Search results for: salt and peppers attacks
522 Status, Habitat Use, and Behaviour of Wintering Greater Flamingos Phoenicopterus roseus in Semi-Arid and Saharan Wetlands of Algeria
Authors: E. Bensaci, M. Saheb, Y. Nouidjem, A. Zoubiri, A. Bouzegag, M. Houhamdi
Abstract:
The Greater flamingo is considered the flagship species of wetlands across semi-arid and Saharan regions of Africa, especially Chotts and Sebkhas, which also concentrate significant numbers of bird species. Flamingos have different status (wintering and breeder) which vary between sites in different parts of Algeria. We conducted surveys and recorded banded flamingos across distinct regions within two climatic belts: semi-arid (Hauts Plateaux) and arid (Sahara), showing the importance of these sites in the migratory flyways particularly the relation between West Mediterranean and West Africa populations. The distribution of Greater flamingos varied between sites and seasons, where the concentrations mainly were in the wide, lees deep and salt lakes. Many of the sites (17) in the surveyed area were regularly supporting at least 1% of the regional population during winter. The analysis of Greater flamingos behaviour in different climatic regions in relation showed that the feeding is the dominant diurnal activity with rates exceeding 60% of the time. While feeding varies between seasons, and showed a negative relationship with the degree of disturbance.Keywords: Algeria, greater flamingo, Phoenicopterus roseus, Sahara, semi-arid
Procedia PDF Downloads 510521 DH-Students Promoting Underage Asylum Seekers' Oral Health in Finland
Authors: Eeva Wallenius-Nareneva, Tuula Toivanen-Labiad
Abstract:
Background: Oral health promotion event was organised for forty Afghanistan, Iraqi and Bangladeshi underage asylum seekers in Finland. The invitation to arrange this coaching occasion was accepted in the Degree Programme in Oral Hygiene in Metropolia. The personnel in the reception center found the need to improve oral health among the youngsters. The purpose was to strengthen the health literacy of the boys in their oral self-care and to reduce dental fears. The Finnish studies, especially the terminology of oral health was integrated to coaching with the help of interpreters. Cooperative learning was applied. Methods: Oral health was interactively discussed in four study group sessions: 1. The importance of healthy eating habits; - Good and bad diets, - Regular meals, - Acid attack o Xylitol. 2. Oral diseases − connection to general health; - Aetiology of gingivitis, periodontitis and caries, - Harmfulness of smoking 3. Tools and techniques for oral self-care; - Brushing and inter dental cleaning. 4. Sharing earlier dental care experiences; - Cultural differences, - Dental fear, - Regular check-ups. Results: During coaching deficiencies appeared in brushing and inter dental cleaning techniques. Some boys were used to wash their mouth with salt justifying it by salt’s antiseptic properties. Many brushed their teeth by vertical movements. The boys took feedback positively when a demonstration with model jaws revealed the inefficiency of the technique. The advantages of fluoride tooth paste were advised. Dental care procedures were new and frightening for many boys. Finnish dental care system was clarified. The safety and indolence of the treatments and informed consent were highlighted. Video presentations and the dialog lowered substantially the threshold to visit dental clinic. The occasion gave the students means for meeting patients from different cultural and language backgrounds. The information hidden behind the oral health problems of the asylum seekers was valuable. Conclusions: Learning dental care practices used in different cultures is essential for dental professionals. The project was a good start towards multicultural oral health care. More experiences are needed before graduation. Health education themes should be held simple regardless of the target group. The heterogeneity of the group does not pose a problem. Open discussion with questions leading to the theme works well in clarifying the target group’s knowledge level. Sharing own experiences strengthens the sense of equality among the participants and encourages them to express own opinions. Motivational interview method turned out to be successful. In the future coaching occasions must confirm active participation of everyone. This could be realized by dividing the participants to even smaller groups. The different languages impose challenges but they can be solved by using more interpreters. Their presence ensures that everyone understands the issues properly although the use of plain and sign languages are helpful. In further development, it would be crucial to arrange a rehearsal occasion to the same participants in two/three months’ time. This would strengthen the adaption of self-care practices and give the youngsters opportunity to pose more open questions. The students would gain valuable feedback regarding the effectiveness of their work.Keywords: cooperative learning, interactive methods, motivational interviewing, oral health promotion, underage asylum seekers
Procedia PDF Downloads 290520 Sharing Experience in Authentic Learning for Mobile Security
Abstract:
Mobile devices such as smartphones are getting more and more popular in our daily lives. The security vulnerability and threat attacks become a very emerging and important research and education topic in computing security discipline. There is a need to have an innovative mobile security hands-on laboratory to provide students with real world relevant mobile threat analysis and protection experience. This paper presents an authentic teaching and learning mobile security approach with smartphone devices which covers most important mobile threats in most aspects of mobile security. Each lab focuses on one type of mobile threats, such as mobile messaging threat, and conveys the threat analysis and protection in multiple ways, including lectures and tutorials, multimedia or app-based demonstration for threats analysis, and mobile app development for threat protections. This authentic learning approach is affordable and easily-adoptable which immerse students in a real world relevant learning environment with real devices. This approach can also be applied to many other mobile related courses such as mobile Java programming, database, network, and any security relevant courses so that can learn concepts and principles better with the hands-on authentic learning experience.Keywords: mobile computing, Android, network, security, labware
Procedia PDF Downloads 406519 An Effective Route to Control of the Safety of Accessing and Storing Data in the Cloud-Based Data Base
Authors: Omid Khodabakhshi, Amir Rozdel
Abstract:
The subject of cloud computing security research has allocated a number of challenges and competitions because the data center is comprised of complex private information and are always faced various risks of information disclosure by hacker attacks or internal enemies. Accordingly, the security of virtual machines in the cloud computing infrastructure layer is very important. So far, there are many software solutions to develop security in virtual machines. But using software alone is not enough to solve security problems. The purpose of this article is to examine the challenges and security requirements for accessing and storing data in an insecure cloud environment. In other words, in this article, a structure is proposed for the implementation of highly isolated security-sensitive codes using secure computing hardware in virtual environments. It also allows remote code validation with inputs and outputs. We provide these security features even in situations where the BIOS, the operating system, and even the super-supervisor are infected. To achieve these goals, we will use the hardware support provided by the new Intel and AMD processors, as well as the TPM security chip. In conclusion, the use of these technologies ultimately creates a root of dynamic trust and reduces TCB to security-sensitive codes.Keywords: code, cloud computing, security, virtual machines
Procedia PDF Downloads 191518 Experimental Investigation of Damaged Reinforced Concrete Beams Repaired with Carbon Fibre Reinforced Polymer (CFRP) Strip under Impact Loading
Authors: M. Al-Farttoosi, M. Y. Rafiq, J. Summerscales, C. Williams
Abstract:
Many buildings and bridges are damaged due to impact loading, explosions, terrorist attacks and wars. Most of the damaged structures members such as beams, columns and slabs are not totally failed and it can be repaired. Nowadays, carbon fibre reinforced polymer CFRP has been wildly used in strengthening and retrofitting the structures members. CFRP can rector the load carrying capacity of the damaged structures members to make them serviceable. An experimental investigation was conducted to investigate the impact behaviour of the damaged beams repaired with CFRP. The tested beams had different degrees of damage and near surface mounted technique NSM was used to install the CFRP. A heavy drop weight impact test machine was used to conduct the experimental work. The study investigated the impact strength, stiffness, cracks and deflection of the CFRP repaired beams. The results show that CFRP significantly increased the impact resistance of the damaged beams. CFRP increased the damaged beams stiffness and reduced the deflection. The results showed that the NSM technique is more effective in repairing beams and preventing the debonding of the CFRP.Keywords: damaged, concrete, impact, repaired
Procedia PDF Downloads 344517 Measurement of Susceptibility Users Using Email Phishing Attack
Authors: Cindy Sahera, Sarwono Sutikno
Abstract:
Rapid technological developments also have negative impacts, namely the increasing criminal cases based on technology or cybercrime. One technique that can be used to conduct cybercrime attacks are phishing email. The issue is whether the user is aware that email can be misused by others so that it can harm the user's own? This research was conducted to measure the susceptibility of selected targets against email abuse. The objectives of this research are measurement of targets’ susceptibility and find vulnerability in email recipient. There are three steps being taken in this research, (1) the information gathering phase, (2) the design phase, and (3) the execution phase. The first step includes the collection of the information necessary to carry out an attack on a target. The next step is to make the design of an attack against a target. The last step is to send phishing emails to the target. The levels of susceptibility are three: level 1, level 2 and level 3. Level 1 indicates a low level of targets’ susceptibility, level 2 indicates the intermediate level of targets’ susceptibility, and level 3 indicates a high level of targets’ susceptibility. The results showed that users who are on level 1 and level 2 more that level 3, which means the user is not too careless. However, it does not mean the user to be safe. There are still vulnerabilities that may occur, such as automatic location detection when opening emails and automatic downloaded malware as user clicks a link in the email.Keywords: cybercrime, email phishing, susceptibility, vulnerability
