Search results for: sulfuric acid attacks
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 3935

Search results for: sulfuric acid attacks

3905 Fertilizer Value of Nitrogen Captured from Poultry Facilities Using Ammonia Scrubbers

Authors: Philip A. Moore Jr., Jerry Martin, Hong Li

Abstract:

Research has shown that over half of the nitrogen (N) excreted from broiler chickens is emitted to the atmosphere before the manure is removed from the barns, resulting in air and water pollution, as well as the loss of a valuable fertilizer resource. The objective of this study was to determine the fertilizer efficiency of N captured from the exhaust air from poultry houses using acid scrubbers. This research was conducted using 24 plots located on a Captina silt loam soil. There were six treatments: (1) unfertilized control, (2) aluminum sulfate (alum) scrubber solution, (3) potassium bisulfate scrubber solution, (4) sodium bisulfate scrubber solution, (5) sulfuric acid scrubber solution and (6) ammonium nitrate fertilizer dissolved in water. There were four replications per treatment in a randomized block design. The scrubber solutions were obtained from acid scrubbers attached to exhaust fans on commercial broiler houses. All N sources were applied at an application rate equivalent to 112 kg N ha⁻¹. Forage yields were measured five times throughout the growing season. Five months after the fertilizer sources were applied, a rainfall simulation study was conducted to determine the potential effects on phosphorus (P) runoff. Forage yields were significantly higher in plots fertilized with scrubber solutions from potassium bisulfate and sodium bisulfate than plots fertilized with scrubber solutions made from alum or sulfuric acid or ammonium nitrate, which were higher than the controls (7.61, 7.46, 6.87, 6.72, 6.45, and 5.12 Mg ha ⁻¹, respectively). Forage N uptake followed similar trends as yields. Phosphorus runoff and water soluble P was significantly lower in plots fertilized with the scrubber solutions made from aluminum sulfate. This study demonstrates that N captured using ammonia scrubbers is as good or possibly better than commercial ammonium nitrate fertilizer.

Keywords: air quality, ammonia emissions, nitrogen fertilizer, poultry

Procedia PDF Downloads 199
3904 Highly Efficient Iron Oxide-Sulfonated Graphene Oxide Catalyst for Esterification and Trans-Esterification Reactions

Authors: Reena D. Souza, Tripti Vats, Prem F. Siril

Abstract:

Esterification of free fatty acid (oleic acid) and transesterification of waste cooking oil (WCO) with ethanol over graphene oxide (GO), GO-Fe2O3, sulfonated GO (GO-SO3H), and Fe2O3/GO-SO3H catalysts were examined in the present study. Iron oxide supported graphene-based acid catalyst (Fe2O3/GO-SO3H) exhibited highest catalytic activity. GO was prepared by modified Hummer’s process. The GO-Fe2O3 nanocomposites were prepared by the addition of NaOH to a solution containing GO and FeCl3. Sulfonation was done using concentrated sulfuric acid. Transmissionelectron microscopy (TEM) and atomic force microscopy (AFM) imaging revealed the presence of Fe2O3 particles having size in the range of 50-200 nm. Crystal structure was analyzed by XRD and defect states of graphene were characterized using Raman spectroscopy. The effects of the reaction variables such as catalyst loading, ethanol to acid ratio, reaction time and temperature on the conversion of fatty acids were studied. The optimum conditions for the esterification process were molar ratio of alcohol to oleic acid at 12:1 with 5 wt% of Fe2O3/GO-SO3H at 1000C with a reaction time of 4h yielding 99% of ethyl oleate. This is because metal oxide supported solid acid catalysts have advantages of having both strong Brønsted as well as Lewis acid properties. The biodiesel obtained by transesterification of WCO was characterized by 1H NMR and Gas Chromatography techniques. XRD patterns of the recycled catalyst evidenced that the catalyst structure was unchanged up to the 5th cycle, which indicated the long life of the catalyst.

Keywords: Fe₂O₃/GO-SO₃H, Graphene Oxide, GO-Fe₂O₃, GO-SO₃H, WCO

Procedia PDF Downloads 277
3903 Preparation and Characterization of Nanocrystalline Cellulose from Acacia mangium

Authors: Samira Gharehkhani, Seyed Farid Seyed Shirazi, Abdolreza Gharehkhani, Hooman Yarmand, Ahmad Badarudin, Rushdan Ibrahim, Salim Newaz Kazi

Abstract:

Nanocrystalline cellulose (NCC) were prepared by acid hydrolysis and ultrasound treatment of bleached Acacia mangium fibers. The obtained rod-shaped nanocrystals showed a uniform size. The results showed that NCC with high crystallinity can be obtained using 64 wt% sulfuric acid. The effect of synthesis condition was investigated. Different reaction times were examined to produce the NCC and the results revealed that an optimum reaction time has to be used for preparing the NCC. Morphological investigation was performed using the transmission electron microscopy (TEM). Fourier transform infrared (FTIR) spectroscopy and thermogravimetric analysis (TGA) were performed. X-ray diffraction (XRD) analysis revealed that the crystallinity increased with successive treatments. The NCC suspension was homogeneous and stable and no sedimentation was observed for a long time.

