Search results for: salt and peppers attacks
612 The Effect of Salinity and Bentonite on the Hydrous Behaviors and Sodium Content of the Broad Bean Vicia faba var. Semilla violeta
Authors: T. Nouri, Y. H. A. Reguieg, A. Latigui, A. Ouaini
Abstract:
Salinity is considered as the most important abiotic factor. It limits growth and productivity of plants and degrades agricultural soils and ecosystem in arid and semi arid area. The study was conducted on Vicia faba L.’Semilla violeta’. Sowing was realized in plastic pots containing sandy substrates of bentonite 0, 3, 5, 7, and 10% associated with abiotic stresses of salinity corresponding to doses of NaCl, MgCl2 and MgSO4 20, 40, and 60 mmol/l respectively. The purpose of this work is to study the combined effect of salinity and of bentonite on a plant commonly cultivated in Algeria the broad bean Vicia faba has through the chemical and hydrous parameter. The results show that the combined action of strong concentration salt (40 and 60 mmol/l) and of bentonite a reduction of the relative content water reveals, against an increase in the content of hydrous deficit and of sodium. The growth of broad bean is significant in the substrate amended to 5 % of bentonite.Keywords: salinity, bentonite, Vicia faba L, sodium content, hydrous parameters
Procedia PDF Downloads 367611 A Distinct Reversed-Phase High-Performance Liquid Chromatography Method for Simultaneous Quantification of Evogliptin Tartrate and Metformin HCl in Pharmaceutical Dosage Forms
Authors: Rajeshkumar Kanubhai Patel, Neha Sudhirkumar Mochi
Abstract:
A simple and accurate stability-indicating, reversed-phase high-performance liquid chromatography (RP-HPLC) method was developed and validated for the simultaneous quantitation of Evogliptin tartrate and Metformin HCl in pharmaceutical dosage forms, following ICH guidelines. Forced degradation was performed under various stress conditions including acid, base, oxidation, thermal, and photodegradation. The method utilized an Eclipse C18 column (250 mm × 4.6 mm, 5 µm) with a mobile phase of 5 mM 1-hexane sulfonic acid sodium salt in water and 0.2% v/v TEA (45:55 %v/v), adjusted to pH 3.0 with OPA, at a flow rate of 1.0 mL/min. Detection at 254.4 nm using a PDA detector showed good resolution of degradation products and both drugs. Linearity was observed within 1-5 µg/mL for Evogliptin tartrate and 100-500 µg/mL for Metformin HCl, with % recovery between 99-100% and precision within acceptable limits (%RSD < 2%). The method proved to be specific, precise, accurate, and robust for routine analysis of these drugs.Keywords: stability indicating RP-HPLC, evogliptin tartrate, metformin HCl, validation
Procedia PDF Downloads 24610 Proactive WPA/WPA2 Security Using DD-WRT Firmware
Authors: Mustafa Kamoona, Mohamed El-Sharkawy
Abstract:
Although the latest Wireless Local Area Network technology Wi-Fi 802.11i standard addresses many of the security weaknesses of the antecedent Wired Equivalent Privacy (WEP) protocol, there are still scenarios where the network security are still vulnerable. The first security model that 802.11i offers is the Personal model which is very cheap and simple to install and maintain, yet it uses a Pre Shared Key (PSK) and thus has a low to medium security level. The second model that 802.11i provide is the Enterprise model which is highly secured but much more expensive and difficult to install/maintain and requires the installation and maintenance of an authentication server that will handle the authentication and key management for the wireless network. A central issue with the personal model is that the PSK needs to be shared with all the devices that are connected to the specific Wi-Fi network. This pre-shared key, unless changed regularly, can be cracked using offline dictionary attacks within a matter of hours. The key is burdensome to change in all the connected devices manually unless there is some kind of algorithm that coordinate this PSK update. The key idea of this paper is to propose a new algorithm that proactively and effectively coordinates the pre-shared key generation, management, and distribution in the cheap WPA/WPA2 personal security model using only a DD-WRT router.Keywords: Wi-Fi, WPS, TLS, DD-WRT
Procedia PDF Downloads 233609 Dynamical Analysis of the Fractional-Order Mathematical Model of Hashimoto’s Thyroiditis
Authors: Neelam Singha
Abstract:
The present work intends to analyze the system dynamics of Hashimoto’s thyroiditis with the assistance of fractional calculus. Hashimoto’s thyroiditis or chronic lymphocytic thyroiditis is an autoimmune disorder in which the immune system attacks the thyroid gland, which gradually results in interrupting the normal thyroid operation. Consequently, the feedback control of the system gets disrupted due to thyroid follicle cell lysis. And, the patient perceives life-threatening clinical conditions like goiter, hyperactivity, euthyroidism, hyperthyroidism, etc. In this work, we aim to obtain the approximate solution to the posed fractional-order problem describing Hashimoto’s thyroiditis. We employ the Adomian decomposition method to solve the system of fractional-order differential equations, and the solutions obtained shall be useful to provide information about the effect of medical care. The numerical technique is executed in an organized manner to furnish the associated details of the progression of the disease and to visualize it graphically with suitable plots.Keywords: adomian decomposition method, fractional derivatives, Hashimoto's thyroiditis, mathematical modeling