Procedia PDF Downloads 287516 Human Wildlife Conflict Outside Protected Areas of Nepal: Causes, Consequences and Mitigation Strategies
Authors: Kedar Baral
Abstract:
This study was carried out in Mustang, Kaski, Tanahun, Baitadi, and Jhapa districts of Nepal. The study explored the spatial and temporal pattern of HWC, socio economic factors associated with it, impacts of conflict on life / livelihood of people and survival of wildlife species, and impact of climate change and forest fire onHWC. Study also evaluated people’s attitude towards wildlife conservation and assessed relevant policies and programs. Questionnaire survey was carried out with the 250 respondents, and both socio-demographic and HWC related information werecollected. Secondary information were collected from Divisional Forest Offices and Annapurna Conservation Area Project.HWC events were grouped by season /months/sites (forest type, distances from forest, and settlement), and the coordinates of the events were exported to ArcGIS. Collected data were analyzed using descriptive statistics in Excel and R Program. A total of 1465 events were recorded in 5 districts during 2015 and 2019. Out of that, livestock killing, crop damage, human attack, and cattle shed damage events were 70 %, 12%, 11%, and 7%, respectively. Among 151 human attack cases, 23 people were killed, and 128 were injured. Elephant in Terai, common leopard and monkey in Middle Mountain, and snow leopard in high mountains were found as major problematic animals. Common leopard attacks were found more in the autumn, evening, and on human settlement area. Whereas elephant attacks were found higher in winter, day time, and on farmland. Poor people farmers were found highly victimized, and they were losing 26% of their income due to crop raiding and livestock depredation. On the other hand, people are killing many wildlife in revenge, and this number is increasing every year. Based on the people's perception, climate change is causing increased temperature and forest fire events and decreased water sources within the forest. Due to the scarcity of food and water within forests, wildlife are compelled to dwell at human settlement area, hence HWC events are increasing. Nevertheless, more than half of the respondents were found positive about conserving entire wildlife species. Forests outside PAs are under the community forestry (CF) system, which restored the forest, improved the habitat, and increased the wildlife.However, CF policies and programs were found to be more focused on forest management with least priority on wildlife conservation and HWC mitigation. Compensation / relief scheme of government for wildlife damage was found some how effective to manage HWC, but the lengthy process, being applicable to the damage of few wildlife species and highly increasing events made it necessary to revisit. Based on these facts, the study suggest to carry out awareness generation activities to the poor farmers, linking the property of people with the insurance scheme, conducting habitat management activities within CF, promoting the unpalatable crops, improvement of shed house of livestock, simplifying compensation scheme and establishing a fund at the district level and incorporating the wildlife conservation and HWCmitigation programs in CF. Finally, the study suggests to carry out rigorous researches to understand the impacts of current forest management practices on forest, biodiversity, wildlife, and HWC.Keywords: community forest, conflict mitigation, wildlife conservation, climate change
Procedia PDF Downloads 117515 An Analyze on ISIS Terror Organization: The Reasons That Emerged ISIS and Its Effects on Both Local and Global Security
Authors: Serkan Kocapinar
Abstract:
Since June 2014, the extremist terrorist group known as the Islamic State of Iraq and the Levant, with its financial resources, as well as the world’s richest in terms of human resources, is a terrorist organization utilizing the most advanced weapons. It has established a state in the occupied region, appointed provincial and district managers, and declared the so-called Caliphate. Despite being a terrorist organization, it is selling the oil which it has seized from the captured regions with low prices. Consequently, it has been achieving great income from these sales. Currently the actual number of terrorists in the area is around from 20,000 to 31,000 according to the CIA assessment. It is estimated that it has extended its domain beyond from the Middle East to the Asia-Pacific coast and has had millions of supporters worldwide. In addition, it is claimed that it has several sleeper cells in some countries and could perform very catastrophic attacks to the countries fighting against it by activating its cells when necessary. The sharp rise of ISIS in just a year has also attracted the attention of terrorist groups such as Boko Haram around the world and some groups expressed their allegiance to ISIS. With this growing power and influence, ISIS is becoming more and more effective threat for not only the region but also for the entire world. The purpose of this study is to show what lies under the rising of ISIS terror organization and how it affects the security concerns.Keywords: ISIS, security, terrorism, threats