Keywords: acid hydrolysis, nanocrystalline cellulose, nano material, reaction time

Procedia PDF Downloads 505
3902 Robust Control of Cyber-Physical System under Cyber Attacks Based on Invariant Tubes

Authors: Bruno Vilić Belina, Jadranko Matuško

Abstract:

The rapid development of cyber-physical systems significantly influences modern control systems introducing a whole new range of applications of control systems but also putting them under new challenges to ensure their resiliency to possible cyber attacks, either in the form of data integrity attacks or deception attacks. This paper presents a model predictive approach to the control of cyber-physical systems robust to cyber attacks. We assume that a cyber attack can be modelled as an additive disturbance that acts in the measuring channel. For such a system, we designed a tube-based predictive controller based. The performance of the designed controller has been verified in Matlab/Simulink environment.

Keywords: control systems, cyber attacks, resiliency, robustness, tube based model predictive control

Procedia PDF Downloads 67
3901 The Impact of Malicious Attacks on the Performance of Routing Protocols in Mobile Ad-Hoc Networks

Authors: Habib Gorine, Rabia Saleh

Abstract:

Mobile Ad-Hoc Networks are the special type of wireless networks which share common security requirements with other networks such as confidentiality, integrity, authentication, and availability, which need to be addressed in order to secure data transfer through the network. Their routing protocols are vulnerable to various malicious attacks which could have a devastating consequence on data security. In this paper, three types of attacks such as selfish, gray hole, and black hole attacks have been applied to the two most important routing protocols in MANET named dynamic source routing and ad-hoc on demand distance vector in order to analyse and compare the impact of these attacks on the Network performance in terms of throughput, average delay, packet loss, and consumption of energy using NS2 simulator.

Keywords: MANET, wireless networks, routing protocols, malicious attacks, wireless networks simulation

Procedia PDF Downloads 320
3900 Phishing Attacks Facilitated by Open Source Intelligence

Authors: Urva Maryam

Abstract:

The information has become an important asset to the current cosmos. Globally, various tactics are being observed to confine the spread of information as it makes people vulnerable to security attacks. Open Source Intelligence (OSINT) is a publicly available source that has disseminated information about users or websites, companies, and various organizations. This paper focuses on the quantitative method of exploring various OSINT tools that reveal public information of personals. This information could further facilitate phishing attacks. Phishing attacks can be launched on email addresses, open ports, and unsecure web-surfing. This study allows to analyze the information retrieved from OSINT tools, i.e. theHarvester, and Maltego that can be used to send phishing attacks to individuals.

Keywords: e-mail spoofing, Maltego, OSINT, phishing, spear phishing, theHarvester

Procedia PDF Downloads 148
3899 Phishing Attacks Facilitated by Open Source Intelligence

Authors: Urva Maryam

Abstract:

Information has become an important asset to the current cosmos. Globally, various tactics are being observed to confine the spread of information as it makes people vulnerable to security attacks. Open Source Intelligence (OSINT) is a publicly available source that has disseminated information about users or website, companies, and various organizations. This paper focuses on the quantitative method of exploring various OSINT tools that reveal public information of personals. This information could further facilitate the phishing attacks. Phishing attacks can be launched on email addresses, open ports, and unsecured web-surfing. This study allows to analyze information retrieved from OSINT tools i.e., the Harvester, and Maltego, that can be used to send phishing attacks to individuals.

Keywords: OSINT, phishing, spear phishing, email spoofing, the harvester, maltego

Procedia PDF Downloads 81
3898 Comparison of Microwave-Assisted and Conventional Leaching for Extraction of Copper from Chalcopyrite Concentrate

Authors: Ayfer Kilicarslan, Kubra Onol, Sercan Basit, Muhlis Nezihi Saridede

Abstract:

Chalcopyrite (CuFeS2) is the most common primary mineral used for the commercial production of copper. The low dissolution efficiency of chalcopyrite in sulfate media has prevented an efficient industrial leaching of this mineral in sulfate media. Ferric ions, bacteria, oxygen and other oxidants have been used as oxidizing agents in the leaching of chalcopyrite in sulfate and chloride media under atmospheric or pressure leaching conditions. Two leaching methods were studied to evaluate chalcopyrite (CuFeS2) dissolution in acid media. First, the conventional oxidative acid leaching method was carried out using sulfuric acid (H2SO4) and potassium dichromate (K2Cr2O7) as oxidant at atmospheric pressure. Second, microwave-assisted acid leaching was performed using the microwave accelerated reaction system (MARS) for same reaction media. Parameters affecting the copper extraction such as leaching time, leaching temperature, concentration of H2SO4 and concentration of K2Cr2O7 were investigated. The results of conventional acid leaching experiments were compared to the microwave leaching method. It was found that the copper extraction obtained under high temperature and high concentrations of oxidant with microwave leaching is higher than those obtained conventionally. 81% copper extraction was obtained by the conventional oxidative acid leaching method in 180 min, with the concentration of 0.3 mol/L K2Cr2O7 in 0.5M H2SO4 at 50 ºC, while 93.5% copper extraction was obtained in 60 min with microwave leaching method under same conditions.

