Search results for: sulphuric acid attack resistance
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 6900

Search results for: sulphuric acid attack resistance

6870 The Role of Micro-Ribonucleic Acid-182 and Micro-Ribonucleic Acid-214 in Cisplatin Resistance of Triple-Negative Breast Cancer Cells

Authors: Bahadir Batar, Elif Serdal, Berna Erdal, Hasan Ogul

Abstract:

Micro-ribonucleic acids (miRNAs) are small short non-coding ribonucleic acid molecules about 22 nucleotides long. miRNAs play a key role in response to chemotherapeutic agents. WW domain-containing oxidoreductase (WWOX) gene encodes a tumor suppressor protein. Loss or reduction of Wwox protein is observed in many breast cancer cases. WWOX protein deficiency is increased in triple-negative breast cancer (TNBC). TNBC is a heterogeneous, highly aggressive, and difficult to treat tumor type. WWOX loss contributes to resistance to cisplatin therapy in patients with TNBC. Here, the aim of the study was to investigate the potential role of miRNAs in cisplatin therapy resistance of WWOX-deficient TNBC cells. This was a cell culture study. miRNA expression profiling was analyzed by LightCycler 480 system. miRNA Set Enrichment Analysis tool was used to integrate experimental data with literature-based biological knowledge to infer a new hypothesis. Increased miR-182 and decreased miR-214 were significantly correlated with cisplatin resistance in WWOX-deficient TNBC cells. miR-182 and miR-214 may involve in cisplatin resistance of WWOX-deficient TNBC cells by deregulating the DNA repair, apoptosis, or protein kinase B signaling pathways. These data highlight the mechanism by which WWOX regulates cisplatin resistance of TNBC and the potential use of WWOX as a predictor biomarker for cisplatin resistance.

Keywords: cisplatin, microRNA, triple-negative breast cancer, WWOX

Procedia PDF Downloads 131
6869 Reliable and Energy-Aware Data Forwarding under Sink-Hole Attack in Wireless Sensor Networks

Authors: Ebrahim Alrashed

Abstract:

Wireless sensor networks are vulnerable to attacks from adversaries attempting to disrupt their operations. Sink-hole attacks are a type of attack where an adversary node drops data forwarded through it and hence affecting the reliability and accuracy of the network. Since sensor nodes have limited battery power, it is essential that any solution to the sinkhole attack problem be very energy-aware. In this paper, we present a reliable and energy efficient scheme to forward data from source nodes to the base station while under sink-hole attack. The scheme also detects sink-hole attack nodes and avoid paths that includes them.

Keywords: energy-aware routing, reliability, sink-hole attack, WSN

Procedia PDF Downloads 396
6868 Study the Effects of Increasing Unsaturation in Palm Oil and Incorporation of Carbon Nanotubes on Resinous Properties

Authors: Muhammad R. Islam, Mohammad Dalour H. Beg, Saidatul S. Jamari

Abstract:

Considering palm oil as non-drying oil owing to its low iodine value, an attempt was taken to increase the unsaturation in the fatty acid chains of palm oil for the preparation of alkyds. To increase the unsaturation in the palm oil, sulphuric acid (SA) and para-toluene sulphonic acid (PTSA) was used prior to alcoholysis for the dehydration process. The iodine number of the oil samples was checked for the unsaturation measurement by Wijs method. Alkyd resin was prepared using the dehydrated palm oil by following alcoholysis and esterification reaction. To improve the film properties 0.5 wt% multi-wall carbon nano tubes (MWCNTs) were used to manufacture polymeric film. The properties of the resins were characterized by various physico-chemical properties such as density, viscosity, iodine value, acid value, saponification value, etc. Structural elucidation was confirmed by Fourier transform of infrared spectroscopy and proton nuclear magnetic resonance; surfaces of the cured films were observed by scanning electron microscopy. In addition, pencil hardness and chemical resistivity was also measured by using standard methods. The effect of enhancement of the unsaturation in the fatty acid chain found significant and motivational. The resin prepared with dehydrated palm oil showed improved properties regarding hardness and chemical resistivity testing. The incorporation of MWCNTs enhanced the thermal stability and hardness of the films as well.

Keywords: alkyd resin, nano-coatings, dehydration, palm oil

Procedia PDF Downloads 310
6867 Effect of the Addition of Additives on the Improvement of the Performances of Lead–Acid Batteries

Authors: Malika Foudia, Larbi Zerroual

Abstract:

The objective of this work is to improve the electrical proprieties of lead-acid battery with the addition of additives in electrolyte and in the cured plates before oxidation. The results showed that the addition of surfactant in sulfuric acid and 3% mineral additive in the cured plates change the morphology and the crystallite size of PAM after oxidation. The discharge capacity increases with the decrease of the crystallite size and the resistance of the active mass. This shows that the addition of mineral additive and the surfactant additive to the PAM, the electrical performance and the cycle life of lead- acid battery are significantly increases.

