Search results for: black hole attack
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 1763

Search results for: black hole attack

1073 Automatic Intelligent Analysis of Malware Behaviour

Authors: Hermann Dornhackl, Konstantin Kadletz, Robert Luh, Paul Tavolato

Abstract:

In this paper we describe the use of formal methods to model malware behaviour. The modelling of harmful behaviour rests upon syntactic structures that represent malicious procedures inside malware. The malicious activities are modelled by a formal grammar, where API calls’ components are the terminals and the set of API calls used in combination to achieve a goal are designated non-terminals. The combination of different non-terminals in various ways and tiers make up the attack vectors that are used by harmful software. Based on these syntactic structures a parser can be generated which takes execution traces as input for pattern recognition.

Keywords: malware behaviour, modelling, parsing, search, pattern matching

Procedia PDF Downloads 314
1072 Preparation, Characterization and Photocatalytic Activity of a New Noble Metal Modified TiO2@SrTiO3 and SrTiO3 Photocatalysts

Authors: Ewelina Grabowska, Martyna Marchelek

Abstract:

Among the various semiconductors, nanosized TiO2 has been widely studied due to its high photosensitivity, low cost, low toxicity, and good chemical and thermal stability. However, there are two main drawbacks to the practical application of pure TiO2 films. One is that TiO2 can be induced only by ultraviolet (UV) light due to its intrinsic wide bandgap (3.2 eV for anatase and 3.0 eV for rutile), which limits its practical efficiency for solar energy utilization since UV light makes up only 4-5% of the solar spectrum. The other is that a high electron-hole recombination rate will reduce the photoelectric conversion efficiency of TiO2. In order to overcome the above drawbacks and modify the electronic structure of TiO2, some semiconductors (eg. CdS, ZnO, PbS, Cu2O, Bi2S3, and CdSe) have been used to prepare coupled TiO2 composites, for improving their charge separation efficiency and extending the photoresponse into the visible region. It has been proved that the fabrication of p-n heterostructures by combining n-type TiO2 with p-type semiconductors is an effective way to improve the photoelectric conversion efficiency of TiO2. SrTiO3 is a good candidate for coupling TiO2 and improving the photocatalytic performance of the photocatalyst because its conduction band edge is more negative than TiO2. Due to the potential differences between the band edges of these two semiconductors, the photogenerated electrons transfer from the conduction band of SrTiO3 to that of TiO2. Conversely, the photogenerated electrons transfer from the conduction band of SrTiO3 to that of TiO2. Then the photogenerated charge carriers can be efficiently separated by these processes, resulting in the enhancement of the photocatalytic property in the photocatalyst. Additionally, one of the methods for improving photocatalyst performance is addition of nanoparticles containing one or two noble metals (Pt, Au, Ag and Pd) deposited on semiconductor surface. The mechanisms were proposed as (1) the surface plasmon resonance of noble metal particles is excited by visible light, facilitating the excitation of the surface electron and interfacial electron transfer (2) some energy levels can be produced in the band gap of TiO2 by the dispersion of noble metal nanoparticles in the TiO2 matrix; (3) noble metal nanoparticles deposited on TiO2 act as electron traps, enhancing the electron–hole separation. In view of this, we recently obtained series of TiO2@SrTiO3 and SrTiO3 photocatalysts loaded with noble metal NPs. using photodeposition method. The M- TiO2@SrTiO3 and M-SrTiO3 photocatalysts (M= Rh, Rt, Pt) were studied for photodegradation of phenol in aqueous phase under UV-Vis and visible irradiation. Moreover, in the second part of our research hydroxyl radical formations were investigated. Fluorescence of irradiated coumarin solution was used as a method of ˙OH radical detection. Coumarin readily reacts with generated hydroxyl radicals forming hydroxycoumarins. Although the major hydroxylation product is 5-hydroxycoumarin, only 7-hydroxyproduct of coumarin hydroxylation emits fluorescent light. Thus, this method was used only for hydroxyl radical detection, but not for determining concentration of hydroxyl radicals.

Keywords: composites TiO2, SrTiO3, photocatalysis, phenol degradation

Procedia PDF Downloads 206
1071 Design a Network for Implementation a Hospital Information System

Authors: Abdulqader Rasool Feqi Mohammed, Ergun Erçelebi̇

Abstract:

A large number of hospitals from developed countries are adopting hospital information system to bring efficiency in hospital information system. The purpose of this project is to research on new network security techniques in order to enhance the current network security structure of save a hospital information system (HIS). This is very important because, it will avoid the system from suffering any attack. Security architecture was optimized but there are need to keep researching on best means to protect the network from future attacks. In this final project research, security techniques were uncovered to produce best network security results when implemented in an integrated framework.

