUC4,6 cryptosystem is more secure than LUC and LUC3 cryptosystems in sustaining against Lenstra’s attack.

Keywords: Lucas sequence, Dickson polynomial, faulty signature, corresponding signature, congruence

Procedia PDF Downloads 135
758 Associated Risks of Spontaneous Lung Collapse after Shoulder Surgery: A Literature Review

Authors: Fiona Bei Na Tan, Glen Wen Kiat Ho, Ee Leen Liow, Li Yin Tan, Sean Wei Loong Ho

Abstract:

Background: Shoulder arthroscopy is an increasingly common procedure. Pneumothorax post-shoulder arthroscopy is a rare complication. Objectives: Our aim is to highlight a case report of pneumothorax post shoulder arthroscopy and to conduct a literature review to evaluate the possible risk factors associated with developing a pneumothorax during or after shoulder arthroscopy. Case Report: We report the case of a 75-year-old male non-smoker who underwent left shoulder arthroscopy without regional anaesthesia and in the left lateral position. The general anaesthesia and surgery were uncomplicated. The patient was desaturated postoperatively and was found to have a pneumothorax on examination and chest X-ray. A chest tube drain was inserted promptly into the right chest. He had an uncomplicated postoperative course. Methods: PubMed Medline and Cochrane database search was carried out using the terms shoulder arthroplasty, pneumothorax, pneumomediastinum, and subcutaneous emphysema. We selected full-text articles written in English. Results: Thirty-two articles were identified and thoroughly reviewed. Based on our inclusion and exclusion criteria, 14 articles, which included 20 cases of pneumothorax during or after shoulder arthroscopy, were included. Eighty percent (16/20) of pneumothoraxes occurred postoperatively. In the articles that specify the side of pneumothorax, 91% (10/11) occur on the ipsilateral side of the arthroscopy. Eighty-eight percent (7/8) of pneumothoraxes occurred when subacromial decompression was performed. Fifty-six percent (9/16) occurred in patients placed in the lateral decubitus position. Only 30% (6/20) occurred in current or ex-smokers, and only 25% (5/20) had a pre-existing lung condition. Overall, of the articles that posit a mechanism, 75% (9/12) deem the pathogenesis to be multifactorial. Conclusion: The exact mechanism of pneumothorax is currently unknown. Awareness of this complication and timely recognition are important to prevent life-threatening sequelae. Surgeons should have a low threshold to obtain diagnostic plain radiographs in the event of clinical suspicion.

Keywords: rotator cuff repair, decompression, pressure, complication

Procedia PDF Downloads 42
757 Recurrent Anterior Gleno-Humeral Instability Management by Modified Latarjet Procedure

Authors: Tarek Aly

Abstract:

The shoulder is the most mobile joint whose stability requires the interaction of both dynamic and static stabilizers. Its wide range of movement predisposes to a high susceptibility to dislocation, accounting for nearly 50% of all dislocations. This trauma typically results in ligament injury (e.g., labral tear, capsular strain) or bony fracture (e.g., loss of glenoid or humeral head bone), which frequently causes recurrent instability. Patients with significant glenoid defects may require Latarjet procedure, which involves transferring the coracoid to the antero-inferior glenoid rim. In spite of outstanding results, 15 to 30% of cases suffer complications. In this article, we discuss the diagnosis of recurrent shoulder instability, the surgical technique and various complications of Latarjet procedure.

Keywords: recurrent, anterior gleno-humeral instability, latarjet, unstable shoulder

Procedia PDF Downloads 50
756 A Game of Information in Defense/Attack Strategies: Case of Poisson Attacks

Authors: Asma Ben Yaghlane, Mohamed Naceur Azaiez

Abstract:

In this paper, we briefly introduce the concept of Poisson attacks in the case of defense/attack strategies where attacks are assumed to be continuous. We suggest a game model in which the attacker will combine both criteria of a sufficient confidence level of a successful attack and a reasonably small size of the estimation error in order to launch an attack. Here, estimation error arises from assessing the system failure upon attack using aggregate data at the system level. The corresponding error is referred to as aggregation error. On the other hand, the defender will attempt to deter attack by making one or both criteria inapplicable. The defender will build his/her strategy by both strengthening the targeted system and increasing the size of error. We will formulate the defender problem based on appropriate optimization models. The attacker will opt for a Bayesian updating in assessing the impact on the improvement made by the defender. Then, the attacker will evaluate the feasibility of the attack before making the decision of whether or not to launch it. We will provide illustrations to better explain the process.

