Search results for: salt and peppers attacks
582 Tracing Back the Bot Master
Authors: Sneha Leslie
Abstract:
The current situation in the cyber world is that crimes performed by Botnets are increasing and the masterminds (botmaster) are not detectable easily. The botmaster in the botnet compromises the legitimate host machines in the network and make them bots or zombies to initiate the cyber-attacks. This paper will focus on the live detection of the botmaster in the network by using the strong framework 'metasploit', when distributed denial of service (DDOS) attack is performed by the botnet. The affected victim machine will be continuously monitoring its incoming packets. Once the victim machine gets to know about the excessive count of packets from any IP, that particular IP is noted and details of the noted systems are gathered. Using the vulnerabilities present in the zombie machines (already compromised by botmaster), the victim machine will compromise them. By gaining access to the compromised systems, applications are run remotely. By analyzing the incoming packets of the zombies, the victim comes to know the address of the botmaster. This is an effective and a simple system where no specific features of communication protocol are considered.Keywords: bonet, DDoS attack, network security, detection system, metasploit framework
Procedia PDF Downloads 254581 Molecular Characterization and Determination of Bioremediation Potentials of Some Bacteria Isolated from Spent Oil Contaminated Soil Mechanic Workshops in Kaduna Metropolis
Authors: David D. Adams, Ibrahim B. Bello
Abstract:
Spent oil contaminated Soil from ten selected mechanic workshops were investigated for their bacteria and bioremediation potentials. The bacterial isolates were morphologically and molecularly identified as Enterobacter hormaechei, Escherichia coli, Klebsiella pneumoniae, Shigella flexneri , Wesiella cibaria, Lactobacillus planetarium. The singles and a consortium of these bacteria incubated in the minimal salt medium incorporated with 1% engine oil exhibited various biodegradation rates, with the mixed consortium exhibiting the highest for this oil. The gene for the hydrocarbon enzyme Catechol 2, 3 dioxygenase (C2,30) was detected and amplified in Enterobacter hormaechei, Escherichia coli and Shigella flexneri using PCR and Agarose gel electrophoresis. The detection of the (C2,30) enzyme gene in, and the spent oil biodegradation activity exhibited by these bacteria suggest their possible possession of bioremediating potentials for the spent engine oil. It is therefore suggested that a pilot study on the field application of these bacteria for bioremediation and restoration of spent oil polluted environment should be done in mechanic workshops.Keywords: spent engine oil, pollution, bacteria, enzyme, bioremediation, mechanic workshop
Procedia PDF Downloads 222580 The Proactive Approach of Digital Forensics Methodology against Targeted Attack Malware
Authors: Mohamed Fadzlee Sulaiman, Mohd Zabri Adil Talib, Aswami Fadillah Mohd Ariffin
Abstract:
Each individual organization has their own mechanism to build up cyber defense capability in protecting their information infrastructures from data breaches and cyber espionage. But, we can not deny the possibility of failing to detect and stop cyber attacks especially for those targeting credential information and intellectual property (IP). In this paper, we would like to share the modern approach of effective digital forensic methodology in order to identify the artifacts in tracing the trails of evidence while mitigating the infection from the target machine/s. This proposed approach will suit the digital forensic investigation to be conducted while resuming the business critical operation after mitigating the infection and minimizing the risk from the identified attack to transpire. Therefore, traditional digital forensics methodology has to be improvised to be proactive which not only focusing to discover the root caused and the threat actor but to develop the relevant mitigation plan in order to prevent from the same attack.Keywords: digital forensic, detection, eradication, targeted attack, malware
Procedia PDF Downloads 275579 Polymorphism in Myostatin Gene and Its Association with Growth Traits in Kurdi Sheep of Northern Khorasan
Authors: Masoud Alipanah, Sekineh Akbari, Gholamreza Dashab
Abstract:
Myostatin genes or factor 8 affecting on growth and making differentiation works (GDF8) as a moderator in the development of skeletal muscle inhibitor. If mutations occurs in the coding region of myostatin, alter its inhibitory role and the muscle growth is increased. In this study, blood samples were collected randomly from 60 Kurdish sheep in northern Khorasan and DNA extraction was performed using a modified salt. A fragment 337 bp from exon 3 myostatin gene and-specific primers by using a polymerase chain reaction (PCR) were amplified. In order to detect different forms of an allele at this locus HaeΙΙΙ restriction enzymes and PCR-RFLP analysis were used. Band patterns clarification was performed using agarose gel electrophoresis. The frequency of genotypes mm, Mm, and MM, were respectively detected, 0, 0.15 and 0.85. The allele frequency for alleles m and M, were respectively, 0.07 and 0.93. The statistical analyses indicated that m allele was significantly associated with body weight. The results of this study suggest that the Myostatin gene possibly is a candidate gene that affects growth traits in Kurdish sheep.Keywords: GDF8 gene, Kurdi Sheep of Northern Khorasan, polymorphism, weight traits
