Search results for: salt and peppers attacks
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 1302

Search results for: salt and peppers attacks

642 Efficacy of Sea Water with Reduced Rate Herbicide to Control Weeds in Tropical Turf

Authors: Md. Kamal Uddin, Abdul Shukor Juraimi, Md. Parvez Anwar

Abstract:

Seawater with reduced herbicide could be considered as a low cost environment friendly alternative method for weed control in turfgrass. Different concentration of sea water in combination with trifloxysulfuron-sodium and quinclorac were used to determine weed control level in turfgrass field. The weed species S. diander, C. aromaticus, and C. rotundus except E. atrovirens were fully controlled when treated with ¾ recommended trifloxysulfuron–sodium with sea water, ¾ recommended trifloxysulfuron–sodium with ¾ sea water, ½ recommended trifloxysulfuron–sodium with sea water, ¾ recommended quinclorac with sea water and ¾ recommended quinclorac with ¾ sea water. Eragrostis atrovirens showed maximum 48% injury when treated with ¾ recommended trifloxysulfuron–sodium and sea water. Among the tested turf grasses, P. vaginatum showed only 8% injury to sea water in combination with ¾ recommended quinclorac, indicating greater salt tolerance. Zoysia japonica also showed no more than 14% injury when treated with sea water in combination with ¾ recommended trifloxysulfuron–sodium or quinclorac.

Keywords: sea water, trifloxysulfuron–sodium, quinclorac, turf

Procedia PDF Downloads 379
641 Performance Evaluation of Various Segmentation Techniques on MRI of Brain Tissue

Authors: U.V. Suryawanshi, S.S. Chowhan, U.V Kulkarni

Abstract:

Accuracy of segmentation methods is of great importance in brain image analysis. Tissue classification in Magnetic Resonance brain images (MRI) is an important issue in the analysis of several brain dementias. This paper portraits performance of segmentation techniques that are used on Brain MRI. A large variety of algorithms for segmentation of Brain MRI has been developed. The objective of this paper is to perform a segmentation process on MR images of the human brain, using Fuzzy c-means (FCM), Kernel based Fuzzy c-means clustering (KFCM), Spatial Fuzzy c-means (SFCM) and Improved Fuzzy c-means (IFCM). The review covers imaging modalities, MRI and methods for noise reduction and segmentation approaches. All methods are applied on MRI brain images which are degraded by salt-pepper noise demonstrate that the IFCM algorithm performs more robust to noise than the standard FCM algorithm. We conclude with a discussion on the trend of future research in brain segmentation and changing norms in IFCM for better results.

Keywords: image segmentation, preprocessing, MRI, FCM, KFCM, SFCM, IFCM

Procedia PDF Downloads 331
640 Fabrication of Cellulose Acetate/Polyethylene Glycol Membranes Blended with Silica and Carbon Nanotube for Desalination Process

Authors: Siti Nurkhamidah, Yeni Rahmawati, Fadlilatul Taufany, Eamor M. Woo, I Made P. A. Merta, Deffry D. A. Putra, Pitsyah Alifiyanti, Krisna D. Priambodo

Abstract:

Cellulose acetate/polyethylene glycol (CA/PEG) membrane was modified with varying amount of silica and carbon nanotube (CNT) to enhance its separation performance in the desalination process. These composite membranes were characterized for their hydrophilicity, morphology and permeation properties. The experiment results show that hydrophilicity of CA/PEG/Silica membranes increases with the increasing of silica concentration and the decreasing particle size of silica. From Scanning Electron Microscopy (SEM) image, it shows that pore structure of CA/PEG membranes increases with the addition of silica. Membrane performance analysis shows that permeate flux, salt rejection, and permeability of membranes increase with the increasing of silica concentrations. The effect of CNT on the hydrophylicity, morphology, and permeation properties was also discussed.

Keywords: carbon nanotube, cellulose acetate, desalination, membrane, PEG

Procedia PDF Downloads 320
639 New Requirements of the Fifth Dimension of War: Planning of Cyber Operation Capabilities

Authors: Mehmet Kargaci

Abstract:

Transformation of technology and strategy has been the main factor for the evolution of war. In addition to land, maritime, air and space domains, cyberspace has become the fifth domain with emerge of internet. The current security environment has become more complex and uncertain than ever before. Moreover, warfare has evaluated from conventional to irregular, asymmetric and hybrid war. Weak actors such as terrorist organizations and non-state actors has increasingly conducted cyber-attacks against strong adversaries. Besides, states has developed cyber capabilities in order to defense critical infrastructure regarding the cyber threats. Cyber warfare will be key in future security environment. Although what to do has been placed in operational plans, how to do has lacked and ignored as to cyber defense and attack. The purpose of the article is to put forward a model for how to conduct cyber capabilities in a conventional war. First, cyber operations capabilities will be discussed. Second put forward the necessities of cyberspace environment and develop a model for how to plan an operation using cyber operation capabilities, finally the assessment of the applicability of cyber operation capabilities and offers will be presented.

