Search results for: salt and peppers attacks
702 Mutual Authentication for Sensor-to-Sensor Communications in IoT Infrastructure
Authors: Shadi Janbabaei, Hossein Gharaee Garakani, Naser Mohammadzadeh
Abstract:
Internet of things is a new concept that its emergence has caused ubiquity of sensors in human life, so that at any time, all data are collected, processed and transmitted by these sensors. In order to establish a secure connection, the first challenge is authentication between sensors. However, this challenge also requires some features so that the authentication is done properly. Anonymity, untraceability, and being lightweight are among the issues that need to be considered. In this paper, we have evaluated the authentication protocols and have analyzed the security vulnerabilities found in them. Then an improved light weight authentication protocol for sensor-to-sensor communications is presented which uses the hash function and logical operators. The analysis of protocol shows that security requirements have been met and the protocol is resistant against various attacks. In the end, by decreasing the number of computational cost functions, it is argued that the protocol is lighter than before.Keywords: anonymity, authentication, Internet of Things, lightweight, un-traceability
Procedia PDF Downloads 292701 Valorization of Banana Peels for Mercury Removal in Environmental Realist Conditions
Authors: E. Fabre, C. Vale, E. Pereira, C. M. Silva
Abstract:
Introduction: Mercury is one of the most troublesome toxic metals responsible for the contamination of the aquatic systems due to its accumulation and bioamplification along the food chain. The 2030 agenda for sustainable development of United Nations promotes the improving of water quality by reducing water pollution and foments an enhance in wastewater treatment, encouraging their recycling and safe water reuse globally. Sorption processes are widely used in wastewater treatments due to their many advantages such as high efficiency and low operational costs. In these processes the target contaminant is removed from the solution by a solid sorbent. The more selective and low cost is the biosorbent the more attractive becomes the process. Agricultural wastes are especially attractive approaches for sorption. They are largely available, have no commercial value and require little or no processing. In this work, banana peels were tested for mercury removal from low concentrated solutions. In order to investigate the applicability of this solid, six water matrices were used increasing the complexity from natural waters to a real wastewater. Studies of kinetics and equilibrium were also performed using the most known models to evaluate the viability of the process In line with the concept of circular economy, this study adds value to this by-product as well as contributes to liquid waste management. Experimental: The solutions were prepared with Hg(II) initial concentration of 50 µg L-1 in natural waters, at 22 ± 1 ºC, pH 6, magnetically stirring at 650 rpm and biosorbent mass of 0.5 g L-1. NaCl was added to obtain the salt solutions, seawater was collected from the Portuguese coast and the real wastewater was kindly provided by ISQ - Instituto de Soldadura e qualidade (Welding and Quality Institute) and diluted until the same concentration of 50 µg L-1. Banana peels were previously freeze-drying, milled, sieved and the particles < 1 mm were used. Results: Banana peels removed more than 90% of Hg(II) from all the synthetic solutions studied. In these cases, the enhance in the complexity of the water type promoted a higher mercury removal. In salt waters, the biosorbent showed removals of 96%, 95% and 98 % for 3, 15 and 30 g L-1 of NaCl, respectively. The residual concentration of Hg(II) in solution achieved the level of drinking water regulation (1 µg L-1). For real matrices, the lower Hg(II) elimination (93 % for seawater and 81 % for the real wastewaters), can be explained by the competition between the Hg(II) ions and the other elements present in these solutions for the sorption sites. Regarding the equilibrium study, the experimental data are better described by the Freundlich isotherm (R ^ 2=0.991). The Elovich equation provided the best fit to the kinetic points. Conclusions: The results exhibited the great ability of the banana peels to remove mercury. The environmental realist conditions studied in this work, highlight their potential usage as biosorbents in water remediation processes.Keywords: banana peels, mercury removal, sorption, water treatment
Procedia PDF Downloads 155700 Investigation Edge Coverage of Automotive Electrocoats Filled by Nano Silica Particles
Authors: Marzieh Bakhtiary Noodeh, Mahla Zabet
Abstract:
Attempts have been carried out to enhance the anticorrosion properties as well as edge coverage of an automotive electrocoating using the nano silica particles. To this end, the automotive electrocoating was reinforced with the nano silica particles at various weight fractions. The electrocoats were applied on the surface of punched edge followed by curing at 160⁰C for 20 min. The effects of nano silica particles on the rheological properties, influencing edge coverage were studied by a RMS (Rheometric Mechanical Spectrometer) technique. The anticorrosion properties were studied by a salt-spray test. The results obtained revealed that nano silica particles can significantly enhance the edge coverage by increasing minimum melt viscosity of electrocoats. It was shown that using 4 wt% nano silica particles, both anticorrosion properties and edge coverage of the electrocoats were significantly improved.Keywords: nano silica, electrocoat, edge coverage, anticorrosion
Procedia PDF Downloads 307699 Secure E-Pay System Using Steganography and Visual Cryptography
Authors: K. Suganya Devi, P. Srinivasan, M. P. Vaishnave, G. Arutperumjothi
Abstract:
Today’s internet world is highly prone to various online attacks, of which the most harmful attack is phishing. The attackers host the fake websites which are very similar and look alike. We propose an image based authentication using steganography and visual cryptography to prevent phishing. This paper presents a secure steganographic technique for true color (RGB) images and uses Discrete Cosine Transform to compress the images. The proposed method hides the secret data inside the cover image. The use of visual cryptography is to preserve the privacy of an image by decomposing the original image into two shares. Original image can be identified only when both qualified shares are simultaneously available. Individual share does not reveal the identity of the original image. Thus, the existence of the secret message is hard to be detected by the RS steganalysis.Keywords: image security, random LSB, steganography, visual cryptography