Keywords: extraction, copper, microwave-assisted leaching, chalcopyrite, potassium dichromate

Procedia PDF Downloads 370
3897 Detection of Intentional Attacks in Images Based on Watermarking

Authors: Hazem Munawer Al-Otum

Abstract:

In this work, an efficient watermarking technique is proposed and can be used for detecting intentional attacks in RGB color images. The proposed technique can be implemented for image authentication and exhibits high robustness against unintentional common image processing attacks. It deploys two measures to discern between intentional and unintentional attacks based on using a quantization-based technique in a modified 2D multi-pyramidal DWT transform. Simulations have shown high accuracy in detecting intentionally attacked regions while exhibiting high robustness under moderate to severe common image processing attacks.

Keywords: image authentication, copyright protection, semi-fragile watermarking, tamper detection

Procedia PDF Downloads 255
3896 Using Hemicellulosic Liquor from Sugarcane Bagasse to Produce Second Generation Lactic Acid

Authors: Regiane A. Oliveira, Carlos E. Vaz Rossell, Rubens Maciel Filho

Abstract:

Lactic acid, besides a valuable chemical may be considered a platform for other chemicals. In fact, the feasibility of hemicellulosic sugars as feedstock for lactic acid production process, may represent the drop of some of the barriers for the second generation bioproducts, especially bearing in mind the 5-carbon sugars from the pre-treatment of sugarcane bagasse. Bearing this in mind, the purpose of this study was to use the hemicellulosic liquor from sugarcane bagasse as a substrate to produce lactic acid by fermentation. To release of sugars from hemicellulose it was made a pre-treatment with a diluted sulfuric acid in order to obtain a xylose's rich liquor with low concentration of inhibiting compounds for fermentation (≈ 67% of xylose, ≈ 21% of glucose, ≈ 10% of cellobiose and arabinose, and around 1% of inhibiting compounds as furfural, hydroxymethilfurfural and acetic acid). The hemicellulosic sugars associated with 20 g/L of yeast extract were used in a fermentation process with Lactobacillus plantarum to produce lactic acid. The fermentation process pH was controlled with automatic injection of Ca(OH)2 to keep pH at 6.00. The lactic acid concentration remained stable from the time when the glucose was depleted (48 hours of fermentation), with no further production. While lactic acid is produced occurs the concomitant consumption of xylose and glucose. The yield of fermentation was 0.933 g lactic acid /g sugars. Besides, it was not detected the presence of by-products, what allows considering that the microorganism uses a homolactic fermentation to produce its own energy using pentose-phosphate pathway. Through facultative heterofermentative metabolism the bacteria consume pentose, as is the case of L. plantarum, but the energy efficiency for the cell is lower than during the hexose consumption. This implies both in a slower cell growth, as in a reduction in lactic acid productivity compared with the use of hexose. Also, L. plantarum had shown to have a capacity for lactic acid production from hemicellulosic hydrolysate without detoxification, which is very attractive in terms of robustness for an industrial process. Xylose from hydrolyzed bagasse and without detoxification is consumed, although the hydrolyzed bagasse inhibitors (especially aromatic inhibitors) affect productivity and yield of lactic acid. The use of sugars and the lack of need for detoxification of the C5 liquor from sugarcane bagasse hydrolyzed is a crucial factor for the economic viability of second generation processes. Taking this information into account, the production of second generation lactic acid using sugars from hemicellulose appears to be a good alternative to the complete utilization of sugarcane plant, directing molasses and cellulosic carbohydrates to produce 2G-ethanol, and hemicellulosic carbohydrates to produce 2G-lactic acid.

Keywords: fermentation, lactic acid, hemicellulosic sugars, sugarcane

Procedia PDF Downloads 373
3895 Investigation on the Capacitive Deionization of Functionalized Carbon Nanotubes (F-CNTs) and Silver-Decorated F-CNTs for Water Softening

Authors: Khrizelle Angelique Sablan, Rizalinda De Leon, Jaeyoung Lee, Joey Ocon

Abstract:

The impending water shortage drives us to find alternative sources of water. One of the possible solutions is desalination of seawater. There are numerous processes by which it can be done and one if which is capacitive deionization. Capacitive deionization is a relatively new technique for water desalination. It utilizes the electric double layer for ion adsorption. Carbon-based materials are commonly used as electrodes for capacitive deionization. In this study, carbon nanotubes (CNTs) were treated in a mixture of nitric and sulfuric acid. The silver addition was also facilitated to incorporate antimicrobial action. The acid-treated carbon nanotubes (f-CNTs) and silver-decorated f-CNTs (Ag@f-CNTs) were used as electrode materials for seawater deionization and compared with CNT and acid-treated CNT. The synthesized materials were characterized using TEM, EDS, XRD, XPS and BET. The electrochemical performance was evaluated using cyclic voltammetry, and the deionization performance was tested on a single cell with water containing 64mg/L NaCl. The results showed that the synthesized Ag@f-CNT-10 H could have better performance than CNT and a-CNT with a maximum ion removal efficiency of 50.22% and a corresponding adsorption capacity of 3.21 mg/g. It also showed antimicrobial activity against E. coli. However, the said material lacks stability as the efficiency decreases with repeated usage of the electrode.