Keywords: lead-acid battery, additives, positive plate, impedance (EIS).

Procedia PDF Downloads 418
6866 Optical Characterization of Lead Sulphide Thin Films Grown by Chemical Bath Deposition

Authors: Ekpekpo Arthur

Abstract:

Thin films can either be conductive or dielectric (non-conductive). It is formed through atom/molecules state or formed after decomposing the materials into atomic/molecular scale by physical or chemical processes. In this study, thin films of Lead Sulphide were deposited on glass substrate prepared from lead acetate and thiourea solution using chemical bath deposition (CBD). The glass slides were subjected to the pretreatment by soaking them in a solution of 50% sulphuric acid and 50% nitric acid. Lead sulphide was deposited at different parameters such as deposition time and temperature. The optical properties of the thin films were determined from spectroscopy measurements of absorbance and reflectance. Optical studies show that the band gap of lead sulphide ranges between 0.41 eV to 300K.

Keywords: lead sulphide, spectroscopy, absorbance, reflectance

Procedia PDF Downloads 431
6865 Elimination of Phosphorus by Activated Carbon Prepared from Algerian Dates Stones

Authors: A. Kamarchoua, A. A. Bebaa, A. Douadi

Abstract:

The current work has a goal of the preparation of activated carbon from the stones of dates from southern Algeria (El-Oued province) using a simple pyrolysis proceeded by chemical impregnation in sulphuric acid. For the preparation of the carbon, we choose the diameter of the pellets (0.5-1)mm, activation by acid and water (1:1), carbonization at 450˚C. The prepared carbon has the following characteristics: specific surface 125.86 m2/g, methylene blue number 40, CCE = 0.3meq.g/l, IR and micrographics SEM. The activated carbon thus obtained is used at the water purification in wastewater treatment plant (WWTP) at Kouinine, El- Oued province, to totally eliminate phosphorus. We analyzed the water at the WWTP before the purification procedure. In this study, we have looked at the effect of the following parameters on the adsorption of carbon: the pH, the contact time (Tc) and the agitation speed (Va). The best conditions for phosphorus adsorption are: pH=4 or pH >5, Tc = 60 min and Va = 900 rotations per minute.

Keywords: activated carbon, date stones, pyrolysis, phosphate pollutants

Procedia PDF Downloads 379
6864 An Attack on the Lucas Based El-Gamal Cryptosystem in the Elliptic Curve Group Over Finite Field Using Greater Common Divisor

Authors: Lee Feng Koo, Tze Jin Wong, Pang Hung Yiu, Nik Mohd Asri Nik Long

Abstract:

Greater common divisor (GCD) attack is an attack that relies on the polynomial structure of the cryptosystem. This attack required two plaintexts differ from a fixed number and encrypted under same modulus. This paper reports a security reaction of Lucas Based El-Gamal Cryptosystem in the Elliptic Curve group over finite field under GCD attack. Lucas Based El-Gamal Cryptosystem in the Elliptic Curve group over finite field was exposed mathematically to the GCD attack using GCD and Dickson polynomial. The result shows that the cryptanalyst is able to get the plaintext without decryption by using GCD attack. Thus, the study concluded that it is highly perilous when two plaintexts have a slight difference from a fixed number in the same Elliptic curve group over finite field.

Keywords: decryption, encryption, elliptic curve, greater common divisor

Procedia PDF Downloads 256
6863 Cross Site Scripting (XSS) Attack and Automatic Detection Technology Research

Authors: Tao Feng, Wei-Wei Zhang, Chang-Ming Ding

Abstract:

Cross-site scripting (XSS) is one of the most popular WEB Attacking methods at present, and also one of the most risky web attacks. Because of the population of JavaScript, the scene of the cross site scripting attack is also gradually expanded. However, since the web application developers tend to only focus on functional testing and lack the awareness of the XSS, which has made the on-line web projects exist many XSS vulnerabilities. In this paper, different various techniques of XSS attack are analyzed, and a method automatically to detect it is proposed. It is easy to check the results of vulnerability detection when running it as a plug-in.

