Search results for: pilot contamination attacks
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 2302

Search results for: pilot contamination attacks

1552 Morphology and Mineralogy of Acid Treated Soil

Authors: P. Hari Prasad Reddy, C. H. Rama Vara Prasad, G. Kalyan Kumar

Abstract:

This paper presents the morphological and mineralogical changes occurring in the soil due to immediate and prolonged interaction with different concentrations of phosphoric acid and sulphuric acid. In order to assess the effect of acid contamination, a series of sediment volume, scanning electron microscopy and X-ray diffraction analysis tests were carried out on soil samples were exposed to different concentrations (1N, 4N and 8N) of phosphoric and sulphuric acid. Experimental results show that both acids showed severe morphological and mineralogical changes with synthesis of neogenic formations mainly at higher concentrations (4N and 8N) and at prolonged duration of interaction (28 and 80 days).

Keywords: phosphoric acid, scanning electron microscopy, sulphuric acid, x-ray diffraction analysis

Procedia PDF Downloads 416
1551 Implementation of Achterbahn-128 for Images Encryption and Decryption

Authors: Aissa Belmeguenai, Khaled Mansouri

Abstract:

In this work, an efficient implementation of Achterbahn-128 for images encryption and decryption was introduced. The implementation for this simulated project is written by MATLAB.7.5. At first two different original images are used for validate the proposed design. Then our developed program was used to transform the original images data into image digits file. Finally, we used our implemented program to encrypt and decrypt images data. Several tests are done for proving the design performance including visual tests and security analysis; we discuss the security analysis of the proposed image encryption scheme including some important ones like key sensitivity analysis, key space analysis, and statistical attacks.

Keywords: Achterbahn-128, stream cipher, image encryption, security analysis

Procedia PDF Downloads 520
1550 Insider Theft Detection in Organizations Using Keylogger and Machine Learning

Authors: Shamatha Shetty, Sakshi Dhabadi, Prerana M., Indushree B.

Abstract:

About 66% of firms claim that insider attacks are more likely to happen. The frequency of insider incidents has increased by 47% in the last two years. The goal of this work is to prevent dangerous employee behavior by using keyloggers and the Machine Learning (ML) model. Every keystroke that the user enters is recorded by the keylogging program, also known as keystroke logging. Keyloggers are used to stop improper use of the system. This enables us to collect all textual data, save it in a CSV file, and analyze it using an ML algorithm and the VirusTotal API. Many large companies use it to methodically monitor how their employees use computers, the internet, and email. We are utilizing the SVM algorithm and the VirusTotal API to improve overall efficiency and accuracy in identifying specific patterns and words to automate and offer the report for improved monitoring.

Keywords: cyber security, machine learning, cyclic process, email notification

Procedia PDF Downloads 44
1549 Market Acceptance of Irradiated Food in the City of Piracicaba, Brazil

Authors: Vanessa de Cillos Silva, Fabrício José Piacente, Sônia Maria De Stefano Piedade, Valter Arthur

Abstract:

The increasing concern in relation to safety and hygiene of food consumption makes it so that food conservation is studied. Food radiation is a technique used for conservation, but many consumers associate this technique with dangers such as environmental contamination and development of diseases. This research had the objective of evaluating the acceptance of radiated products by the consumer market in the city of Piracicaba/SP-Brasil. The methodology adopted was the application of a questionnaire in the city’s supermarkets. After the application, the data was tabulated and analyzed. It was observed that the majority of interviewees would not eat irradiated food. The unfamiliarity and questions about the safety of irradiated food were the main causes of your rejection.

Keywords: irradiation, questionnaire, storage, market acceptance

Procedia PDF Downloads 396
1548 Nutritional Value of Rabbit Meat after Contamination with 1,1-Dimethylhydrazine

Authors: Balgabay Sadepovich Maikanov, Laura Tyulegenovna Auteleyeva, Seidenova Simbat Polatbekovna

Abstract:

In this article reduced nutritional value of the rabbits’ meat at 1, 1 dimethylhydrazine experimental toxicosis is shown. The assay was performed on liquid chromatograph SHIMADZU LC-20 Prominence (Japan) with fluorometric and spectrophotometric detector. This research has revealed that samples of rabbit meat of the experimental group had significant differences from the control group:in amino acids concentration from 1.2% to 9.1%; vitamin concentration from 11.2% to 60.5%, macro – minerals concentration from 17.4% to 78.1% and saturated fatty acids concentration from 17,1% to 34.5%, respectively. The decrease in the chemical composition of rabbits’ meat at 1,1 dimethylhydrazine toxicosis may be due to changes in the internal processes associated with impaired metabolic homeostasis of animals.