Keywords: capacitive deionization, carbon nanotubes, desalination, acid functionalization, silver

Procedia PDF Downloads 231
3894 A Tutorial on Network Security: Attacks and Controls

Authors: Belbahi Ahlam

Abstract:

With the phenomenal growth in the Internet, network security has become an integral part of computer and information security. In order to come up with measures that make networks more secure, it is important to learn about the vulnerabilities that could exist in a computer network and then have an understanding of the typical attacks that have been carried out in such networks. The first half of this paper will expose the readers to the classical network attacks that have exploited the typical vulnerabilities of computer networks in the past and solutions that have been adopted since then to prevent or reduce the chances of some of these attacks. The second half of the paper will expose the readers to the different network security controls including the network architecture, protocols, standards and software/ hardware tools that have been adopted in modern day computer networks.

Keywords: network security, attacks and controls, computer and information, solutions

Procedia PDF Downloads 454
3893 A Systematic Approach for Analyzing Multiple Cyber-Physical Attacks on the Smart Grid

Authors: Yatin Wadhawan, Clifford Neuman, Anas Al Majali

Abstract:

In this paper, we evaluate the resilience of the smart grid system in the presence of multiple cyber-physical attacks on its distinct functional components. We discuss attack-defense scenarios and their effect on smart grid resilience. Through contingency simulations in the Network and PowerWorld Simulator, we analyze multiple cyber-physical attacks that propagate from the cyber domain to power systems and discuss how such attacks destabilize the underlying power grid. The analysis of such simulations helps system administrators develop more resilient systems and improves the response of the system in the presence of cyber-physical attacks.

Keywords: smart grid, gas pipeline, cyber- physical attack, security, resilience

Procedia PDF Downloads 313
3892 A Study of General Attacks on Elliptic Curve Discrete Logarithm Problem over Prime Field and Binary Field

Authors: Tun Myat Aung, Ni Ni Hla

Abstract:

This paper begins by describing basic properties of finite field and elliptic curve cryptography over prime field and binary field. Then we discuss the discrete logarithm problem for elliptic curves and its properties. We study the general common attacks on elliptic curve discrete logarithm problem such as the Baby Step, Giant Step method, Pollard’s rho method and Pohlig-Hellman method, and describe in detail experiments of these attacks over prime field and binary field. The paper finishes by describing expected running time of the attacks and suggesting strong elliptic curves that are not susceptible to these attacks.c

Keywords: discrete logarithm problem, general attacks, elliptic curve, prime field, binary field

Procedia PDF Downloads 232
3891 Study on Network-Based Technology for Detecting Potentially Malicious Websites

Authors: Byung-Ik Kim, Hong-Koo Kang, Tae-Jin Lee, Hae-Ryong Park

Abstract:

Cyber terrors against specific enterprises or countries have been increasing recently. Such attacks against specific targets are called advanced persistent threat (APT), and they are giving rise to serious social problems. The malicious behaviors of APT attacks mostly affect websites and penetrate enterprise networks to perform malevolent acts. Although many enterprises invest heavily in security to defend against such APT threats, they recognize the APT attacks only after the latter are already in action. This paper discusses the characteristics of APT attacks at each step as well as the strengths and weaknesses of existing malicious code detection technologies to check their suitability for detecting APT attacks. It then proposes a network-based malicious behavior detection algorithm to protect the enterprise or national networks.

Keywords: Advanced Persistent Threat (APT), malware, network security, network packet, exploit kits

Procedia PDF Downloads 366
3890 Fatty Acid and Amino Acid Composition in Mene maculata in The Sea of Maluku

Authors: Semuel Unwakoly, Reinner Puppela, Maresthy Rumalean, Healthy Kainama

Abstract:

Fish is a kind of food that contains many nutritions, one of those is the long chain of unsaturated fatty acids as omega-3 and omega-6 fatty acids and essential amino acid in enough amount for the necessity of our body. Like pelagic fish that found in the sea of Maluku. This research was done to identify fatty acids and amino acids composition in Moonfish (M. maculata) using transesterification reaction steps and Gas Chromatograph-Mass Spectrophotometer (GC-MS) and High-Performance Liquid Chromatography (HPLC). The result showed that fatty acids composition in Moonfish (M. maculata) contained tridecanoic acid (2.84%); palmitoleic acid (2.65%); palmitic acid (35.24%); oleic acid (6.2%); stearic acid (14.20%); and 5,8,11,14-eicosatetraenoic acid (1.29%) and 12 amino acids composition that consist of 7 essential amino acids, were leucine, isoleucine, valine, phenylalanine, methionine, lysine, and histidine, and also 5 non-essential amino acid, were tyrosine, glycine, alanine, glutamic acid, and arginine.Thus, these fishes can be used by the people to complete the necessity of essential fatty acid and amino acid.