Keywords: XSS, no target attack platform, automatic detection,XSS detection

Procedia PDF Downloads 403
6862 Surface Modified Polyamidoamine Dendrimer with Gallic Acid Overcomes Drug Resistance in Colon Cancer Cells HCT-116

Authors: Khushbu Priyadarshi, Chandramani Pathak

Abstract:

Cancer cells can develop resistance to conventional therapies especially chemotherapeutic drugs. Resistance to chemotherapy is another challenge in cancer therapeutics. Therefore, it is important to address this issue. Gallic acid (GA) is a natural plant compound that exhibits various biological properties including anti-proliferative, anti-inflammatory, anti-oxidant and anti-bacterial. Despite of the wide spectrum biological properties GA has cytotoxic response and low bioavailability. To overcome this problem, GA was conjugated with the Polyamidoamine(PAMAM) dendrimer for improving the bioavailability and efficient delivery in drug-resistant HCT-116 Colon Cancer cells. Gallic acid was covalently linked to 4.0 G PAMAM dendrimer. PAMAM dendrimer is well established nanocarrier but has cytotoxicity due to presence of amphiphilic nature of amino group. In our study we have modified surface of PAMAM dendrimer with Gallic acid and examine their anti-proliferative effects in drug-resistant HCT-116 cells. Further, drug-resistant colon cancer cells were established and thereafter treated with different concentration of PAMAM-GA to examine their anti-proliferative potential. Our results show that PAMAM-GA conjugate induces apoptotic cell death in HCT-116 and drug-resistant cells observed by Annexin-PI staining. In addition, it also shows that multidrug-resistant drug transporter P-gp protein expression was downregulated with increasing the concentration of GA conjugate. After that we also observed the significant difference in Rh123 efflux and accumulation in drug sensitive and drug-resistant cancer cells. Thus, our study suggests that conjugation of anti-cancer agents with PAMAM could improve drug resistant property and cytotoxic response to treatment of cancer.

Keywords: drug resistance, gallic acid, PAMAM dendrimer, P-glycoprotein

Procedia PDF Downloads 149
6861 Cryptographic Attack on Lucas Based Cryptosystems Using Chinese Remainder Theorem

Authors: Tze Jin Wong, Lee Feng Koo, Pang Hung Yiu

Abstract:

Lenstra’s attack uses Chinese remainder theorem as a tool and requires a faulty signature to be successful. This paper reports on the security responses of fourth and sixth order Lucas based (LUC4,6) cryptosystem under the Lenstra’s attack as compared to the other two Lucas based cryptosystems such as LUC and LUC3 cryptosystems. All the Lucas based cryptosystems were exposed mathematically to the Lenstra’s attack using Chinese Remainder Theorem and Dickson polynomial. Result shows that the possibility for successful Lenstra’s attack is less against LUC4,6 cryptosystem than LUC3 and LUC cryptosystems. Current study concludes that LUC4,6 cryptosystem is more secure than LUC and LUC3 cryptosystems in sustaining against Lenstra’s attack.

Keywords: Lucas sequence, Dickson polynomial, faulty signature, corresponding signature, congruence

Procedia PDF Downloads 166
6860 The Efficacy of Salicylic Acid and Puccinia Triticina Isolates Priming Wheat Plant to Diuraphis Noxia Damage

Authors: Huzaifa Bilal

Abstract:

Russian wheat aphid (Diuraphis noxia, Kurdjumov) is considered an economically important wheat (Triticum aestivum L.) pest worldwide and in South Africa. The RWA damages wheat plants and reduces annual yields by more than 10%. Even though pest management by pesticides and resistance breeding is an attractive option, chemicals can cause harm to the environment. Furthermore, the evolution of resistance-breaking aphid biotypes has out-paced the release of resistant cultivars. An alternative strategy to reduce the impact of aphid damage on plants, such as priming, which sensitizes plants to respond effectively to subsequent attacks, is necessary. In this study, wheat plants at the seedling and flag leaf stages were primed by salicylic acid and isolate representative of two races of the leaf rust pathogen Puccinia triticina Eriks. (Pt), before RWA (South African RWA biotypes 1 and 4) infestation. Randomized complete block design experiments were conducted in the greenhouse to study plant-pest interaction in primed and non-primed plants. Analysis of induced aphid damage indicated salicylic acid differentially primed wheat cultivars for increased resistance to the RWASA biotypes. At the seedling stage, all cultivars were primed for enhanced resistance to RWASA1, while at the flag leaf stage, only PAN 3111, SST 356 and Makalote were primed for increased resistance. The Puccinia triticina efficaciously primed wheat cultivars for excellent resistance to RWASA1 at the seedling and flag leaf stages. However, Pt failed to enhance the four Lesotho cultivars' resistance to RWASA4 at the seedling stage and PAN 3118 at the flag leaf stage. The induced responses at the seedling and flag leaf stages were positively correlated in all the treatments. Primed plants induced high activity of antioxidant enzymes like peroxidase, ascorbate peroxidase and superoxide dismutase. High antioxidant activity indicates activation of resistant responses in primed plants (primed by salicylic acid and Puccina triticina). Isolates of avirulent Pt races can be a worthy priming agent for improved resistance to RWA infestation. Further confirmation of the priming effects needs to be evaluated at the field trials to investigate its application efficiency.