Keywords: hospital information system, HIS, network security techniques, internet protocol, IP, network

Procedia PDF Downloads 418
1070 Characterization of Carbazole-Based Host Material for Highly Efficient Thermally Activated Delayed Fluorescence Emitter

Authors: Malek Mahmoudi, Jonas Keruckas, Dmytro Volyniuk, Jurate Simokaitiene, Juozas V. Grazulevicius

Abstract:

Host materials have been discovered as one of the most appealing methods for harvesting triplet states in organic materials for application in organic light-emitting diodes (OLEDs). The ideal host-guest system for emission in thermally delayed fluorescence OLEDs with 20% guest concentration for efficient energy transfer has been demonstrated in the present investigation. In this work, 3,3'-bis[9-(4-fluorophenyl) carbazole] (bFPC) has been used as the host, which induces balanced charge carrier transport for high-efficiency OLEDs.For providing a complete characterization of the synthesized compound, photophysical, photoelectrical, charge-transporting, and electrochemical properties of the compound have been examined. Excited-state lifetimes and singlet-triplet energy gaps were measured for characterization of photophysical properties, while thermogravimetric analysis, as well as differential scanning calorimetry measurements, were performed for probing of electrochemical and thermal properties of the compound. The electrochemical properties of this compound were investigated by cyclic voltammetry (CV) method, and ionization potential (IPCV) value of 5.68 eV was observed. UV–Vis absorption and photoluminescence spectrum of a solution of the compound in toluene (10-5 M) showed maxima at 302 and 405 nm, respectively. Photoelectron emission spectrometry was used for the characterization of charge-injection properties of the studied compound in solid. The ionization potential of this material was found to be 5.78 eV, and time-of-flight measurement was used for testing charge-transporting properties and hole mobility estimated using this technique in a vacuum-deposited layer reached 4×10-4 cm2 V-1s-1. Since the compound with high charge mobilities was tested as a host in an organic light-emitting diode. The device was fabricated by successive deposition onto a pre-cleaned indium tin oxide (ITO) coated glass substrate under a vacuum of 10-6 Torr and consisting of an indium-tin-oxide anode, hole injection and transporting layer(MoO3, NPB), emitting layer with bFPC as a host and 4CzIPN (2,4,5,6-tetra(9-carbazolyl)isophthalonitrile) which is a new highly efficient green thermally activated delayed fluorescence (TADF) material as an emitter, an electron transporting layer(TPBi) and lithium fluoride layer topped with aluminum layer as a cathode exhibited the highest maximum current efficiency and power efficiency of 33.9 cd/A and 23.5 lm/W, respectively and the electroluminescence spectrum showed only a peak at 512nm. Furthermore, the new bicarbazole-based compound was tested as a host in thermally activated delayed fluorescence organic light-emitting diodes are reaching luminance of 25300 cd m-2 and external quantum efficiency of 10.1%. Interestingly, the turn-on voltage was low enough (3.8 V), and such a device can be used for highly efficient light sources.

Keywords: thermally-activated delayed fluorescence, host material, ionization energy, charge mobility, electroluminescence

Procedia PDF Downloads 127
1069 ICanny: CNN Modulation Recognition Algorithm

Authors: Jingpeng Gao, Xinrui Mao, Zhibin Deng

Abstract:

Aiming at the low recognition rate on the composite signal modulation in low signal to noise ratio (SNR), this paper proposes a modulation recognition algorithm based on ICanny-CNN. Firstly, the radar signal is transformed into the time-frequency image by Choi-Williams Distribution (CWD). Secondly, we propose an image processing algorithm using the Guided Filter and the threshold selection method, which is combined with the hole filling and the mask operation. Finally, the shallow convolutional neural network (CNN) is combined with the idea of the depth-wise convolution (Dw Conv) and the point-wise convolution (Pw Conv). The proposed CNN is designed to complete image classification and realize modulation recognition of radar signal. The simulation results show that the proposed algorithm can reach 90.83% at 0dB and 71.52% at -8dB. Therefore, the proposed algorithm has a good classification and anti-noise performance in radar signal modulation recognition and other fields.

Keywords: modulation recognition, image processing, composite signal, improved Canny algorithm

Procedia PDF Downloads 175
1068 An Overview of the Wind and Wave Climate in the Romanian Nearshore

Authors: Liliana Rusu

Abstract:

The goal of the proposed work is to provide a more comprehensive picture of the wind and wave climate in the Romanian nearshore, using the results provided by numerical models. The Romanian coastal environment is located in the western side of the Black Sea, the more energetic part of the sea, an area with heavy maritime traffic and various offshore operations. Information about the wind and wave climate in the Romanian waters is mainly based on observations at Gloria drilling platform (70 km from the coast). As regards the waves, the measurements of the wave characteristics are not so accurate due to the method used, being also available for a limited period. For this reason, the wave simulations that cover large temporal and spatial scales represent an option to describe better the wave climate. To assess the wind climate in the target area spanning 1992–2016, data provided by the NCEP-CFSR (U.S. National Centers for Environmental Prediction - Climate Forecast System Reanalysis) and consisting in wind fields at 10m above the sea level are used. The high spatial and temporal resolution of the wind fields is good enough to represent the wind variability over the area. For the same 25-year period, as considered for the wind climate, this study characterizes the wave climate from a wave hindcast data set that uses NCEP-CFSR winds as input for a model system SWAN (Simulating WAves Nearshore) based. The wave simulation results with a two-level modelling scale have been validated against both in situ measurements and remotely sensed data. The second level of the system, with a higher resolution in the geographical space (0.02°×0.02°), is focused on the Romanian coastal environment. The main wave parameters simulated at this level are used to analyse the wave climate. The spatial distributions of the wind speed, wind direction and the mean significant wave height have been computed as the average of the total data. As resulted from the amount of data, the target area presents a generally moderate wave climate that is affected by the storm events developed in the Black Sea basin. Both wind and wave climate presents high seasonal variability. All the results are computed as maps that help to find the more dangerous areas. A local analysis has been also employed in some key locations corresponding to highly sensitive areas, as for example the main Romanian harbors.