Procedia PDF Downloads 293514 Real-Time Network Anomaly Detection Systems Based on Machine-Learning Algorithms
Authors: Zahra Ramezanpanah, Joachim Carvallo, Aurelien Rodriguez
Abstract:
This paper aims to detect anomalies in streaming data using machine learning algorithms. In this regard, we designed two separate pipelines and evaluated the effectiveness of each separately. The first pipeline, based on supervised machine learning methods, consists of two phases. In the first phase, we trained several supervised models using the UNSW-NB15 data-set. We measured the efficiency of each using different performance metrics and selected the best model for the second phase. At the beginning of the second phase, we first, using Argus Server, sniffed a local area network. Several types of attacks were simulated and then sent the sniffed data to a running algorithm at short intervals. This algorithm can display the results of each packet of received data in real-time using the trained model. The second pipeline presented in this paper is based on unsupervised algorithms, in which a Temporal Graph Network (TGN) is used to monitor a local network. The TGN is trained to predict the probability of future states of the network based on its past behavior. Our contribution in this section is introducing an indicator to identify anomalies from these predicted probabilities.Keywords: temporal graph network, anomaly detection, cyber security, IDS
Procedia PDF Downloads 103513 Lightweight Cryptographically Generated Address for IPv6 Neighbor Discovery
Authors: Amjed Sid Ahmed, Rosilah Hassan, Nor Effendy Othman
Abstract:
Limited functioning of the Internet Protocol version 4 (IPv4) has necessitated the development of the Internetworking Protocol next generation (IPng) to curb the challenges. Indeed, the IPng is also referred to as the Internet Protocol version 6 (IPv6) and includes the Neighbor Discovery Protocol (NDP). The latter performs the role of Address Auto-configuration, Router Discovery (RD), and Neighbor Discovery (ND). Furthermore, the role of the NDP entails redirecting the service, detecting the duplicate address, and detecting the unreachable services. Despite the fact that there is an NDP’s assumption regarding the existence of trust the links’ nodes, several crucial attacks may affect the Protocol. Internet Engineering Task Force (IETF) therefore has recommended implementation of Secure Neighbor Discovery Protocol (SEND) to tackle safety issues in NDP. The SEND protocol is mainly used for validation of address rights, malicious response inhibiting techniques and finally router certification procedures. For routine running of these tasks, SEND utilizes on the following options, Cryptographically Generated Address (CGA), RSA Signature, Nonce and Timestamp option. CGA is produced at extra high costs making it the most notable disadvantage of SEND. In this paper a clear description of the constituents of CGA, its operation and also recommendations for improvements in its generation are given.Keywords: CGA, IPv6, NDP, SEND
Procedia PDF Downloads 385512 Causes of Terrorism: Perceptions of University Students of Teacher Training Institutions
Authors: Saghir Ahmad, Abid Hussain Ch, Misbah Malik, Ayesha Batool
Abstract:
Terrorism is the marvel in which dreadful circumstance is made by a gathering of individuals who view themselves as abused by society. Terrorism is the unlawful utilization of power or viciousness by a man or a sorted out gathering by the general population or property with the aim of intimidation or compulsion of social orders or governments frequently for ideological or political reasons. Terrorism is as old as people. The main aim of the study was to find out the causes of terrorism through the perceptions of the universities students of teacher training institutions. This study was quantitative in nature. Survey method was used to collect data. A sample of two hundred and sixty seven students was selected from public universities. A five point Likert scale was used to collect data. Mean, Standard deviation, independent sample t-test, and One Way ANOVA were applied to analyze the data. The major findings of the study indicated that students perceived the main causes of terrorism are poverty, foreign interference, wrong concept of Islamization, and social injustice. It is also concluded that mostly, students think that drone attacks are promoting the terrorist activities. The education is key to eliminate the terrorism. There is need to educate the people and specially youngsters to bring the peace in the world.Keywords: dreadful circumstance, governments, power, students, terrorism
Procedia PDF Downloads 548511 Utilization Reactive Dilutes to Improve the Properties of Epoxy Resin as Anticorrosion Coating
Authors: El-Sayed Negim, Ainakulova D. T., Puteri S. M., Khaldun M. Azzam, Bekbayeva L. K., Arpit Goyal, Ganjian E.