Keywords: Russian wheat aphis, salicylic acid, puccina triticina, priming

Procedia PDF Downloads 208
6859 A Game of Information in Defense/Attack Strategies: Case of Poisson Attacks

Authors: Asma Ben Yaghlane, Mohamed Naceur Azaiez

Abstract:

In this paper, we briefly introduce the concept of Poisson attacks in the case of defense/attack strategies where attacks are assumed to be continuous. We suggest a game model in which the attacker will combine both criteria of a sufficient confidence level of a successful attack and a reasonably small size of the estimation error in order to launch an attack. Here, estimation error arises from assessing the system failure upon attack using aggregate data at the system level. The corresponding error is referred to as aggregation error. On the other hand, the defender will attempt to deter attack by making one or both criteria inapplicable. The defender will build his/her strategy by both strengthening the targeted system and increasing the size of error. We will formulate the defender problem based on appropriate optimization models. The attacker will opt for a Bayesian updating in assessing the impact on the improvement made by the defender. Then, the attacker will evaluate the feasibility of the attack before making the decision of whether or not to launch it. We will provide illustrations to better explain the process.

Keywords: attacker, defender, game theory, information

Procedia PDF Downloads 468
6858 A Fluorescent Polymeric Boron Sensor

Authors: Soner Cubuk, Mirgul Kosif, M. Vezir Kahraman, Ece Kok Yetimoglu

Abstract:

Boron is an essential trace element for the completion of the life circle for organisms. Suitable methods for the determination of boron have been proposed, including acid - base titrimetric, inductively coupled plasma emission spectroscopy flame atomic absorption and spectrophotometric. However, the above methods have some disadvantages such as long analysis times, requirement of corrosive media such as concentrated sulphuric acid and multi-step sample preparation requirements and time-consuming procedures. In this study, a selective and reusable fluorescent sensor for boron based on glycosyloxyethyl methacrylate was prepared by photopolymerization. The response characteristics such as response time, pH, linear range, limit of detection were systematically investigated. The excitation/emission maxima of the membrane were at 378/423 nm, respectively. The approximate response time was measured as 50 sec. In addition, sensor had a very low limit of detection which was 0.3 ppb. The sensor was successfully used for the determination of boron in water samples with satisfactory results.

Keywords: boron, fluorescence, photopolymerization, polymeric sensor

Procedia PDF Downloads 283
6857 11-Round Impossible Differential Attack on Midori64

Authors: Zhan Chen, Wenquan Bi

Abstract:

This paper focuses on examining the strength of Midori against impossible differential attack. The Midori family of light weight block cipher orienting to energy-efficiency is proposed in ASIACRYPT2015. Using a 6-round property, the authors implement an 11-round impossible differential attack on Midori64 by extending two rounds on the top and three rounds on the bottom. There is enough key space to consider pre-whitening keys in this attack. An impossible differential path that minimises the key bits involved is used to reduce computational complexity. Several additional observations such as partial abort technique are used to further reduce data and time complexities. This attack has data complexity of 2 ⁶⁹·² chosen plaintexts, requires 2 ¹⁴·⁵⁸ blocks of memory and 2 ⁹⁴·⁷ 11- round Midori64 encryptions.

Keywords: cryptanalysis, impossible differential, light weight block cipher, Midori

Procedia PDF Downloads 276
6856 External Sulphate Attack: Advanced Testing and Performance Specifications

Authors: G. Massaad, E. Roziere, A. Loukili, L. Izoret

Abstract:

Based on the monitoring of mass, hydrostatic weighing, and the amount of leached OH- we deduced the nature of leached and precipitated minerals, the amount of lost aggregates and the evolution of porosity and cracking during the sulphate attack. Using these information, we are able to draw the volume / mass changes brought by mineralogical variations and cracking of the cement matrix. Then we defined a new performance indicator, the averaged density, capable to resume along the test of sulphate attack the occurred physicochemical variation occurred in the cementitious matrix and then highlight.