Procedia PDF Downloads 340578 High-Throughput Screening and Selection of Electrogenic Microbial Communities Using Single Chamber Microbial Fuel Cells Based on 96-Well Plate Array
Authors: Lukasz Szydlowski, Jiri Ehlich, Igor Goryanin
Abstract:
We demonstrate a single chamber, 96-well-plated based Microbial Fuel Cell (MFC) with printed, electronic components. This invention is aimed at robust selection of electrogenic microbial community under specific conditions, e.g., electrode potential, pH, nutrient concentration, salt concentration that can be altered within the 96 well plate array. This invention enables robust selection of electrogenic microbial community under the homogeneous reactor, with multiple conditions that can be altered to allow comparative analysis. It can be used as a standalone technique or in conjunction with other selective processes, e.g., flow cytometry, microfluidic-based dielectrophoretic trapping. Mobile conductive elements, like carbon paper, carbon sponge, activated charcoal granules, metal mesh, can be inserted inside to increase the anode surface area in order to collect electrogenic microorganisms and to transfer them into new reactors or for other analytical works. An array of 96-well plate allows this device to be operated by automated pipetting stations.Keywords: bioengineering, electrochemistry, electromicrobiology, microbial fuel cell
Procedia PDF Downloads 149577 Risk of Plastic Shrinkage Cracking in Recycled Aggregate Concrete
Authors: M. Eckert, M. Oliveira
Abstract:
The intensive use of natural aggregates, near cities and towns, associated to the increase of the global population, leads to its depletion and increases the transport distances. The uncontrolled deposition of construction and demolition waste in landfills and city outskirts, causes pollution and takes up space. The use of recycled aggregates in concrete preparation would contribute to mitigate the problem. However, it arises the problem that the high water absorption of recycled aggregate decreases the bleeding rate of concrete, and when this gets lower than the evaporation rate, plastic shrinkage cracking occurs. This phenomenon can be particularly problematic in hot and windy curing environments. Cracking facilitates the flow of liquid and gas into concrete which attacks the reinforcement and degrades the concrete. These factors reduce the durability of concrete structures and consequently the lifetime of buildings. A ring test was used, cured in a wind tunnel, to evaluate the plastic shrinkage cracking sensitivity of recycled aggregate concrete, in order to implement preventive means to control this phenomenon. The role of several aggregate properties on the concrete segregation and cracking mechanisms were also discussed.Keywords: recycled aggregate, plastic shrinkage cracking, wind tunnel, durability
Procedia PDF Downloads 421576 Studying Relationship between Local Geometry of Decision Boundary with Network Complexity for Robustness Analysis with Adversarial Perturbations
Authors: Tushar K. Routh
Abstract:
If inputs are engineered in certain manners, they can influence deep neural networks’ (DNN) performances by facilitating misclassifications, a phenomenon well-known as adversarial attacks that question networks’ vulnerability. Recent studies have unfolded the relationship between vulnerability of such networks with their complexity. In this paper, the distinctive influence of additional convolutional layers at the decision boundaries of several DNN architectures was investigated. Here, to engineer inputs from widely known image datasets like MNIST, Fashion MNIST, and Cifar 10, we have exercised One Step Spectral Attack (OSSA) and Fast Gradient Method (FGM) techniques. The aftermaths of adding layers to the robustness of the architectures have been analyzed. For reasoning, separation width from linear class partitions and local geometry (curvature) near the decision boundary have been examined. The result reveals that model complexity has significant roles in adjusting relative distances from margins, as well as the local features of decision boundaries, which impact robustness.Keywords: DNN robustness, decision boundary, local curvature, network complexity
Procedia PDF Downloads 75575 Contemporary Arabic Novel Probing the Self and the Other: A Contrapuntal Study of Identity, Sexuality, and Fundamentalism
Authors: Jihan Mahmoud
Abstract:
This paper examines the role played by Arabic novelists in revolutionary change in the Arab world, discussing themes of identity, sexuality and fundamentalism as portrayed in a selection of modern and contemporary Arabic novels that are either written in English or translated from Arabic into English. It particularly focuses on the post-Naguib Mahfouz era. Taking my cue from the current political changes in the Arab world, starting with 9/11/ terrorist attacks in the USA and the UK, the ‘Arab Spring’ revolutions, the rise of political Islam and the emergence of Isis, the Islamic state in Iraq and the Levant, the study analyses the differences in the ways contemporary Arab novelists from different Arabic countries represent the interaction between identity, sexual politics and fundamentalist ideas in the Arab world, with a specific focus on the overlap between literature, religion and international politics in the region. It argues that the post-Mahfouz era marked a new phase in the development of the political Arabic novel not only as a force of resistance against political-religious oppression, but as a call for revolution as well. Thus, the Arabic novel reshapes values and prompts future action.Keywords: Arabic novel, Islam, politics, sexuality