Keywords: cyber war, cyber threats, cyber operation capabilities, operation planning

Procedia PDF Downloads 335
638 Bioactivity of Peptides from Two Mushrooms

Authors: Parisa Farzaneh, Azade Harati

Abstract:

Mushrooms, or macro-fungi, as an important superfood, contain many bioactive compounds, particularly bio-peptides. In this research, mushroom proteins were extracted by buffer or buffer plus salt (0.15 M), along with an ultrasound bath to extract the intercellular protein. As a result, the highest amount of proteins in mushrooms were categorized into albumin. Proteins were also hydrolyzed and changed into peptides through endogenous and exogenous proteases, including gastrointestinal enzymes. The potency of endogenous proteases was also higher in Agaricus bisporus than Terfezia claveryi, as their activity ended at 75 for 15 min. The blanching process, endogenous enzymes, the mixture of gastrointestinal enzymes (pepsin-trypsin-α-chymotrypsin or trypsin- α-chymotrypsin) produced the different antioxidant and antibacterial hydrolysates. The peptide fractions produced with different cut-off ultrafilters also had various levels of radical scavenging, lipid peroxidation inhibition, and antibacterial activities. The bio-peptides with superior bioactivities (less than 3 kD of T. claveryi) were resistant to various environmental conditions (pH and temperatures). Therefore, they are good options to be added to nutraceutical and pharmaceutical preparations or functional foods, even during processing.

Keywords: bio-peptide, mushrooms, gastrointestinal enzymes, bioactivity

Procedia PDF Downloads 59
637 The Stable Isotopic Composition of Pedogenic Carbonate in the Minusinsk Basin, South Siberia

Authors: Jessica Vasil'chuk, Elena Ivanova, Pavel Krechetov, Vladimir Litvinsky, Nadine Budantseva, Julia Chizhova, Yurij Vasil'chuk

Abstract:

Carbonate minerals’ isotopic composition is widely used as a proxy for environmental parameters of the past. Pedogenic carbonate coatings on lower surfaces of coarse rock fragments are studied in order to indicate the climatic conditions and predominant vegetation under which they were formed. The purpose of the research is to characterize the isotopic composition of carbonate pedofeatures in soils of Minusink Hollow and estimate its correlation with isotopic composition of soil pore water, precipitation, vegetation and parent material. The samples of pedogenic carbonates, vegetation, carbonate parent material, soil water and precipitation water were analyzed using the Delta-V mass spectrometer with options of a gas bench and element analyser. The soils we studied are mainly Kastanozems that are poorly moisturized, therefore soil pore water was extracted by ethanol. Oxygen and carbon isotopic composition of pedogenic carbonates was analyzed in 3 key sites. Kazanovka Khakass state national reserve, Hankul salt lake, region of Sayanogorsk aluminum smelter. Vegetation photosynthetic pathway in the region is mainly C3. δ18O values of carbonate coatings in soils of Kazanovka vary in a range from −7.49 to −10.5‰ (vs V-PDB), and the smallest value −13.9‰ corresponds the coatings found between two buried soil horizons which 14C dates are 4.6 and 5.2 kyr BP. That may indicate cooler conditions of late Holocene than nowadays. In Sayanogorsk carbonates’ δ18O range is from −8.3 to −11.1‰ and near the Hankul Lake is from −9.0 to −10.2‰ all ranges are quite similar and may indicate coatings’ uniform formation conditions. δ13C values of carbonate coatings in Kazanovka vary from −2.5 to −6.7‰, the highest values correspond to the soils of Askiz and Syglygkug rivers former floodplains. For Sayanogorsk the range is from −4.9 to −6.8‰ and for Hankul from −2.3 to −5.7‰, where the highest value is for the modern salt crust. δ13C values of coatings strongly decrease from inner (older) to outer (younger) layers of coatings, that can indicate differences connected with the diffusion of organic material. Carbonate parent material δ18O value in the region vary from −11.1 to −12.0‰ and δ13C values vary from −4.9 to −5.7‰. Soil pore water δ18O values that determine the oxygen isotope composition of carbonates vary due to the processes of transpiration and mixing in the studied sites in a wide range of −2.0 to −13.5‰ (vs V-SMOW). Precipitation waters show δ18O values from -6.6‰ in May and -19.0‰ in January (snow) due to the temperature difference. The main conclusions are as follows: pedogenic carbonates δ13C values (−7…−2,5‰) show no correlation with modern C3 vegetation δ13C values (−30…−26‰), expected values under such vegetation are (−19…−15‰) but are closer to C4 vegetation. Late Holocene climate for the Minusinsk Hollow according to obtained data on isotope composition of carbonates and soil pore water chemical composition was dryer and cooler than present, that does not contradict with paleocarpology data obtained for the region. The research was supported by Russian Science Foundation (grant №14-27-00083).