Keywords: monitoring strategy, performance indicator, sulphate attack, mechanism of degradation

Procedia PDF Downloads 321
6855 Polyacrylates in Poly (Lactic Acid) Matrix, New Biobased Polymer Material

Authors: Irena Vuković-Kwiatkowska, Halina Kaczmarek

Abstract:

Poly (lactic acid) is well known polymer, often called green material because of its origin (renewable resources) and biodegradability. This biopolymer can be used in the packaging industry very often. Poor resistance to permeation of gases is the disadvantage of poly (lactic acid). The permeability of gases and vapor through the films applied for packages and bottles generally should be very low to prolong products shelf-life. We propose innovation method of PLA gas barrier modification using electromagnetic radiation in ultraviolet range. Poly (lactic acid) (PLA) and multifunctional acrylate monomers were mixed in different composition. Final films were obtained by photochemical reaction (photocrosslinking). We tested permeability to water vapor and carbon dioxide through these films. Also their resistance to UV radiation was also studied. The samples were conditioned in the activated sludge and in the natural soil to test their biodegradability. An innovative method of PLA modification allows to expand its usage, and can reduce the future costs of waste management what is the result of consuming such materials like PET and HDPE. Implementation of our material for packaging will contribute to the protection of the environment from the harmful effects of extremely difficult to biodegrade materials made from PET or other plastic

Keywords: interpenetrating polymer network, packaging films, photocrosslinking, polyacrylates dipentaerythritol pentaacrylate DPEPA, poly (lactic acid), polymer biodegradation

Procedia PDF Downloads 478
6854 A Survey on Countermeasures of Cache-Timing Attack on AES Systems

Authors: Settana M. Abdulh, Naila A. Sadalla, Yaseen H. Taha, Howaida Elshoush

Abstract:

Side channel attacks are based on side channel information, which is information that is leaked from encryption systems. This includes timing information, power consumption as well as electromagnetic or even sound leaking which can exploited by an attacker. Implementing side channel attacks are possible if and only if an attacker has access to a cryptosystem. In this case, the attacker can exploit bad implementation in software or hardware which is not controlled by encryption implementer. Thus, he/she will represent a real threat to the security system. Several countermeasures have been proposed to eliminate side channel information vulnerability.Cache timing attack is a special type of side channel attack. Here, timing information is collected and analyzed by an attacker to guess sensitive information such as encryption key or plaintext. This paper reviews the technique applied in this attack and surveys the countermeasures against it, evaluating the feasibility and usability of each. Based on this evaluation, finally we pose several recommendations about using these countermeasures.

Keywords: AES algorithm, side channel attack, cache timing attack, cache timing countermeasure

Procedia PDF Downloads 299
6853 Achieving Better Security by Using Nonlinear Cellular Automata as a Cryptographic Primitive

Authors: Swapan Maiti, Dipanwita Roy Chowdhury

Abstract:

Nonlinear functions are essential in different cryptoprimitives as they play an important role on the security of the cipher designs. Rule 30 was identified as a powerful nonlinear function for cryptographic applications. However, an attack (MS attack) was mounted against Rule 30 Cellular Automata (CA). Nonlinear rules as well as maximum period CA increase randomness property. In this work, nonlinear rules of maximum period nonlinear hybrid CA (M-NHCA) are studied and it is shown to be a better crypto-primitive than Rule 30 CA. It has also been analysed that the M-NHCA with single nonlinearity injection proposed in the literature is vulnerable against MS attack, whereas M-NHCA with multiple nonlinearity injections provide maximum length cycle as well as better cryptographic primitives and they are also secure against MS attack.

Keywords: cellular automata, maximum period nonlinear CA, Meier and Staffelbach attack, nonlinear functions

Procedia PDF Downloads 314
6852 Induced Pulsation Attack Against Kalman Filter Driven Brushless DC Motor Control System

Authors: Yuri Boiko, Iluju Kiringa, Tet Yeap

Abstract:

We use modeling and simulation tools, to introduce a novel bias injection attack, named the ’Induced Pulsation Attack’, which targets Cyber Physical Systems with closed-loop controlled Brushless DC (BLDC) motor and Kalman filter driver in the feedback loop. This attack involves engaging a linear function with a constant gradient to distort the coefficient of the injected bias, which falsifies the Kalman filter estimates of the rotor’s angular speed. As a result, this manipulation interaction inside the control system causes periodic pulsations in a form of asymmetric sine wave of both current and voltage in the circuit windings, with a high magnitude. It is shown that by varying the gradient of linear function, one can control both the frequency and structure of the induced pulsations. It is also demonstrated that terminating the attack at any point leads to additional compensating effort from the controller to restore the speed to its equilibrium value. This compensation effort produces an exponentially decaying wave, which we call the ’attack withdrawal syndrome’ wave. The conditions for maximizing or minimizing the impact of the attack withdrawal syndrome are determined. Linking the termination of the attack to the end of the full period of the induced pulsation wave has been shown to nullify the attack withdrawal syndrome wave, thereby improving the attack’s covertness.