Keywords: numerical simulations, Romanian nearshore, waves, wind

Procedia PDF Downloads 321
1067 Dimensional Accuracy of CNTs/PMMA Parts and Holes Produced by Laser Cutting

Authors: A. Karimzad Ghavidel, M. Zadshakouyan

Abstract:

Laser cutting is a very common production method for cutting 2D polymeric parts. Developing of polymer composites with nano-fibers makes important their other properties like laser workability. The aim of this research is investigation of the influence different laser cutting conditions on the dimensional accuracy of parts and holes from poly methyl methacrylate (PMMA)/carbon nanotubes (CNTs) material. Experiments were carried out by considering of CNTs (in four level 0,0.5, 1 and 1.5% wt.%), laser power (60, 80, and 100 watt) and cutting speed 20, 30, and 40 mm/s as input variable factors. The results reveal that CNTs adding improves the laser workability of PMMA and the increasing of power has a significant effect on the part and hole size. The findings also show cutting speed is effective parameter on the size accuracy. Eventually, the statistical analysis of results was done, and calculated mathematical equations by the regression are presented for determining relation between input and output factor.

Keywords: dimensional accuracy, PMMA, CNTs, laser cutting

Procedia PDF Downloads 292
1066 A Method and System for Secure Authentication Using One Time QR Code

Authors: Divyans Mahansaria

Abstract:

User authentication is an important security measure for protecting confidential data and systems. However, the vulnerability while authenticating into a system has significantly increased. Thus, necessary mechanisms must be deployed during the process of authenticating a user to safeguard him/her from the vulnerable attacks. The proposed solution implements a novel authentication mechanism to counter various forms of security breach attacks including phishing, Trojan horse, replay, key logging, Asterisk logging, shoulder surfing, brute force search and others. QR code (Quick Response Code) is a type of matrix barcode or two-dimensional barcode that can be used for storing URLs, text, images and other information. In the proposed solution, during each new authentication request, a QR code is dynamically generated and presented to the user. A piece of generic information is mapped to plurality of elements and stored within the QR code. The mapping of generic information with plurality of elements, randomizes in each new login, and thus the QR code generated for each new authentication request is for one-time use only. In order to authenticate into the system, the user needs to decode the QR code using any QR code decoding software. The QR code decoding software needs to be installed on handheld mobile devices such as smartphones, personal digital assistant (PDA), etc. On decoding the QR code, the user will be presented a mapping between the generic piece of information and plurality of elements using which the user needs to derive cipher secret information corresponding to his/her actual password. Now, in place of the actual password, the user will use this cipher secret information to authenticate into the system. The authentication terminal will receive the cipher secret information and use a validation engine that will decipher the cipher secret information. If the entered secret information is correct, the user will be provided access to the system. Usability study has been carried out on the proposed solution, and the new authentication mechanism was found to be easy to learn and adapt. Mathematical analysis of the time taken to carry out brute force attack on the proposed solution has been carried out. The result of mathematical analysis showed that the solution is almost completely resistant to brute force attack. Today’s standard methods for authentication are subject to a wide variety of software, hardware, and human attacks. The proposed scheme can be very useful in controlling the various types of authentication related attacks especially in a networked computer environment where the use of username and password for authentication is common.

Keywords: authentication, QR code, cipher / decipher text, one time password, secret information

Procedia PDF Downloads 253
1065 Pioneer Synthesis and Characterization of Boron Containing Hard Materials

Authors: Gülşah Çelik Gül, Figen Kurtuluş

Abstract:

The first laboratory synthesis of hard materials such as diamond proceeded to attack of developing materials with high hardness to compete diamond. Boron rich solids are good candidates owing to their short interatomic bond lengths and strong covalent character. Boron containing hard material was synthesized by modified-microwave method under nitrogen atmosphere by using a fuel (glycine or urea), amorphous boron and/or boric acid in appropriate molar ratio. Characterizations were done by x-ray diffraction (XRD), fourier transform infrared (FTIR) spectroscopy, scanning electron microscopy/energy dispersive analyze (SEM/EDS), thermo gravimetric/differantial thermal analysis (TG/DTA).