Abstract:
Anticorrosion coatings protect metal surfaces from environmental factors including moisture, oxygen, and gases that caused corrosion to the metal. Various types of anticorrosion coatings are available, with different properties and application methods. Many researchers have been developing methods to prevent corrosion, and epoxy polymers are one of the wide methods due to their excellent adhesion, chemical resistance, and durability. In this study, synthesis reactive dilute based on glycidyl methacrylate (GMA) with each of 2-ethylhexyl acrylate (2-EHA) and butyl acrylate (BuA) to improve the performance of epoxy resin and anticorrosion coating. The copolymers were synthesized with composition ratio (5/5) by bulk polymerization technique using benzoyl peroxide as a catalyst and temperature at 85 oC for 2 hours and at 90 oC for 30 minutes to complete the polymerization process. The obtained copolymers were characterized by FTIR, viscosity and thixotropic index. The effect of copolymers as reactive dilute on the physical and mechanical properties of epoxy resin was investigated. Metal plates coated by the modified epoxy resins with different contents of copolymers were tested using alkali and salt test methods, and the copolymer based on GMA and BUA showed the best protection efficiency due to the barrier effect of the polymer layer.Keywords: epoxy, coating, dilute, corrosion, reactive
Procedia PDF Downloads 52510 Novel Anticorrosion Epoxy Reinforced Graphitic Nanocomposite as a Durable Surface
Authors: Shimaa A. Higazy, Mohamed S. Selim, Olfat E. El-Azabawy, Abeer A. Hassan
Abstract:
We designed novel epoxy/graphitic carbon nitride (g-C₃N₄) nanocomposite materials as suitable surface coatings. g-C₃N₄ nanosheets were facilely prepared and dispersed in the epoxy resin via solution casting. This research focuses on the mechanical and anticorrosion properties of g-C₃N₄ nanofiller reinforced epoxy nanocomposites. The structures, sizes, and morphologies of designed polymeric nanocomposites and nanofillers were elucidated using various techniques such as FT-IR, NMR, FE-TEM, FE-SEM. The developed nanocomposite was applied as a surface coating by air-assisted spray method. The structure-property relationship was studied for different concentrations of nanofiller in the epoxy matrix. The anticorrosive properties were studied via electrochemical experiments, including potentiodynamic polarization, electrochemical impedance, and open-circuit potential analyses, as well as salt spray test. Mechanical durability was assessed by various methods, such as impact, T-bending, and crosscut tests. Surface heterogeneity, elasticity, and corrosion-resistance features are among the merits of developed composite. The highest improvement was achieved with well dispersion of g-C₃N₄ sheets fillers. This fascinating epoxy nanostructured coating provides a promising anticorrosive coatings for a sustainable future environment.Keywords: epoxy, nanocomposite, surface coating, anticorrosive properties, mechanical durability
Procedia PDF Downloads 88509 Preparation and Characterization of Bioplastic from Sorghum Husks
Authors: Hannatu Abubakar Sani, Abubakar Umar Birnin Yauri, Aliyu Muhammad, Mujahid Salau, Aminu Musa, Hadiza Adamu Kwazo
Abstract:
The increase in the global population and advances in technology have made plastic materials to have wide applications in every aspect of life. However, the non-biodegradability of these petrochemical-based materials and their increasing accumulation in the environment has been a threat to the planet and has been a source of environmental concerns and hence, the driving force in the search for ‘green’ alternatives for which agricultural waste remains the front liner. Sorghum husk, an agricultural waste with potentials as a raw material in the production of bioplastic, was used in this research to prepare bioplastic using sulphuric acid-catalyzed acetylation process. The prepared bioplastic