Procedia PDF Downloads 330698 Probabilistic-Based Design of Bridges under Multiple Hazards: Floods and Earthquakes
Authors: Kuo-Wei Liao, Jessica Gitomarsono
Abstract:
Bridge reliability against natural hazards such as floods or earthquakes is an interdisciplinary problem that involves a wide range of knowledge. Moreover, due to the global climate change, engineers have to design a structure against the multi-hazard threats. Currently, few of the practical design guideline has included such concept. The bridge foundation in Taiwan often does not have a uniform width. However, few of the researches have focused on safety evaluation of a bridge with a complex pier. Investigation of the scouring depth under such situation is very important. Thus, this study first focuses on investigating and improving the scour prediction formula for a bridge with complicated foundation via experiments and artificial intelligence. Secondly, a probabilistic design procedure is proposed using the established prediction formula for practical engineers under the multi-hazard attacks.Keywords: bridge, reliability, multi-hazards, scour
Procedia PDF Downloads 374697 Direct Current Electric Field Stimulation against PC12 Cells in 3D Bio-Reactor to Enhance Axonal Extension
Authors: E. Nakamachi, S. Tanaka, K. Yamamoto, Y. Morita
Abstract:
In this study, we developed a three-dimensional (3D) direct current electric field (DCEF) stimulation bio-reactor for axonal outgrowth enhancement to generate the neural network of the central nervous system (CNS). By using our newly developed 3D DCEF stimulation bio-reactor, we cultured the rat pheochromocytoma cells (PC12) and investigated the effects on the axonal extension enhancement and network generation. Firstly, we designed and fabricated a 3D bio-reactor, which can load DCEF stimulation on PC12 cells embedded in the collagen gel as extracellular environment. The connection between the electrolyte and the medium using salt bridges for DCEF stimulation was introduced to avoid the cell death by the toxicity of metal ion. The distance between the salt bridges was adopted as the design variable to optimize a structure for uniform DCEF stimulation, where the finite element (FE) analyses results were used. Uniform DCEF strength and electric flux vector direction in the PC12 cells embedded in collagen gel were examined through measurements of the fabricated 3D bio-reactor chamber. Measurement results of DCEF strength in the bio-reactor showed a good agreement with FE results. In addition, the perfusion system was attached to maintain pH 7.2 ~ 7.6 of the medium because pH change was caused by DCEF stimulation loading. Secondly, we disseminated PC12 cells in collagen gel and carried out 3D culture. Finally, we measured the morphology of PC12 cell bodies and neurites by the multiphoton excitation fluorescence microscope (MPM). The effectiveness of DCEF stimulation to enhance the axonal outgrowth and the neural network generation was investigated. We confirmed that both an increase of mean axonal length and axogenesis rate of PC12, which have been exposed 5 mV/mm for 6 hours a day for 4 days in the bioreactor. We found following conclusions in our study. 1) Design and fabrication of DCEF stimulation bio-reactor capable of 3D culture nerve cell were completed. A uniform electric field strength of average value of 17 mV/mm within the 1.2% error range was confirmed by using FE analyses, after the structure determination through the optimization process. In addition, we attached a perfusion system capable of suppressing the pH change of the culture solution due to DCEF stimulation loading. 2) Evaluation of DCEF stimulation effects on PC12 cell activity was executed. The 3D culture of PC 12 was carried out adopting the embedding culture method using collagen gel as a scaffold for four days under the condition of 5.0 mV/mm and 10mV/mm. There was a significant effect on the enhancement of axonal extension, as 11.3% increase in an average length, and the increase of axogenesis rate. On the other hand, no effects on the orientation of axon against the DCEF flux direction was observed. Further, the network generation was enhanced to connect longer distance between the target neighbor cells by DCEF stimulation.Keywords: PC12, DCEF stimulation, 3D bio-reactor, axonal extension, neural network generation
Procedia PDF Downloads 184696 Analysis of Cracked Beams with Spalling Having Different Arrangements of the Reinforcement Bars Using Finite Element Analysis (FEA)
Authors: Rishabh Shukla, Achin Agrawal, Anupam Saxena, S. Mandal
Abstract:
The existence of a crack, affects the mechanical behaviour and various properties of a structure to a great degree. This paper focuses on recognizing the parameters that gets changed due to the formation of cracks and have a great impact on the performance of the structure. Spalling is a major concern as it leaves the reinforcement bars more susceptible to environmental attacks. Beams of cross section 300 mm × 500 mm are designed and for a calculated area of steel, two different arrangements of reinforced bars are analysed. Results are prepared for different stages of cracking for each arrangement of rebars. The parameters for both arrangements are then compared. The Finite Element Analysis (FEA) is carried out and changes in the properties like flexural strength, Elasticity and modal frequency are reported. The conclusions have been drawn by comparing the results.Keywords: cracks, elasticity, spalling, FEA
Procedia PDF Downloads 279695 Symmetric Arabic Language Encryption Technique Based on Modified Playfair Algorithm
Authors: Fairouz Beggas
Abstract:
Due to the large number of exchanges in the networks, the security of communications is essential. Most ways of keeping communication secure rely on encryption. In this work, a symmetric encryption technique is offered to encrypt and decrypt simple Arabic scripts based on a multi-level security. A proposed technique uses an idea of Playfair encryption with a larger table size and an additional layer of encryption to ensure more security. The idea of the proposed algorithm aims to generate a dynamic table that depends on a secret key. The same secret key is also used to create other secret keys to over-encrypt the plaintext in three steps. The obtained results show that the proposed algorithm is faster in terms of encryption/decryption speed and can resist to many types of attacks.Keywords: arabic data, encryption, playfair, symmetric algorithm