Keywords: attacker, defender, game theory, information

Procedia PDF Downloads 434
755 11-Round Impossible Differential Attack on Midori64

Authors: Zhan Chen, Wenquan Bi

Abstract:

This paper focuses on examining the strength of Midori against impossible differential attack. The Midori family of light weight block cipher orienting to energy-efficiency is proposed in ASIACRYPT2015. Using a 6-round property, the authors implement an 11-round impossible differential attack on Midori64 by extending two rounds on the top and three rounds on the bottom. There is enough key space to consider pre-whitening keys in this attack. An impossible differential path that minimises the key bits involved is used to reduce computational complexity. Several additional observations such as partial abort technique are used to further reduce data and time complexities. This attack has data complexity of 2 ⁶⁹·² chosen plaintexts, requires 2 ¹⁴·⁵⁸ blocks of memory and 2 ⁹⁴·⁷ 11- round Midori64 encryptions.

Keywords: cryptanalysis, impossible differential, light weight block cipher, Midori

Procedia PDF Downloads 257
754 External Sulphate Attack: Advanced Testing and Performance Specifications

Authors: G. Massaad, E. Roziere, A. Loukili, L. Izoret

Abstract:

Based on the monitoring of mass, hydrostatic weighing, and the amount of leached OH- we deduced the nature of leached and precipitated minerals, the amount of lost aggregates and the evolution of porosity and cracking during the sulphate attack. Using these information, we are able to draw the volume / mass changes brought by mineralogical variations and cracking of the cement matrix. Then we defined a new performance indicator, the averaged density, capable to resume along the test of sulphate attack the occurred physicochemical variation occurred in the cementitious matrix and then highlight.

Keywords: monitoring strategy, performance indicator, sulphate attack, mechanism of degradation

Procedia PDF Downloads 293
753 Comparison of Sports Massage and Stretching along the Cold on Pain Intensity in Elite Female Volleyball Players with Trigger Points in Shoulder Girdle Region

Authors: Sahar Mohammadyari Ghareh Bolagh, Behnaz Seyedi Aghdam, Jalal Shamlou

Abstract:

This study was done to compare the effects of sports massage and stretching along the cold on pain intensity in elite female volleyball players with trigger points in shoulder girdle region. This study was conducted on 32 female volleyball players with latent trigger points in shoulder girdle region. Patients were randomly assigned to three groups: sports massage (n=11) stretching along the cold (n=11) and control group (n=10). One session treatment program during 15 minutes was performed. Pain intensity with VAS + algometer was assessed before and after intervention and improved in both of massage and cold groups. After treatment there were no significant difference between two treatment groups (P < 0. 050). Results of present research showed sports massage and stretching along the cold were effective on pain intensity of myofascial trigger points.

Keywords: sports massage، stretching along the cold، pain intensity، trigger points, elite, volleyball players, shoulder girdle region

Procedia PDF Downloads 343
752 Effect of Hand Grip Strength on Shoulder Muscles Activity in Patients with Subacromial Impingement

Authors: Mohamed E. Abdelrahamn, Mahmoud Aly Hassan, Mohamed Sarhan

Abstract:

Subacromial impingement syndrome (SIS) is a common shoulder disorder. Patients often complain from a decrease in electromyography (EMG) activity of the rotator cuff muscles especially the supraspinatus muscle during glenohumeral elevation. Objective: The purpose of the study is to assess the effect of applying 50% of maximum voluntary contraction of hand grip strength on the EMG activity of the shoulder muscles in patients with SIS. Methods: Thirty male and female patients participated in this study. Their ages ranged from 25 to 40 years. EMG activity of supraspinatus muscle and middle deltoid muscle was assessed without and with applying 50% of maximum voluntary contraction (MVC). Results: A significant difference was found for both supraspinatus and middle deltoid muscles, indicating that the gripping resulted in increasing muscle activity. Conclusion: Applying 50% MVC of hand grip strength could increase the supraspinatus and middle deltoid muscles activity in patients of SIS. This might be useful in the development and monitoring of shoulder rehabilitation strategies.