Procedia PDF Downloads 211608 Violence against Women: Exploring Discursive Resistance in the Frames of Gender Violence in South Africa
Authors: Kunle Oparinde, Rachel Matteau-Matsha, Felix Awung
Abstract:
In recent times, the issue of gender-based violence against women in South Africa is prevalent in headlines due to the high rate of attacks directed towards women. Ranging from teenagers to adults, women are continuously targeted indiscriminately in what is seemingly becoming a prolonged cycle in the country. To this end, human rights activists, organisations, and political leaders have managed to somewhat verbally condemn the atrocious acts. Further, interested people in South Africa, through walks and protests, have continued to speak against the swinging violence against women in the country. The thrust in this study is to explore and analyse how discourse (language) has been employed as a resounding voice against gender violence in the country. Through a purposive sampling of materials employed during walks and protests, collected from online sources, we examine how language is being used to combat and confront the issue of gender violence viz-a-viz how it continues to serve as a crucial tool in repelling gender violence.Keywords: gender, violence, language, discourse, resistance
Procedia PDF Downloads 134607 In-Situ Reactive Growth of Silver Nanoparticles on Cotton Textile for Antiviral and Electromagnetic Shielding Applications
Authors: Hamed Mohammadi Mofarah, Mutalifu Abulikemu, Ghassan E. Jabbour
Abstract:
Personal protective equipment (PPE) is finding increasing interest in incorporating silver nanoparticles (NPs) for various applications including microbial disinfection and shielding against electromagnetic waves. In this venue, we present an in situ reactive coating approach where silver nanoparticles are self-assembled on the surface of cotton yarn. The impacts of a variety of experimental parameters on the average size of the synthesized silver NPs were investigated. These include vacuum conditions, the concentration of the silver salt solution and reducer, temperature, and curing time. Silver NPs with an average size ranging from 10 to 50 nanometers were self-assembled as a result of careful regulation of such reaction conditions. The disinfection efficacy against the COVID surrogate virus of the functional textile reached a rate of 99.99%. On the other hand, the silver NPs decorated textile demonstrated an electromagnetic shielding ranging from 31 dB to 45 dB were achieved for the frequency range 8.2-12.4 GHz.Keywords: antiviral, COVID, electromagnetic shielding, in-situ reactive coating, SARS CoV 2, silver nanoparticles, smart textile
Procedia PDF Downloads 99606 Botnet Detection with ML Techniques by Using the BoT-IoT Dataset
Authors: Adnan Baig, Ishteeaq Naeem, Saad Mansoor
Abstract:
The Internet of Things (IoT) gadgets have advanced quickly in recent years, and their use is steadily rising daily. However, cyber-attackers can target these gadgets due to their distributed nature. Additionally, many IoT devices have significant security flaws in their implementation and design, making them vulnerable to security threats. Hence, these threats can cause important data security and privacy loss from a single attack on network devices or systems. Botnets are a significant security risk that can harm the IoT network; hence, sophisticated techniques are required to mitigate the risk. This work uses a machine learning-based method to identify IoT orchestrated by botnets. The proposed technique identifies the net attack by distinguishing between legitimate and malicious traffic. This article proposes a hyperparameter tuning model to improvise the method to improve the accuracy of existing processes. The results demonstrated an improved and more accurate indication of botnet-based cyber-attacks.Keywords: Internet of Things, Botnet, BoT-IoT dataset, ML techniques
Procedia PDF Downloads 11605 Investigating the Role of Clam Festival for Destination Branding: A Case Study of Tainan Cigu
Authors: Lim Lie Pin, Lin Hui Wen
Abstract:
Rural tourism has become popular in Taiwan, the villages based on agriculture including fishery have to follow the trend to develop the local economy and achieve the sustainable development of the rural areas. Through cultural festivals, the tourist could experience the benefit while promoting and stimulating the local development of rural tourism. Cigu is famous for salt history and abundant natural resources, such as lagoon, black-faced spoonbills and other fishery products. Digging clam has become the most special parent-child activities in Tainan and increasing awareness since it was initiated. Therefore, festival organizers and regional destination marketers need to identify visitors’ experiences attributes which lead to opportunities for industry professionals, community involvement to plan and organize regional festivals and their programmes for effective destination branding finding out more potential rural resources encouraging the local industry growth and sustainable development.Keywords: rural tourism, cultural festival, destination branding, tourist experience, sustainable development