Keywords: carbon, oxygen, pedogenic carbonates, South Siberia, stable isotopes

Procedia PDF Downloads 297
636 Impact of Network Workload between Virtualization Solutions on a Testbed Environment for Cybersecurity Learning

Authors: Kevin Fernagut, Olivier Flauzac, Erick M. G. Robledo, Florent Nolot

Abstract:

The adoption of modern lightweight virtualization often comes with new threats and network vulnerabilities. This paper seeks to assess this with a different approach studying the behavior of a testbed built with tools such as Kernel-Based Virtual Machine (KVM), Linux Containers (LXC) and Docker, by performing stress tests within a platform where students experiment simultaneously with cyber-attacks, and thus observe the impact on the campus network and also find the best solution for cyber-security learning. Interesting outcomes can be found in the literature comparing these technologies. It is, however, difficult to find results of the effects on the global network where experiments are carried out. Our work shows that other physical hosts and the faculty network were impacted while performing these trials. The problems found are discussed, as well as security solutions and the adoption of new network policies.

Keywords: containerization, containers, cybersecurity, cyberattacks, isolation, performance, virtualization, virtual machines

Procedia PDF Downloads 149
635 Smoker Recognition from Lung X-Ray Images Using Convolutional Neural Network

Authors: Moumita Chanda, Md. Fazlul Karim Patwary

Abstract:

Smoking is one of the most popular recreational drug use behaviors, and it contributes to birth defects, COPD, heart attacks, and erectile dysfunction. To completely eradicate this disease, it is imperative that it be identified and treated. Numerous smoking cessation programs have been created, and they demonstrate how beneficial it may be to help someone stop smoking at the ideal time. A tomography meter is an effective smoking detector. Other wearables, such as RF-based proximity sensors worn on the collar and wrist to detect when the hand is close to the mouth, have been proposed in the past, but they are not impervious to deceptive variables. In this study, we create a machine that can discriminate between smokers and non-smokers in real-time with high sensitivity and specificity by watching and collecting the human lung and analyzing the X-ray data using machine learning. If it has the highest accuracy, this machine could be utilized in a hospital, in the selection of candidates for the army or police, or in university entrance.

Keywords: CNN, smoker detection, non-smoker detection, OpenCV, artificial Intelligence, X-ray Image detection

Procedia PDF Downloads 84
634 Anticorrosive Polyurethane Clear Coat with Self-Cleaning Character

Authors: Nihit Madireddi, P. A. Mahanwar

Abstract:

We have aimed to produce a self-cleaning transparent polymer coating with polyurethane (PU) matrix as the latter is highly solvent, chemical and weather resistant having good mechanical properties. Nano-silica modified by 1H, 1H, 2H, 2H-perflurooctyltriethoxysilane was incorporated into the PU matrix for attaining self-cleaning ability through hydrophobicity. The modification was confirmed by particle size analysis and scanning electron microscopy (SEM). Thermo-gravimetric (TGA) studies were carried to ascertain the grafting of silane onto the silica. Several coating formulations were prepared by varying the silica loading content and compared to a commercial equivalent. The effect of dispersion and the morphology of the coated films were assessed by SEM analysis. All coating standardized tests like solvent resistance, adhesion, flexibility, acid, alkali, gloss etc. have been performed as per ASTM standards. Water contact angle studies were conducted to analyze the hydrophobic character of the coating. In addition, the coatings were also subjected to salt spray and accelerated weather testing to analyze the durability of the coating.

Keywords: FAS, nano-silica, PU clear coat, self-cleaning

Procedia PDF Downloads 311
633 India’s Role in Afghanistan in the Post 9/11 Era

Authors: Fayiz Saifurahman

Abstract:

Afghanistan's geopolitically and geo-strategically location has remained the attention of Indian policy. On 11 September 2001, the terrorist attacks in the United States and the announcement of the United States, fight for international war against the Taliban in November 2001 provided India a chance to pursue its foreign policy goals of achieving a good position in the region and emerging as an international power. Therefore, post-9/11, India strengthened its efforts to re-establish its power in Afghanistan. The objectives of this study are to study the India-Afghanistan relation in the post 9/11 and to discuss the initial role of India in Afghanistan. The research method was conducted on a qualitative method based on descriptive. The research findings propose that; Indian foreign policy should be analyzed and increase its soft power. Afghanistan has definitely provided a significant occasion for India to increase its power in Afghanistan. In this linkage, Indian determinations have been to intrude all parts in Afghanistan to make them reliant on Indian cooperation.

Keywords: Afghanistan, war, power, policy.

Procedia PDF Downloads 231
632 Survival Chances and Costs after Heart Attacks: An Instrumental Variable Approach

Authors: Alice Sanwald, Thomas Schober

Abstract:

We analyze mortality and follow-up costs of heart attack patients using administrative data from Austria (2002-2011). As treatment intensity in a hospital largely depends on whether it has a catheterization laboratory, we focus on the effects of patients' initial admission to these specialized hospitals. To account for the nonrandom selection of patients into hospitals, we exploit individuals' place of residence as a source of exogenous variation in an instrumental variable framework. We find that the initial admission to specialized hospitals increases patients' survival chances substantially. The effect on 3-year mortality is -9.5 percentage points. A separation of the sample into subgroups shows the strongest effects in relative terms for patients below the age of 65. We do not find significant effects on longterm inpatient costs and find only marginal increases in outpatient costs.