Keywords: electromyography, supraspinatus muscle, deltoid muscle, subacromial impingement syndrome

Procedia PDF Downloads 279
751 A Survey on Countermeasures of Cache-Timing Attack on AES Systems

Authors: Settana M. Abdulh, Naila A. Sadalla, Yaseen H. Taha, Howaida Elshoush

Abstract:

Side channel attacks are based on side channel information, which is information that is leaked from encryption systems. This includes timing information, power consumption as well as electromagnetic or even sound leaking which can exploited by an attacker. Implementing side channel attacks are possible if and only if an attacker has access to a cryptosystem. In this case, the attacker can exploit bad implementation in software or hardware which is not controlled by encryption implementer. Thus, he/she will represent a real threat to the security system. Several countermeasures have been proposed to eliminate side channel information vulnerability.Cache timing attack is a special type of side channel attack. Here, timing information is collected and analyzed by an attacker to guess sensitive information such as encryption key or plaintext. This paper reviews the technique applied in this attack and surveys the countermeasures against it, evaluating the feasibility and usability of each. Based on this evaluation, finally we pose several recommendations about using these countermeasures.

Keywords: AES algorithm, side channel attack, cache timing attack, cache timing countermeasure

Procedia PDF Downloads 271
750 A Case Study on the Effect of a Mobility Focused Exercise Training in Rehabilitation of an Elite Weightlifter with Shoulder Pain and Weakness

Authors: Lingling Li, Peng Zhao, Runze Guan, Alice Jones, Tao Yu

Abstract:

Background: Shoulder pain and weakness are associated with complex pathologies and often precludes weightlifters from participation in training. The role and mode of exercise training in weightlifters with shoulder pathology remains unclear. Objectives: This case report described an exercise program in management of an elite weightlifter with primary complaint of right shoulder pain and weakness. Methods: A 22-year-old weightlifter presented with 2-year duration of right shoulder pain and weakness which was worsened by routine weightlifting training, and symptoms were not relieved with steroid injection, manual therapy nor usual physiotherapy. There was a limitation in all active range of motion especially horizontal extension (13ᵒ) and external rotation (41ᵒ) with pain intensity at 4/10 and 10/10 (numeric pain rating score) respectively. Muscle weakness was most significant at supraspinatus and teres minor, 38% and 27% respectively compared to his left shoulder (hand-held dynamometry, Micro FET2). An exercise training program focusing on improving mobility was designed for this athlete following a comprehensive physical assessment. Exercises included specific stretching, muscle activating and scapular stability training; once per day, and for 60 minutes each session. All exercises were completed under instruction as pain allowed. Quantitative assessment was conducted at the end of each week for 3 weeks. Outcomes: After the program, the athlete was pain-free in all movements except the O’Brien active compression internal rotation test, the pain was however reduced from 10/10 to 3/10. The horizontal extension and external rotation range increased to 79ᵒ to 120ᵒ respectively, and strength of all rotator cuff muscles returned to normal. At 1-month follow up, the athlete was totally pain-free and had returned to normal function and weightlifting training activities. The outcomes sustained through 6-month and one year. Conclusion: This case report supports the use of a mobility-focused exercise program for management of shoulder pain and weakness in an elite weightlifter athlete.

Keywords: exercise training, mobility, rehabilitation, shoulder pain, weightlifting

Procedia PDF Downloads 155
749 Achieving Better Security by Using Nonlinear Cellular Automata as a Cryptographic Primitive

Authors: Swapan Maiti, Dipanwita Roy Chowdhury

Abstract:

Nonlinear functions are essential in different cryptoprimitives as they play an important role on the security of the cipher designs. Rule 30 was identified as a powerful nonlinear function for cryptographic applications. However, an attack (MS attack) was mounted against Rule 30 Cellular Automata (CA). Nonlinear rules as well as maximum period CA increase randomness property. In this work, nonlinear rules of maximum period nonlinear hybrid CA (M-NHCA) are studied and it is shown to be a better crypto-primitive than Rule 30 CA. It has also been analysed that the M-NHCA with single nonlinearity injection proposed in the literature is vulnerable against MS attack, whereas M-NHCA with multiple nonlinearity injections provide maximum length cycle as well as better cryptographic primitives and they are also secure against MS attack.