Procedia PDF Downloads 526574 Comparison of Salt-Water Intrusion into Eastern and Western Coastal Aquifers of Urmia Lake thru Over-Exploration of Groundwater Resources
Authors: Saman Javadi, Mohammad Hassan Mahmoudi, Fatemeh Jafari, Aminreza Neshat
Abstract:
Urmia Lake’s water level has been dropped during the past decade. Although the most common reason in studies was declared climate change, but observation of adjacent lake (like Van in Turkey) is not the same as the common reason. Most of studies were focused on climate and land use change, but groundwater resource as one of the most important element is negligible. Due to population and agriculture activities growth, exploration of groundwater resource has been increased. In as much as continued decline of water levels can lead to saltwater intrusion, reduce stream discharge near outcrop regions and threaten groundwater quality, aquifers of this region were affected by saltwater intrusion of Urmia Lake. In this research comparison of saltwater intrusion into eastern and western coastal aquifer was studied. In conclusion eastern aquifers are in a critical situation; vice versa the western ones are in a better situation. Thus applying management of groundwater operation would be necessary for eastern aquifers.Keywords: coastal aquifer, groundwater over-exploration, saltwater intrusion, Urmia Lake
Procedia PDF Downloads 539573 Investigation of Electrical, Thermal and Structural Properties on Polyacrylonitrile Nano-Fiber
Authors: N. Demirsoy, N. Uçar, A. Önen, N. Kızıldağ, Ö. F. Vurur, O. Eren, İ. Karacan
Abstract:
Polymer composite nano-fibers including (1, 3 wt %) silver nano-particles have been produced by electrospinning method. Polyacrylonitrile/N,N-dimethylformamide (PAN/DMF) solution has been prepared and the amount of silver nitrate has been adjusted to PAN weight. Silver nano-particles were obtained from reduction of silver ions into silver nano-particles by chemical reduction by hydrazine hydroxide (N2H5OH). The different amount of silver salt was loaded into polymer matrix to obtain polyacrylonitrile composite nano-fiber containing silver nano-particles. The effect of the amount of silver nano-particles on the properties of composite nano-fiber web was investigated. Electrical conductivity, mechanical properties, thermal properties were examined by Microtest LCR Meter 6370 (0.01 mΩ-100 MΩ), tensile tester, differential scanning calorimeter DSC (Q10) and SEM, respectively. Also, antimicrobial efficiency test (ASTM E2149-10) was done against Staphylococcus aureus bacteria. It has been seen that breaking strength, conductivity, antimicrobial effect, enthalpy during cyclization increase by use of silver nano-particles while the diameter of nano-fiber decreases.Keywords: composite polyacrylonitrile nanofiber, electrical conductivity, electrospinning, mechanical properties, thermal properties, silver nanoparticles
Procedia PDF Downloads 418572 Developing a Systems Dynamics Model for Security Management
Authors: Kuan-Chou Chen
Abstract:
This paper will demonstrate a simulation model of an information security system by using the systems dynamic approach. The relationships in the system model are designed to be simple and functional and do not necessarily represent any particular information security environments. The purpose of the paper aims to develop a generic system dynamic information security system model with implications on information security research. The interrelated and interdependent relationships of five primary sectors in the system dynamic model will be presented in this paper. The integrated information security systems model will include (1) information security characteristics, (2) users, (3) technology, (4) business functions, and (5) policy and management. Environments, attacks, government and social culture will be defined as the external sector. The interactions within each of these sectors will be depicted by system loop map as well. The proposed system dynamic model will not only provide a conceptual framework for information security analysts and designers but also allow information security managers to remove the incongruity between the management of risk incidents and the management of knowledge and further support information security managers and decision makers the foundation for managerial actions and policy decisions.Keywords: system thinking, information security systems, security management, simulation
Procedia PDF Downloads 429571 Probiotic Properties of Lactic Acid Bacteria Isolated from Fermented Food
Authors: Wilailak Siripornadulsil, Siriyanapat Tasaku, Jutamas Buahorm, Surasak Siripornadulsil
Abstract:
The objectives of this study were to isolate LAB from various sources, dietary supplement, Thai traditional fermented food, and freshwater fish and to characterize their potential as probiotic cultures. Out of 1,558 isolates, 730 were identified as LAB based on isolation on MRS agar supplemented with a bromocresol purple indicator and CaCO3 and gram-positive, catalase and oxidase negative characteristics. Eight isolates showed the potential probiotic properties including tolerance to acid, bile salt and heat, proteolytic, amylolytic and lipolytic activities and oxalate-degrading capability. They all showed the antimicrobial activity against some Gram-negative and Gram-positive pathogenic bacteria. Based on 16S rDNA sequence analysis, they were identified as Enterococcus faecalis BT2 and MG30, Leconostoc mesenteroides SW64 and Pediococcus pentosaceous BD33, CF32, NP6, PS34 and SW5. The health beneficial effects and food safety will be further investigated and developed as a probiotic or protective culture used in Nile tilapia belly flap meat fermentation.Keywords: probiotic, lactic acid bacteria, pathogen, protective culture