Keywords: acute myocardial infarction, mortality, costs, instrumental variables, heart attack

Procedia PDF Downloads 436
631 Ascorbic Acid Application Mitigates the Salt Stress Effects on Helianthus annuus L. Plants Grown on a Reclaimed Saline Soil

Authors: Mostafa M. Rady, Majed M. Howladar, Saad M. Howladar

Abstract:

A field trial was conducted during two successive seasons (2013 and 2014) in Southeast Fayoum, Egypt (29º 17'N; 30º 53'E) to investigate the improving effect of ascorbic acid (Vit C) foliar spray at the rates of 0, 1, 2 or 3 mM on the growth, seed and oil yields, and some chemical constituents of sunflower plants grown on a reclaimed saline soil (EC = 7.98–7.83). Vit C application at all rates (1, 2 and 3 mM) was significantly increased growth traits, seed and oil yields, and the concentrations of endogenous Vit C, leaf photosynthetic pigments, total soluble sugars, free proline and nutrient elements as well as K/Na ratio. In contrast, Na concentration was significantly reduced with the application of all Vit C levels. Vit C foliar spray at the rate of 2 mM was found to be the best treatment, alleviating the inhibitory effects of salinity on sunflower plants grown on a reclaimed saline soil.

Keywords: Helianthus annuus L., Vit C, salinity, growth, seed and oil yields, osmoprotectants

Procedia PDF Downloads 418
630 Seed Germination and Recovery Responses of Suaeda Heterophylla to Abiotic Stresses

Authors: Abdul Hameed, Muhammad Zaheer Ahmed, Salman Gulzar, Bilquees Gul, Jan Alam, Ahmad K. Hegazy, Abdel Rehman A. Alatar, M. Ajmal Khan

Abstract:

Seed germination and recovery from salt stress of an annual halophyte Suaeda heterophylla (Kar. and Kir.) Bunge to different iso-osmotic concentrations (0, -0.46, -0.92, -1.38, -1.84, and -2.30 MPa) of NaCl and PEG-6000 at 15/25, 20/30 and 25/35°C in both 12-h temperature and light regimes and in complete darkness were studied. Maximum number of seeds germinated in distilled water and increase in concentrations of both NaCl and PEG-6000 decreased germination at all temperature regimes, light and dark conditions, with higher inhibition in NaCl than PEG-6000. Recovery of germination and viability of seeds were lower in NaCl than PEG-6000 both in the light and dark. Moderate alternate temperatures (20/30°C) and 12-h photoperiod were found to be the optimal for seed germination and recovery. Better seed germination of S. heterophylla when osmotic potential caused both by NaCl and PEG 6000 is lower, temperature regime of 20/30°C and light regime is for 12 h.

Keywords: seed germination, abiotic stresses, Suaeda heterophylla, molecular biology

Procedia PDF Downloads 438
629 A Study on Automotive Attack Database and Data Flow Diagram for Concretization of HEAVENS: A Car Security Model

Authors: Se-Han Lee, Kwang-Woo Go, Gwang-Hyun Ahn, Hee-Sung Park, Cheol-Kyu Han, Jun-Bo Shim, Geun-Chul Kang, Hyun-Jung Lee

Abstract:

In recent years, with the advent of smart cars and the expansion of the market, the announcement of 'Adventures in Automotive Networks and Control Units' at the DEFCON21 conference in 2013 revealed that cars are not safe from hacking. As a result, the HEAVENS model considering not only the functional safety of the vehicle but also the security has been suggested. However, the HEAVENS model only presents a simple process, and there are no detailed procedures and activities for each process, making it difficult to apply it to the actual vehicle security vulnerability check. In this paper, we propose an automated attack database that systematically summarizes attack vectors, attack types, and vulnerable vehicle models to prepare for various car hacking attacks, and data flow diagrams that can detect various vulnerabilities and suggest a way to materialize the HEAVENS model.

Keywords: automotive security, HEAVENS, car hacking, security model, information security

Procedia PDF Downloads 362
628 Conducting Glove Leathers Prepared through in-situ Polymerization of Pyrrole

Authors: Wegene Demisie Jima

Abstract:

Leather is a durable and flexible material used for various purposes including clothing, footwear, upholstery and gloves. However, the use of leather for smart product applications is a challenge since it is electrically insulating material. Here, we report a simple method to produce conducting glove leathers using an in-situ polymerization of pyrrole. The concentrations of pyrrole, ferric chloride and anthraquinone-2-sulfonic acid sodium salt monohydrate were optimized to produce maximum conductivity in the treated leathers. The coating of polypyrrole in the treated leathers was probed using FT-IR, X-ray diffraction and electron microscopic analysis. FTIR confirms that the formation of polypyrrole on the leather surface as well as presence of prominent N-C stretching band. X-ray diffraction analysis suggests para-crystallinity in the PPy-treated leathers.We further demonstrate that the treated leathers, with maximum conductivity of 7.4 S/cm, can be used for making conductive gloves for operating touch-screen devices apart from other smart product applications.