Keywords: boron containing materials, hard materials, microwave synthesis, powder X-ray diffraction

Procedia PDF Downloads 580
1064 A Review of Security Attacks and Intrusion Detection Schemes in Wireless Sensor Networks: A Survey

Authors: Maleh Yassine, Ezzati Abdellah

Abstract:

Wireless Sensor Networks (WSNs) are currently used in different industrial and consumer applications, such as earth monitoring, health related applications, natural disaster prevention, and many other areas. Security is one of the major aspects of wireless sensor networks due to the resource limitations of sensor nodes. However, these networks are facing several threats that affect their functioning and their life. In this paper we present security attacks in wireless sensor networks, and we focus on a review and analysis of the recent Intrusion Detection schemes in WSNs.

Keywords: wireless sensor networks, security attack, denial of service, IDS, cluster-based model, signature based IDS, hybrid IDS

Procedia PDF Downloads 363
1063 Study of Photonic Crystal Band Gap and Hexagonal Microcavity Based on Elliptical Shaped Holes

Authors: A. Benmerkhi, A. Bounouioua, M. Bouchemat, T. Bouchemat

Abstract:

In this paper, we present a numerical optical properties of a triangular periodic lattice of elliptical air holes. We report the influence of the ratio (semi-major axis length of elliptical hole to the filling ratio) on the photonic band gap. Then by using the finite difference time domain (FDTD) algorithm, the resonant wavelength of the point defect microcavities in a two-dimensional photonic crystal (PC) shifts towards the low wavelengths with significantly increased filing ratio. It can be noted that the Q factor is gradually changed to higher when the filling ratio increases. It is due to an increase in reflectivity of the PC mirror. Also we theoretically investigate the H1 cavity, where the value of semi-major axis (Rx) of the six holes surrounding the cavity are fixed at 0.5a and the Rx of the two edge air holes are fixed at the optimum value of 0.52a. The highest Q factor of 4.1359 × 106 is achieved at the resonant mode located at λ = 1.4970 µm.

Keywords: photonic crystal, microcavity, filling ratio, elliptical holes

Procedia PDF Downloads 120
1062 Identification of Information War in Lithuania

Authors: Vitalijus Leibenka

Abstract:

After 2014 the world of Russia’s actions in annexing Crimea has seen a hybrid war that has helped Russia achieve its goals. The world and NATO nations have pointed out that hybrid action can help achieve not only military but also economic and political goals. One of the weapons of action in hybrid warfare is information warfare tools, the use of which helps to carry out actions in the context of hybrid warfare as a whole. In addition, information war tools can be used alone, over time and for long-term purposes. Although forms of information war, such as propaganda and disinformation, have been used in the past, in old conflicts and wars, new forms of information war have emerged as a result of technological development, making the dissemination of information faster and more efficient. The world understands that information is becoming a weapon, but not everyone understands that both information war and information warfare differ in their essence and full content. In addition, the damage and impact of the use of information war, which may have worse consequences than a brief military conflict, is underestimated. Lithuania is also facing various interpretations of the information war. Some believe that the information attack is an information war and the understanding of the information war is limited to a false message in the press. Others, however, deepen and explain the essence of the information war. Society has formed in such a way that not all people are able to assess the threats of information war, to separate information war from information attack. Recently, the Lithuanian government has been taking measures in the context of the information war, making decisions that allow the development of the activities of the state and state institutions in order to create defense mechanisms in the information war. However, this is happening rather slowly and incompletely. Every military conflict, related to Lithuania in one way or another, forces Lithuanian politicians to take up the theme of information warfare again. As a result, a national cyber security center is being set up, and Russian channels spreading lies are banned. However, there is no consistent development and continuous improvement of action against information threats. Although a sufficiently influential part of society (not a political part) helps to stop the spread of obscure information by creating social projects such as “Demaskuok” and “Laikykis ten su Andriumi tapinu”, it goes without saying that it will not become a key tool in the fight against information threats. Therefore, in order to achieve clean dissemination of information in Lithuania, full-fledged and substantial political decisions are necessary, the adoption of which would change the public perception of the information war, its damage, impact and actions that would allow to combat the spread. Political decisions should cover the educational, military, economic and political areas, which are one of the main and most important in the state, which would allow to fundamentally change the situation against the background of information war.

Keywords: information war, information warfare, hybrid war, hybrid warfare, NATO, Lithuania, Russia

Procedia PDF Downloads 46
1061 Parameter Selection and Monitoring for Water-Powered Percussive Drilling in Green-Fields Mineral Exploration

Authors: S. J. Addinell, T. Richard, B. Evans

Abstract:

The Deep Exploration Technologies Cooperative Research Centre (DET CRC) is researching and developing a new coiled tubing based greenfields mineral exploration drilling system utilising downhole water powered percussive drill tooling. This new drilling system is aimed at significantly reducing the costs associated with identifying mineral resource deposits beneath deep, barron cover. This system has shown superior rates of penetration in water-rich hard rock formations at depths exceeding 500 meters. Several key challenges exist regarding the deployment and use of these bottom hole assemblies for mineral exploration, and this paper discusses some of the key technical challenges. This paper presents experimental results obtained from the research program during laboratory and field testing of the prototype drilling system. A study of the morphological aspects of the cuttings generated during the percussive drilling process is presented and shows a strong power law relationship for particle size distributions. Several percussive drilling parameters such as RPM, applied fluid pressure and weight on bit have been shown to influence the particle size distributions of the cuttings generated. This has direct influence on other drilling parameters such as flow loop performance, cuttings dewatering, and solids control. Real-time, accurate knowledge of percussive system operating parameters will assist the driller in maximising the efficiency of the drilling process. The applied fluid flow, fluid pressure, and rock properties are known to influence the natural oscillating frequency of the percussive hammer, but this paper also shows that drill bit design, drill bit wear and the applied weight on bit can also influence the oscillation frequency. Due to the changing drilling conditions and therefore changing operating parameters, real-time understanding of the natural operating frequency is paramount to achieving system optimisation. Several techniques to understand the oscillating frequency have been investigated and presented. With a conventional top drive drilling rig, spectral analysis of applied fluid pressure, hydraulic feed force pressure, hold back pressure and drill string vibrations have shown the presence of the operating frequency of the bottom hole tooling. Unfortunately, however, with the implementation of a coiled tubing drilling rig, implementing a positive displacement downhole motor to provide drill bit rotation, these signals are not available for interrogation at the surface and therefore another method must be considered. The investigation and analysis of ground vibrations using geophone sensors, similar to seismic-while-drilling techniques have indicated the presence of the natural oscillating frequency of the percussive hammer. This method is shown to provide a robust technique for the determination of the downhole percussive oscillation frequency when used with a coiled tubing drill rig.

Keywords: cuttings characterization, drilling optimization, oscillation frequency, percussive drilling, spectral analysis

Procedia PDF Downloads 218
1060 Use of Hierarchical Temporal Memory Algorithm in Heart Attack Detection

Authors: Tesnim Charrad, Kaouther Nouira, Ahmed Ferchichi

Abstract:

In order to reduce the number of deaths due to heart problems, we propose the use of Hierarchical Temporal Memory Algorithm (HTM) which is a real time anomaly detection algorithm. HTM is a cortical learning algorithm based on neocortex used for anomaly detection. In other words, it is based on a conceptual theory of how the human brain can work. It is powerful in predicting unusual patterns, anomaly detection and classification. In this paper, HTM have been implemented and tested on ECG datasets in order to detect cardiac anomalies. Experiments showed good performance in terms of specificity, sensitivity and execution time.

Keywords: cardiac anomalies, ECG, HTM, real time anomaly detection

Procedia PDF Downloads 205
1059 Methods for Mitigating Corrosion Caused by Biogenic Sulfuric Acid in Sewerage Systems: State of the Art Review

Authors: M. Cortés, E. Vera, M. Avella

Abstract:

Corrosion is an imminent process in nature, which affects all types of materials. In sewerage systems, the corrosion process caused by microorganisms, also known as biogenic sulfuric acid attack, has been studied. This affects the structural integrity of the concrete drainage pipes and the sewage treatment plants. This article is a review of research which focuses on the study of how to reduce the production of hydrogen sulfide, how to improve the resistance of concrete through the use of additives and the implementation of antimicrobial techniques to reduce bacterial growth.

Keywords: bactericides, biogenic sulfuric acid, corrosion, concrete, hydrogen sulphide, nano materials, zeolites

Procedia PDF Downloads 427
1058 Spin-Dipole Excitations Produced On-Demand in the Fermi Sea

Authors: Mykhailo Moskalets, Pablo Burset, Benjamin Roussel, Christian Flindt

Abstract:

The single-particle injection from the Andreev level and how such injection is simulated using a voltage pulse are discussed. Recently, high-speed quantum-coherent electron sources injecting one- to few-particle excitations into the Fermi sea have been experimentally realized. The main obstacle to using these excitations as flying qubits for quantum-information processing purposes is decoherence due to the long-range Coulomb interaction. An obvious way to get around this difficulty is to employ electrically neutral excitations. Here it is discussed how such excitations can be generated on-demand using the same injection principles as in existing electron sources. Namely, with the help of a voltage pulse of a certain shape applied to the Fermi sea or using a driven quantum dot with superconducting correlations. The advantage of the latter approach is the possibility of varying the electron-hole content in the excitation and the possibility of creating a charge-neutral but spin-dipole excitation.

Keywords: Andreev level, on-demand, single-electron, spin-dipole

Procedia PDF Downloads 71
1057 Phone Number Spoofing Attack in VoLTE 4G

Authors: Joo-Hyung Oh

Abstract:

The number of service users of 4G VoLTE (voice over LTE) using LTE data networks is rapidly growing. VoLTE based on all-IP network enables clearer and higher-quality voice calls than 3G. It does, however, pose new challenges; a voice call through IP networks makes it vulnerable to security threats such as wiretapping and forged or falsified information. And in particular, stealing other users’ phone numbers and forging or falsifying call request messages from outgoing voice calls within VoLTE result in considerable losses that include user billing and voice phishing to acquaintances. This paper focuses on the threats of caller phone number spoofing in the VoLTE and countermeasure technology as safety measures for mobile communication networks.