Procedia PDF Downloads 382570 The Applicability of International Humanitarian Law to Non-State Actors
Authors: Yin Cheung Lam
Abstract:
In 1949, the ratification of the Geneva Conventions heralded the international community’s adoption of a new universal and non-discriminatory approach to human rights in situations of conflict. However, with the proliferation of international terrorism after the 9/11 attacks on the United States (U.S.), the international community’s uneven and contradictory implementations of international humanitarian law (IHL) questioned its agenda of universal human rights. Specifically, the derogation from IHL has never been so pronounced in the U.S. led ‘War on Terror’. While an extensive literature has ‘assessed the impact’ of the implementation of the Geneva Conventions, limited attention has been paid to interrogating the ways in which the Geneva Conventions and its resulting implementation have functioned to discursively reproduce certain understandings of human rights between states and non-state actors. Through a discursive analysis of the Geneva Conventions and the conceptualization of human rights in relation to terrorism, this thesis problematises the way in which the U.S. has understood and reproduced understandings of human rights. Using the U.S. ‘War on Terror’ as an example, it seeks to extend previous analyses of the U.S.’ practice of IHL through a qualitative discursive analysis of the human rights content that appears in the Geneva Conventions in addition to the speeches and policy documents on the ‘War on Terror’.Keywords: discursive analysis, human rights, non-state actors, war on terror
Procedia PDF Downloads 606569 Fluid Inclusions Analysis of Fluorite from the Hammam Jedidi District, North-Eastern Tunisia
Authors: Miladi Yasmine, Bouhlel Salah, Garnit Hechmi
Abstract:
Hydrothermal vein-type deposits of the Hammam Jedidi F-Ba(Pb-Zn-Cu) are hosted in Lower Jurassic, Cretaceous and Tertiary series, and located near a very important structural lineament (NE-SW) corresponding to the Hammam Jedidi Fault in the Tunisian Dorsale. The circulation of the ore forming fluid is triggered by a regional tectonic compressive phase which occurred during the miocène time. Mineralization occurs as stratabound and vein-type orebodies adjacent to the Triassic salt diapirs and within fault in Jurassic limestone. Fluid inclusions data show that two distinct fluids were involved in the mineralisation deposition: a warmer saline fluid (180°C, 20 wt % NaCl equivalent) and cooler less saline fluid (126°C, 5wt%NaCl equivalent). The contrasting salinities and halogen ratios suggest that this two fluid derived from one of the brine originated after the dissolution of halite as suggested by its high salinity. The other end member, as indicated by the low Cl/Br ratios, acquired its low salinity by dilution of Br enriched evaporated seawater. These results are compatible with Mississippi-Valley- type mineralization.Keywords: Jebel Oust, fluid inclusions, North Eastern Tunisia, mineralization
Procedia PDF Downloads 341568 Minimization of Denial of Services Attacks in Vehicular Adhoc Networking by Applying Different Constraints
Authors: Amjad Khan
Abstract:
The security of Vehicular ad hoc networking is of great importance as it involves serious life threats. Thus to provide secure communication amongst Vehicles on road, the conventional security system is not enough. It is necessary to prevent the network resources from wastage and give them protection against malicious nodes so that to ensure the data bandwidth availability to the legitimate nodes of the network. This work is related to provide a non conventional security system by introducing some constraints to minimize the DoS (Denial of services) especially data and bandwidth. The data packets received by a node in the network will pass through a number of tests and if any of the test fails, the node will drop those data packets and will not forward it anymore. Also if a node claims to be the nearest node for forwarding emergency messages then the sender can effectively identify the true or false status of the claim by using these constraints. Consequently the DoS(Denial of Services) attack is minimized by the instant availability of data without wasting the network resources.Keywords: black hole attack, grey hole attack, intransient traffic tempering, networking
Procedia PDF Downloads 284567 Heterophase Polymerization of Pyrrole and Thienyl End Capped Ethoxylated Nonyl Phenol by Iron (III) Chloride
Authors: Görkem Ülkü, Nesrin Köken, Esin A. Güvel, Nilgün Kızılcan
Abstract:
Ethoxylated nonyl phenols (ENP) and ceric ammonium nitrate redox systems have been used for the polymerization of vinyl and acrylic monomers. In that case, ENP acted as an organic reducing agent in the presence of Ce (IV) salt and a radical was formed. The polymers obtained with that redox system contained ENP chain ends because the radicals are formed on the reducing molecules. Similar copolymer synthesis has been reported using poly(ethylene oxide) instead of its nonyl phenol terminated derivative, ENP. However, copolymers of poly(ethylene oxide) and conducting polymers synthesized by ferric ions were produced in two steps. Firstly, heteroatoms (pyrrole, thiophene etc.) were attached to the poly(ethylene oxide) chains then copolymerization with heterocyclic monomers was carried out. In this work, ethoxylated nonylphenol (ENP) was reacted with 2-thiophenecarbonyl chloride in order to synthesize a macromonomer containing thienyl end-group (ENP-ThC). Then, copolymers of ENP-ThC and pyrrole were synthesized by chemical oxidative polymerization using iron (III) chloride as an oxidant.Keywords: end capped polymer, ethoxylated nonylphenol, heterophase polymerization, polypyrrole