Keywords: electrical conductivity, in-situ polymerization, pyrrole, smart product

Procedia PDF Downloads 193
627 Soybean Lecithin Based Reverse Micellar Extraction of Pectinase from Synthetic Solution

Authors: Sivananth Murugesan, I. Regupathi, B. Vishwas Prabhu, Ankit Devatwal, Vishnu Sivan Pillai

Abstract:

Pectinase is an important enzyme which has a wide range of applications including textile processing and bioscouring of cotton fibers, coffee and tea fermentation, purification of plant viruses, oil extraction etc. Selective separation and purification of pectinase from fermentation broth and recover the enzyme form process stream for reuse are cost consuming process in most of the enzyme based industries. It is difficult to identify a suitable medium to enhance enzyme activity and retain its enzyme characteristics during such processes. The cost effective, selective separation of enzymes through the modified Liquid-liquid extraction is of current research interest worldwide. Reverse micellar extraction, globally acclaimed Liquid-liquid extraction technique is well known for its separation and purification of solutes from the feed which offers higher solute specificity and partitioning, ease of operation and recycling of extractants used. Surfactant concentrations above critical micelle concentration to an apolar solvent form micelles and addition of micellar phase to water in turn forms reverse micelles or water-in-oil emulsions. Since, electrostatic interaction plays a major role in the separation/purification of solutes using reverse micelles. These interaction parameters can be altered with the change in pH, addition of cosolvent, surfactant and electrolyte and non-electrolyte. Even though many chemical based commercial surfactant had been utilized for this purpose, the biosurfactants are more suitable for the purification of enzymes which are used in food application. The present work focused on the partitioning of pectinase from the synthetic aqueous solution within the reverse micelle phase formed by a biosurfactant, Soybean Lecithin dissolved in chloroform. The critical micelle concentration of soybean lecithin/chloroform solution was identified through refractive index and density measurements. Effect of surfactant concentrations above and below the critical micelle concentration was considered to study its effect on enzyme activity, enzyme partitioning within the reverse micelle phase. The effect of pH and electrolyte salts on the partitioning behavior was studied by varying the system pH and concentration of different salts during forward and back extraction steps. It was observed that lower concentrations of soybean lecithin enhanced the enzyme activity within the water core of the reverse micelle with maximizing extraction efficiency. The maximum yield of pectinase of 85% with a partitioning coefficient of 5.7 was achieved at 4.8 pH during forward extraction and 88% yield with a partitioning coefficient of 7.1 was observed during backward extraction at a pH value of 5.0. However, addition of salt decreased the enzyme activity and especially at higher salt concentrations enzyme activity declined drastically during both forward and back extraction steps. The results proved that reverse micelles formed by Soybean Lecithin and chloroform may be used for the extraction of pectinase from aqueous solution. Further, the reverse micelles can be considered as nanoreactors to enhance enzyme activity and maximum utilization of substrate at optimized conditions, which are paving a way to process intensification and scale-down.

Keywords: pectinase, reverse micelles, soybean lecithin, selective partitioning

Procedia PDF Downloads 372
626 Adversary Emulation: Implementation of Automated Countermeasure in CALDERA Framework

Authors: Yinan Cao, Francine Herrmann

Abstract:

Adversary emulation is a very effective concrete way to evaluate the defense of an information system or network. It is about building an emulator, which depending on the vulnerability of a target system, will allow to detect and execute a set of identified attacks. However, emulating an adversary is very costly in terms of time and resources. Verifying the information of each technique and building up the countermeasures in the middle of the test is also needed to be accomplished manually. In this article, a synthesis of previous MITRE research on the creation of the ATT&CK matrix will be as the knowledge base of the known techniques and a well-designed adversary emulation software CALDERA based on ATT&CK Matrix will be used as our platform. Inspired and guided by the previous study, a plugin in CALDERA called Tinker will be implemented, which is aiming to help the tester to get more information and also the mitigation of each technique used in the previous operation. Furthermore, the optional countermeasures for some techniques are also implemented and preset in Tinker in order to facilitate and fasten the process of the defense improvement of the tested system.

Keywords: automation, adversary emulation, CALDERA, countermeasures, MITRE ATT&CK

Procedia PDF Downloads 208
625 Influence of Coenzyme as a Corrosion Barrier for Biodegradable Magnesium

Authors: Minjung Park, Jimin Park, Youngwoon Kim, Hyungseop Han, Myoungryul Ok, Hojeong Jeon, Hyunkwang Seok, Yuchan Kim

Abstract:

Magnesium is an essential element in human body and has unique characteristics such as bioabsorbable and biodegradable properties. Therefore, there has been much attention on studies on the implants based on magnesium to avoid subsequent surgery. However, high amount of hydrogen gas is generated by relatively severe corrosion of magnesium especially in aqueous condition with chloride ions. And it contributes to the causes of swelling of skin and causes consequent inflammation of soft tissue where is directly in contact with implants. Therefore, there is still concern about the safety of the using biodegradable magnesium alloys, which is limited to various applications. In this study, we analyzed the influence of coenzyme on corrosion behavior of magnesium. The analysis of corrosion rate was held by using Hanks’ balanced salt solution (HBSS) as a body stimulated fluid and in condition of 37°C. Thus, with deferring the concentration of the coenzyme used in this study, corrosion rates from 0.0654ml/ cm² to 0.0438ml/cm² were observed in immersion tests. Also, comparable results were obtained in electrochemical tests. Results showed that hydrogen gas produced from corrosion of magnesium can be controlled.