Keywords: LTE, 4G, VoLTE, phone number spoofing

Procedia PDF Downloads 414
1056 A Robust Hybrid Blind Digital Image Watermarking System Using Discrete Wavelet Transform and Contourlet Transform

Authors: Nidal F. Shilbayeh, Belal AbuHaija, Zainab N. Al-Qudsy

Abstract:

In this paper, a hybrid blind digital watermarking system using Discrete Wavelet Transform (DWT) and Contourlet Transform (CT) has been implemented and tested. The implemented combined digital watermarking system has been tested against five common types of image attacks. The performance evaluation shows improved results in terms of imperceptibility, robustness, and high tolerance against these attacks; accordingly, the system is very effective and applicable.

Keywords: discrete wavelet transform (DWT), contourlet transform (CT), digital image watermarking, copyright protection, geometric attack

Procedia PDF Downloads 377
1055 Multiscale Modelling of Citrus Black Spot Transmission Dynamics along the Pre-Harvest Supply Chain

Authors: Muleya Nqobile, Winston Garira

Abstract:

We presented a compartmental deterministic multi-scale model which encompass internal plant defensive mechanism and pathogen interaction, then we consider nesting the model into the epidemiological model. The objective was to improve our understanding of the transmission dynamics of within host and between host of Guignardia citricapa Kiely. The inflow of infected class was scaled down to individual level while the outflow was scaled up to average population level. Conceptual model and mathematical model were constructed to display a theoretical framework which can be used for predicting or identify disease pattern.

Keywords: epidemiological model, mathematical modelling, multi-scale modelling, immunological model

Procedia PDF Downloads 438
1054 Long Wavelength GaInNAs Based Hot Electron Light Emission VCSOAs

Authors: Faten Adel Ismael Chaqmaqchee

Abstract:

Optical, electrical and optical-electrical characterisations of surface light emitting VCSOAs devices are reported. The hot electron light emitting and lasing in semiconductor hetero-structure vertical cavity semiconductor optical amplifier (HELLISH VCSOA) device is a surface emitter based on longitudinal injection of electron and hole pairs in their respective channels. Ga0.35In0.65N0.02As0.08/GaAs was used as an active material for operation in the 1.3 μm window of the optical communications. The device has undoped Distributed Bragg Reflectors (DBRs) and the current is injected longitudinally, directly into the active layers and does not involve DBRs. Therefore, problems associated with refractive index contrast and current injection through the DBR layers, which are common with the doped DBRs in conventional VCSOAs, are avoided. The highest gain of around 4 dB is obtained for the 1300 nm wavelength operation.

Keywords: HELLISH, VCSOA, GaInNAs, luminescence, gain

Procedia PDF Downloads 348
1053 Reservoir Properties Effect on Estimating Initial Gas in Place Using Flowing Material Balance Method

Authors: Yousef S. Kh. S. Hashem

Abstract:

Accurate estimation of initial gas in place (IGIP) plays an important factor in the decision to develop a gas field. One of the methods that are available in the industry to estimate the IGIP is material balance. This method required that the well has to be shut-in while pressure is measured as it builds to average reservoir pressure. Since gas demand is high and shut-in well surveys are very expensive, flowing gas material balance (FGMB) is sometimes used instead of material balance. This work investigated the effect of reservoir properties (pressure, permeability, and reservoir size) on the estimation of IGIP when using FGMB. A gas reservoir simulator that accounts for friction loss, wellbore storage, and the non-Darcy effect was used to simulate 165 different possible causes (3 pressures, 5 reservoir sizes, and 11 permeabilities). Both tubing pressure and bottom-hole pressure were analyzed using FGMB. The results showed that the FGMB method is very sensitive for tied reservoirs (k < 10). Also, it showed which method is best to be used for different reservoir properties. This study can be used as a guideline for the application of the FGMB method.

Keywords: flowing material balance, gas reservoir, reserves, gas simulator

Procedia PDF Downloads 139
1052 Effect of Different Diesel Fuels on Formation of the Cavitation Phenomena

Authors: Mohammadreza Nezamirad, Sepideh Amirahmadian, Nasim Sabetpour, Azadeh Yazdi, Amirmasoud Hamedi

Abstract:

Cavitation inside the diesel injector nozzle is investigated numerically in this study. Reynolds Stress Navier Stokes set of equations (RANS) are utilized to investigate flow behavior inside the nozzle numerically. Moreover, K-ε turbulent model is found to be a better approach comparing to K-ω turbulent model. Winklhofer rectangular shape nozzle is also simulated in order to verify the current numerical scheme, and with, mass flow rate approach, the current solution is verified. Afterward, a six-hole real-size nozzle was simulated, and it was found that among different fuels used in this study with the same condition, diesel fuel provides the largest length of cavitation. Also, it was found that at the same boundary condition, RME fuel leads to the highest value of discharge coefficient and mass flow rate.