Procedia PDF Downloads 407566 Evaluation of Rehabilitation in Ischemic Stroke
Authors: Amirmohammad Dahouri
Abstract:
Each year, more than 795,000 individuals in the United States grieve a stroke, and by 2030, it is predictable that 4% of the U.S. people will have had a stroke. Ischemic stroke, accounting for about 80% of all strokes, is one of the main causes of disability. The goal of stroke rehabilitation is to help patients return to physical and mental functions and relearn the required aids to living everyday life. This flagging has an adverse effect on patients’ quality of life and affects their daily living activities. In recent years, the rehabilitation of ischemic stroke attractions more attention in the world. A review of the rudimentary perceptions of stroke rehabilitation that are price stressing to all specialists who delicacy patients with stroke. Ideas are made for patients on how to functionally manage daily activities after they have qualified for a stroke. It is vital for home healthcare clinicians to understand the process from acute events to medical equilibrium and rehabilitation to adaptation. Different sources such as Pub Med Google Scholar and science direct have been used and various contemporary articles in this era have been analyzed. The care plan must also foundation actual actions to protect against recurrent stroke, as stroke patients are generally at significant risk for further ischemic or hemorrhagic attacks. Here, we review evidence of rehabilitation in treating post-stroke impairment.Keywords: rehabilitation, stroke, ischemic, hemorrhagic, brain
Procedia PDF Downloads 163565 Utilization of Chrysanthemum Flowers in Textile Dyeing: Chemical and Phenolic Analysis of Dyes and Fabrics
Authors: Muhammad Ahmad
Abstract:
In this research, Chrysanthemum (morifolium) flowers are used as a natural dye to reduce synthetic dyes and take a step toward sustainability in the fashion industry. The aqueous extraction method is utilized for natural dye extraction and then applied to silk and cotton fabric samples. The color of the dye extracted from dried chrysanthemum flowers is originally a shade of rich green, but after being washed with detergent, it turns to a shade of yellow. Traditional salt and vinegar are used as a natural mordant to fix the dye color. This study also includes a phenolic and chemical analysis of the natural dye (Chrysanthemum flowers) and the textiles (cotton and silk). Compared to cotton fabric, silk fabric has far superior chemical qualities to use in natural dyeing. The results of this study show that the Chrysanthemum flower offers a variety of colors when treated with detergent, without detergent, and with mordants. Chrysanthemum flowers have long been used in other fields, such as medicine; therefore, it is time to start using them in the fashion industry as a natural dye to lessen the harm that synthetic dyes cause.Keywords: natural dyes, Chrysanthemum flower, sustainability, textile fabrics, chemical and phenolic analysis
Procedia PDF Downloads 20564 A Greener Approach for the Recovery of Proteins from Meat Industries
Authors: Jesus Hernandez, Zead Elzoeiry, Md. S. Islam, Abel E. Navarro
Abstract:
The adsorption of bovine serum albumin (BSA) and human hemoglobin (Hb) on naturally-occurring adsorbents was studied to evaluate the potential recovery of proteins from meat industry residues. Spent peppermint tea (PM), powdered purple corn cob (PC), natural clay (NC) and chemically-modified clay (MC) were investigated to elucidate the effects of pH, adsorbent dose, initial protein concentration, presence of salts and heavy metals. Equilibrium data were fitted according to isotherm models, reporting a maximum adsorption capacity at pH 8 of 318 and 344 mg BSA/g of PM and NC, respectively. Moreover, Hb displayed maximum adsorption capacity at pH 5 of 125 and 143 mg/g of PM and PC, respectively. Hofmeister salt effect was only observed for PM/Hb system. Salts tend to decrease protein adsorption, and the presence of Cu(II) ions had negligible impacts on the adsorption onto NC and PC. Desorption experiments confirmed that more than 85% of both proteins can be recovered with diluted acids and bases. SEM, EDX, and TGA analyses demonstrated that the adsorbents have favorable morphological and mechanical properties. The long-term goal of this study aims to recover soluble proteins from industrial wastewaters to produce animal food or any protein-based product.Keywords: adsorption, albumin, clay, hemoglobin, spent peppermint leaf
Procedia PDF Downloads 103563 VANETs: Security Challenges and Future Directions
Authors: Jared Oluoch
Abstract:
Connected vehicles are equipped with wireless sensors that aid in Vehicle to Vehicle (V2V) and Vehicle to Infrastructure (V2I) communication. These vehicles will in the near future provide road safety, improve transport efficiency, and reduce traffic congestion. One of the challenges for connected vehicles is how to ensure that information sent across the network is secure. If security of the network is not guaranteed, several attacks can occur, thereby compromising the robustness, reliability, and efficiency of the network. This paper discusses existing security mechanisms and unique properties of connected vehicles. The methodology employed in this work is exploratory. The paper reviews existing security solutions for connected vehicles. More concretely, it discusses various cryptographic mechanisms available, and suggests areas of improvement. The study proposes a combination of symmetric key encryption and public key cryptography to improve security. The study further proposes message aggregation as a technique to overcome message redundancy. This paper offers a comprehensive overview of connected vehicles technology, its applications, its security mechanisms, open challenges, and potential areas of future research.Keywords: VANET, connected vehicles, 802.11p, WAVE, DSRC, trust, security, cryptography
Procedia PDF Downloads 312562 A Hybrid Digital Watermarking Scheme
Authors: Nazish Saleem Abbas, Muhammad Haris Jamil, Hamid Sharif
Abstract:
Digital watermarking is a technique that allows an individual to add and hide secret information, copyright notice, or other verification message inside a digital audio, video, or image. Today, with the advancement of technology, modern healthcare systems manage patients’ diagnostic information in a digital way in many countries. When transmitted between hospitals through the internet, the medical data becomes vulnerable to attacks and requires security and confidentiality. Digital watermarking techniques are used in order to ensure the authenticity, security and management of medical images and related information. This paper proposes a watermarking technique that embeds a watermark in medical images imperceptibly and securely. In this work, digital watermarking on medical images is carried out using the Least Significant Bit (LSB) with the Discrete Cosine Transform (DCT). The proposed methods of embedding and extraction of a watermark in a watermarked image are performed in the frequency domain using LSB by XOR operation. The quality of the watermarked medical image is measured by the Peak signal-to-noise ratio (PSNR). It was observed that the watermarked medical image obtained performing XOR operation between DCT and LSB survived compression attack having a PSNR up to 38.98.Keywords: watermarking, image processing, DCT, LSB, PSNR
Procedia PDF Downloads 47561 Cyber Security in Russia: Offense, Defense and Strategy in Cyberspace
Authors: Da Eun Sung
Abstract:
In today’s world, cyber security has become an important international agenda. As the information age has arrived, the need for cyber defense against cyber attacks is mounting, and the significance of cyber cooperation in the international community is drawing attention. Through the course, international society has agreed that the institutionalization of international norms dealing with cyber space and cyber security is crucial ever. Nevertheless, the West, led by the United States of America, and 'the East', composed of Russia and China, have shown conflicting views on forming international norms and principles which would regulate and ward off the possible threats in cyber space. Thus, the international community hasn’t yet to reach an agreement on cyber security. In other words, the difference between both sides on the approach and understanding of principles, objects, and the definition has rendered such. Firstly, this dissertation will cover the Russia’s perception, strategy, and definition on cyber security through analyzing primary source. Then, it will delve into the two contrasting cyber security strategy between Russia and the US by comparing them. And in the conclusion, it will seek the possible solution for the cooperation in the field of cyber security. It is quite worthwhile to look into Russia’s views, which is the main counterpart to the US in this field, especially when the efforts to institutionalize cyber security by the US-led international community have met with their boundaries, and when the legitimacy of them have been challenged.Keywords: cyber security, cyber security strategic, international relation in cyberspace, Russia
Procedia PDF Downloads 319560 Models, Methods and Technologies for Protection of Critical Infrastructures from Cyber-Physical Threats
Authors: Ivan Župan
Abstract:
Critical infrastructure is essential for the functioning of a country and is designated for special protection by governments worldwide. Due to the increase in smart technology usage in every facet of the industry, including critical infrastructure, the exposure to malicious cyber-physical attacks has grown in the last few years. Proper security measures must be undertaken in order to defend against cyber-physical threats that can disrupt the normal functioning of critical infrastructure and, consequently the functioning of the country. This paper provides a review of the scientific literature of models, methods and technologies used to protect from cyber-physical threats in industries. The focus of the literature was observed from three aspects. The first aspect, resilience, concerns itself with the robustness of the system’s defense against threats, as well as preparation and education about potential future threats. The second aspect concerns security risk management for systems with cyber-physical aspects, and the third aspect investigates available testbed environments for testing developed models on scaled models of vulnerable infrastructure.Keywords: critical infrastructure, cyber-physical security, smart industry, security methodology, security technology