Keywords: biodegradable magnesium, biomaterials, coenzyme, corrosion

Procedia PDF Downloads 421
624 3D-Mesh Robust Watermarking Technique for Ownership Protection and Authentication

Authors: Farhan A. Alenizi

Abstract:

Digital watermarking has evolved in the past years as an important means for data authentication and ownership protection. The images and video watermarking was well known in the field of multimedia processing; however, 3D objects' watermarking techniques have emerged as an important means for the same purposes, as 3D mesh models are in increasing use in different areas of scientific, industrial, and medical applications. Like the image watermarking techniques, 3D watermarking can take place in either space or transform domains. Unlike images and video watermarking, where the frames have regular structures in both space and temporal domains, 3D objects are represented in different ways as meshes that are basically irregular samplings of surfaces; moreover, meshes can undergo a large variety of alterations which may be hard to tackle. This makes the watermarking process more challenging. While the transform domain watermarking is preferable in images and videos, they are still difficult to implement in 3d meshes due to the huge number of vertices involved and the complicated topology and geometry, and hence the difficulty to perform the spectral decomposition, even though significant work was done in the field. Spatial domain watermarking has attracted significant attention in the past years; they can either act on the topology or on the geometry of the model. Exploiting the statistical characteristics in the 3D mesh models from both geometrical and topological aspects was useful in hiding data. However, doing that with minimal surface distortions to the mesh attracted significant research in the field. A 3D mesh blind watermarking technique is proposed in this research. The watermarking method depends on modifying the vertices' positions with respect to the center of the object. An optimal method will be developed to reduce the errors, minimizing the distortions that the 3d object may experience due to the watermarking process, and reducing the computational complexity due to the iterations and other factors. The technique relies on the displacement process of the vertices' locations depending on the modification of the variances of the vertices’ norms. Statistical analyses were performed to establish the proper distributions that best fit each mesh, and hence establishing the bins sizes. Several optimizing approaches were introduced in the realms of mesh local roughness, the statistical distributions of the norms, and the displacements in the mesh centers. To evaluate the algorithm's robustness against other common geometry and connectivity attacks, the watermarked objects were subjected to uniform noise, Laplacian smoothing, vertices quantization, simplification, and cropping. Experimental results showed that the approach is robust in terms of both perceptual and quantitative qualities. It was also robust against both geometry and connectivity attacks. Moreover, the probability of true positive detection versus the probability of false-positive detection was evaluated. To validate the accuracy of the test cases, the receiver operating characteristics (ROC) curves were drawn, and they’ve shown robustness from this aspect. 3D watermarking is still a new field but still a promising one.

Keywords: watermarking, mesh objects, local roughness, Laplacian Smoothing

Procedia PDF Downloads 160
623 A Security Cloud Storage Scheme Based Accountable Key-Policy Attribute-Based Encryption without Key Escrow

Authors: Ming Lun Wang, Yan Wang, Ning Ruo Sun

Abstract:

With the development of cloud computing, more and more users start to utilize the cloud storage service. However, there exist some issues: 1) cloud server steals the shared data, 2) sharers collude with the cloud server to steal the shared data, 3) cloud server tampers the shared data, 4) sharers and key generation center (KGC) conspire to steal the shared data. In this paper, we use advanced encryption standard (AES), hash algorithms, and accountable key-policy attribute-based encryption without key escrow (WOKE-AKP-ABE) to build a security cloud storage scheme. Moreover, the data are encrypted to protect the privacy. We use hash algorithms to prevent the cloud server from tampering the data uploaded to the cloud. Analysis results show that this scheme can resist conspired attacks.

Keywords: cloud storage security, sharing storage, attributes, Hash algorithm

Procedia PDF Downloads 390
622 FLEX: A Backdoor Detection and Elimination Method in Federated Scenario

Authors: Shuqi Zhang

Abstract:

Federated learning allows users to participate in collaborative model training without sending data to third-party servers, reducing the risk of user data privacy leakage, and is widely used in smart finance and smart healthcare. However, the distributed architecture design of federation learning itself and the existence of secure aggregation protocols make it inherently vulnerable to backdoor attacks. To solve this problem, the federated learning backdoor defense framework FLEX based on group aggregation, cluster analysis, and neuron pruning is proposed, and inter-compatibility with secure aggregation protocols is achieved. The good performance of FLEX is verified by building a horizontal federated learning framework on the CIFAR-10 dataset for experiments, which achieves 98% success rate of backdoor detection and reduces the success rate of backdoor tasks to 0% ~ 10%.