Keywords: Moonfish (M. maculata), fatty acid, amino acid, GC-MS, HPLC

Procedia PDF Downloads 249
3889 WebAppShield: An Approach Exploiting Machine Learning to Detect SQLi Attacks in an Application Layer in Run-time

Authors: Ahmed Abdulla Ashlam, Atta Badii, Frederic Stahl

Abstract:

In recent years, SQL injection attacks have been identified as being prevalent against web applications. They affect network security and user data, which leads to a considerable loss of money and data every year. This paper presents the use of classification algorithms in machine learning using a method to classify the login data filtering inputs into "SQLi" or "Non-SQLi,” thus increasing the reliability and accuracy of results in terms of deciding whether an operation is an attack or a valid operation. A method Web-App auto-generated twin data structure replication. Shielding against SQLi attacks (WebAppShield) that verifies all users and prevents attackers (SQLi attacks) from entering and or accessing the database, which the machine learning module predicts as "Non-SQLi" has been developed. A special login form has been developed with a special instance of data validation; this verification process secures the web application from its early stages. The system has been tested and validated, up to 99% of SQLi attacks have been prevented.

Keywords: SQL injection, attacks, web application, accuracy, database

Procedia PDF Downloads 151
3888 Cloud Computing: Deciding Whether It Is Easier or Harder to Defend Against Cyber Attacks

Authors: Emhemed Shaklawoon, Ibrahim Althomali

Abstract:

We propose that we identify different defense mechanisms that were used before the introduction of the cloud and compare if their protection mechanisms are still valuable and to what degree. Note that in order to defend against vulnerability, we must know how this vulnerability is abused in an attack. Only then, we will be able to recognize if it is easier or harder to defend against cyber attacks.

Keywords: cloud computing, privacy, cyber attacks, defend the cloud

Procedia PDF Downloads 422
3887 Tamper Resistance Evaluation Tests with Noise Resources

Authors: Masaya Yoshikawa, Toshiya Asai, Ryoma Matsuhisa, Yusuke Nozaki, Kensaku Asahi

Abstract:

Recently, side-channel attacks, which estimate secret keys using side-channel information such as power consumption and compromising emanations of cryptography circuits embedded in hardware, have become a serious problem. In particular, electromagnetic analysis attacks against cryptographic circuits between information processing and electromagnetic fields, which are related to secret keys in cryptography circuits, are the most threatening side-channel attacks. Therefore, it is important to evaluate tamper resistance against electromagnetic analysis attacks for cryptography circuits. The present study performs basic examination of the tamper resistance of cryptography circuits using electromagnetic analysis attacks with noise resources.

Keywords: tamper resistance, cryptographic circuit, hardware security evaluation, noise resources

Procedia PDF Downloads 504
3886 Development of Metal-Organic Frameworks-Type Hybrid Functionalized Materials for Selective Uranium Extraction

Authors: Damien Rinsant, Eugen Andreiadis, Michael Carboni, Daniel Meyer

Abstract:

Different types of materials have been developed for the solid/liquid uranium extraction processes, such as functionalized organic polymers, hybrid silica or inorganic adsorbents. In general, these materials exhibit a moderate affinity for uranyl ions and poor selectivity against impurities like iron, vanadium or molybdenum. Moreover, the structural organization deficiency of these materials generates ion diffusion issues inside the material. Therefore, the aim of our study is to developed efficient and organized materials, stable in the acid media encountered in uranium extraction processes. Metal organic frameworks (MOFs) are hybrid crystalline materials consisting of an inorganic part (cluster or metal ions) and tailored organic linkers connected via coordination bonds. These hierarchical materials have exceptional surface area, thermal stability and a large variety of tunable structures. However, due to the reversibility of constitutive coordination bonds, MOFs have moderate stability in strongly complexing or acidic media. Only few of them are known to be stable in aqueous media and only one example is described in strong acidic media. However, these conditions are very often encountered in the environmental pollution remediation of mine wastewaters. To tackle the challenge of developing MOFs adapted for uranium extraction from acid mine waters, we have investigated the stability of several materials. To ensure a good stability we have synthetized and characterized different materials based on highly coordinated metal clusters, such as LnOFs and Zirconium based materials. Among the latter, the UiO family shows a great stability in sulfuric acid media even in the presence of 1.4 M sodium sulfate at pH 2. However, the stability in phosphoric media is reduced due to the high affinity between zirconium and phosphate ligand. Based on these results, we have developed a tertiary amine functionalized MOF denoted UiO-68-NMe2 particularly adapted for the extraction of anionic uranyl (VI) sulfate complexes mainly present in the acid mine solutions. The adsorption capacity of the material has been determined upon varying total sulfate concentration, contact time and uranium concentration. The extraction tests put in evidence different phenomena due to the complexity of the extraction media and the interaction between the MOF and sulfate anion. Finally, the extraction mechanisms and the interaction between uranyl and the MOF structure have been investigated. The functionalized material UiO-68-NMe2 has been characterized in the presence and absence of uranium by FT-IR, UV and Raman techniques. Moreover, the stability of the protonated amino functionalized MOF has been evaluated. The synthesis, characterization and evaluation of this type of hybrid material, particularly adapted for uranium extraction in sulfuric acid media by an anionic exchange mechanism, paved the way for the development of metal organic frameworks functionalized by different other chelating motifs, such as bifunctional ligands showing an enhanced affinity and selectivity for uranium in acid and complexing media. Work in this direction is currently in progress.