Keywords: cellular automata, maximum period nonlinear CA, Meier and Staffelbach attack, nonlinear functions

Procedia PDF Downloads 287
748 Identification and Management of Septic Arthritis of the Untouched Glenohumeral Joint

Authors: Sumit Kanwar, Manisha Chand, Gregory Gilot

Abstract:

Background: Septic arthritis of the shoulder has infrequently been discussed. Focus on infection of the untouched shoulder has not heretofore been described. We present four patients with glenohumeral septic arthritis. Methods: Case 1: A 59 year old male with left shoulder pain in the anterior, posterior and superior aspects. Case 2: A 60 year old male with fever, chills, and generalized muscle aches. Case 3: A 70 year old male with right shoulder pain about the anterior and posterior aspects. Case 4: A 55 year old male with global right shoulder pain, swelling, and limited ROM. Results: In case 1, the left shoulder was affected. Physical examination, swelling was notable, there was global tenderness with a painful range of motion (ROM). The lab values indicated an erythrocyte sedimentation rate (ESR) of 96, and a C-reactive protein (CRP) of 304.30. Imaging studies were performed and MRI indicated a high suspicion for an abscess with osteomyelitis of the humeral head. Our second case’s left arm was affected. He had swelling, global tenderness and painful ROM. His ESR was 38, CRP was 14.9. X-ray showed severe arthritis. Case 3 differed with the right arm being affected. Again, global tenderness and painful ROM was observed. His ESR was 94, and CRP was 10.6. X-ray displayed an eroded glenoid space. Our fourth case’s right shoulder was affected. He had global tenderness and painful, limited ROM. ESR was 108 and CRP was 2.4. X-ray was non-significant. Discussion: Monoarticular septic arthritis of the virgin glenohumeral joint is seldom diagnosed in clinical practice. Common denominators include elevated ESR, painful, limited ROM, and involvement of the dominant arm. The male population is more frequently affected with an average age of 57. Septic arthritis is managed with incision and drainage or needle aspiration of synovial fluid supplemented with 3-6 weeks of intravenous antibiotics. Due to better irrigation and joint visualization, arthroscopy is preferred. Open surgical drainage may be indicated if the above methods fail. Conclusion: If a middle-aged male presents with vague anterior or posterior shoulder pain, elevated inflammatory markers and a low grade fever, an x-ray should be performed. If this displays degenerative joint disease, the complete further workup with advanced imaging, such as an MRI, CT scan, or an ultrasound. If these imaging modalities display anterior space joint effusion with soft tissue involvement, we can suspect septic arthritis of the untouched glenohumeral joint and surgery is indicated.

Keywords: glenohumeral joint, identification, infection, septic arthritis, shoulder

Procedia PDF Downloads 398
747 Induced Pulsation Attack Against Kalman Filter Driven Brushless DC Motor Control System

Authors: Yuri Boiko, Iluju Kiringa, Tet Yeap

Abstract:

We use modeling and simulation tools, to introduce a novel bias injection attack, named the ’Induced Pulsation Attack’, which targets Cyber Physical Systems with closed-loop controlled Brushless DC (BLDC) motor and Kalman filter driver in the feedback loop. This attack involves engaging a linear function with a constant gradient to distort the coefficient of the injected bias, which falsifies the Kalman filter estimates of the rotor’s angular speed. As a result, this manipulation interaction inside the control system causes periodic pulsations in a form of asymmetric sine wave of both current and voltage in the circuit windings, with a high magnitude. It is shown that by varying the gradient of linear function, one can control both the frequency and structure of the induced pulsations. It is also demonstrated that terminating the attack at any point leads to additional compensating effort from the controller to restore the speed to its equilibrium value. This compensation effort produces an exponentially decaying wave, which we call the ’attack withdrawal syndrome’ wave. The conditions for maximizing or minimizing the impact of the attack withdrawal syndrome are determined. Linking the termination of the attack to the end of the full period of the induced pulsation wave has been shown to nullify the attack withdrawal syndrome wave, thereby improving the attack’s covertness.

Keywords: cyber-attack, induced pulsation, bias injection, Kalman filter, BLDC motor, control system, closed loop, P- controller, PID-controller, saw-function, cyber-physical system

Procedia PDF Downloads 48
746 Assessment of Hamstring, Lower Back and Upper Body Flexibility in War Disabled Individuals in Sri Lanka North and East Region

Authors: Esther Liyanage, Indrajith Liyanage, A. A. J. Rajaratne

Abstract:

During the 30 year civil war in Sri Lanka, a large number of individuals were injured and disabled. These disabilities have reduced their daily physical activities which may cause reduction in flexibility of upper limb, shoulder girdle, lower back and lower limb. Muscle flexibility is important for a healthy lifestyle. The main objective of the study was to assess the upper limb, shoulder girdle and lower back, hamstring flexibility of the intact lower limb in disabled individuals in the North and Eastern parts of Sri Lanka. Back saver sits and reach test and shoulder scratch test described in FITNESS GRAM was used in the study. A total of 125 disabled soldiers with lower limb disabilities were recruited for the study. Flexibility of the lower back and hamstring muscles of uninjured lower limb was measured using back saver sit and reach test described by Wells and Dillon (1952). Upper limb and shoulder girdle flexibility was assessed using shoulder stretch test. Score 0-3 was given according to the ability to reach Superior medial angle of the opposite scapula, top of the head or the mouth. The results indicate that 31 (24.8%) disabled soldiers have lower limb flexibility less than 8, 2 (1.6 % ) have flexibility of 8, 2 (1.6 %) have flexibility of 8.5, 11 ( 8.8% ) have flexibility of 9, 14 (11.2 %) have flexibility of 9.5, 23 (18.4 %) have flexibility of 10, 17 (13.6 %) have 10.5 flexibility, 13 (10.4%) have 11 flexibility, 2 (1.6%) have 11.5 flexibility, 10 (8 %) have flexibility of 12 and 3 (2.34 %) have flexibility of 12.5. Six disabled soldiers (4.8%) have upper limb flexibility of 2 and remaining 95.2% have normal upper limb flexibility (score 3). A reduction in the flexibility of muscles in lower body and lower limbs was seen in 25% disabled soldiers which could be due to reduction in their daily physical activities.

Keywords: disability, flexibility, rehabilitation, quality of life

Procedia PDF Downloads 445
745 Modeling Intelligent Threats: Case of Continuous Attacks on a Specific Target

Authors: Asma Ben Yaghlane, Mohamed Naceur Azaiez

Abstract:

In this paper, we treat a model that falls in the area of protecting targeted systems from intelligent threats including terrorism. We introduce the concept of system survivability, in the context of continuous attacks, as the probability that a system under attack will continue operation up to some fixed time t. We define a constant attack rate (CAR) process as an attack on a targeted system that follows an exponential distribution. We consider the superposition of several CAR processes. From the attacker side, we determine the optimal attack strategy that minimizes the system survivability. We also determine the optimal strengthening strategy that maximizes the system survivability under limited defensive resources. We use operations research techniques to identify optimal strategies of each antagonist. Our results may be used as interesting starting points to develop realistic protection strategies against intentional attacks.

Keywords: CAR processes, defense/attack strategies, exponential failure, survivability

Procedia PDF Downloads 366
744 Effect of Waste Foundry Slag and Alccofine on Durability Properties of High Strength Concrete

Authors: Devinder Sharma, Sanjay Sharma, Ajay Goyal, Ashish Kapoor

Abstract:

The present research paper discussed the durability properties of high strength concrete (HSC) using Foundry Slag(FD) as partial substitute for fine aggregates (FA) and Alccofine (AF) in addition to portland pozzolana (PPC) cement. Specimens of Concrete M100 grade with water/binder ratio 0.239, with Foundry Slag (FD) varying from 0 to 50% and with optimum quantity of AF(15%) were casted and tested for durability properties such as Water absorption, water permeability, resistance to sulphate attack, alkali attack and nitrate attack of HSC at the age of 7, 14, 28, 56 and 90 days. Substitution of fine aggregates (FA) with up to 45% of foundry slag(FD) content and cement with 15% substitution and addition of alccofine showed an excellent resistance against durability properties at all ages but showed a decrease in these properties with 50% of FD contents. Loss of weight in concrete samples due to sulphate attack, alkali attack and nitrate attack of HSC at the age of 365 days was compared with loss in compressive strength. Correlation between loss in weight and loss in compressive strength in all the tests was found to be excellent.

Keywords: alccofine, alkali attack, foundry slag, high strength concrete, nitrate attack, water absorption, water permeability

Procedia PDF Downloads 304
743 Experimental Studies on the Corrosion Effects of the Concrete Made with Tannery Effluent

Authors: K. Nirmalkumar

Abstract:

An acute water scarcity is prevailing in the dry season in and around Perundurai (Erode district, Tamil Nadu, India) where there are more number of tannery units. Hence an attempt was made to use the effluent from the tannery industry for construction purpose. The mechanical properties such as compressive strength, tensile strength, flexural strength and the special properties such as chloride attack, sulphate attack and chemical attack were studied by casting various concrete specimens in form of cube, cylinders and beams, etc. It was observed that the concrete had some reduction in strength while subjected to chloride attack, sulphate attack and chemical attack. So admixtures were selected and optimized in suitable proportion to counter act the adverse effects and the results were found to be satisfactory. In this research study the corrosion results of specimens prepared by using treated and untreated tannery effluent were compared with the concrete specimens prepared by using potable water. It was observed that by the addition of admixtures, the adverse effects due to the usage of the treated and untreated tannery effluent are counteracted.