Procedia PDF Downloads 304604 Management of the Asthma Crisis in the Unit of Intensive Care of the General Hospital of Reference of Kinshasa
Authors: Eddy K. Mukadi
Abstract:
The aim of this study was to provide contributing elements to improve the management of the asthma crisis in the intensive care unit of the General Reference Hospital of Kinshasa. This was a descriptive study of all patients in the intensive care unit presenting with the asthma attack during the period from February 5, 2013 to February 5, 2014. The main data were obtained from consultation registry and medical records. A total of 35 patients, 21 of whom were male (majority) compared to 14 female. Average age of patients was 46.48 plus or minus 16.98 with extremes ranging from 21-75 years. The clinic was dominated by dyspnea in 100% of cases, followed by rales with 91.4% of cases. In spite of the control of the crisis obtained after the treatment with B2 mimetic by inhalation was introduced A 91.5%; 88% corticosteroids; 80% oxygen, the therapeutic principle recommended for the management of asthma attacks was not respected in the majority of cases. This is why we suggest that improving the quality of care to be administered to patients will yield more adequate results.Keywords: asthma crisis, intensive care, general hospital, Kinshasa
Procedia PDF Downloads 232603 Use of Remote Sensing for Seasonal and Temporal Monitoring in Wetlands: A Case Study of Akyatan Lagoon
Authors: A. Cilek, S. Berberoglu, A. Akin Tanriover, C. Donmez
Abstract:
Wetlands are the areas which have important effects and functions on protecting human life, adjust to nature, and biological variety, besides being potential exploitation sources. Observing the changes in these sensitive areas is important to study for data collecting and correct planning for the future. Remote sensing and Geographic Information System are being increasingly used for environmental studies such as biotope mapping and habitat monitoring. Akyatan Lagoon, one of the most important wetlands in Turkey, has been facing serious threats from agricultural applications in recent years. In this study, seasonal and temporal monitoring in wetlands system are determined by using remotely sensed data and Geographic Information Systems (GIS) between 1985 and 2015. The research method is based on classifying and mapping biotopes in the study area. The natural biotope types were determined as coastal sand dunes, salt marshes, river beds, coastal woods, lakes, lagoons.Keywords: biotope mapping, GIS, remote sensing, wetlands
Procedia PDF Downloads 393602 Detection Method of Federated Learning Backdoor Based on Weighted K-Medoids
Authors: Xun Li, Haojie Wang
Abstract:
Federated learning is a kind of distributed training and centralized training mode, which is of great value in the protection of user privacy. In order to solve the problem that the model is vulnerable to backdoor attacks in federated learning, a backdoor attack detection method based on a weighted k-medoids algorithm is proposed. First of all, this paper collates the update parameters of the client to construct a vector group, then uses the principal components analysis (PCA) algorithm to extract the corresponding feature information from the vector group, and finally uses the improved k-medoids clustering algorithm to identify the normal and backdoor update parameters. In this paper, the backdoor is implanted in the federation learning model through the model replacement attack method in the simulation experiment, and the update parameters from the attacker are effectively detected and removed by the defense method proposed in this paper.Keywords: federated learning, backdoor attack, PCA, k-medoids, backdoor defense
Procedia PDF Downloads 114601 VCloud: A Security Framework for VANET
Authors: Wiseborn Manfe Danquah, D. Turgay Altilar
Abstract:
Vehicular Ad-hoc Network (VANET) is an integral component of Intelligent Transport Systems (ITS) that has enjoyed a lot of attention from the research community and the automotive industry. This is mainly due to the opportunities and challenges it presents. Vehicular Ad-hoc Network being a class of Mobile Ad-hoc Networks (MANET) has all the security concerns existing in traditional MANET as well as new security and privacy concerns introduced by the unique vehicular communication environment. This paper provides a survey of the possible attacks in vehicular environment, as well as security and privacy concerns in VANET. It also provides an insight into the development of a comprehensive cloud framework to provide a more robust and secured communication among vehicular nodes and road side units. Our proposal, a Metropolitan Based Public Interconnected Vehicular Cloud (MIVC) infrastructure seeks to provide a more reliable and secured vehicular communication network.Keywords: mobile Ad-hoc networks, vehicular ad hoc network, cloud, ITS, road side units (RSU), metropolitan interconnected vehicular cloud (MIVC)