Procedia PDF Downloads 87694 Benign Recurrent Unilateral Abducens (6th) Nerve Palsy in 14 Months Old Girl: A Case Report
Authors: Khaled Alabduljabbar
Abstract:
Background: Benign, isolated, recurrent sixth nerve palsy is very rare in children. Here we report a case of recurrent abducens nerve palsy with no obvious etiology. It is a diagnosis of exclusion. A recurrent benign form of 6th nerve palsy, a rarer still palsy, has been described in the literature, and it is of most likely secondary to inflammatory causes, e.g, following viral and bacterial infections. Purpose: To present a case of 14 months old girl with recurrent attacks of isolated left sixth cranial nerve palsy following upper respiratory tract infection. Observation: The patient presented to opthalmology clinic with sudden onset of inward deviation (esotropia) of the left eye with a compensatory left face turn one week following signs of upper respiratory tract infection. Ophthalmological examination revealed large angle esotropia of the left eye in primary position, with complete limitation of abduction of the left eye, no palpebral fissure changes, and abnormal position of the head (left face turn). Visual acuity was normal, and no significant refractive error on cycloplegic refraction for her age. Fundus examination was normal with no evidence of papilledema. There was no relative afferent pupillary defect (RAPD) and no anisocoria. Past medical history and family history were unremarkable, with no history of convulsion attacks or head trauma. Additional workout include CBC. Erythrocyte sedimentation rate, Urgent magnetic resonance imaging (MRI), and angiography of the brain were performed and demonstrated the absence of intracranial and orbital lesions. Referral to pediatric neurologist was also done and concluded no significant finding. The patient showed improvement of the left sixth cranial nerve palsy and left face turn over a period of two months. Seven months since the first attack, she experienced a recurrent attack of left eye esotropia with left face turn concurrent with URTI. The rest of eye examination was again unremarkable. CT scan and MRI scan of brain and orbit were performed and showed only signs of sinusitis with no intracranial pathology. The palsy resolved spontaneously within two months. A third episode of left 6th nerve palsy occurred 6 months later, whichrecovered over one month. Examination and neuroimagingwere unremarkable. A diagnosis of benign recurrent left 6th cranial nerve palsy was made. Conclusion: Benign sixth cranial nerve palsy is always a diagnosis of exclusion given the more serious and life-threatening alternative causes. It seems to have a good prognosis with only supportive measures. The likelihood of benign 6th cranial nerve palsy to resolve completely and spontaneously is high. Observation for at least 6 months without intervention is advisable.Keywords: 6th nerve pasy, abducens nerve pasy, recurrent nerve palsy, cranial nerve palsy
Procedia PDF Downloads 89693 Concealed Objects Detection in Visible, Infrared and Terahertz Ranges
Authors: M. Kowalski, M. Kastek, M. Szustakowski
Abstract:
Multispectral screening systems are becoming more popular because of their very interesting properties and applications. One of the most significant applications of multispectral screening systems is prevention of terrorist attacks. There are many kinds of threats and many methods of detection. Visual detection of objects hidden under clothing of a person is one of the most challenging problems of threats detection. There are various solutions of the problem; however, the most effective utilize multispectral surveillance imagers. The development of imaging devices and exploration of new spectral bands is a chance to introduce new equipment for assuring public safety. We investigate the possibility of long lasting detection of potentially dangerous objects covered with various types of clothing. In the article we present the results of comparative studies of passive imaging in three spectrums – visible, infrared and terahertzKeywords: terahertz, infrared, object detection, screening camera, image processing
Procedia PDF Downloads 357692 Removal of Lead in High Rate Activated Sludge System
Authors: Mamdouh Y. Saleh, Gaber El Enany, Medhat H. Elzahar, Mohamed Z. Elshikhipy, Rana Hamouda
Abstract:
The heavy metals pollution in water, sediments and fish of Lake Manzala affected from the disposal of wastewater, industrial and agricultural drainage water into the lake on the environmental situation. A pilot plant with an industrial discharge flow of 135L/h was designed according to the activated sludge plant to simulate between the biological and chemical treatment with the addition of alum to the aeration tank with dosages of 100, 150, 200, and 250 mg/L. The industrial discharge had concentrations of Lead and BOD5 with an average range 1.22, 145mg/L, respectively. That means the average Pb was high up to 25 times than the allowed permissible concentration. The optimization of the chemical-biological process using 200mg/L alum dosage compared has improvement of Lead and BOD5 removal efficiency to 61.76% and 56%, respectively.Keywords: industrial wastewater, activated sludge, BOD5, lead, alum salt
Procedia PDF Downloads 518691 Bioremediation of Phenanthrene by Monocultures and Mixed Culture Bacteria Isolated from Contaminated Soil
Authors: A. Fazilah, I. Darah, I. Noraznawati
Abstract:
Three different bacteria capable of degrading phenanthrene were isolated from hydrocarbon contaminated site. In this study, the phenanthrene-degrading activity by defined monoculture was determined and mixed culture was identified as Acinetobacter sp. P3d, Bacillus sp. P4a and Pseudomonas sp. P6. All bacteria were able to grow in a minimal salt medium saturated with phenanthrene as the sole source of carbon and energy. Phenanthrene degradation efficiencies by different combinations (consortia) of these bacteria were investigated and their phenanthrene degradation was evaluated by gas chromatography. Among the monocultures, Pseudomonas sp. P6 exhibited 58.71% activity compared to Acinetobacter sp. P3d and Bacillus sp. P4a which were 56.97% and 53.05%, respectively after 28 days of cultivation. All consortia showed high phenanthrene elimination which were 95.64, 79.37, 87.19, 79.21% for Consortia A, B, C and D, respectively. The results indicate that all of the bacteria isolated may effectively degrade target chemical and have a promising application in bioremediation of hydrocarbon contaminated soil purposes.Keywords: phenanthrene, consortia, acinetobacter sp. P3d, bacillus sp. P4a, pseudomonas sp. P6