Keywords: cyber-attack, induced pulsation, bias injection, Kalman filter, BLDC motor, control system, closed loop, P- controller, PID-controller, saw-function, cyber-physical system

Procedia PDF Downloads 71
6851 Mechanical Strengths of Self-Compacting Mortars Prepared with the Pozzolanic Cement in Aggressive Environments

Authors: M. Saidi, I. Djefour, F. Ait Medjber, A. Melouane, A. Gacem

Abstract:

The objective of this research is to study the physical and mechanical properties and durability of self-compacting mortars prepared by substituting a part of cement up to a percentage of 30% pozzolan according to different Blaine specific surface area (SSB1=7000 cm2/g and SSB=9000 cm2/g)). Order to evaluate durability, mortars were subjected to chemical attacks in various aggressive environments, a solution of a mixture of nitric acid and ammonium nitrate (HNO3 + NH4NO3) and a magnesium sulfate salt solution (MgSO4)) with a concentration of 10%, for a period of one month. This study is complemented by a comparative study of the durability of mortars elaborated with sulphate resistant cement (SRC). The results show that these mortars develop long-term, mechanical and chemical resistance better than mortars based Portland cement with 5% gypsum (CEM 1) and SRC. We found that the mass losses are lowest in mortars elaborated with pozzolanic cement (30% substitution with SSB2) in both of chemical attack solutions (3.28% in the solution acid and 1.16% in the salt solution) and the compressive strength gains of 14.68% and 8.5% respectively in the two media. This is due to the action of pozzolan which fixes portlandite to form hydrated calcium silicate (CSH) from the hydration of tricalcic silicate (C3S).

Keywords: aggressive environments, durability, mechanical strengths, pozzolanic cement, self-compacting mortar

Procedia PDF Downloads 235
6850 Fatty Acid and Amino Acid Composition in Mene maculata in The Sea of Maluku

Authors: Semuel Unwakoly, Reinner Puppela, Maresthy Rumalean, Healthy Kainama

Abstract:

Fish is a kind of food that contains many nutritions, one of those is the long chain of unsaturated fatty acids as omega-3 and omega-6 fatty acids and essential amino acid in enough amount for the necessity of our body. Like pelagic fish that found in the sea of Maluku. This research was done to identify fatty acids and amino acids composition in Moonfish (M. maculata) using transesterification reaction steps and Gas Chromatograph-Mass Spectrophotometer (GC-MS) and High-Performance Liquid Chromatography (HPLC). The result showed that fatty acids composition in Moonfish (M. maculata) contained tridecanoic acid (2.84%); palmitoleic acid (2.65%); palmitic acid (35.24%); oleic acid (6.2%); stearic acid (14.20%); and 5,8,11,14-eicosatetraenoic acid (1.29%) and 12 amino acids composition that consist of 7 essential amino acids, were leucine, isoleucine, valine, phenylalanine, methionine, lysine, and histidine, and also 5 non-essential amino acid, were tyrosine, glycine, alanine, glutamic acid, and arginine.Thus, these fishes can be used by the people to complete the necessity of essential fatty acid and amino acid.

Keywords: Moonfish (M. maculata), fatty acid, amino acid, GC-MS, HPLC

Procedia PDF Downloads 249
6849 Rejuvenation of Peanut Seedling from Collar Rot Disease by Azotobacter sp. RA2

Authors: Ravi R. Patel, Vasudev R. Thakkar

Abstract:

Use of plant growth-promoting rhizobacteria (PGPR) to increase the production and decrees disease occurrence is a recent method in agriculture. An RA2 rhizospheric culture was isolated from peanut rhizosphere from Junagadh region of Gujarat, India and showed different direct and indirect plant growth promoting activity like indole acetic acid, gibberellic acid, siderophore, hydrogen cyanide, Ammonia and (1-Aminocyclopropane-1-Carboxylate) deaminase production, N2 fixation, phosphate and potassium solubilization in vitro. RA2 was able to protect peanut germinating seedling from A. niger infection and reduce collar rot disease incidence 60-35% to 72-41% and increase germination percentage from 70-82% to 75-97% in two varieties GG20 and GG2 of peanut. RA2 was found to induce resistance in A. hypogaea L. seedlings via induction of different defense-related enzymes like phenylalanine ammonia lyase, peroxidase, polyphenol oxidase, lipoxygenase and pathogenesis related protein like chitinase, ß – 1,3- glucanase. Jasmonic acid one of the major signaling molecules of inducing systemic resistance was also found to induced due to RA2 treatments. RA2 bacterium was also promoting peanut growth and reduce A. niger infection in pot studies. 16S rDNA sequence of RA2 showed 99 % homology to Azotobacter species.