Procedia PDF Downloads 354600 An Efficient Mitigation Plan to Encounter Various Vulnerabilities in Internet of Things Enterprises
Authors: Umesh Kumar Singh, Abhishek Raghuvanshi, Suyash Kumar Singh
Abstract:
As IoT networks gain popularity, they are more susceptible to security breaches. As a result, it is crucial to analyze the IoT platform as a whole from the standpoint of core security concepts. The Internet of Things relies heavily on wireless networks, which are well-known for being susceptible to a wide variety of attacks. This article provides an analysis of many techniques that may be used to identify vulnerabilities in the software and hardware associated with the Internet of Things (IoT). In the current investigation, an experimental setup is built with the assistance of server computers, client PCs, Internet of Things development boards, sensors, and cloud subscriptions. Through the use of network host scanning methods and vulnerability scanning tools, raw data relating to IoT-based applications and devices may be collected. Shodan is a tool that is used for scanning, and it is also used for effective vulnerability discovery in IoT devices as well as penetration testing. This article presents an efficient mitigation plan for encountering vulnerabilities in the Internet of Things.Keywords: internet of things, security, privacy, vulnerability identification, mitigation plan
Procedia PDF Downloads 40599 Domestic and Foreign Terrorism: Evaluation of the Breeding Ground
Authors: T. K. Hung
Abstract:
Terrorism acts have occurred across both developed and developing states, with well-identified motivation and causes. For many years, terrorism eradication has become a major topic yet only passive actions were taken in response to acts. The linkage between the location of terrorism occurrence and breeding ground is not well-documented, resulting in the passive approach used in counter-terrorism nowadays. The evaluation investigates all post-9/11 terrorism affairs considering their state capacity, safety, ease of border access control, religion diversity, and technology access, to measure the level of breeding ground of the states. Those "weak" states with poor border access control, resources capacity and domestic safety are the best breeding ground for terrorists. Although many attacks were caused by religious motivation, religion diversity does not predict the breeding ground. States with censored technology access, particular computer-mediated communication, predict on the terrorism breeding ground, moderated by the level of breeding ground of neighboring states.Keywords: counter-terrorism, lethality, security, terrorism
Procedia PDF Downloads 340598 A Robust Digital Image Watermarking Against Geometrical Attack Based on Hybrid Scheme
Authors: M. Samadzadeh Mahabadi, J. Shanbehzadeh
Abstract:
This paper presents a hybrid digital image-watermarking scheme, which is robust against varieties of attacks and geometric distortions. The image content is represented by important feature points obtained by an image-texture-based adaptive Harris corner detector. These feature points are extracted from LL2 of 2-D discrete wavelet transform which are obtained by using the Harris-Laplacian detector. We calculate the Fourier transform of circular regions around these points. The amplitude of this transform is rotation invariant. The experimental results demonstrate the robustness of the proposed method against the geometric distortions and various common image processing operations such as JPEG compression, colour reduction, Gaussian filtering, median filtering, and rotation.Keywords: digital watermarking, geometric distortions, geometrical attack, Harris Laplace, important feature points, rotation, scale invariant feature
Procedia PDF Downloads 501597 Algal Mat Shift to Marsh Domain in Sandy and Muddy Tidal Flat: Examples the Gulf of Gabes, SE Tunisia
Authors: Maher Gzam, Noureddine Elmejdoub, Younes Jedoui
Abstract:
Physical parameters involved in the depositional process on stromatolites, which grow in salt marsh domain, are elucidated in this study. Stromatolites start to grow where surface altimetry of the intertidal flat is high enough to reduce water cover (above mean high tide) and to guarantee a lamellar stream flow. Stromatolite aggrades as a thick laminated layer (stromatolite package) allowing pioneer vascular plants (Salicornia Arabica) to colonize this elevated area (6 cm a.m.s.l). In turn halophytic plant, regularly flooded on spring tide, reduce hydrodynamics velocities causing deposition of sediment, as a result, intertidal zone shift on the flat surface with an expanded marsh domain. This positive feedback invokes self organization between stromatolite growth, vegetation proliferation and deposition of sediment and may be applicable to ancient progradational sequence.Keywords: stromatolites, marsh, deposition of sediment, aggradation, progradation, gulf of Gabes, Tunisia
Procedia PDF Downloads 335596 Restoring Trees Damaged by Cyclone Hudhud at Visakhapatnam, India
Authors: Mohan Kotamrazu
Abstract:
Cyclone Hudhud which battered the city of Visakhapatnam on 12th October, 2014, damaged many buildings, public amenities and infrastructure facilities along the Visakha- Bheemili coastal corridor. More than half the green cover of the city was wiped out. Majority of the trees along the coastal corridor suffered from complete or partial damage. In order to understand the different ways that trees incurred damage during the cyclone, a damage assessment study was carried out by the author. The areas covered by this study included two university campuses, several parks and residential colonies which bore the brunt of the cyclone. Post disaster attempts have been made to restore many of the trees that have suffered from partial or complete damage from the effects of extreme winds. This paper examines the various ways that trees incurred damage from the cyclone Hudhud and presents some examples of the restoration efforts carried out by educational institutions, public parks and religious institutions of the city of Visakhapatnam in the aftermath of the devastating cyclone.Keywords: defoliaton, salt spray damage, uprooting and wind throw, restoration
Procedia PDF Downloads 529595 Improvement to Abiotic Stress Tolerance in Durum Wheat (Triticum Durum Desf) with the Vegetable Extract Application
Authors: Zemour Kamel, Chouhim Kadda Mohamed Amine
Abstract:
Salinity is one of the most environmental factors limiting crop productivity. It has a negative effect on both germination and plant growth processes (photosynthesis, respiration, and transpiration), nutrient balance, membrane properties and cellular homeostasis, enzymatic and metabolic activities. Among the strategic crops in the world and more mainly in Algeria, durum wheat is very affected by this abiotic stress. For that, this study focuses on an evaluation of salt stress effect on the germination process of durum wheat as well as its response after application of lavender hydrosol and aqueous pistachio extract. The results have shown that all the physicochemical parameters of germination have been affected by this stress. However, lavender hydrosol and aqueous pistachio extract, considered as organic compounds, significantly improved the germination of wheat seeds. Finally, this study has highlighted the importance of using organic products as an ideal alternative to reduce the effect of abiotic stress on durum wheat productivity.Keywords: salinity, wheat durum, extract, lavender hydrosol, aqueous pistachio
Procedia PDF Downloads 83594 Providing a Secure Hybrid Method for Graphical Password Authentication to Prevent Shoulder Surfing, Smudge and Brute Force Attack
Authors: Faraji Sepideh
Abstract:
Nowadays, purchase rate of the smart device is increasing and user authentication is one of the important issues in information security. Alphanumeric strong passwords are difficult to memorize and also owners write them down on papers or save them in a computer file. In addition, text password has its own flaws and is vulnerable to attacks. Graphical password can be used as an alternative to alphanumeric password that users choose images as a password. This type of password is easier to use and memorize and also more secure from pervious password types. In this paper we have designed a more secure graphical password system to prevent shoulder surfing, smudge and brute force attack. This scheme is a combination of two types of graphical passwords recognition based and Cued recall based. Evaluation the usability and security of our proposed scheme have been explained in conclusion part.Keywords: brute force attack, graphical password, shoulder surfing attack, smudge attack
Procedia PDF Downloads 161593 Synthesis of α-Diimin Nickel(II) Catalyst Supported on Graphene and Graphene Oxide for Ethylene Slurry Polymerization
Authors: Mehrji Khosravan, Mostafa Fathali-Sianib, Davood Soudbar, Sasan Talebnezhad, Mohammad-Reza Ebrahimi
Abstract:
The late transition metal catalyst of the end group of transition metals in the periodic table as Ni, Fe, Co, and Pd was grown up rapidly in polyolefin industries recently. These metals with suitable ligands exhibited special characteristic properties and appropriate activities in the production of polyolefins. The ligand 1,4-bis (2,6-diisopropyl phenyl) acenaphthene was synthesized by reaction of 2,6-diisopropyl aniline and acenaphthenequinone. The ligand was added to nickel (II) dibromide salt for synthesis the 1,4-bis (2,6 diisopropylphenyl) acenaphthene nickel (II) dibromide catalyst. The structure of the ligand characterized by IR technique. The catalyst then deposited on graphene and graphene oxide by vander walss-attachment for use in Ethylene slurry polymerization process in the presence of catalyst activator such as methylaluminoxane (MAO) in hexane solvent. The structure of the catalyst characterized by IR and TEM techniques and some of the polymers were characterized by DSC. The highest activity was achieved at 600 C for catalyst.Keywords: α-diimine nickel (II) complex, graphene as supported catalyst, late transition metal, ethylene polymerization
Procedia PDF Downloads 386592 Analysis of Pollution in Agriculture Land Using Decagon Em-50 and Rock Magnetism Method
Authors: Adinda Syifa Azhari, Eleonora Agustine, Dini Fitriani