Procedia PDF Downloads 296690 Nanometric Sized Ions for Colloidal Stabilization
Authors: Pierre Bauduin, Coralie Pasquier, Alban Jonchere, Luc Girard, Olivier Diat
Abstract:
Ionic species, such as polyoxometalates (POMs) or (metal-) boron clusters, are at the frontier between ions and (charged-)colloids due to their nm size. We show here that the large size and low charge density of POMs, compared to classical ions, are responsible for a peculiar behavior called “super-chaotropy”. This property refers to the strong propensity of nano-ions to adsorb at neutral polar interfaces, via non-specific interactions. It has strong effects on phase transitions in soft matter and can, for example, stabilize colloidal systems such as surfactant foams. A simple way for evaluating and classifying nano-ions, such as POMs, according to their super-chaotropy is proposed here. The super-chaotropic behavior of nano-ions opens many opportunities in separation science, catalysis, and for the design of nanostructured hybrid materials.Keywords: colloids, foams, surfactant, salt effect, colloidal stability, nano-ions
Procedia PDF Downloads 74689 Ethereum Based Smart Contracts for Trade and Finance
Authors: Rishabh Garg
Abstract:
Traditionally, business parties build trust with a centralized operating mechanism, such as payment by letter of credit. However, the increase in cyber-attacks and malicious hacking has jeopardized business operations and finance practices. Emerging markets, owing to their higher banking risks and bigger presence of digital financing, are looking forward to technology-driven solutions, financial inclusion and innovative working paradigms. Blockchain has the potential to enhance transaction transparency and supply chain traceability. It has captured a vast landscape with 200 million crypto users worldwide. Fintech and blockchain products are popping up across brokerage, digital wallets, exchanges, post-trade clearance, settlement, middleware, infrastructure, and base protocols.Keywords: blockchain, distributed ledger technology, decentralized applications, ethereum, smart contracts, trade finance
Procedia PDF Downloads 152688 Computational Fluid Dynamics Analysis of an RC Airplane Wing Using a NACA 2412 Profile at Different Angle of Attacks
Authors: Huseyin Gokberk, Shian Gao
Abstract:
CFD analysis of the relationship between the coefficients of lift and drag with respect to the angle of attack on a NACA 2412 wing section of an RC plane is conducted. Both the 2D and 3D models are investigated with the turbulence model. The 2D analysis has a free stream velocity of 10m/s at different AoA of 0°, 2°, 5°, 10°, 12°, and 15°. The induced drag and drag coefficient increased throughout the changes in angles even after the critical angle had been exceeded, whereas the lift force and coefficient of lift increased but had a limit at the critical stall angle, which results in values to reduce sharply. Turbulence flow characteristics are analysed around the aerofoil with the additions caused due to a finite 3D model. 3D results highlight how wing tip vortexes develop and alter the flow around the wing with the effects of the tapered configuration.Keywords: CFD, turbulence modelling, aerofoil, angle of attack
Procedia PDF Downloads 225687 In vitro Synergistic Antioxidant Activity of Honey-Mentha Spicata Combination
Authors: Yuva Bellik, Selles Mohamed Amar
Abstract:
The beneficial health effects including antioxidant properties of mint (Mentha spicata) and honey bees (Apis mellifera) have been extensively studied. However, there is no data about the effects of their associated use. In this study the total phenolic and flavonoid contents for individual extracts of mint and honey and their combination were determined. The antioxidant activity was investigated by using reducing power, 1,1-diphenyl-2-picrylhydrazyl (DPPH), 2,2´- azinobis-(3-ethylbenzothiazoline-6-sulphonic acid diamonium salt (ABTS), and chelating power methods. The results showed that individual extracts contained important quantity of phenolics and flavonoids and their combination was found to produce best antioxidant activity. A significant linear correlation between the phenolic/flavonoid contents and antioxidant activity, especially with reducing power and free radical scavenging abilities, was observed.Keywords: honey, mint, synergy, antioxidant activity
Procedia PDF Downloads 389686 Plant Microbiota of Coastal Halophyte Salicornia Ramossisima
Authors: Isabel N. Sierra-Garcia, Maria J. Ferreira, Sandro Figuereido, Newton Gomes, Helena Silva, Angela Cunha
Abstract:
Plant-associated microbial communities are considered crucial in the adaptation of halophytes to coastal environments. The plant microbiota can be horizontally acquired from the environment or vertically transmitted from generation to generation via seeds. Recruiting of the microbial communities by the plant is affected by geographical location, soil source, host genotype, and cultivation practice. There is limited knowledge reported on the microbial communities in halophytes the influence of biotic and abiotic factors. In this work, the microbiota associated with the halophyte Salicornia ramosissima was investigated to determine whether the structure of bacterial communities is influenced by host genotype or soil source. For this purpose, two contrasting sites where S. ramosissima is established in the estuarine system of the Ria de Aveiro were investigated. One site corresponds to a natural salt marsh where S. ramosissima plants are present (wild plants), and the other site is a former salt pan that nowadays are subjected to intensive crop production of S. ramosissima (crop plants). Bacterial communities from the rhizosphere, seeds and root endosphere of S. ramossisima from both sites were investigated by sequencing bacterial 16S rRNA gene using the Illumina MiSeq platform. The analysis of the sequences showed that the three plant-associated compartments, rhizosphere, root endosphere, and seed endosphere, harbor distinct microbiomes. However, bacterial richness and diversity were higher in seeds of wild plants, followed by rhizosphere in both sites, while seeds in the crop site had the lowest diversity. Beta diversity measures indicated that bacterial communities in root endosphere and seeds