Keywords: 1, 1-dimethylhydrazine, metabolic homeostasis, nutritional value, rabbit meat

Procedia PDF Downloads 198
1547 An Analytical Metric and Process for Critical Infrastructure Architecture System Availability Determination in Distributed Computing Environments under Infrastructure Attack

Authors: Vincent Andrew Cappellano

Abstract:

In the early phases of critical infrastructure system design, translating distributed computing requirements to an architecture has risk given the multitude of approaches (e.g., cloud, edge, fog). In many systems, a single requirement for system uptime / availability is used to encompass the system’s intended operations. However, when architected systems may perform to those availability requirements only during normal operations and not during component failure, or during outages caused by adversary attacks on critical infrastructure (e.g., physical, cyber). System designers lack a structured method to evaluate availability requirements against candidate system architectures through deep degradation scenarios (i.e., normal ops all the way down to significant damage of communications or physical nodes). This increases risk of poor selection of a candidate architecture due to the absence of insight into true performance for systems that must operate as a piece of critical infrastructure. This research effort proposes a process to analyze critical infrastructure system availability requirements and a candidate set of systems architectures, producing a metric assessing these architectures over a spectrum of degradations to aid in selecting appropriate resilient architectures. To accomplish this effort, a set of simulation and evaluation efforts are undertaken that will process, in an automated way, a set of sample requirements into a set of potential architectures where system functions and capabilities are distributed across nodes. Nodes and links will have specific characteristics and based on sampled requirements, contribute to the overall system functionality, such that as they are impacted/degraded, the impacted functional availability of a system can be determined. A machine learning reinforcement-based agent will structurally impact the nodes, links, and characteristics (e.g., bandwidth, latency) of a given architecture to provide an assessment of system functional uptime/availability under these scenarios. By varying the intensity of the attack and related aspects, we can create a structured method of evaluating the performance of candidate architectures against each other to create a metric rating its resilience to these attack types/strategies. Through multiple simulation iterations, sufficient data will exist to compare this availability metric, and an architectural recommendation against the baseline requirements, in comparison to existing multi-factor computing architectural selection processes. It is intended that this additional data will create an improvement in the matching of resilient critical infrastructure system requirements to the correct architectures and implementations that will support improved operation during times of system degradation due to failures and infrastructure attacks.

Keywords: architecture, resiliency, availability, cyber-attack

Procedia PDF Downloads 92
1546 People Abandoning Mobile Social Games: Using Candy Crush Saga as an Example

Authors: Pei-Shan Wei, Szu-Ying Lee, Hsi-Peng Lu, Jen-Chuen Tzou, Chien-I Weng

Abstract:

Mobile social games recently become extremely popular, spawning a whole new entertainment culture. However, mobile game players are fickle, quickly and easily picking up and abandoning games. This pilot study seeks to identify factors that influence users to discontinue playing mobile social games. We identified three sacrifices which can prompt users to abandon games: monetary sacrifice, time sacrifice and privacy sacrifice. The results showed that monetary sacrifice has a greater impact than the other two factors in causing players to discontinue usage intention.

Keywords: abandon, mobile devices, mobile social games, perceived sacrifice

Procedia PDF Downloads 485
1545 Importance of Cryptosporidiosis in Dairy Calves

Authors: Mohammad Asadpour

Abstract:

Cryptosporidium spp. is zoonotic pathogens transmissible from a variety of animals to humans and is a considerable public health concern. Calves have been identified in numerous reports as a major source of environmental contamination with this pathogen. Parasite has a different species that are the cases of zoonotic disease in immunodeficient people and neonatal calves. Cryptosporidium oocysts are extremely resistant to chlorine and other physical cases that commonly used in drinking water. Reproduction of resistant oocytes is a way for this monoxenous parasite to remain in the environment. Cryptosporidium parvum is the most important species that has human and cattle genotypes. Cryptosporidium is one of the most important causes of diarrhea in neonatal calves and also, one of the four causes of diarrhea symptoms in pre-weaned calves. Because of the incompetent immune system in calves, Cryptosporidium infection is the cause of a lot of problems in raising farms.

Keywords: Cryptosporidium spp, dairy calves, importance, veterinary medicine

Procedia PDF Downloads 570
1544 A Security Study for Smart Metering Systems

Authors: Musaab Hasan, Farkhund Iqbal, Patrick C. K. Hung, Benjamin C. M. Fung, Laura Rafferty

Abstract:

In modern societies, the smart cities concept raised simultaneously with the projection towards adopting smart devices. A smart grid is an essential part of any smart city as both consumers and power utility companies benefit from the features provided by the power grid. In addition to advanced features presented by smart grids, there may also be a risk when the grids are exposed to malicious acts such as security attacks performed by terrorists. Considering advanced security measures in the design of smart meters could reduce these risks. This paper presents a security study for smart metering systems with a prototype implementation of the user interfaces for future works.

Keywords: security design, smart city, smart meter, smart grid, smart metering system

Procedia PDF Downloads 317
1543 Performance Evaluation of Acoustic-Spectrographic Voice Identification Method in Native and Non-Native Speech

Authors: E. Krasnova, E. Bulgakova, V. Shchemelinin

Abstract:

The paper deals with acoustic-spectrographic voice identification method in terms of its performance in non-native language speech. Performance evaluation is conducted by comparing the result of the analysis of recordings containing native language speech with recordings that contain foreign language speech. Our research is based on Tajik and Russian speech of Tajik native speakers due to the character of the criminal situation with drug trafficking. We propose a pilot experiment that represents a primary attempt enter the field.