Keywords: cavitation, diesel fuel, CFD, real size nozzle, discharge coefficient

Procedia PDF Downloads 137
1051 Multi-Response Optimization of EDM for Ti-6Al-4V Using Taguchi-Grey Relational Analysis

Authors: Ritesh Joshi, Kishan Fuse, Gopal Zinzala, Nishit Nirmal

Abstract:

Ti-6Al-4V is a titanium alloy having high strength, low weight and corrosion resistant which is a required characteristic for a material to be used in aerospace industry. Titanium, being a hard alloy is difficult to the machine via conventional methods, so it is a call to use non-conventional processes. In present work, the effects on Ti-6Al-4V by drilling a hole of Ø 6 mm using copper (99%) electrode in Electric Discharge Machining (EDM) process is analyzed. Effect of various input parameters like peak current, pulse-on time and pulse-off time on output parameters viz material removal rate (MRR) and electrode wear rate (EWR) is studied. Multi-objective optimization technique Grey relational analysis is used for process optimization. Experiments are designed using an L9 orthogonal array. ANOVA is used for finding most contributing parameter followed by confirmation tests for validating the results. Improvement of 7.45% in gray relational grade is observed.

Keywords: ANOVA, electric discharge machining, grey relational analysis, Ti-6Al-4V

Procedia PDF Downloads 349
1050 Cryptosystems in Asymmetric Cryptography for Securing Data on Cloud at Various Critical Levels

Authors: Sartaj Singh, Amar Singh, Ashok Sharma, Sandeep Kaur

Abstract:

With upcoming threats in a digital world, we need to work continuously in the area of security in all aspects, from hardware to software as well as data modelling. The rise in social media activities and hunger for data by various entities leads to cybercrime and more attack on the privacy and security of persons. Cryptography has always been employed to avoid access to important data by using many processes. Symmetric key and asymmetric key cryptography have been used for keeping data secrets at rest as well in transmission mode. Various cryptosystems have evolved from time to time to make the data more secure. In this research article, we are studying various cryptosystems in asymmetric cryptography and their application with usefulness, and much emphasis is given to Elliptic curve cryptography involving algebraic mathematics.

Keywords: cryptography, symmetric key cryptography, asymmetric key cryptography

Procedia PDF Downloads 101
1049 Phone Number Spoofing Attack in VoLTE

Authors: Joo-Hyung Oh, Sekwon Kim, Myoungsun Noh, Chaetae Im

Abstract:

The number of service users of 4G VoLTE (voice over LTE) using LTE data networks is rapidly growing. VoLTE based on All-IP network enables clearer and higher-quality voice calls than 3G. It does, however, pose new challenges; a voice call through IP networks makes it vulnerable to security threats such as wiretapping and forged or falsified information. Moreover, in particular, stealing other users’ phone numbers and forging or falsifying call request messages from outgoing voice calls within VoLTE result in considerable losses that include user billing and voice phishing to acquaintances. This paper focuses on the threats of caller phone number spoofing in the VoLTE and countermeasure technology as safety measures for mobile communication networks.

Keywords: LTE, 4G, VoLTE, phone number spoofing

Procedia PDF Downloads 505
1048 Bionomics of Cryptophlebia Ombrodelta Lower (Lepidoptera: Tortricidae), a Major Pest of Tamarind, Tamarindus Indica in Bastar Tribal Belt of Chhattisgarh, India

Authors: R. K. Patel

Abstract:

The experiment entitled “Bionomics of Cryptophlebia ombrodelta Lower (Lepidoptera: Tortricidae), a Major Pest of Tamarind, Tamarindus indica in Bastar tribal belt of Chhattisgarh” was conducted at S. G. College of Agriculture and Research Station, Jagdalpur (Chhattisgarh) during 2014-15. The moth, Cryptophlebia ombrodelta (Lower) is very destructive pest to tamarind, Tamarindus indica. The mature larva is pinkish in colour whereas, the moth is generally grayish in colour and it lays pale yellowish - white, flat and round eggs near the peduncle joint of pod (fruit) or on the pod surface. The newly hatched larva enters into the fruit by making hole packed with excreta. It completes three to four generation in a year and can cause fourty two per cent loss to tamarind fruits. The morphological details of this pest were studied.

Keywords: bionomics, Cryptophlebia ombrodelta, loss, pest, Tamarind, Tamarindus indica

Procedia PDF Downloads 284
1047 Improving Inelastic Capacity of Cold-Formed Steel Beams Using Slotted Blotted Connection

Authors: Marzie Shahini, Alireza Bagheri Sabbagh, Rasoul Mirghaderi, Paul C. Davidson

Abstract:

The focus of this paper is to incorporating the slotted bolted connection into the cold-formed steel (CFS) beams with aim of increasing inelastic bending capacity through bolt slip. An extensive finite element analysis was conducted on the through plate CFS bolted connections which are equipped with the slotted hole. The studied parameters in this paper included the following: CFS beam section geometry, the value of slip force, CFS beam thickness. The numerical results indicate that CFS slotted bolted connection exhibit higher inelastic capacity in terms of ductility compare to connection with standards holes. Moreover, the effect of slip force was analysed by comparing the moment-rotation curves of different models with different slip force value. As a result, as the slip force became lower, there was a tendency for the plastic strain to extend from the CFS member to the connection region.