Keywords: extraction, MOF, ligand, uranium

Procedia PDF Downloads 160
3885 SIP Flooding Attacks Detection and Prevention Using Shannon, Renyi and Tsallis Entropy

Authors: Neda Seyyedi, Reza Berangi

Abstract:

Voice over IP (VOIP) network, also known as Internet telephony, is growing increasingly having occupied a large part of the communications market. With the growth of each technology, the related security issues become of particular importance. Taking advantage of this technology in different environments with numerous features put at our disposal, there arises an increasing need to address the security threats. Being IP-based and playing a signaling role in VOIP networks, Session Initiation Protocol (SIP) lets the invaders use weaknesses of the protocol to disable VOIP service. One of the most important threats is denial of service attack, a branch of which in this article we have discussed as flooding attacks. These attacks make server resources wasted and deprive it from delivering service to authorized users. Distributed denial of service attacks and attacks with a low rate can mislead many attack detection mechanisms. In this paper, we introduce a mechanism which not only detects distributed denial of service attacks and low rate attacks, but can also identify the attackers accurately. We detect and prevent flooding attacks in SIP protocol using Shannon (FDP-S), Renyi (FDP-R) and Tsallis (FDP-T) entropy. We conducted an experiment to compare the percentage of detection and rate of false alarm messages using any of the Shannon, Renyi and Tsallis entropy as a measure of disorder. Implementation results show that, according to the parametric nature of the Renyi and Tsallis entropy, by changing the parameters, different detection percentages and false alarm rates will be gained with the possibility to adjust the sensitivity of the detection mechanism.

Keywords: VOIP networks, flooding attacks, entropy, computer networks

Procedia PDF Downloads 405
3884 A Highly Sensitive Dip Strip for Detection of Phosphate in Water

Authors: Hojat Heidari-Bafroui, Amer Charbaji, Constantine Anagnostopoulos, Mohammad Faghri

Abstract:

Phosphorus is an essential nutrient for plant life which is most frequently found as phosphate in water. Once phosphate is found in abundance in surface water, a series of adverse effects on an ecosystem can be initiated. Therefore, a portable and reliable method is needed to monitor the phosphate concentrations in the field. In this paper, an inexpensive dip strip device with the ascorbic acid/antimony reagent dried on blotting paper along with wet chemistry is developed for the detection of low concentrations of phosphate in water. Ammonium molybdate and sulfuric acid are separately stored in liquid form so as to improve significantly the lifetime of the device and enhance the reproducibility of the device’s performance. The limit of detection and quantification for the optimized device are 0.134 ppm and 0.472 ppm for phosphate in water, respectively. The device’s shelf life, storage conditions, and limit of detection are superior to what has been previously reported for the paper-based phosphate detection devices.

Keywords: phosphate detection, paper-based device, molybdenum blue method, colorimetric assay

Procedia PDF Downloads 170
3883 A Review Paper for Detecting Zero-Day Vulnerabilities

Authors: Tshegofatso Rambau, Tonderai Muchenje

Abstract:

Zero-day attacks (ZDA) are increasing day by day; there are many vulnerabilities in systems and software that date back decades. Companies keep discovering vulnerabilities in their systems and software and work to release patches and updates. A zero-day vulnerability is a software fault that is not widely known and is unknown to the vendor; attackers work very quickly to exploit these vulnerabilities. These are major security threats with a high success rate because businesses lack the essential safeguards to detect and prevent them. This study focuses on the factors and techniques that can help us detect zero-day attacks. There are various methods and techniques for detecting vulnerabilities. Various companies like edges can offer penetration testing and smart vulnerability management solutions. We will undertake literature studies on zero-day attacks and detection methods, as well as modeling approaches and simulations, as part of the study process.