Procedia PDF Downloads 75559 Spectrophotometric Evaluation of Custom Microalgae-Based Bioink Formulations for Optimized Green Bioprinting
Authors: Olubusuyi Ayowole, Bashir Khoda
Abstract:
Green bioprinting, from the context of merging 3D bioprinting with microalgae cell organization, holds promise for industrial-scale optimization. This study employs spectrophotometric analysis to explore post-bioprinting cell growth density variation within hybrid hydrogel biomaterial scaffolds. Three hydrogel biomaterials—Alginic acid sodium salt (ALGINATE), Nanofibrillated Cellulose (NFC) – TEMPO, and CarboxyMethyl Cellulose (CMC)—are chosen for their scaffolding capabilities. Bioink development and analysis of their impact on cell proliferation and morphology are conducted. Chlorella microalgae cell growth within hydrogel compositions is probed using absorbance measurements, with additional assessment of shear thinning properties. Notably, NFC exhibits reduced shear thinning compared to CMC. Results reveal that while mono-hydrogel substrates with pronounced adhesion inhibit Chlorella cell proliferation, Alginate fosters increased cell concentration alongside a slight viscosity rise.Keywords: green bioprinting, 3d bioprinting, microalgae cell, hybrid hydrogel scaffolds, spectrophotometric analysis, bioink development, shear thinning properties
Procedia PDF Downloads 29558 A Blockchain-Based Protection Strategy against Social Network Phishing
Authors: Francesco Buccafurri, Celeste Romolo
Abstract:
Nowadays phishing is the most frequent starting point of cyber-attack vectors. Phishing is implemented both via email and social network messages. While a wide scientific literature exists which addresses the problem of contrasting email spam-phishing, no specific countermeasure has been so far proposed for phishing included into private messages of social network platforms. Unfortunately, the problem is severe. This paper proposes an approach against social network phishing, based on a non invasive collaborative information-sharing approach which leverages blockchain. The detection method works by filtering candidate messages, by distilling them by means of a distance-preserving hash function, and by publishing hashes over a public blockchain through a trusted smart contract (thus avoiding denial of service attacks). Phishing detection exploits social information embedded into social network profiles to identify similar messages belonging to disjoint contexts. The main contribution of the paper is to introduce a new approach to contrasting the problem of social network phishing, which, despite its severity, received little attention by both research and industry.Keywords: phishing, social networks, information sharing, blockchain
Procedia PDF Downloads 328557 The Association between Self-Efficacy and Hypertension Self-Care Behavior among Patients with Hypertension
Authors: Fazel Zinat Motlagh, Reza Chaman, Rashid Ghafari, Zahra Behzad, Ahmad Ali Eslami
Abstract:
Background: Chronic disease management requires the individual to perform several self-care behaviors. Self-efficacy, a widely used psychosocial concept, is associated with the ability to manage chronic disease. In this study, we examine the association between self-efficacy and self-care behaviors related to hypertension. Methods: In this cross-sectional study, conducted in Kohgiluye Boyer Ahmad province, the south of Iran, a total of 1836 hypertension patients, were randomly selected and participated in the study. Self-care behavior was measured with using H-SCALE (Hypertension Self-Care Activity Level Effects). Logistic regression conducted to detect correlation between self-efficacy and adherence to hypertension self-care behaviors. Results: Less than half (40.8%) of the participants reported that they have good self-efficacy to manage hypertension. Good self-efficacy was significantly associated with improve in adherence to medication (95% CI: 1.68, 1.83), eating a low-salt diet (95% CI: 1.44–1.73), physical activity (95% CI: 1.39–1.55), quit smoking (95% CI: 0.38–0.47), and weight management techniques (95% CI: 0.66–0.82). Conclusion: Hypertension self-efficacy was associated with adherence to self-care behaviors among adult with hypertension. According to our finding hypertension is a manageable condition. Self-efficacy is important factor in adherence with self-care behaviors related with hypertension.Keywords: self-efficacy, hypertension, self-care, Iran
Procedia PDF Downloads 545556 Evaluation of Corrosion Behaviour of Coatings Applied in a High-Strength Low Alloy Steel in Different Climatic Cabinets
Authors: Raquel Bayon, Ainara Lopez-Ortega, Elena Rodriguez, Amaya Igartua
Abstract:
Corrosion is one of the most concerning phenomenon that accelerates material degradation in offshore applications. In order to avoid the premature failure of metallic materials in marine environments, organic coatings have widely been used, due to their elevated corrosion resistance. Thermally-sprayed metals have recently been used in offshore applications, whereas ceramic materials are usually less employed, due to their high cost. The protectiveness of the coatings can be evaluated and categorized in corrosivity categories in accordance with the ISO 12944-6 Standard. According to this standard, for coatings that are supposed to work in marine environments, a C5-M category is required for components working out of the water or partially immersed in the splash zone, and an Im2 category for totally immersed components. C5-M/Im-2 high category would correspond to a durability of more than 20 years without maintenance in accordance with ISO 12944 and NORSOK M501 standards. In this work, the corrosion behavior of three potential coatings used in offshore applications has been evaluated. For this aim, the materials have been subjected to different environmental conditions in several climatic chambers (humidostatic, climatic, immersion, UV and salt-fog). The category of the coatings to each condition has been selected, in accordance with the previously mentioned standard.Keywords: cabinet, coatings, corrosion, offshore