Keywords: speaker identification, acoustic-spectrographic method, non-native speech, performance evaluation

Procedia PDF Downloads 439
1542 Factors Affecting Harvested Rain Water Quality and Quantity in Yatta Area, Palestine

Authors: Nibal Al-Batsh, Issam Al-Khatib, Subha Ghannam

Abstract:

Yatta is the study area for this research, located 9 km south of Hebron City in the West Bank in Palestine. It has been connected to a water network since 1974 serving nearly 85% of the households. The water network is old and inadequate to meet the needs of the population. The water supply made available to the area is also very limited, estimated to be around 20 l/c.d. Residents are thus forced to rely on water vendors which supply water with a lower quality compared to municipal water while being 400% more expensive. As a cheaper and more reliable alternative, rainwater harvesting is a common practice in the area, with the majority of the households owning at least one cistern. Rainwater harvesting is of great socio-economic importance in areas where water sources are scarce or polluted. The quality of harvested rainwater used for drinking and domestic purposes in the Yatta area was assessed throughout a year long period. A total of 100 water samples were collected from (50 rainfed cisterns) with an average capacity of 69 m3, adjacent to cement-roof catchment with an average area of 145 m2. Samples were analyzed for a number of parameters including: pH, Alkalinity, Hardness, Turbidity, Total Dissolved Solids (TDS), NO3, NH4, chloride and salinity. Microbiological contents such as Total Coliforms (TC) and Fecal Coliforms (FC) bacteria were also analyzed. Results showed that most of the rainwater samples were within WHO and EPA guidelines set for chemical parameters while revealing biological contamination. The pH values of mixed water ranged from 6.9 to 8.74 with a mean value of 7.6. collected Rainwater had lower pH values than mixed water ranging from 7.00 to 7.57 with a mean of 7.21. Rainwater also had lower average values of conductivity (389.11 µScm-1) compared to that of mixed water (463.74 µScm-1) thus indicating lower values of salinity (0.75%). The largest TDS value measured in rainwater was 316 mg/l with a mean of 199.86 mg /l. As far as microbiological quality is concerned, TC and FC were detected in 99%, 52% of collected rainwater samples, respectively. The research also addressed the impact of different socio-economic attributes on rainwater harvesting using information collected through a survey from the area. Results indicated that the majority of homeowners have the primary knowledge necessary to collect and store water in cisterns. Most of the respondents clean both the cisterns and the catchment areas. However, the research also arrives at a conclusion that cleaning is not done in a proper manner. Results show that cisterns with an operating capacity of 69 m3 would provide sufficient water to get through the dry summer months. However, the catchment area must exceed 146 m2 to produce sufficient water to fill a cistern of this size in a year receiving average precipitation.

Keywords: rainwater harvesting, runoff coefficient, water quality, microbiological contamination

Procedia PDF Downloads 272
1541 TRNG Based Key Generation for Certificateless Signcryption

Authors: S.Balaji, R.Sujatha, M. Ramakrishnan

Abstract:

Signcryption is a cryptographic primitive that fulfills both the functions of digital signature and public key encryption simultaneously in low cost when compared with the traditional signature-then-encryption approach. In this paper, we propose a novel mouse movement based key generation technique to generate secret keys which is secure against the outer and insider attacks. Tag Key Encapsulation Mechanism (KEM) process is implemented using True Random Number Generator (TRNG) method. This TRNG based key is used for data encryption in the Data Encapsulation Mechanism (DEM). We compare the statistical reports of the proposed system with the previous methods which implements TKEM based on pseudo random number generator

Keywords: pseudo random umber generator, signcryption, true random number generator, node deployment

Procedia PDF Downloads 328
1540 Examining Employee Social Intrapreneurial Behaviour (ESIB) in Kuwait: Pilot Study

Authors: Ardita Malaj, Ahmad R. Alsaber, Bedour Alboloushi, Anwaar Alkandari

Abstract:

Organizations worldwide, particularly in Kuwait, are concerned with implementing a progressive workplace culture and fostering social innovation behaviours. The main aim of this research is to examine and establish a thorough comprehension of the relationship between an inventive organizational culture, employee intrapreneurial behaviour, authentic leadership, employee job satisfaction, and employee job commitment in the manufacturing sector of Kuwait, which is a developed economy. Literature reviews analyse the core concepts and their related areas by scrutinizing their definitions, dimensions, and importance to uncover any deficiencies in existing research. The examination of relevant research uncovered major gaps in understanding. This study examines the reliability and validity of a newly developed questionnaire designed to identify the appropriate applications for a large-scale investigation. A preliminary investigation was carried out, determining a sample size of 36 respondents selected randomly from a pool of 223 samples. SPSS was utilized to calculate the percentages of the demographic characteristics for the participants, assess the credibility of the measurements, evaluate the internal consistency, validate all agreements, and determine Pearson's correlation. The study's results indicated that the majority of participants were male (66.7%), aged between 35 and 44 (38.9%), and possessed a bachelor's degree (58.3%). Approximately 94.4% of the participants were employed full-time. 72.2% of the participants are employed in the electrical, computer, and ICT sector, whilst 8.3% work in the metal industry. Out of all the departments, the human resource department had the highest level of engagement, making up 13.9% of the total. Most participants (36.1%) possessed intermediate or advanced levels of experience, whilst 21% were classified as entry-level. Furthermore, 8.3% of individuals were categorized as first-level management, 22.2% were categorized as middle management, and 16.7% were categorized as executive or senior management. Around 19.4% of the participants have over a decade of professional experience. The Pearson's correlation coefficient for all 5 components varies between 0.4009 to 0.7183. The results indicate that all elements of the questionnaire were effectively verified, with a Cronbach alpha factor predominantly exceeding 0.6, which is the criterion commonly accepted by researchers. Therefore, the work on the larger scope of testing and analysis could continue.

Keywords: pilot study, ESIB, innovative organizational culture, Kuwait, validation

Procedia PDF Downloads 23
1539 An Enhanced Digital Forensic Model for Internet of Things Forensic

Authors: Tina Wu, Andrew Martin

Abstract:

The expansion of the Internet of Things (IoT) brings a new level of threat. Attacks on IoT are already being used by criminals to form botnets, launch Distributed Denial of Service (DDoS) and distribute malware. This opens a whole new digital forensic arena to develop forensic methodologies in order to have the capability to investigate IoT related crimes. However, existing proposed IoT forensic models are still premature requiring further improvement and validation, many lack details on the acquisition and analysis phase. This paper proposes an enhanced theoretical IoT digital forensic model focused on identifying and acquiring the main sources of evidence in a methodical way. In addition, this paper presents a theoretical acquisition framework of the different stages required in order to be capable of acquiring evidence from IoT devices.

Keywords: acquisition, Internet of Things, model, zoning

Procedia PDF Downloads 256
1538 Proposal Evaluation of Critical Success Factors (CSF) in Lean Manufacturing Projects

Authors: Guilherme Gorgulho, Carlos Roberto Camello Lima

Abstract:

Critical success factors (CSF) are used to design the practice of project management that can lead directly or indirectly to the success of the project. This management includes many elements that have to be synchronized in order to ensure the project on-time delivery, quality and the lowest possible cost. The objective of this work is to develop a proposal for evaluation of the FCS in lean manufacturing projects, and apply the evaluation in a pilot project. The results show that the use of continuous improvement programs in organizations brings benefits as the process cost reduction and improve productivity.

Keywords: continuous improvement, critical success factors (csf), lean thinking, project management

Procedia PDF Downloads 352
1537 Currently Use Pesticides: Fate, Availability, and Effects in Soils

Authors: Lucie Bielská, Lucia Škulcová, Martina Hvězdová, Jakub Hofman, Zdeněk Šimek

Abstract:

The currently used pesticides represent a broad group of chemicals with various physicochemical and environmental properties which input has reached 2×106 tons/year and is expected to even increases. From that amount, only 1% directly interacts with the target organism while the rest represents a potential risk to the environment and human health. Despite being authorized and approved for field applications, the effects of pesticides in the environment can differ from the model scenarios due to the various pesticide-soil interactions and resulting modified fate and behavior. As such, a direct monitoring of pesticide residues and evaluation of their impact on soil biota, aquatic environment, food contamination, and human health should be performed to prevent environmental and economic damages. The present project focuses on fluvisols as they are intensively used in the agriculture but face to several environmental stressors. Fluvisols develop in the vicinity of rivers by the periodic settling of alluvial sediments and periodic interruptions to pedogenesis by flooding. As a result, fluvisols exhibit very high yields per area unit, are intensively used and loaded by pesticides. Regarding the floods, their regular contacts with surface water arise from serious concerns about the surface water contamination. In order to monitor pesticide residues and assess their environmental and biological impact within this project, 70 fluvisols were sampled over the Czech Republic and analyzed for the total and bioaccessible amounts of 40 various pesticides. For that purpose, methodologies for the pesticide extraction and analysis with liquid chromatography-mass spectrometry technique were developed and optimized. To assess the biological risks, both the earthworm bioaccumulation tests and various types of passive sampling techniques (XAD resin, Chemcatcher, and silicon rubber) were optimized and applied. These data on chemical analysis and bioavailability were combined with the results of soil analysis, including the measurement of basic physicochemical soil properties as well detailed characterization of soil organic matter with the advanced method of diffuse reflectance infrared spectrometry. The results provide unique data on the residual levels of pesticides in the Czech Republic and on the factors responsible for increased pesticide residue levels that should be included in the modeling of pesticide fate and effects.