were more similar in both wild and crop plants in contrast to rhizospheres that differed by local, indicating that the recruitment of the similar bacterial communities by the plant genotype is active in regard to the site. Moreover, bacterial communities from the root endosphere and rhizosphere were phylogenetically more similar in both sites, but the phylogenetic composition of seeds in wild and crop sites was distinct. These results indicate that cultivation practices affect the seed microbiome. However, minimal vertical transmission of bacteria from seeds to adult plants is expected. Seeds from the crop site showed higher abundances of Kushneria and Zunongwangia genera. Bacterial members of the classes Alphaprotebacteria and Bacteroidia were the most ubiquitous across sites and compartments and might encompass members of the core microbiome. These findings indicate that bacterial communities associated with S. ramosissima are more influenced by host genotype rather than local abiotic factors or cultivation practices. This study provides a better understanding of the composition of the plant microbiota in S. ramosissima , which is essential to predict the interactions between plant and associated microbial communities and their effects on plant health. This knowledge is useful to the manipulations of these microbial communities to enhance the health and productivity of this commercially important plant.Keywords: halophytes, plant microbiome, Salicornia ramosissima, agriculture
Procedia PDF Downloads 169685 Survey on Securing the Optimized Link State Routing (OLSR) Protocol in Mobile Ad-hoc Network
Authors: Kimaya Subhash Gaikwad, S. B. Waykar
Abstract:
The mobile ad-hoc network (MANET) is collection of various types of nodes. In MANET various protocols are used for communication. In OLSR protocol, a node is selected as multipoint relay (MPR) node which broadcast the messages. As the MANET is open kind of network any malicious node can easily enter into the network and affect the performance of the network. The performance of network mainly depends on the components which are taking part into the communication. If the proper nodes are not selected for the communication then the probability of network being attacked is more. Therefore, it is important to select the more reliable and secure components in the network. MANET does not have any filtering so that only selected nodes can be used for communication. The openness of the MANET makes it easier to attack the communication. The most of the attack are on the Quality of service (QoS) of the network. This paper gives the overview of the various attacks that are possible on OLSR protocol and some solutions. The papers focus mainly on the OLSR protocol.Keywords: communication, MANET, OLSR, QoS
Procedia PDF Downloads 450684 The Role of Social Media in the Rise of Islamic State in India: An Analytical Overview
Authors: Yasmeen Cheema, Parvinder Singh
Abstract:
The evolution of Islamic State (acronym IS) has an ultimate goal of restoring the caliphate. IS threat to the global security is main concern of international community but has also raised a factual concern for India about the regular radicalization of IS ideology among Indian youth. The incident of joining Arif Ejaz Majeed, an Indian as ‘jihadist’ in IS has set strident alarm in law & enforcement agencies. On 07.03.2017, many people were injured in an Improvised Explosive Device (IED) blast on-board of Bhopal Ujjain Express. One perpetrator of this incident was killed in encounter with police. But, the biggest shock is that the conspiracy was pre-planned and the assailants who carried out the blast were influenced by the ideology perpetrated by the Islamic State. This is the first time name of IS has cropped up in a terror attack in India. It is a red indicator of violent presence of IS in India, which is spreading through social media. The IS have the capacity to influence the younger Muslim generation in India through its brutal and aggressive propaganda videos, social media apps and hatred speeches. It is a well known fact that India is on the radar of IS, as well on its ‘Caliphate Map’. IS uses Twitter, Facebook and other social media platforms constantly. Islamic State has used enticing videos, graphics, and articles on social media and try to influence persons from India & globally that their jihad is worthy. According to arrested perpetrator of IS in different cases in India, the most of Indian youths are victims to the daydreams which are fondly shown by IS. The dreams that the Muslim empire as it was before 1920 can come back with all its power and also that the Caliph and its caliphate can be re-established are shown by the IS. Indian Muslim Youth gets attracted towards these euphemistic ideologies. Islamic State has used social media for disseminating its poisonous ideology, recruitment, operational activities and for future direction of attacks. IS through social media inspired its recruits & lone wolfs to continue to rely on local networks to identify targets and access weaponry and explosives. Recently, a pro-IS media group on its Telegram platform shows Taj Mahal as the target and suggested mode of attack as a Vehicle Born Improvised Explosive Attack (VBIED). Islamic State definitely has the potential to destroy the Indian national security & peace, if timely steps are not taken. No doubt, IS has used social media as a critical mechanism for recruitment, planning and executing of terror attacks. This paper will therefore examine the specific characteristics of social media that have made it such a successful weapon for Islamic State. The rise of IS in India should be viewed as a national crisis and handled at the central level with efficient use of modern technology.Keywords: ideology, India, Islamic State, national security, recruitment, social media, terror attack
Procedia PDF Downloads 230683 Swimming Pool Water Chlorination Detection System Utilizing TDSTestr
Authors: Fahad Alamoudi, Yaser Miaji, Fawzy Jalalah
Abstract:
The growing popularity of swimming pools and other activities in the water for sport, fitness, therapy or just enjoyable relaxation have led to the increased use of swimming pools and the establishment of a variety of specific-use pools such as spa pools, Waterslides and more recently, hydrotherapy and wave pools. In this research a few simple equipments are used for test, Detect and alert for detection of water cleanness and pollution. YSI Photometer Systems, TDSTestr High model, rio 12HF, and Electrode A1. The researchers used electrolysis as a method of separating bonded elements and compounds by passing an electric current through them. The results which use 41 experiments show the higher the salt concentration, the more efficient the electrode and the smaller the gap between the plates and The lower the electrode voltage. Furthermore, it is proved that the larger the surface area, the lower the cell voltage and the higher current used the more chlorine produced.Keywords: photometer, electrode, electrolysis, swimming pool chlorination