Keywords: corrosion, calcium nitrite, concrete, fly ash

Procedia PDF Downloads 245
742 An Aspiring Solution to the Man in the Middle Bootstrap Vulnerability

Authors: Mouad Zouina, Benaceur Outtaj

Abstract:

The proposed work falls within the context of improving data security for m-commerce systems. In this context we have placed under the light some flaws encountered in HTTPS the most used m-commerce protocol, particularly the man in the middle attack, shortly MITM. The man in the middle attack is an active listening attack. The idea of this attack is to target the handshake phase of the HTTPS protocol which is the transition from a non-secure connection to a secure connection in our case HTTP to HTTPS. This paper proposes a solution to fix those flaws based on the upgrade of HSTS standard handshake sequence using the DNSSEC standard.

Keywords: m-commerce, HTTPS, HSTS, DNSSEC, MITM bootstrap vulnerability

Procedia PDF Downloads 373
741 Slope Stability Considering the Top Building Load

Authors: Micke Didit, Xiwen Zhang, Weidong Zhu

Abstract:

Slope stability is one of the most important subjects of geotechnics. The slope top-loading plays a key role in the stability of slopes in hill slope areas. Therefore, it is of great importance to study the relationship between the load and the stability of the slope. This study aims to analyze the influence of the building load applied on the top of the slope and deduces its effect on the slope stability. For this purpose, a three-dimensional slope model under different building loads with different distances to the slope shoulder was established using the finite-difference analysis software Flac3D. The results show that the loads applied at different distances on the top of the slope have different effects on the slope stability. The slope factor of safety (fos) increases with the increase of the distance between the top-loading and the slope shoulder, resulting in the decrease of the coincidence area between the load-deformation and the potential sliding surface. The slope is no longer affected by the potential risk of sliding at approximately 20 m away from the slope shoulder.

Keywords: building load, finite-difference analysis, FLAC3D software, slope factor of safety, slope stability

Procedia PDF Downloads 151
740 Comparison of EMG Normalization Techniques Recommended for Back Muscles Used in Ergonomics Research

Authors: Saif Al-Qaisi, Alif Saba

Abstract:

Normalization of electromyography (EMG) data in ergonomics research is a prerequisite for interpreting the data. Normalizing accounts for variability in the data due to differences in participants’ physical characteristics, electrode placement protocols, time of day, and other nuisance factors. Typically, normalized data is reported as a percentage of the muscle’s isometric maximum voluntary contraction (%MVC). Various MVC techniques have been recommended in the literature for normalizing EMG activity of back muscles. This research tests and compares the recommended MVC techniques in the literature for three back muscles commonly used in ergonomics research, which are the lumbar erector spinae (LES), latissimus dorsi (LD), and thoracic erector spinae (TES). Six healthy males from a university population participated in this research. Five different MVC exercises were compared for each muscle using the Tringo wireless EMG system (Delsys Inc.). Since the LES and TES share similar functions in controlling trunk movements, their MVC exercises were the same, which included trunk extension at -60°, trunk extension at 0°, trunk extension while standing, hip extension, and the arch test. The MVC exercises identified in the literature for the LD were chest-supported shoulder extension, prone shoulder extension, lat-pull down, internal shoulder rotation, and abducted shoulder flexion. The maximum EMG signal was recorded during each MVC trial, and then the averages were computed across participants. A one-way analysis of variance (ANOVA) was utilized to determine the effect of MVC technique on muscle activity. Post-hoc analyses were performed using the Tukey test. The MVC technique effect was statistically significant for each of the muscles (p < 0.05); however, a larger sample of participants was needed to detect significant differences in the Tukey tests. The arch test was associated with the highest EMG average at the LES, and also it resulted in the maximum EMG activity more often than the other techniques (three out of six participants). For the TES, trunk extension at 0° was associated with the largest EMG average, and it resulted in the maximum EMG activity the most often (three out of six participants). For the LD, participants obtained their maximum EMG either from chest-supported shoulder extension (three out of six participants) or prone shoulder extension (three out of six participants). Chest-supported shoulder extension, however, had a larger average than prone shoulder extension (0.263 and 0.240, respectively). Although all the aforementioned techniques were superior in their averages, they did not always result in the maximum EMG activity. If an accurate estimate of the true MVC is desired, more than one technique may have to be performed. This research provides additional MVC techniques for each muscle that may elicit the maximum EMG activity.