Keywords: federated learning, secure aggregation, backdoor attack, cluster analysis, neuron pruning

Procedia PDF Downloads 96
621 The Use of Biofeedback to Increase Resilience and Mental Health of Supersonic Pilots

Authors: G. Kloudova, S. Kozlova, M. Stehlik

Abstract:

Pilots are operating in a high-risk environment rich in potential stressors, which negatively affect aviation safety and the mental health of pilots. In the research conducted, the pilots were offered mental training biofeedback therapy. Biofeedback is an objective tool to measure physiological responses to stress. After only six sessions, all of the pilots tested showed significant differences between their initial condition and their condition after therapy. The biggest improvement was found in decreased heart rate (in 83.3% of tested pilots) and respiration rate (66.7%), which are the best indicators of anxiety states and panic attacks. To incorporate all of the variables, we correlated the measured physiological state of the pilots with their personality traits. Surprisingly, we found a high correlation with peripheral temperature and confidence (0.98) and with heart rate and aggressiveness (0.97). A retest made after a one-year interval showed that in majority of the subjects tested their acquired self-regulation ability had been internalized.

Keywords: aviation, biofeedback, mental workload, performance psychology

Procedia PDF Downloads 248
620 An Analysis into Global Suicide Trends and Their Relation to Current Events Through a Socio-Cultural Lens

Authors: Lyndsey Kim

Abstract:

We utilized country-level data on suicide rates from 1985 through 2015 provided by the WHO to explore global trends as well as country-specific trends. First, we find that up until 1995, there was an increase in suicide rates globally, followed by a steep decline in deaths. This observation is largely driven by the data from Europe, where suicides are prominent but steadily declining. Second, men are more likely to commit suicide than women across the world over the years. Third, the older generation is more likely to commit suicide than youth and adults. Finally, we turn to Durkheim’s theory and use it as a lens to understand trends in suicide across time and countries and attempt to identify social and economic events that might explain patterns that we observe. For example, we discovered a drastically different pattern in suicide rates in the US, with a steep increase in suicides in the early 2000s. We hypothesize this might be driven by both the 9/11 attacks and the recession of 2008.

Keywords: suicide trends, current events, data analysis, world health organization, durkheim theory

Procedia PDF Downloads 92
619 Temporal Myopia in Sustainable Behavior under Uncertainty

Authors: Arianne Van Der Wal, Femke Van Horen, Amir Grinstein

Abstract:

Consumers in today’s world are confronted with the alarming consequences of unsustainable behavior such as pollution and resource degradation. In addition, they are facing an increase in uncertainty due to, for instance, economic instability and terror attacks. Although these two problems are central to consumers’ lives, occur on a global scale, and have significant impact on the world’s political, economic, environmental, and social landscapes, they have not been systematically studied in tandem before. Contributing to research on persuasion and pro-social behavior, this paper shows in five studies (three experimental studies and one field study) that the two problems are intertwined. We demonstrate that uncertainty leads to lower sustainable behavior in comparison to certainty (Studies 1 and 2) and that this is due to consumers displaying higher levels of temporal discounting (i.e., adopting a more immediate orientation; Study 2). Finally, providing valuable implications for policy makers and responsible marketers, we show that emphasizing the immediate benefits of sustainable behavior during uncertainty buffers the negative effect (Studies 3 and 4).

Keywords: sustainable behavior, uncertainty, temporal discounting, framing

Procedia PDF Downloads 318
618 Rare Earth Element (REE) Geochemistry of Tepeköy Sandstones (Central Anatolia, Turkey)

Authors: Mehmet Yavuz Hüseyinca, Şuayip Küpeli

Abstract:

Sandstones from Upper Eocene - Oligocene Tepeköy formation (Member of Mezgit Group) that exposed on the eastern edge of Tuz Gölü (Salt Lake) were analyzed for their rare earth element (REE) contents. Average concentrations of ΣREE, ΣLREE (Total light rare earth elements) and ΣHREE (Total heavy rare earth elements) were determined as 31.37, 26.47 and 4.55 ppm respectively. These values are lower than UCC (Upper continental crust) which indicates grain size and/or CaO dilution effect. The chondrite-normalized REE pattern is characterized by the average ratios of (La/Yb)cn = 6.20, (La/Sm)cn = 4.06, (Gd/Lu)cn = 1.10, Eu/Eu* = 0.99 and Ce/Ce* = 0.94. Lower values of ΣLREE/ΣHREE (Average 5.97) and (La/Yb)cn suggest lower fractionation of overall REE. Moreover (La/Sm)cn and (Gd/Lu)cn ratios define less inclined LREE and almost flat HREE pattern when compared with UCC. Almost no Ce anomaly (Ce/Ce*) emphasizes that REE were originated from terrigenous material. Also depleted LREE and no Eu anomaly (Eu/Eu*) suggest an undifferentiated mafic provenance for the sandstones.