Procedia PDF Downloads 349682 A Survey on Smart Security Mechanism Using Graphical Passwords
Authors: Aboli Dhanavade, Shweta Bhimnath, Rutuja Jumale, Ajay Nadargi
Abstract:
Security to any of our personal thing is our most basic need. It is not possible to directly apply that standard Human-computer—interaction approaches. Important usability goal for authentication system is to support users in selecting best passwords. Users often select text-passwords that are easy to remember, but they are more open for attackers to guess. The human brain is good in remembering pictures rather than textual characters. So the best alternative is being designed that is Graphical passwords. However, Graphical passwords are still immature. Conventional password schemes are also vulnerable to Shoulder-surfing attacks, many shoulder-surfing resistant graphical passwords schemes have been proposed. Next, we have analyzed the security and usability of the proposed scheme, and show the resistance of the proposed scheme to shoulder-surfing and different accidental logins.Keywords: shoulder-surfing, security, authentication, text-passwords
Procedia PDF Downloads 362681 A Survey on Genetic Algorithm for Intrusion Detection System
Authors: Prikhil Agrawal, N. Priyanka
Abstract:
With the increase of millions of users on Internet day by day, it is very essential to maintain highly reliable and secured data communication between various corporations. Although there are various traditional security imparting techniques such as antivirus software, password protection, data encryption, biometrics and firewall etc. But still network security has become the main issue in various leading companies. So IDSs have become an essential component in terms of security, as it can detect various network attacks and respond quickly to such occurrences. IDSs are used to detect unauthorized access to a computer system. This paper describes various intrusion detection techniques using GA approach. The intrusion detection problem has become a challenging task due to the conception of miscellaneous computer networks under various vulnerabilities. Thus the damage caused to various organizations by malicious intrusions can be mitigated and even be deterred by using this powerful tool.Keywords: genetic algorithm (GA), intrusion detection system (IDS), dataset, network security
Procedia PDF Downloads 297680 Modification of a Commercial Ultrafiltration Membrane by Electrospray Deposition for Performance Adjustment
Authors: Elizaveta Korzhova, Sebastien Deon, Patrick Fievet, Dmitry Lopatin, Oleg Baranov
Abstract:
Filtration with nanoporous ultrafiltration membranes is an attractive option to remove ionic pollutants from contaminated effluents. Unfortunately, commercial membranes are not necessarily suitable for specific applications, and their modification by polymer deposition is a fruitful way to adapt their performances accordingly. Many methods are usually used for surface modification, but a novel technique based on electrospray is proposed here. Various quantities of polymers were deposited on a commercial membrane, and the impact of the deposit is investigated on filtration performances and discussed in terms of charge and hydrophobicity. The electrospray deposition is a technique which has not been used for membrane modification up to now. It consists of spraying small drops of polymer solution under a high voltage between the needle containing the solution and the metallic support on which membrane is stuck. The advantage of this process lies in the small quantities of polymer that can be coated on the membrane surface compared with immersion technique. In this study, various quantities (from 2 to 40 μL/cm²) of solutions containing two charged polymers (13 mmol/L of monomer unit), namely polyethyleneimine (PEI) and polystyrene sulfonate (PSS), were sprayed on a negatively charged polyethersulfone membrane (PLEIADE, Orelis Environment). The efficacy of the polymer deposition was then investigated by estimating ion rejection, permeation flux, zeta-potential and contact angle before and after the polymer deposition. Firstly, contact angle (θ) measurements show that the surface hydrophilicity is notably improved by coating both PEI and PSS. Moreover, it was highlighted that the contact angle decreases monotonously with the amount of sprayed solution. Additionally, hydrophilicity enhancement was proved to be better with PSS (from 62 to 35°) than PEI (from 62 to 53°). Values of zeta-potential (ζ were estimated by measuring the streaming current generated by a pressure difference on both sides of a channel made by clamping two membranes. The ζ-values demonstrate that the deposits of PSS (negative at pH=5.5) allow an increase of the negative membrane charge, whereas the deposits of PEI (positive) lead to a positive surface charge. Zeta-potentials measurements also emphasize that the sprayed quantity has little impact on the membrane charge, except for very low quantities (2 μL/m²). The cross-flow filtration of salt solutions containing mono and divalent ions demonstrate that polymer deposition allows a strong enhancement of ion rejection. For instance, it is shown that rejection of a salt containing a divalent cation can be increased from 1 to 20 % and even to 35% by deposing 2 and 4 μL/cm² of PEI solution, respectively. This observation is coherent with the reversal of the membrane charge induced by PEI deposition. Similarly, the increase of negative charge induced by PSS deposition leads to an increase of NaCl rejection from 5 to 45 % due to electrostatic repulsion of the Cl- ion by the negative surface charge. Finally, a notable fall in the permeation flux due to the polymer layer coated at the surface was observed and the best polymer concentration in the sprayed solution remains to be determined to optimize performances.Keywords: ultrafiltration, electrospray deposition, ion rejection, permeation flux, zeta-potential, hydrophobicity
Procedia PDF Downloads 187679 Evaluation of Toxicity of Some Fungicides Against the Pathogen Fusarium sp.