Keywords: plant growth promoting rhizobacteria, peanut, aspergillus niger, induce systemic resistance

Procedia PDF Downloads 242
6848 Modeling Intelligent Threats: Case of Continuous Attacks on a Specific Target

Authors: Asma Ben Yaghlane, Mohamed Naceur Azaiez

Abstract:

In this paper, we treat a model that falls in the area of protecting targeted systems from intelligent threats including terrorism. We introduce the concept of system survivability, in the context of continuous attacks, as the probability that a system under attack will continue operation up to some fixed time t. We define a constant attack rate (CAR) process as an attack on a targeted system that follows an exponential distribution. We consider the superposition of several CAR processes. From the attacker side, we determine the optimal attack strategy that minimizes the system survivability. We also determine the optimal strengthening strategy that maximizes the system survivability under limited defensive resources. We use operations research techniques to identify optimal strategies of each antagonist. Our results may be used as interesting starting points to develop realistic protection strategies against intentional attacks.

Keywords: CAR processes, defense/attack strategies, exponential failure, survivability

Procedia PDF Downloads 395
6847 High-Temperature X-Ray Powder Diffraction of Secondary Gypsum

Authors: D. Gazdič, I. Hájková, M. Fridrichová

Abstract:

This paper involved the performance of a high-temperature X-Ray powder diffraction analysis (XRD) of a sample of chemical gypsum generated in the production of titanium white; this gypsum originates by neutralizing highly acidic water with limestone suspension. Specifically, it was gypsum formed in the first stage of neutralization when the resulting material contains, apart from gypsum, a number of waste products resulting from the decomposition of ilmenite by sulphuric acid. So it can be described as red titanogypsum. By conducting the experiment using XRD apparatus Bruker D8 Advance with a Cu anode (λkα=1.54184 Å) equipped with high-temperature chamber Anton Paar HTK 16, it was possible to identify clearly in the sample each phase transition in the system of CaSO4•xH2O.

Keywords: anhydrite, gypsum, bassanite, hematite, XRD, powder, high-temperature

Procedia PDF Downloads 344
6846 Durability of Slurry Infiltrated Fiber Concrete to Corrosion in Chloride Environment: An Experimental Study, Part I

Authors: M. F. Alrubaie, S. A. Salih, W. A. Abbas

Abstract:

Slurry infiltrated fiber concrete (SIFCON) is considered as a special type of high strength high-performance fiber reinforced concrete, extremely strong, and ductile. The objective of this study is to investigate the durability of SIFCON to corrosion in chloride environments. Six different SIFCON mixes were made in addition to two refinance mixes with 0% and 1.5% steel fiber content. All mixes were exposed to 10% chloride solution for 180 days. Half of the specimens were partially immersed in chloride solution, and the others were exposed to weekly cycles of wetting and drying in 10% chloride solution. The effectiveness of using corrosion inhibitors, mineral admixture, and epoxy protective coating were also evaluated as protective measures to reduce the effect of chloride attack and to improve the corrosion resistance of SIFCON mixes. Corrosion rates, half-cell potential, electrical resistivity, total permeability tests had been monitored monthly. The results indicated a significant improvement in performance for SIFCON mixes exposed to chloride environment, when using corrosion inhibitor or epoxy protective coating, whereas SIFCON mix contained mineral admixture (metakaolin) did not improve the corrosion resistance at the same level. The cyclic wetting and drying exposure were more aggressive to the specimens than the partial immersion in chloride solution although the observed surface corrosion for the later was clearer.

Keywords: chloride attack, chloride environments, corrosion inhibitor, corrosion resistance, durability, SIFCON, slurry infiltrated fiber concrete

Procedia PDF Downloads 136
6845 Experimental Studies on the Corrosion Effects of the Concrete Made with Tannery Effluent

Authors: K. Nirmalkumar

Abstract:

An acute water scarcity is prevailing in the dry season in and around Perundurai (Erode district, Tamil Nadu, India) where there are more number of tannery units. Hence an attempt was made to use the effluent from the tannery industry for construction purpose. The mechanical properties such as compressive strength, tensile strength, flexural strength and the special properties such as chloride attack, sulphate attack and chemical attack were studied by casting various concrete specimens in form of cube, cylinders and beams, etc. It was observed that the concrete had some reduction in strength while subjected to chloride attack, sulphate attack and chemical attack. So admixtures were selected and optimized in suitable proportion to counter act the adverse effects and the results were found to be satisfactory. In this research study the corrosion results of specimens prepared by using treated and untreated tannery effluent were compared with the concrete specimens prepared by using potable water. It was observed that by the addition of admixtures, the adverse effects due to the usage of the treated and untreated tannery effluent are counteracted.