Keywords: zero-day attacks, exploitation, vulnerabilities

Procedia PDF Downloads 102
3882 Chemical Aging of High-Density Polyethylene (HDPE-100) in Interaction with Aggressive Environment

Authors: Berkas Khaoula, Chaoui Kamel

Abstract:

Polyethylene (PE) pipes are one of the best options for water and gas transmission networks. The main reason for such a choice is its high-quality performance in service conditions over long periods of time. PE pipes are installed in contact with different soils having various chemical compositions with confirmed aggressiveness. As a result, PE pipe surfaces undergo unwanted oxidation reactions. Usually, the polymer mixture is designed to include some additives, such as anti-oxidants, to inhibit or reduce the degradation effects. Some other additives are intended to increase resistance to the ESC phenomenon associated with polymers (ESC: Environmental Stress Cracking). This situation occurs in contact with aggressive external environments following different contaminations of soil, groundwater and transported fluids. In addition, bacterial activity and other physical or chemical media, such as temperature and humidity, can play an enhancing role. These conditions contribute to modifying the PE pipe structure and degrade its properties during exposure. In this work, the effect of distilled water, sodium hypochlorite (bleach), diluted sulfuric acid (H2SO4) and toluene-methanol (TM) mixture are studied when extruded PE samples are exposed to those environments for given periods. The chosen exposure periods are 7, 14 and 28 days at room temperature and in sealed glass containers. Post-exposure observations and ISO impact tests are presented as a function of time and chemical medium. Water effects are observed to be limited in explaining such use in real applications, whereas the changes in TM and acidic media are very significant. For the TM medium, the polymer toughness increased drastically (from 15.95 kJ/m² up to 32.01 kJ/m²), while sulfuric acid showed a steady augmentation over time. This situation may correspond to a hardening phenomenon of PE increasing its brittleness and its ability for structural degradation because of localized oxidation reactions and changes in crystallinity.

Keywords: polyethylene, toluene-methanol mixture, environmental stress cracking, degradation, impact resistance

Procedia PDF Downloads 75
3881 Deradicalization for Former Terrorists through Entrepreneurship Program

Authors: Jamal Wiwoho, Pujiyono, Triyanto

Abstract:

Terrorism is a real enemy for all countries, including Indonesia. Bomb attacks in some parts of Indonesia are proof that Indonesia has serious problems with terrorism. Perpetrators of terror are arrested and imprisoned, and some of them were executed. However, this method did not succeed in stopping the terrorist attacks. Former terrorists continue to carry out bomb attacks. Therefore, this paper proposes a program towards deradicalization efforts of former terrorists through entrepreneurship. This is necessary because it is impossible to change their radical ideology. The program is also motivated by understanding that terrorists generally come from poor families. This program aims to occupy their time with business activities so there is no time to plan and carry out bomb attacks. This research is an empirical law study. Data were collected by literature study, observation, and in-depth interviews. Data were analyzed with the Miles and Huberman interactive model. The results show that the entrepreneurship program is effective to prevent terrorist attack. Former terrorists are busy with their business. Therefore, they have no time to carry out bomb attacks.

Keywords: deradicalization, terrorism, terrorists, entrepreneurship

Procedia PDF Downloads 269
3880 Characterization of Sunflower Oil for Illustration of Its Components

Authors: Mehwish Shahzadi

Abstract:

Sunflower is cultivated all over the world not only as an ornament plant but also for the purpose of getting oil. It is the third most cultivated plant in the history because its oil considered best for health. The present study deals with the preparation of sunflower oil from commercial seed sample which was obtained from local market. The physicochemical properties of the oil were determined which included saponification value, acid value and ester value. Results showed that saponification value of the oil was 191.675, acid value was 0.64 and ester value to be 191.035 for the sample under observation. GC-MS analysis of sunflower oil was carried out to check its composition. Oleic acid was determined with linoleic acid and isopropyl palmitate. It represents the presence of three major components of sunflower oil. Other compounds detected were, p-toluylic acid, butylated hydroxytoluene, 1,2-benzenedicarboxylic acid, benzoic acid, 2,4,6-trimethyl-, 2,4,6-trimethylphenyl ester and 2,4-decadienal, (E,E).

Keywords: GC-MS, oleic acid, saponification value, sunflower oil

Procedia PDF Downloads 318
3879 4P-Model of Information Terrorism

Authors: Nataliya Venelinova

Abstract:

The paper proposes a new interdisciplinary model of reconsidering the role of mass communication effects by coverage of terrorism. The idea of 4P model is based on the synergy, created by the information strategy of threat, predominantly used by terrorist groups, the effects of mediating the symbolic action of the terrorist attacks or the taking of responsibility of any attacks, and the reshaped public perception for security after the attacks being mass communicated. The paper defines the mass communication cycle of terrorism, which leads not only to re-agenda setting of the societies, but also spirally amplifying the effect of propagating fears by over-informing on terrorism attacks. This finally results in the outlining of the so called 4P-model of information terrorism: mass propaganda, panic, paranoia and pandemic.