Authors: M. Djekoun, H. Berrebah, M. R. Djebar
Abstract:
Fusarium wilt attacks the plants of major economic interest including wheat. This disease causes many problems for farmers and economic loss resulting are often very heavy. Chemical control is currently one of the most effective ways to fight against these diseases. In this study, the efficacy of three fungicides (tebuconazole, thiram and fludioxonil - difenoconazole mixture) was tested, in vitro, on the phytopathogenic Fusarium sp. isolated from seeds of wheat. The active ingredients were tested at different concentrations: 0.06, 1.39, 2.79, 5.58, and 11.16 mg/l for tebuconazole, 0.035, 0.052, 0.105, 0.21, and 0.42 mg/l for thiram and finally, for the mixture fludioxonil- difenoconazole 4 concentrations were tested : 0.05, 0.1, 0.5, and 1 mg/l. Toxicity responses were expressed as the effective concentration, which inhibits mycelial growth by 50%, (EC50). Of the three selected fungicides, thirame proved to be the most effective with EC50 value of the order of 0,15 mg/l followed by the mixture of fludioxonil- difenoconazole with 0,27 mg/l and finally tebuconazole with a value of 3.79 mg/l.Keywords: Fusarium sp, thiram, tebuconazole, fludioxonil, difenoconazole, EC50
Procedia PDF Downloads 544678 Software Quality Assurance in Network Security using Cryptographic Techniques
Authors: Sidra Shabbir, Ayesha Manzoor, Mehreen Sirshar
Abstract:
The use of the network communication has imposed serious threats to the security of assets over the network. Network security is getting more prone to active and passive attacks which may result in serious consequences to data integrity, confidentiality and availability. Various cryptographic techniques have been proposed in the past few years to combat with the concerned problem by ensuring quality but in order to have a fully secured network; a framework of new cryptosystem was needed. This paper discusses certain cryptographic techniques which have shown far better improvement in the network security with enhanced quality assurance. The scope of this research paper is to cover the security pitfalls in the current systems and their possible solutions based on the new cryptosystems. The development of new cryptosystem framework has paved a new way to the widespread network communications with enhanced quality in network security.Keywords: cryptography, network security, encryption, decryption, integrity, confidentiality, security algorithms, elliptic curve cryptography
Procedia PDF Downloads 733677 Molecular Dynamics Simulations of the Structural, Elastic and Thermodynamic Properties of Cubic GaBi
Authors: M. Zemouli, K. Amara, M. Elkeurti, Y. Benallou
Abstract:
We present the molecular dynamic simulations results of the structural and dynamical properties of the zinc-blende GaBi over a wide range of temperature (300-1000) K. Our simulation where performed in the framework of the three-body Tersoff potential, which accurately reproduces the lattice constants and elastic constants of the GaBi. A good agreement was found between our calculated results and the available theoretical data of the lattice constant, the bulk modulus and the cohesive energy. Our study allows us to predict the thermodynamic properties such as the specific heat and the lattice thermal expansion. In addition, this method allows us to check its ability to predict the phase transition of this compound. In particular, the transition pressure to the rock-salt phase is calculated and the results are compared with other available works.Keywords: Gallium compounds, molecular dynamics simulations, interatomic potential thermodynamic properties, structural phase transition
Procedia PDF Downloads 445676 Evaluation of Gesture-Based Password: User Behavioral Features Using Machine Learning Algorithms
Authors: Lakshmidevi Sreeramareddy, Komalpreet Kaur, Nane Pothier
Abstract:
Graphical-based passwords have existed for decades. Their major advantage is that they are easier to remember than an alphanumeric password. However, their disadvantage (especially recognition-based passwords) is the smaller password space, making them more vulnerable to brute force attacks. Graphical passwords are also highly susceptible to the shoulder-surfing effect. The gesture-based password method that we developed is a grid-free, template-free method. In this study, we evaluated the gesture-based passwords for usability and vulnerability. The results of the study are significant. We developed a gesture-based password application for data collection. Two modes of data collection were used: Creation mode and Replication mode. In creation mode (Session 1), users were asked to create six different passwords and reenter each password five times. In replication mode, users saw a password image created by some other user for a fixed duration of time. Three different duration timers, such as 5 seconds (Session 2), 10 seconds (Session 3), and 15 seconds (Session 4), were used to mimic the shoulder-surfing attack. After the timer expired, the password image was removed, and users were asked to replicate the password. There were 74, 57, 50, and 44 users participated in Session 1, Session 2, Session 3, and Session 4 respectfully. In this study, the machine learning algorithms have been applied to determine whether the person is a genuine user or an imposter based on the password