Abstract:
This measurement has been done to analyze the impact of industrial pollution on the environment. Our research is to indicate the soil which has contained some pollution by industrial activity around the area, especially in Sumedang, West Java. The parameter phsyics such as total dissolved solid, volumetric water content, electrical conductivity bulk and FD have shown that the soil has polluted and measured by Decagon EM 50. Decagon EM 50 is one of the geophysical environment instrumentation that is used to interpret the soil condition. This experiment has given a result of these parameter physics, these are: Volumetric water content (m³/m³) = 0,154 – 0,384; Electrical Conductivity Bulk (dS/m) = 0,29 – 1,11 ; Dielectric Permittivity (DP) = 77,636 – 78, 339.Based on these data, we have got the conclusion that the area has, in fact, been contaminated by dangerous materials. VWC is parameter physics that has shown water in soil. The data show the pollution of the soil at the place, of which the specifications are PH, Total Dissolved Solid (TDS), Electrical Conductivity (EC) bigger (>>) and Frequency Dependent (FD) smaller (<<); that means the soil is alkali with big grain and has high salt concentration.Keywords: Decagon EM 50, electrical conductivity, industrial textiles, land, pollution
Procedia PDF Downloads 381591 The Experimental Measurement of the LiBr Concentration of a Solar Absorption Machine
Authors: N. Hatraf, L. Merabti, Z. Neffah, W. Taane
Abstract:
The excessive consumption of fossil energies (electrical energy) during summer caused by the technological development involves more and more climate warming. In order to reduce the worst impact of gas emissions produced from classical air conditioning, heat driven solar absorption chiller is pretty promising; it consists on using solar as motive energy which is clean and environmentally friendly to provide cold. Solar absorption machine is composed by four components using Lithium Bromide /water as a refrigerating couple. LiBr- water is the most promising in chiller applications due to high safety, high volatility ratio, high affinity, high stability and its high latent heat. The lithium bromide solution is constitute by the salt lithium bromide which absorbs water under certain conditions of pressure and temperature however if the concentration of the solution is high in the absorption chillers; which exceed 70%, the solution will crystallize. The main aim of this article is to study the phenomena of the crystallization and to evaluate how the dependence between the electric conductivity and the concentration which should be controlled.Keywords: absorption, crystallization, experimental results, lithium bromide solution
Procedia PDF Downloads 310590 Mobile Agent Security Using Reference Monitor Based Security Framework
Authors: Sandhya Armoogum
Abstract:
In distributed systems and in open systems such as the Internet, often mobile code has to run on unknown and potentially hostile hosts. Mobile code such as a mobile agent is vulnerable when executing on remote hosts. The mobile agent may be subjected to various attacks such as tampering, inspection, and replay attack by a malicious host. Much research has been done to provide solutions for various security problems, such as authentication of mobile agent and hosts, integrity and confidentiality of the data carried by the mobile agent. Many of such proposed solutions in literature are not suitable for open systems whereby the mobile code arrives and executes on a host which is not known and trusted by the mobile agent owner. In this paper, we propose the adoption of the reference monitor by hosts in an open system for providing trust and security for mobile code execution. A secure protocol for the distribution of the reference monitor entity is described. This reference monitor entity on the remote host may also provide several security services such as authentication and integrity to the mobile code.Keywords: security, mobile agents, reference monitor, trust
Procedia PDF Downloads 440589 A Socio-Technical Approach to Cyber-Risk Assessment
Authors: Kitty Kioskli, Nineta Polemi
Abstract:
Evaluating the levels of cyber-security risks within an enterprise is most important in protecting its information system, services and all its digital assets against security incidents (e.g. accidents, malicious acts, massive cyber-attacks). The existing risk assessment methodologies (e.g. eBIOS, OCTAVE, CRAMM, NIST-800) adopt a technical approach considering as attack factors only the capability, intention and target of the attacker, and not paying attention to the attacker’s psychological profile and personality traits. In this paper, a socio-technical approach is proposed in cyber risk assessment, in order to achieve more realistic risk estimates by considering the personality traits of the attackers. In particular, based upon principles from investigative psychology and behavioural science, a multi-dimensional, extended, quantifiable model for an attacker’s profile is developed, which becomes an additional factor in the cyber risk level calculation.Keywords: attacker, behavioural models, cyber risk assessment, cybersecurity, human factors, investigative psychology, ISO27001, ISO27005