Keywords: slip-critical bolted connection, inelastic capacity, slotted holes, cold-formed steel, bolt slippage, slip force

Procedia PDF Downloads 416
1046 Understanding the Accumulation of Microplastics in Riverbeds and Soils

Authors: Gopala Krishna Darbha

Abstract:

Microplastics (MPs) are secondary fragments of large-sized plastic debris released into the environment and fall in the size range of less than 5 mm. Though reports indicate the abundance of MPs in both riverine and soil environments, their fate is still not completely understood due to the complexity of natural conditions. Mineral particles are ubiquitous in the rivers and may play a vital role in accumulating MPs to the riverbed, thus affecting the benthic life and posing a threat to the river's health. Apart, the chemistry (pH, ionic strength, humics) at the interface can be very prominent. The MPs can also act as potential vectors to transport other contaminants in the environment causing secondary water pollution. The present study focuses on understanding the interaction of MPs with weathering sequence of minerals (feldspar, kaolinite and gibbsite) under batch mode under relevant environmental and natural conditions. Simultaneously, we performed stability studies and transport (column) experiments to understand the mobility of MPs under varying soil solutions (SS) chemistry and the influence of contaminants (CuO nanoparticles). Results showed that the charge and morphology of the gibbsite played an significant role in sorption of NPs (108.1 mg/g) compared to feldspar (7.7 mg/g) and kaolinite (11.9 mg/g). The Fourier transform infrared spectroscopy data supports the complexation of NPs with gibbsite particles via hydrogen bonding. In case of feldspar and kaolinite, a weak interaction with NPs was observed which can be due to electrostatic repulsions and low surface area to volume ration of the mineral particles. The study highlights the enhanced mobility in presence of feldspar and kaolinite while gibbsite rich zones can cause entrapment of NPs accumulating in the riverbeds. In the case of soils, in the absence of MPs, a very high aggregation of CuO NPs observed in SS extracted from black, lateritic, and red soils, which can be correlated with ionic strength (IS) and type of ionic species. The sedimentation rate (Ksed(1/h)) for CuO NPs was >0.5 h−1 in the case of these SS. Interestingly, the stability and sedimentation behavior of CuO NPs varied significantly in the presence of MPs. The Ksed for CuO NPs decreased to half and found <0.25 h−1 in the presence of MPs in all SS. C/C0 values in breakthrough curves increased drastically (black < alluvial < laterite < red) in the presence of MPs. Results suggest that the release of MPs in the terrestrial ecosystem is a potential threat leading to increased mobility of metal nanoparticles in the environment.

Keywords: microplastics, minerals, sorption, soils

Procedia PDF Downloads 76
1045 Climate Change, Global Warming and Future of Our Planet

Authors: Indu Gupta

Abstract:

Climate change and global warming is most burning issue for “our common future”. For this common global interest. Countries organize conferences of government and nongovernment type. Human being destroying the non-renewable resources and polluting the renewable resources of planet for economic growth. Air pollution is mainly responsible for global warming and climate change .Due to global warming ice glaciers are shrinking and melting. Forests are shrinking, deserts expanding and soil eroding. The depletion of stratospheric ozone layer is depleting and hole in ozone layer that protect us from harmful ultra violet radiation. Extreme high temperature in summer and extreme low temperature and smog in winters, floods in rainy season. These all are indication of climate change. The level of carbon dioxide and other heat trapping gases in the atmosphere is increasing at high speed. Nation’s are worried about environmental degradation.

Keywords: environmental degradation, global warming, soil eroding, ultra-Violate radiation

Procedia PDF Downloads 356
1044 Experimental and Characterization Studies on Micro Direct Methanol Fuel Cell

Authors: S. Muthuraja Soundrapandian, C.K. Subramaniam

Abstract:

A micro Direct Methanol Fuel Cell (DMFC) of 1 cm2 active area with selective sensor materials to sense methanol for redox, has been developed. Among different Pt alloys, Pt-Sn/C was able to produce high current density and repeatability. Membrane Elecctrode Assembly (MEA) of anode catalyst Pt-Sn/C was prepared with nafion as active membrane and Pt black as cathode catalyst. The sensor’s maximum ability to detect the trace levels of methanol in ppm has been analyzed. A compact sensor set up has also been made and the characterization studies were carried out. The acceptable value of current density was derived by the cell and the results are able to fulfill the needs of DMFC technology for the practical applications.

Keywords: DMFC, sensor, MEA, Pt-Sn

Procedia PDF Downloads 121