Keywords: currently used pesticides, fluvisoils, bioavailability, Quechers, liquid-chromatography-mass spectrometry, soil properties, DRIFT analysis, pesticides

Procedia PDF Downloads 455
1536 UV Resistibility of a Carbon Nanofiber Reinforced Polymer Composite

Authors: A. Evcin, N. Çiçek Bezir, R. Duman, N. Duman

Abstract:

Nowadays, a great concern is placed on the harmfulness of ultraviolet radiation (UVR) which attacks human bodies. Nanocarbon materials, such as carbon nanotubes (CNTs), carbon nanofibers (CNFs) and graphene, have been considered promising alternatives to shielding materials because of their excellent electrical conductivities, very high surface areas and low densities. In the present work, carbon nanofibers have been synthesized from solutions of Polyacrylonitrile (PAN)/ N,N-dimethylformamide (DMF) by electrospinning method. The carbon nanofibers have been stabilized by oxidation at 250 °C for 2 h in air and carbonized at 750 °C for 1 h in H2/N2. We present the fabrication and characterization of transparent and ultraviolet (UV) shielding CNF/polymer composites. The content of CNF filler has been varied from 0.2% to 0.6 % by weight. UV Spectroscopy has been performed to study the effect of composition on the transmittance of polymer composites.

Keywords: electrospinning, carbon nanofiber, characterization, composites, nanofiber, ultraviolet radiation

Procedia PDF Downloads 215
1535 Cryptographic Protocol for Secure Cloud Storage

Authors: Luvisa Kusuma, Panji Yudha Prakasa

Abstract:

Cloud storage, as a subservice of infrastructure as a service (IaaS) in Cloud Computing, is the model of nerworked storage where data can be stored in server. In this paper, we propose a secure cloud storage system consisting of two main components; client as a user who uses the cloud storage service and server who provides the cloud storage service. In this system, we propose the protocol schemes to guarantee against security attacks in the data transmission. The protocols are login protocol, upload data protocol, download protocol, and push data protocol, which implement hybrid cryptographic mechanism based on data encryption before it is sent to the cloud, so cloud storage provider does not know the user's data and cannot analysis user’s data, because there is no correspondence between data and user.

Keywords: cloud storage, security, cryptographic protocol, artificial intelligence

Procedia PDF Downloads 347
1534 Effect of Low Level Laser for Athletic Achilles Tendinopathy: A Systematic Review

Authors: Sameh Eldaly, Rola Essam

Abstract:

Objective: The purpose of this study was to determine the benefits of low-level laser therapy for Athletic Achilles Tendinopathy. Data sources: Search strategies were conducted on 2 Randomized control trial and one pilot study. Results: three trials (103 participants) were analyzed. Laser therapy associated to eccentric exercises, when compared to eccentric exercises and placebo, had low to very low certainty of evidence in pain and function assessment. Conclusion: those three trials evidenced low to very low effect of LLLT, and the results are insufficient to support the routine use LLLT for Achilles tendinopathy.

Keywords: achilles tendinopathy, evidence-based, low-level laser therapy, review

Procedia PDF Downloads 72
1533 Deformulation and Comparative Analysis of Apparently Similar Polymers Using Multiple Modes of Pyrolysis-Gc/Ms

Authors: Athena Nguyen, Rojin Belganeh

Abstract:

Detecting and identifying differences in like polymer materials are key factors in deformulation, comparative analysis as well as reverse engineering. Pyrolysis-GC/MS is an easy solid sample introduction technique which expands the application areas of gas chromatography and mass spectrometry. The Micro-furnace pyrolyzer is directly interfaced with the GC injector preventing any potential of cold spot, carryover, and cross contamination. This presentation demonstrates the study of two similar polymers by performing different mode of operations in the same system: Evolve gas analysis (EGA), Flash pyrolysis, Thermal desorption analysis, and Heart-cutting analysis. Unknown polymer materials and their chemical compositions are identified.

Keywords: gas chromatography/mass spectrometry, pyrolysis, pyrolyzer, thermal desorption-GC/MS

Procedia PDF Downloads 249
1532 Groundwater Quality Monitoring in the Shoush Suburbs, Khouzestan Province, Iran

Authors: Mohammad Tahsin Karimi Nezhad, Zaynab Shadbahr, Ali Gholami

Abstract:

In recent years many attempts have been made to assess groundwater contamination by nitrates worldwide. The assessment of spatial and temporal variations of physico-chemical parameters of water is necessary to mange water quality. The objectives of the study were to evaluate spatial variability and temporal changes of hydrochemical factors by water sampling from 24 wells in the Shoush City suburb. The analysis was conducted for the whole area and for different land use and geological classes. In addition, nitrate concentration variability with descriptive parameters such as sampling depth, dissolved oxygen, and on ground nitrogen loadings was also investigated The results showed that nitrate concentrations did not exceed the standard limit (50 mg/l). EC of water samples, ranged from 900 to 1200 µs/cm, TDS from 775 to 830 mg/l and pH from 5.6 to 9.