Keywords: information terrorism, mass communication cycle, public perception, security

Procedia PDF Downloads 173
3878 Comparison of Punicic Acid Amounts in Abdominal Fat Farm Feeding Hy-Line Chickens

Authors: Ozcan Baris Citil, Mehmet Akoz

Abstract:

Effects of fatty acid composition and punicic acid contents of abdominal fat of Hy-line hens were investigated by the gas chromatographic method. Total 30 different fatty acids were determined in fatty acid compositions of eggs. These fatty acids were varied between C 8 to C 22. The punicic acid content of abdominal fats analysed was found to be higher percentages in the 90th day than those of 30th and 60th day. At the end of the experiment, total punicic acid contents of abdominal fats were significantly increased.

Keywords: fatty acids, gas chromatography, punicic acid, abdominal fats

Procedia PDF Downloads 347
3877 Synthesis of Smart Materials Based on Polyaniline Coated Fibers

Authors: Mihaela Beregoi, Horia Iovu, Cristina Busuioc, Alexandru Evanghelidis, Elena Matei, Monica Enculescu, Ionut Enculescu

Abstract:

Nanomaterials field is very attractive for all researchers who are attempting to develop new devices with the same or improved properties than the micro-sized ones, while reducing the reagents and power consumptions. In this way, a wide range of nanomaterials were fabricated and integrated in applications for electronics, optoelectronics, solar cells, tissue reconstruction and drug delivery. Obviously, the most appealing ones are those dedicated to the medical domain. Different types of nano-sized materials, such as particles, fibers, films etc., can be synthesized by using physical, chemical or electrochemical methods. One of these techniques is electrospinning, which enable the production of fibers with nanometric dimensions by pumping a polymeric solution in a high electric field; due to the electrostatic charging and solvent evaporation, the precursor mixture is converted into nonwoven meshes with different fiber densities and mechanical properties. Moreover, polyaniline is a conducting polymer with interesting optical properties, suitable for displays and electrochromic windows. Otherwise, polyaniline is an electroactive polymer that can contract/expand by applying electric stimuli, due to the oxidation/reduction reactions which take place in the polymer chains. These two main properties can be exploited in order to synthesize smart materials that change their dimensions, exhibiting in the same time good electrochromic properties. In the context aforesaid, a poly(methyl metacrylate) solution was spun to get webs composed of fibers with diameter values between 500 nm and 1 µm. Further, the polymer meshes were covered with a gold layer in order to make them conductive and also appropriate as working electrode in an electrochemical cell. The gold shell was deposited by DC sputtering. Such metalized fibers can be transformed into smart materials by covering them with a thin layer of conductive polymer. Thus, the webs were coated with a polyaniline film by the electrochemical route, starting from and aqueous solution of aniline and sulfuric acid, where sulfuric acid acts as oxidant agent. For the polymerization of aniline, a saturated calomel electrode was employed as reference, a platinum plate as counter electrode and the gold covered webs as working electrode. Chronoamperometry was selected as deposition method for polyaniline, by modifying the deposition time. Metalized meshes with different fiber densities were used, the transmission ranging between 70 and 80 %. The morphological investigation showed that polyaniline layer has a granular structure for all deposition experiments. As well, some preliminary optical tests were done by using sulfuric acid as electrolyte, which revealed the modification of polyaniline colour from green to dark blue when applying a voltage. In conclusion, new multilayered materials were obtained by a simple approach: the merge of the electrospinning method benefits with polyaniline chemistry. This synthesis method allows the fabrication of structures with reproducible characteristics, suitable for display or tissue substituents.

Keywords: electrospinning, fibers, smart materials, polyaniline

Procedia PDF Downloads 293
3876 Deep Learning and Accurate Performance Measure Processes for Cyber Attack Detection among Web Logs

Authors: Noureddine Mohtaram, Jeremy Patrix, Jerome Verny

Abstract:

As an enormous number of online services have been developed into web applications, security problems based on web applications are becoming more serious now. Most intrusion detection systems rely on each request to find the cyber-attack rather than on user behavior, and these systems can only protect web applications against known vulnerabilities rather than certain zero-day attacks. In order to detect new attacks, we analyze the HTTP protocols of web servers to divide them into two categories: normal attacks and malicious attacks. On the other hand, the quality of the results obtained by deep learning (DL) in various areas of big data has given an important motivation to apply it to cybersecurity. Deep learning for attack detection in cybersecurity has the potential to be a robust tool from small transformations to new attacks due to its capability to extract more high-level features. This research aims to take a new approach, deep learning to cybersecurity, to classify these two categories to eliminate attacks and protect web servers of the defense sector which encounters different web traffic compared to other sectors (such as e-commerce, web app, etc.). The result shows that by using a machine learning method, a higher accuracy rate, and a lower false alarm detection rate can be achieved.

Keywords: anomaly detection, HTTP protocol, logs, cyber attack, deep learning

Procedia PDF Downloads 210