Keywords: central Anatolia, provenance, rare earth elements, REE, Tepeköy sandstone

Procedia PDF Downloads 475
617 Total Dissolved Solids and Total Iron in High Rate Activated Sludge System

Authors: M. Y. Saleh, G. M. ELanany, M. H. Elzahar, M. Z. Elshikhipy

Abstract:

Industrial wastewater discharge, which carries high concentrations of dissolved solids and iron, could be treated by high rate activated sludge stage of the multiple-stage sludge treatment plant, a system which is characterized by high treatment efficiency, optimal prices, and small areas compared with conventional activated sludge treatment plants. A pilot plant with an influent industrial discharge flow of 135 L/h was designed following the activated sludge system to simulate between the biological and chemical treatment with the addition of dosages 100, 150, 200 and 250 mg/L alum salt to the aeration tank. The concentrations of total dissolved solids (TDS) and iron (Fe) in industrial discharge flow had an average range of 140000 TDS and 4.5 mg/L iron. The optimization of the chemical-biological process using a dosage of 200 mg/L alum succeeded to improve the removal efficiency of TDS and total iron to 48.15% and 68.11% respectively.

Keywords: wastewater, activated sludge, TDS, total iron

Procedia PDF Downloads 295
616 Design and Implementation of Security Middleware for Data Warehouse Signature, Framework

Authors: Mayada Al Meghari

Abstract:

Recently, grid middlewares have provided large integrated use of network resources as the shared data and the CPU to become a virtual supercomputer. In this work, we present the design and implementation of the middleware for Data Warehouse Signature, DWS Framework. The aim of using the middleware in our DWS framework is to achieve the high performance by the parallel computing. This middleware is developed on Alchemi.Net framework to increase the security among the network nodes through the authentication and group-key distribution model. This model achieves the key security and prevents any intermediate attacks in the middleware. This paper presents the flow process structures of the middleware design. In addition, the paper ensures the implementation of security for DWS middleware enhancement with the authentication and group-key distribution model. Finally, from the analysis of other middleware approaches, the developed middleware of DWS framework is the optimal solution of a complete covering of security issues.

Keywords: middleware, parallel computing, data warehouse, security, group-key, high performance

Procedia PDF Downloads 119
615 The Nature and Impact of Trojan Horses in Cybersecurity

Authors: Mehrab Faraghti

Abstract:

Trojan horses, a form of malware masquerading as legitimate software, pose significant cybersecurity threats. These malicious programs exploit user trust, infiltrate systems, and can lead to data breaches, financial loss, and compromised privacy. This paper explores the mechanisms through which Trojan horses operate, including delivery methods such as phishing and software vulnerabilities. It categorizes various types of Trojan horses and their specific impacts on individuals and organizations. Additionally, the research highlights the evolution of Trojan threats and the importance of user awareness and proactive security measures. By analyzing case studies of notable Trojan attacks, this study identifies common vulnerabilities that can be exploited and offers insights into effective countermeasures, including behavioral analysis, anomaly detection, and robust incident response strategies. The findings emphasize the need for comprehensive cybersecurity education and the implementation of advanced security protocols to mitigate the risks associated with Trojan horses.

Keywords: Trojan horses, cybersecurity, malware, data breach

Procedia PDF Downloads 9
614 Characterization of (GRAS37) Gibberellin Acid Insensitive (GAI), Repressor (RGA), and Scarecrow (SCR) Gene by Using Bioinformatics Tools

Authors: Yusra Tariq

Abstract:

The Grass 37 gene is presently known in tomatoes, which are the source of healthy substances such as ascorbic acid, polyphenols, carotenoids and nutrients. It has a significant impact on the growth and development of humans. The GRASS 37 gene is a plant Transcription factor group assuming significant parts in various reactions of different Abiotic stresses such as (drought, salinity, thermal stresses, temperature, and bright waves) which could highly affect the growth. Tomatoes are very sensitive to temperature, and their growth or production occurs optimally in a temperature range from 21 C to 29.5 C during the daytime and from 18.5 C to 21 C during the night. This protein acts as a positive regulator of salt stress response and abscisic acid signaling. This study summarizes the structure characterized by molecular formula and protein-binding domains by different bioinformatics tools such as Expasy translate tool, Expasy Portparam, Swiss Prot and Inter Pro Scan, Clustal W tool regulatory procedure of GRASS gene components, also their reactions to both biotic and Abiotic stresses.

Keywords: GRAS37, gene, bioinformatics, tool

Procedia PDF Downloads 53
613 An Intrusion Detection Systems Based on K-Means, K-Medoids and Support Vector Clustering Using Ensemble

Authors: A. Mohammadpour, Ebrahim Najafi Kajabad, Ghazale Ipakchi

Abstract:

Presently, computer networks’ security rise in importance and many studies have also been conducted in this field. By the penetration of the internet networks in different fields, many things need to be done to provide a secure industrial and non-industrial network. Fire walls, appropriate Intrusion Detection Systems (IDS), encryption protocols for information sending and receiving, and use of authentication certificated are among things, which should be considered for system security. The aim of the present study is to use the outcome of several algorithms, which cause decline in IDS errors, in the way that improves system security and prevents additional overload to the system. Finally, regarding the obtained result we can also detect the amount and percentage of more sub attacks. By running the proposed system, which is based on the use of multi-algorithmic outcome and comparing that by the proposed single algorithmic methods, we observed a 78.64% result in attack detection that is improved by 3.14% than the proposed algorithms.

Keywords: intrusion detection systems, clustering, k-means, k-medoids, SV clustering, ensemble

Procedia PDF Downloads 221