Keywords: groundwater, GIS, water quality, Iran

Procedia PDF Downloads 422
1531 Hyperchaos-Based Video Encryption for Device-To-Device Communications

Authors: Samir Benzegane, Said Sadoudi, Mustapha Djeddou

Abstract:

In this paper, we present a software development of video streaming encryption for Device-to-Device (D2D) communications by using Hyperchaos-based Random Number Generator (HRNG) implemented in C#. The software implements and uses the proposed HRNG to generate key stream for encrypting and decrypting real-time video data. The used HRNG consists of Hyperchaos Lorenz system which produces four signal outputs taken as encryption keys. The generated keys are characterized by high quality randomness which is confirmed by passing standard NIST statistical tests. Security analysis of the proposed encryption scheme confirms its robustness against different attacks.

Keywords: hyperchaos Lorenz system, hyperchaos-based random number generator, D2D communications, C#

Procedia PDF Downloads 354
1530 The Exploitation of the MOSES Project Outcomes on Supply Chain Optimisation

Authors: Reza Karimpour

Abstract:

Ports play a decisive role in the EU's external and internal trade, as about 74% of imports and exports and 37% of exchanges go through ports. Although ports, especially Deep Sea Shipping (DSS) ports, are integral nodes within multimodal logistic flows, Short Sea Shipping (SSS) and inland waterways are not so well integrated. The automated vessels and supply chain optimisations for sustainable shortsea shipping (MOSES) project aims to enhance the short sea shipping component of the European supply chain by addressing the vulnerabilities and strains related to the operation of large containerships. The MOSES concept can be shortly described as a large containership (mother-vessel) approaching a DSS port (or a large container terminal). Upon her arrival, a combined intelligent mega-system consisting of the MOSES Autonomous tugboat swarm for manoeuvring and the MOSES adapted AutoMoor system. Then, container handling processes are ready to start moving containers to their destination via hinterland connections (trucks and/or rail) or to be shipped to destinations near small ports (on the mainland or island). For the first case, containers are stored in a dedicated port area (Storage area), waiting to be moved via trucks and/or rail. For the second case, containers are stacked by existing port equipment near-dedicated berths of the DSS port. They then are loaded on the MOSES Innovative Feeder Vessel, equipped with the MOSES Robotic Container-Handling System that provides (semi-) autonomous (un) feeding of the feeder. The Robotic Container-Handling System is remotely monitored through a Shore Control Centre. When the MOSES innovative Feeder vessel approaches the small port, where her docking is achieved without tugboats, she automatically unloads the containers using the Robotic Container-Handling System on the quay or directly on trucks. As a result, ports with minimal or no available infrastructure may be effectively integrated with the container supply chain. Then, the MOSES innovative feeder vessel continues her voyage to the next small port, or she returns to the DSS port. MOSES exploitation activity mainly aims to exploit research outcomes beyond the project, facilitate utilisation of the pilot results by others, and continue the pilot service after the project ends. By the mid-lifetime of the project, the exploitation plan introduces the reader to the MOSES project and its key exploitable results. It provides a plan for delivering the MOSES innovations to the market as part of the overall exploitation plan.

Keywords: automated vessels, exploitation, shortsea shipping, supply chain

Procedia PDF Downloads 98
1529 Molecular Detection of Staphylococcus aureus in the Pork Chain Supply and the Potential Anti-Staphylococcal Activity of Natural Compounds

Authors: Valeria Velasco, Ana M. Bonilla, José L. Vergara, Alcides Lofa, Jorge Campos, Pedro Rojas-García

Abstract:

Staphylococcus aureus is both commensal bacterium and opportunistic pathogen that can cause different diseases in humans and can rapidly develop antimicrobial resistance. Since this bacterium has the ability to colonize the nares and skin of humans and animals, there is a risk of contamination of food in different steps of the food chain supply. Emerging strains have been detected in food-producing animals and meat, such as methicillin-resistant S. aureus (MRSA). The aim of this study was to determine the prevalence and oxacillin susceptibility of S. aureus in the pork chain supply in Chile and to suggest some natural antimicrobials for control. A total of 487 samples were collected from pigs (n=332), carcasses (n=85), and retail pork meat (n=70). Presumptive S. aureus colonies were isolated by selective enrichment and culture media. The confirmation was carried out by biochemical testing (Api® Staph) and molecular technique PCR (detection of nuc and mecA genes, associated with S. aureus and methicillin resistance, respectively). The oxacillin (β-lactam antibiotic that replaced methicillin) susceptibility was assessed by minimum inhibitory concentration (MIC) using the Epsilometer test (Etest). A preliminary assay was carried out to test thymol, carvacrol, oregano essential oil (Origanum vulgare L.), Maqui or Chilean wineberry extract (Aristotelia chilensis (Mol.) Stuntz) as anti-staphylococcal agents using the disc diffusion method at different concentrations. The overall prevalence of S. aureus in the pork chain supply reached 33.9%. A higher prevalence of S. aureus was determined in carcasses (56.5%) than in pigs (28.3%) and pork meat (32.9%) (P ≤ 0.05). The prevalence of S. aureus in pigs sampled at farms (40.6%) was higher than in pigs sampled at slaughterhouses (23.3%) (P ≤ 0.05). The contamination of no packaged meat with S. aureus (43.1%) was higher than in packaged meat (5.3%) (P ≤ 0.05). The mecA gene was not detected in S. aureus strains isolated in this study. Two S. aureus strains exhibited oxacillin resistance (MIC ≥ 4µg/mL). Anti-staphylococcal activity was detected in solutions of thymol, carvacrol, and oregano essential oil at all concentrations tested. No anti-staphylococcal activity was detected in Maqui extract. Finally, S. aureus is present in the pork chain supply in Chile. Although the mecA gene was not detected, oxacillin resistance was found in S. aureus and could be attributed to another resistance mechanism. Thymol, carvacrol, and oregano essential oil could be used as anti-staphylococcal agents at low concentrations. Research project Fondecyt No. 11140379.