Keywords: corrosion, calcium nitrite, concrete, fly ash

Procedia PDF Downloads 269
6844 Analyzing the Water Quality of Settling Pond after Revegetation at Ex-Mining Area

Authors: Iis Diatin, Yani Hadiroseyani, Muhammad Mujahid, Ahmad Teduh, Juang R. Matangaran

Abstract:

One of silica quarry managed by a mining company is located at Sukabumi District of West Java Province Indonesia with an area of approximately 70 hectares. Since 2013 this company stopped the mining activities. The company tries to restore the ecosystem post-mining with rehabilitation activities such as reclamation and revegetation of their ex-mining area. After three years planting the area the trees grown well. Not only planting some tree species but also some cover crop has covered the soil surface. There are two settling ponds located in the middle of the ex-mining area. Those settling pond were built in order to prevent the effect of acid mine drainage. Acid mine drainage (AMD) or the acidic water is created when sulphide minerals are exposed to air and water and through a natural chemical reaction produce sulphuric acid. AMD is the main pollutant at the open pit mining. The objective of the research was to analyze the effect of revegetation on water quality change at the settling pond. The physical and chemical of water quality parameter were measured and analysed at site and at the laboratory. Physical parameter such as temperature, turbidity and total organic matter were analyse. Also heavy metal and some other chemical parameter such as dissolved oxygen, alkalinity, pH, total ammonia nitrogen, nitrate and nitrite were analysed. The result showed that the acidity of first settling pond was higher than that of the second settling pond. Both settling pond water’s contained heavy metal. The turbidity and total organic matter were the parameter of water quality which become better after revegetation.

Keywords: acid mine drainage, ex-mining area, revegetation, settling pond, water quality

Procedia PDF Downloads 303
6843 Selection Effects on the Molecular and Abiotic Evolution of Antibiotic Resistance

Authors: Abishek Rajkumar

Abstract:

Antibiotic resistance can occur naturally given the selective pressure placed on antibiotics. Within a large population of bacteria, there is a significant chance that some of those bacteria can develop resistance via mutations or genetic recombination. However, a growing public health concern has arisen over the fact that antibiotic resistance has increased significantly over the past few decades. This is because humans have been over-consuming and producing antibiotics, which has ultimately accelerated the antibiotic resistance seen in these bacteria. The product of all of this is an ongoing race between scientists and the bacteria as bacteria continue to develop resistance, which creates even more demand for an antibiotic that can still terminate the newly resistant strain of bacteria. This paper will focus on a myriad of aspects of antibiotic resistance in bacteria starting with how it occurs on a molecular level and then focusing on the antibiotic concentrations and how they affect the resistance and fitness seen in bacteria.

Keywords: antibiotic, molecular, mutation, resistance

Procedia PDF Downloads 323
6842 An Aspiring Solution to the Man in the Middle Bootstrap Vulnerability

Authors: Mouad Zouina, Benaceur Outtaj

Abstract:

The proposed work falls within the context of improving data security for m-commerce systems. In this context we have placed under the light some flaws encountered in HTTPS the most used m-commerce protocol, particularly the man in the middle attack, shortly MITM. The man in the middle attack is an active listening attack. The idea of this attack is to target the handshake phase of the HTTPS protocol which is the transition from a non-secure connection to a secure connection in our case HTTP to HTTPS. This paper proposes a solution to fix those flaws based on the upgrade of HSTS standard handshake sequence using the DNSSEC standard.

Keywords: m-commerce, HTTPS, HSTS, DNSSEC, MITM bootstrap vulnerability

Procedia PDF Downloads 392
6841 Effect of Preparation Temperature on Producing Graphene Oxide by Chemical Oxidation Approach

Authors: Rashad Al-Gaashani, Muataz A. Atieh

Abstract:

In this study, the effect of preparation temperature, namely room temperature (RT), 40, 60, and 85°C, on producing of high-quality graphene oxide (GO) has been investigated. GO samples have been prepared by chemical oxidation of graphite via a safe improved chemical technique using a blend of two deferent acids: sulphuric acid (H₂SO₄) and phosphoric acid (H₃PO₄) with volume ratio 4:1, respectively. potassium permanganate (KMnO₄) and hydrogen peroxide (H₂O₂) were applied as oxidizing agents. In this work, sodium nitrate (NaNO₃) was excluded, so the emission of hazardous explosive gases such as NO₂ and N₂O₂ was shunned. Ice and oil baths were used to carefully control the temperature. Several characterization instruments including X-Ray diffraction, transmission electron microscopy, scanning electron microscopy, electron dispersive spectroscopy, Fourier transform infrared spectroscopy, X-ray photoelectron spectroscopy, and UV-vis spectroscopy were used to study and compare the synthesized samples. The results indicated that GO can be prepared at RT with graphite oxide, and the purity of GO increased with rising of the solvent temperature. Optical properties of GO samples were studied using UV-vis absorption spectra.

Keywords: chemical method, graphite, graphene oxide, optical properties

Procedia PDF Downloads 163