Procedia PDF Downloads 165588 Optimization of Adsorption Performance of Lignocellulosic Waste Pretreatment and Chemical Modification
Authors: Bendjelloul Meriem, Elandaloussi El Hadj
Abstract:
In this work, we studied the effectiveness of a lignocellulosic waste (wood sawdust) for the removal of cadmium Cd (II) in aqueous solution. The adsorbent material SBO-CH2-CO2Na has been prepared by alkaline pretreatment of wood sawdust followed by a chemical modification with sodium salt of chloroacetic acid. The characterization of the as-prepared material by FTIR has proven that the grafting of acetate spacer took actually place in the lignocellulosic backbone by the appearance of characteristic band of carboxylic groups in the IR spectrum. The removal study of Cd2+ by SBO-CH2-CO2Na material at the solid-liquid interface was carried out by kinetics, sorption isotherms, effect of temperature and thermodynamic parameters were evaluated. The last part of this work was dedicated to assess the regenerability of the adsorbent material after three reuse cycles. The results indicate that SBO-CH2-CO2Na matrix possesses a high effectiveness in removing Cd (II) with an adsorption capacity of 222.22 mg/g, yet a better value that those of many low-cost adsorbents so far reported in the literature. The results found in the course of this study suggest that ionic exchange is the most appropriate mechanism involved in the removal of cadmium ions.Keywords: adsorption, cadmium, isotherms, lignocellulosic, regenerability
Procedia PDF Downloads 331587 Pre-conditioning and Hot Water Sanitization of Reverse Osmosis Membrane for Medical Water Production
Authors: Supriyo Das, Elbir Jove, Ajay Singh, Sophie Corbet, Noel Carr, Martin Deetz
Abstract:
Water is a critical commodity in the healthcare and medical field. The utility of medical-grade water spans from washing surgical equipment, drug preparation to the key element of life-saving therapy such as hydrotherapy and hemodialysis for patients. A properly treated medical water reduces the bioburden load and mitigates the risk of infection, ensuring patient safety. However, any compromised condition during the production of medical-grade water can create a favorable environment for microbial growth putting patient safety at high risk. Therefore, proper upstream treatment of the medical water is essential before its application in healthcare, pharma and medical space. Reverse Osmosis (RO) is one of the most preferred treatments within healthcare industries and is recommended by all International Pharmacopeias to achieve the quality level demanded by global regulatory bodies. The RO process can remove up to 99.5% of constituents from feed water sources, eliminating bacteria, proteins and particles sizes of 100 Dalton and above. The combination of RO with other downstream water treatment technologies such as Electrodeionization and Ultrafiltration meet the quality requirements of various pharmacopeia monographs to produce highly purified water or water for injection for medical use. In the reverse osmosis process, the water from a liquid with a high concentration of dissolved solids is forced to flow through an especially engineered semi-permeable membrane to the low concentration side, resulting in high-quality grade water. However, these specially engineered RO membranes need to be sanitized either chemically or at high temperatures at regular intervals to keep the bio-burden at the minimum required level. In this paper, we talk about Dupont´s FilmTec Heat Sanitizable Reverse Osmosis membrane (HSRO) for the production of medical-grade water. An HSRO element must be pre-conditioned prior to initial use by exposure to hot water (80°C-85°C) for its stable performance and to meet the manufacturer’s specifications. Without pre-conditioning, the membrane will show variations in feed pressure operations and salt rejection. The paper will discuss the critical variables of pre-conditioning steps that can affect the overall performance of the HSRO membrane and demonstrate the data to support the need for pre-conditioning of HSRO elements. Our preliminary data suggests that there can be up to 35 % reduction in flow due to initial heat treatment, which also positively affects the increase in salt rejection. The paper will go into detail about the fundamental understanding of the performance change of HSRO after the pre-conditioning step and its effect on the quality of medical water produced. The paper will also discuss another critical point, “regular hot water sanitization” of these HSRO membranes. Regular hot water sanitization (at 80°C-85°C) is necessary to keep the membrane bioburden free; however, it can negatively impact the performance of the membrane over time. We will demonstrate several data points on hot water sanitization using FilmTec HSRO elements and challenge its robustness to produce quality medical water. The last part of this paper will discuss the construction details of the FilmTec HSRO membrane and features that make it suitable to pre-condition and sanitize at high temperatures.Keywords: heat sanitizable reverse osmosis, HSRO, medical water, hemodialysis water, water for Injection, pre-conditioning, heat sanitization