Keywords: antimicrobials, mecA gen, nuc gen, oxacillin susceptibility, pork meat

Procedia PDF Downloads 214
1528 Mutual Authentication for Sensor-to-Sensor Communications in IoT Infrastructure

Authors: Shadi Janbabaei, Hossein Gharaee Garakani, Naser Mohammadzadeh

Abstract:

Internet of things is a new concept that its emergence has caused ubiquity of sensors in human life, so that at any time, all data are collected, processed and transmitted by these sensors. In order to establish a secure connection, the first challenge is authentication between sensors. However, this challenge also requires some features so that the authentication is done properly. Anonymity, untraceability, and being lightweight are among the issues that need to be considered. In this paper, we have evaluated the authentication protocols and have analyzed the security vulnerabilities found in them. Then an improved light weight authentication protocol for sensor-to-sensor communications is presented which uses the hash function and logical operators. The analysis of protocol shows that security requirements have been met and the protocol is resistant against various attacks. In the end, by decreasing the number of computational cost functions, it is argued that the protocol is lighter than before.

Keywords: anonymity, authentication, Internet of Things, lightweight, un-traceability

Procedia PDF Downloads 278
1527 Lead in The Blood and Hypertension in Indonesia: A Systematic Review

Authors: Ainia Nurul Aqida

Abstract:

Lead is one of the sources of air pollution. The use of lead on motor vehicle fuels resulted in the increasing contamination of lead in the air. The polluted air that has been inhaled by many people, especially guards and sellers of retail gasoline filling stations. The impact is increased levels of lead in blood. One result is an increase in blood pressure that causes hypertension. This research would like to know the relationship between blood lead levels in the incidence of hypertension in Indonesia. The method used in this study is a systematic review of the three journals have been published in the year 2007 to the year 2010 with the total sample is 312 samples. Odd ratio values obtained in the first article was OR = 6.50 pvalue = 0.000, CI = 95 % (2.89 to 14.60), and the second article was obtained OR 2.619 (95 % CI: 0.944 to 7.625) pvalue = 0.028, and the third article was obtained 0.002 r = 0.324 R2 = 10.5 %. Over all, there is a relationship between blood lead levels with the incidence of hypertension in Indonesia.

Keywords: lead, blood, air pollution, hypertension

Procedia PDF Downloads 311
1526 Secure E-Pay System Using Steganography and Visual Cryptography

Authors: K. Suganya Devi, P. Srinivasan, M. P. Vaishnave, G. Arutperumjothi

Abstract:

Today’s internet world is highly prone to various online attacks, of which the most harmful attack is phishing. The attackers host the fake websites which are very similar and look alike. We propose an image based authentication using steganography and visual cryptography to prevent phishing. This paper presents a secure steganographic technique for true color (RGB) images and uses Discrete Cosine Transform to compress the images. The proposed method hides the secret data inside the cover image. The use of visual cryptography is to preserve the privacy of an image by decomposing the original image into two shares. Original image can be identified only when both qualified shares are simultaneously available. Individual share does not reveal the identity of the original image. Thus, the existence of the secret message is hard to be detected by the RS steganalysis.

Keywords: image security, random LSB, steganography, visual cryptography

Procedia PDF Downloads 319
1525 Bacterial Decontamination of Nurses' White Coats by Application of Antimicrobial Finish

Authors: Priyanka Gupta, Nilanjana Bairagi, Deepti Gupta

Abstract:

New pathogenic strains of microbes are continually emerging and resistance of bacteria to antibiotics is growing. Hospitals in India have a high burden of infections in their intensive care units and general wards. Rising incidence of hospital infections is a matter of great concern in India. This growth is often attributed to the absence of effective infection control strategies in healthcare facilities. Government, therefore, is looking for cost effective strategies that are effective against HAIs. One possible method is by application of an antimicrobial finish on the uniform. But there are limited studies to show the effect of antimicrobial activity of antimicrobial finish treated nurses’ uniforms in a real hospital set up. This paper proposes a prospective non-destructive sampling technique, based on the use of a detachable fabric patch, to assess the effectiveness of silver based antimicrobial agent across five wards in a tertiary care government hospital in Delhi, India. Fabrics like polyester and polyester cotton blend fabric which are more prevalent for making coats were selected for the study. Polyester and polyester cotton blend fabric was treated with silver based antimicrobial (AM) finish. At the beginning of shift, a composite patch of untreated and treated fabric respectively was stitched on the abdominal region on the left and right side of the washed white coat of participating nurse. At the end of the shift, the patch was removed and taken for bacterial sampling on Brain Heart Infusion (BHI) plates. Microbial contamination on polyester and blend fabrics after 6 hours shift was compared in Brain Heart Infusion broth (BHI). All patches treated with silver based antimicrobial agent showed decreased bacterial counts. Percent reduction in the bacterial colonies after the antimicrobial treatment in both fabrics was 81.0 %. Antimicrobial finish was equally effective in reducing microbial adhesion on both fabric types. White coats of nurses become progressively contaminated during clinical care. Type of fabric used to make the coat can affect the extent of contamination which is higher on polyester cotton blend as compared to 100% polyester. The study highlights the importance of silver based antimicrobial finish in the area of uniform hygiene. Bacterial load can be reduced by using antimicrobial finish on hospital uniforms. Hospital staff uniforms endowed with antimicrobial properties may be of great help in reducing the occurrence and spread of infections.

Keywords: antimicrobial finish, bacteria, infection control, silver, white coat

Procedia PDF Downloads 200
1524 Collateral Impact of Water Resources Development in an Arsenic Affected Village of Patna District

Authors: Asrarul H. Jeelani

Abstract:

Arsenic contamination of groundwater and its’ health implications in lower Gangetic plain of Indian states started reporting in the 1980s. The same period was declared as the first water decade (1981-1990) to achieve ‘water for all.’ To fulfill the aim, the Indian government, with the support of international agencies installed millions of hand-pumps through water resources development programs. The hand-pumps improve the accessibility if the groundwater, but over-extraction of it increases the chances of mixing of trivalent arsenic which is more toxic than pentavalent arsenic of dug well water in Gangetic plain and has different physical manifestations. Now after three decades, Bihar (middle Gangetic plain) is also facing arsenic contamination of groundwater and its’ health implications. Objective: This interdisciplinary research attempts to understand the health and social implications of arsenicosis among different castes in Haldi Chhapra village and to find the association of ramifications with water resources development. Methodology: The Study used concurrent quantitative dominant mix method (QUAN+qual). The researcher had employed household survey, social mapping, interviews, and participatory interactions. However, the researcher used secondary data for retrospective analysis of hand-pumps and implications of arsenicosis. Findings: The study found 88.5% (115) household have hand-pumps as a source of water however 13.8% uses purified supplied water bottle and 3.6% uses combinations of hand-pump, bottled water and dug well water for drinking purposes. Among the population, 3.65% of individuals have arsenicosis, and 2.72% of children between the age group of 5 to 15 years are affected. The caste variable has also emerged through quantitative as well as geophysical locations analysis as 5.44% of arsenicosis manifested individual belong to scheduled caste (SC), 3.89% to extremely backward caste (EBC), 2.57% to backward caste (BC) and 3% to other. Among three clusters of arsenic poisoned locations, two belong to SC and EBC. The village as arsenic affected is being discriminated, whereas the affected individual is also facing discrimination, isolation, stigma, and problem in getting married. The forceful intervention to install hand-pumps in the first water decades and later restructuring of the dug well destroyed a conventional method of dug well cleaning. Conclusion: The common manifestation of arsenicosis has increased by 1.3% within six years of span in the village. This raised the need for setting up a proper surveillance system in the village. It is imperative to consider the social structure for arsenic mitigation program as this research reveals caste as a significant factor. The health and social implications found in the study; retrospectively analyzed as the collateral impact of water resource development programs in the village.

Keywords: arsenicosis, caste, collateral impact, water resources

Procedia PDF Downloads 102
1523 A Strategic Communication Design Model for Indigenous Knowledge Management

Authors: Dilina Janadith Nawarathne

Abstract:

This article presents the initial development of a communication model (Model_isi) as the means of gathering, preserving and transferring indigenous knowledge in the field of knowledge management. The article first discusses the need for an appropriate complimentary model for indigenous knowledge management which differs from the existing methods and models. Then the paper suggests the newly developed model for indigenous knowledge management which generate as result of blending key aspects of different disciplines, which can be implemented as a complementary approach for the existing scientific method. The paper further presents the effectiveness of the developed method in reflecting upon a pilot demonstration carried out on selected indigenous communities of Sri Lanka.

Keywords: indigenous knowledge management, knowledge transferring, tacit knowledge, research model, asian centric philosophy

Procedia PDF Downloads 467