Procedia PDF Downloads 420555 Optimization of Bio-Based Mixture of Canarium Luzonicum and Calcium Oxide as Coating Material for Reinforcing Steel Bars
Authors: Charizza D. Montarin, Daryl Jae S. Sigue, Gilford Estores
Abstract:
Philippines was moderately vulnerable to corrosion and to prevent this problem, surface coating should be applied. The main objective of this research was to develop and optimize a bio-based mixture of Pili Resin and Lime as Coating Materials. There are three (3) factors to be considered in choosing the best coating material such as chemical adhesion, friction, and the bearing/shear against the steel bar-concrete interface. Fortunately, both proportions of the Bio-based coating materials (50:50 and 65:35) do not have red rust formation complying with ASTM B117 but failed in terms of ASTM D 3359. Splitting failures of concrete were observed in the Unconfined Reinforced Concrete Samples. All of the steel bars (uncoated and coated) surpassed the Minimum Bond strength (NSCP 2015) about 203% to 285%. The experiments were about 1% to 3% of the results from the ANSYS Simulations with and without Salt Spray Test. Using the bio-based and epoxy coatings, normal splitting strengths were declined. However, there has no significant difference between the results. Thus, the bio-based coating materials can be used as an alternative for the epoxy coating materials and it was highly recommended for Low – Rise Building only.Keywords: Canarium luzonicum, calcium oxide, corrosion, finite element simulations
Procedia PDF Downloads 322554 Chitosan Magnetic Nanoparticles and Its Analytical Applications
Authors: Eman Alzahrani
Abstract:
Efficient extraction of proteins by removing interfering materials is necessary in proteomics, since most instruments cannot handle such contaminated sample matrices directly. In this study, chitosan-coated magnetic nanoparticles (CS-MNPs) for purification of myoglobin were successfully fabricated. First, chitosan (CS) was prepared by a deacetylation reaction during its extraction from shrimp-shell waste. Second, magnetic nanoparticles (MNPs) were synthesised, using the coprecipitation method, from aqueous Fe2+ and Fe3+ salt solutions by the addition of a base under an inert atmosphere, followed by modification of the surface of MNPs with chitosan. The morphology of the formed nanoparticles, which were about 23 nm in average diameter, was observed by transmission electron microscopy (TEM). In addition, nanoparticles were characterised using X-ray diffraction patterns (XRD), which showed the naked magnetic nanoparticles have a spinel structure and the surface modification did not result in phase change of the Fe3O4. The coating of MNPs was also demonstrated by scanning electron microscopy (SEM) analysis, energy dispersive analysis of X-ray spectroscopy (EDAX), and Fourier transform infrared (FT-IR) spectroscopy. The adsorption behaviour of MNPs and CS-MNPs towards myoglobin was investigated. It was found that the difference in adsorption capacity between MNPs and CS-MNPs was larger for CS-MNPs. This result makes CS-MNPs good adsorbents and attractive for using in protein extraction from biological samples.Keywords: chitosan, magnetic nanoparticles, coprecipitation, adsorption
Procedia PDF Downloads 416553 Synthesis, Investigation, DFT Study and Biologically Activity of Zirconium (IV) Complexes with Diammie Complexes
Authors: Salem El Ashoor, Fathia M. El-Meheishi, Ibtisam M. Diab
Abstract:
Zirconium diammin and triammin complexes can be possess biological activities, these complexes were synthesized via the reaction equimolar quantity of (1:10-phenanthroline){NC3H3(C6H2)NC3H3} (L1) or 4-4-amino phenazone {ONC6H5(NH)CH(NH2} (L2) or diphenyl carbizon {HNNCO(NH)2(C6H5)} (L3) with Zirconium Salt {ZrOCl2} in ratio (1:1) to form complexes [{NC3H3(C6H2)NC3H3}ZrOCl2}] [ZrOCl2L1], [{(O2NC6H4(NH)(NH2)}ZrOCl2] [ZrOCl2L2] and [{HNNCO(NH)2(C6H5)ZrOCl2}] [ZrOCl2L3] respectively. The characterization of these complexes were follow by using Fourier Transform Infrared (FT-IR) and UV-Visible spectroscopy. Also a variable temperature study of these complexes has been followed by using UV-Visible spectroscopy to follow electronic transform behaviors under temperature control also DFT study calculation was follow these complexes via the information from FT-IR and UV-Visible spectroscopy. A coordination number of these complexes of types five and six of the geometry can be suggested. These complexes were found to shown deferent inhibition to the growth of bacterial strains of Bacillus spp & Klebsiella spp & E.coli & proteus spp & pseudomona spp) while all complexes were in deferent's concentration (0.001, 0.2 and 1M) and the result as evidenced from the presence. For better understanding these complexes were examined by using Density functional theory (DFT) calculation.Keywords: (1:10-phenanthroline) (L1), 4-4-amino phenazone (L2), diphenyl carbizon (L3), DFT study, antibacterial
Procedia PDF Downloads 414