Keywords: electromyography, maximum voluntary contraction, normalization, physical ergonomics

Procedia PDF Downloads 169
739 A Pattern Recognition Neural Network Model for Detection and Classification of SQL Injection Attacks

Authors: Naghmeh Moradpoor Sheykhkanloo

Abstract:

Structured Query Language Injection (SQLI) attack is a code injection technique in which malicious SQL statements are inserted into a given SQL database by simply using a web browser. Losing data, disclosing confidential information or even changing the value of data are the severe damages that SQLI attack can cause on a given database. SQLI attack has also been rated as the number-one attack among top ten web application threats on Open Web Application Security Project (OWASP). OWASP is an open community dedicated to enabling organisations to consider, develop, obtain, function, and preserve applications that can be trusted. In this paper, we propose an effective pattern recognition neural network model for detection and classification of SQLI attacks. The proposed model is built from three main elements of: a Uniform Resource Locator (URL) generator in order to generate thousands of malicious and benign URLs, a URL classifier in order to: 1) classify each generated URL to either a benign URL or a malicious URL and 2) classify the malicious URLs into different SQLI attack categories, and an NN model in order to: 1) detect either a given URL is a malicious URL or a benign URL and 2) identify the type of SQLI attack for each malicious URL. The model is first trained and then evaluated by employing thousands of benign and malicious URLs. The results of the experiments are presented in order to demonstrate the effectiveness of the proposed approach.

Keywords: neural networks, pattern recognition, SQL injection attacks, SQL injection attack classification, SQL injection attack detection

Procedia PDF Downloads 437
738 Service Life Modelling of Concrete Deterioration Due to Biogenic Sulphuric Acid (BSA) Attack-State-of-an-Art-Review

Authors: Ankur Bansal, Shashank Bishnoi

Abstract:

Degradation of Sewage pipes, sewage pumping station and Sewage treatment plants(STP) is of major concern due to difficulty in their maintenance and the high cost of replacement. Most of these systems undergo degradation due to Biogenic sulphuric acid (BSA) attack. Since most of Waste water treatment system are underground, detection of this deterioration remains hidden. This paper presents a literature review, outlining the mechanism of this attack focusing on critical parameters of BSA attack, along with available models and software to predict the deterioration due to this attack. This paper critically examines the various steps and equation in various Models of BSA degradation, detail on assumptions and working of different softwares are also highlighted in this paper. The paper also focuses on the service life design technique available through various codes and method to integrate the servile life design with BSA degradation on concrete. In the end, various methods enhancing the resistance of concrete against Biogenic sulphuric acid attack are highlighted. It may be concluded that the effective modelling for degradation phenomena may bring positive economical and environmental impacts. With current computing capabilities integrated degradation models combining the various durability aspects can bring positive change for sustainable society.

Keywords: concrete degradation, modelling, service life, sulphuric acid attack

Procedia PDF Downloads 286
737 Parkinson's Disease and Musculoskeletal Problems

Authors: Ozge Yilmaz Kusbeci, Ipek Inci

Abstract:

Aim: Musculoskeletal problems are very common in Parkinson’s disease (PD). They affect quality of life and cause disabilities. However they are under-evaluated, and under-treated. The aim of this study is to evaluate the prevalence and clinical features of musculoskeletal problems in patients with Parkinson disease (PD) compared to controls. Methods: 50 PD patients and 50 age and sex matched controls were interviewed by physicians about their musculoskeletal problems. Results: The prevalence of musculoskeletal problems was significantly higher in the PD group than in the control group (p < 0.05). Commonly involved body sites were the shoulder, low back, and knee. The shoulder and low back was more frequently involved in the PD group than in the control group. However, the knee was similarly involved in both groups. Among the past diagnoses associated with musculoskeletal problems, frozen shoulder, low back pain and osteoporosis more common in the PD group than in the control group (p < 0.05). Furthermore, musculoskeletal problems in the PD group tended to receive less treatment than that of the control group. Conclusion: Musculoskeletal problems were more common in the PD group than in the controls. Therefore assessment and treatment of musculoskeletal problems could improve quality of life in PD patients.