entered. Five different machine learning algorithms were deployed to compare the performance in user authentication: namely, Decision Trees, Linear Discriminant Analysis, Naive Bayes Classifier, Support Vector Machines (SVMs) with Gaussian Radial Basis Kernel function, and K-Nearest Neighbor. Gesture-based password features vary from one entry to the next. It is difficult to distinguish between a creator and an intruder for authentication. For each password entered by the user, four features were extracted: password score, password length, password speed, and password size. All four features were normalized before being fed to a classifier. Three different classifiers were trained using data from all four sessions. Classifiers A, B, and C were trained and tested using data from the password creation session and the password replication with a timer of 5 seconds, 10 seconds, and 15 seconds, respectively. The classification accuracies for Classifier A using five ML algorithms are 72.5%, 71.3%, 71.9%, 74.4%, and 72.9%, respectively. The classification accuracies for Classifier B using five ML algorithms are 69.7%, 67.9%, 70.2%, 73.8%, and 71.2%, respectively. The classification accuracies for Classifier C using five ML algorithms are 68.1%, 64.9%, 68.4%, 71.5%, and 69.8%, respectively. SVMs with Gaussian Radial Basis Kernel outperform other ML algorithms for gesture-based password authentication. Results confirm that the shorter the duration of the shoulder-surfing attack, the higher the authentication accuracy. In conclusion, behavioral features extracted from the gesture-based passwords lead to less vulnerable user authentication.Keywords: authentication, gesture-based passwords, machine learning algorithms, shoulder-surfing attacks, usability
Procedia PDF Downloads 107675 Electric Field Analysis of XLPE, Cross-Linked Polyethylene Covered Aerial Line and Insulator Lashing
Authors: Jyh-Cherng Gu, Ming-Ta Yang, Dai-Ling Tsai
Abstract:
Both sparse lashing and dense lashing are applied to secure overhead XLPE (cross-linked polyethylene) covered power lines on ceramic insulators or HDPE polymer insulators. The distribution of electric field in and among the lashing wires, the XLPE power lines and insulators in normal clean condition and when conducting materials such as salt, metal particles, dust, smoke or acidic smog are present is studied in this paper. The ANSYS Maxwell commercial software is used in this study for electric field analysis. Although the simulation analysis is performed assuming ideal conditions due to the constraints of the simulation software, the result may not be the same as in real situation but still be of sufficient practical values.Keywords: electric field intensity, insulator, XLPE covered aerial line, empty
Procedia PDF Downloads 263674 Isolation and Characterization of Salt-Tolerance of Rhizobia under the Effects of Salinity
Authors: Sarra Sobti, Baelhadj Hamdi-Aïssa
Abstract:
The bacteria of the soil, usually called rhizobium, have a considerable importance in agriculture because of their capacity to fix the atmospheric nitrogen in symbiosis with the plants of the family of legumes. The present work was to study the effect of the salinity on growth and nodulation of alfalfa-rhizobia symbiosis at different agricultural experimental sites in Ouargla. The experiment was conducted in 3 steps. The first one was the isolation and characterization of the Rhizobia; next, the evolution of the isolates tolerance to salinity at three levels of NaCl (6, 8,12 and 16 g/L); and the last step was the evolution of the tolerance on symbiotic characteristics. The results showed that the phenotypic characterizations behave practically as Rhizobia spp, and the effects of salinity affect the symbiotic process. The tolerance to high levels of salinity and the survival and persistence in severe and harsh desert conditions make these rhizobia highly valuable inoculums to improve productivity of the leguminous plants cultivated under extreme environments.Keywords: rhizobia, symbiosis, salinity, tolerance, nodulation, soil, Medicago sativa L.
Procedia PDF Downloads 319673 Effect of Electromagnetic Field on Capacitive Deionization Performance
Authors: Alibi Kilybay, Emad Alhseinat, Ibrahim Mustafa, Abdulfahim Arangadi, Pei Shui, Faisal Almarzooqi
Abstract:
In this work, the electromagnetic field has been used for improving the performance of the capacitive deionization process. The effect of electromagnetic fields on the efficiency of the capacitive deionization (CDI) process was investigated experimentally. The results showed that treating the feed stream of the CDI process using an electromagnetic field can enhance the electrosorption capacity from 20% up to 70%. The effect of the degree of time of exposure, concentration, and type of ions have been examined. The electromagnetic field enhanced the salt adsorption capacity (SAC) of the Ca²⁺ ions by 70%, while the SAC enhanced 20% to the Na⁺ ions. It is hypnotized that the electrometric field affects the hydration shell around the ions and thus reduces their effective size and enhances the mass transfer. This reduction in ion effective size and increase in mass transfer enhanced the electrosorption capacity and kinetics of the CDI process.Keywords: capacitive deionization, desalination, electromagnetic treatment, water treatment
Procedia PDF Downloads 264