Procedia PDF Downloads 211586 An Industrial Scada System Remote Control Using Mobile Phones
Authors: Ahmidah Elgali
Abstract:
SCADA is the abbreviation for "Administrative Control And Data Acquisition." SCADA frameworks are generally utilized in industry for administrative control and information securing of modern cycles. Regular SCADA frameworks use PC, journal, slim client, and PDA as a client. In this paper, a Java-empowered cell phone has been utilized as a client in an example SCADA application to show and regulate the place of an example model crane. The paper presents a genuine execution of the online controlling of the model crane through a cell phone. The remote correspondence between the cell phone and the SCADA server is performed through a base station by means of general parcel radio assistance GPRS and remote application convention WAP. This application can be used in industrial sites in areas that are likely to be exposed to a security emergency (like terrorist attacks) which causes the sudden exit of the operators; however, no time to perform the shutdown procedures for the plant. Hence this application allows shutting down units and equipment remotely by mobile and so avoids damage and losses.Keywords: control, industrial, mobile, network, remote, SCADA
Procedia PDF Downloads 78585 Numerical Investigation of Wave Run-Up on Curved Dikes
Authors: Suba Periyal Subramaniam, Babette Scheres, Altomare Corrado, Holger Schuttrumpf
Abstract:
Due to the climatic change and the usage of coastal areas, there is an increasing risk of dike failures along the coast worldwide. Wave run-up plays a key role in planning and design of a coastal structure. The coastal dike lines are bent either due to geological characteristics or due to influence of anthropogenic activities. The effect of the curvature of coastal dikes on wave run-up and overtopping is not yet investigated. The scope of this research is to find the effects of the dike curvature on wave run-up by employing numerical model studies for various dike opening angles. Numerical simulation is carried out using DualSPHysics, a meshless method, and OpenFOAM, a mesh-based method. The numerical results of the wave run-up on a curved dike and the wave transformation process for various opening angles, wave attacks, and wave parameters will be compared and discussed. This research aims to contribute a more precise analysis and understanding the influence of the curvature in the dike line and thus ensuring a higher level of protection in the future development of coastal structures.Keywords: curved dikes, DualSPHysics, OpenFOAM, wave run-up
Procedia PDF Downloads 147584 Intrusion Detection System Based on Peer to Peer
Authors: Alireza Pour Ebrahimi, Vahid Abasi
Abstract:
Recently by the extension of internet usage, Research on the intrusion detection system takes a significant importance. Many of improvement systems prevent internal and external network attacks by providing security through firewalls and antivirus. In recently years, intrusion detection systems gradually turn from host-based systems and depend on O.S to the distributed systems which are running on multiple O.S. In this work, by considering the diversity of computer networks whit respect to structure, architecture, resource, services, users and also security goals requirement a fully distributed collaborative intrusion detection system based on peer to peer architecture is suggested. in this platform each partner device (matched device) considered as a peer-to-peer network. All transmitted information to network are visible only for device that use security scanning of a source. Experimental results show that the distributed architecture is significantly upgradeable in respect to centralized approach.Keywords: network, intrusion detection system, peer to peer, internal and external network
Procedia PDF Downloads 547583 Experimental Investigation of Heat Transfer and Scale Growth Characteristics of Crystallisation Scale in Agitation Tank
Authors: Prasanjit Das, M .M. K. Khan, M. G. Rasul, Jie Wu, I. Youn
Abstract:
Crystallisation scale occurs when dissolved minerals precipitate from an aqueous solution. To investigate the crystallisation scale growth of normal solubility salt, a lab-scale agitation tank with and without baffles were used as a benchmark using potassium nitrate as the test fluid. Potassium nitrate (KNO3) solution in this test leads to crystallisation scale on heat transfer surfaces. This experimental investigation has focused on the effect of surface crystallisation of potassium nitrate on the low-temperature heat exchange surfaces on the wall of the agitation tank. The impeller agitation rate affects the scaling rate at the low-temperature agitation wall and it shows a decreasing scaling rate with an increasing agitation rate. It was observed that there was a significant variation of heat transfer coefficients and scaling resistance coefficients with different agitation rate as well as with varying impeller size, tank with and without baffles and solution concentration.Keywords: crystallisation, heat transfer coefficient, scale, resistance
Procedia PDF Downloads 184