Keywords: parkinson disease, musculoskeletal problems, quality of life, PD disease

Procedia PDF Downloads 376
736 Utility of Range of Motion Measurements on Classification of Athletes

Authors: Dhiraj Dolai, Rupayan Bhattacharya

Abstract:

In this study, a comparison of Range Of Motion (ROM) of middle and long-distance runners and swimmers has been made. The mobility of the various joints is essential for the quick movement of any sportsman. Knowledge of a ROM helps in preventing injuries, in repeating the movement, and in generating speed and power. ROM varies among individuals, and it is influenced by factors such as gender, age, and whether the motion is performed actively or passively. ROM for running and swimming, both performed with due consideration on speed, plays an important role. The time of generation of speed and mobility of the particular joints are very important for both kinds of athletes. The difficulties that happen during running and swimming in the direction of motion is changed. In this study, data were collected for a total of 102 subjects divided into three groups: control group (22), middle and long-distance runners (40), and swimmers (40), and their ages are between 12 to 18 years. The swimmers have higher ROM in shoulder joint flexion, extension, abduction, and adduction movement. Middle and long-distance runners have significantly greater ROM from Control Group in the left shoulder joint flexion with a 5.82 mean difference. Swimmers have significantly higher ROM from the Control Group in the left shoulder joint flexion with 24.84 mean difference and swimmers have significantly higher ROM from the Middle and Long distance runners in left shoulder flexion with 19.02 mean difference. The picture will be clear after a more detailed investigation.

Keywords: range of motion, runners, swimmers, significance

Procedia PDF Downloads 101
735 The Journey of a Malicious HTTP Request

Authors: M. Mansouri, P. Jaklitsch, E. Teiniker

Abstract:

SQL injection on web applications is a very popular kind of attack. There are mechanisms such as intrusion detection systems in order to detect this attack. These strategies often rely on techniques implemented at high layers of the application but do not consider the low level of system calls. The problem of only considering the high level perspective is that an attacker can circumvent the detection tools using certain techniques such as URL encoding. One technique currently used for detecting low-level attacks on privileged processes is the tracing of system calls. System calls act as a single gate to the Operating System (OS) kernel; they allow catching the critical data at an appropriate level of detail. Our basic assumption is that any type of application, be it a system service, utility program or Web application, “speaks” the language of system calls when having a conversation with the OS kernel. At this level we can see the actual attack while it is happening. We conduct an experiment in order to demonstrate the suitability of system call analysis for detecting SQL injection. We are able to detect the attack. Therefore we conclude that system calls are not only powerful in detecting low-level attacks but that they also enable us to detect high-level attacks such as SQL injection.

Keywords: Linux system calls, web attack detection, interception, SQL

Procedia PDF Downloads 326
734 Comparison of Two Online Intervention Protocols on Reducing Habitual Upper Body Postures: A Randomized Trial

Authors: Razieh Karimian, Kim Burton, Mohammad Mehdi Naghizadeh, Maryam Karimian

Abstract:

Introduction: Habitual upper body postures are associated with online learning during the COVID-19 pandemic. This study explored whether adding an exercise routine to an ergonomic advice intervention improves these postures. Methods: In this randomized trial, 42 male adolescent students with a forward head posture were randomly divided into two equal groups, one allocated to ergonomic advice alone and the other to ergonomic advice plus an exercise routine. The angles of forward head, shoulder, and back postures were measured with a photogrammetric profile technique before and after the 8-week intervention period. Findings: During home quarantine, 76% of the students used their mobile phones, while 35% used a table-chair-computer for online learning. While significant reductions of the forward, shoulder, and back angles were found in both groups (P < 0.001), the effect was significantly greater in the exercise group (P < 0.001: forward head, shoulder, and back angles reduced by some 9, 6, and 5 degrees respectively, compared with 4 degrees in the forward head, and 2 degrees in the shoulder and back angles for ergonomic advice alone. Conclusion: The exercise routine produced a greater improvement in habitual upper body postures than ergonomic advice alone, a finding that may extend beyond online learning at home.

Keywords: randomized trial, online learning, adolescent, posture, exercise, ergonomic advice

Procedia PDF Downloads 44