was characterized by X-ray diffraction and Fourier transform infrared spectroscopy (FTIR), and the structure of the prepared bioplastic was confirmed. The Fourier transform infrared spectroscopy (FTIR) spectra of the product displayed the presence of OH, C-H, C=O, and C-O absorption peaks. The bioplastic obtained is biodegradable and is affected by acid, salt, and alkali to a lesser extent. Other tests like solubility and swelling studies were carried out to ensure the commercial properties of these bioplastic materials. Therefore, this revealed that new bioplastics with better environmental and sustainable properties could be produced from agricultural waste, which may have applications in many industries.Keywords: agricultural waste, bioplastic, characterization, Sorghum Husk
Procedia PDF Downloads 157508 Cu Nanoparticle Embedded-Zno Nanoplate Thin Films for Highly Efficient Photocatalytic Hydrogen Production
Authors: Premrudee Promdet, Fan Cui, Gi Byoung Hwang, Ka Chuen To, Sanjayan Sathasivam, Claire J. Carmalt, Ivan P. Parkin
Abstract:
A novel single-step fabrication of Cu nanoparticle embedded ZnO (Cu.ZnO) thin films was developed by aerosol-assisted chemical vapor deposition for stable and efficient hydrogen production in Photoelectrochemical (PEC) cell. In this approach, the Cu.ZnO nanoplate thin films were grown by using acetic acid to promote preferential growth and enhance surface active sites, where Cu nanoparticles can be formed under chemical deposition by reduction of Cu salt. Studies using photoluminescence spectroscopy indicate the enhanced photocatalytic performance is attributed to hot electron generated from SPR. The Cu metal in the composite material is functioning as a sensitizer to supply electrons to the semiconductor resulting in enhanced electron density for redox reaction. This work not only describes a way to obtain photoanodes with high photocatalytic activity but also suggests a low-cost route towards production of photocatalysts for hydrogen production. This work also supports a vital need to understand electron transfer between photoexcited semiconductor materials and metals, a requirement for tailoring the properties of semiconductor/metal composites.Keywords: photocatalysis, photoelectrochemical cell (PEC), aerosol-assisted chemical vapor deposition (AACVD), surface plasmon resonance (SPR)
Procedia PDF Downloads 219507 Investigating Nanocrystalline CaF2:Tm for Carbon Beam and Gamma Radiation Dosimetry
Authors: Kanika Sharma, Shaila Bahl, Birendra Singh, Pratik Kumar, S. P. Lochab, A. Pandey
Abstract:
In the present investigation, initially nano-particles of CaF2 were prepared by the chemical co-precipitation method and later the prepared salt was activated by thulium (0.1 mol%) using the combustion technique. The final product was characterized and confirmed by X-Ray diffraction (XRD) and transmission electron microscopy (TEM). Further, the thermoluminescence (TL) properties of the nanophosphor were studied by irradiating it with 1.25 MeV of gamma radiation and 65 MeV of carbon (C6+) ion beam. For gamma rays, two prominent TL peaks were observed with a low temperature peak at around 1070C and a high temperature peak at around 1570C. Furthermore, the nanophosphor maintained a linear TL response for the entire range of studied doses i.e. 10 Gy to 2000 Gy for both the temperature peaks. Moreover, when the nanophosphor was irradiated with 65 MeV of C6+ ion beam the shape and structure of the glow curves remained spectacularly similar and the nanophosphor displayed a linear TL response for the full range of studied fluences i.e. 5*1010 ions/cm2 to 1 *1012 ions/ cm2. Finally, various tests like reproducibility test and batch homogeneity were also carried out to define the final product. Thus, co-precipitation method followed by combustion technique was successful in effectively producing dosimetric grade CaF2:Tm for dosimetry of gamma as well as carbon (C6+) beam.Keywords: gamma radiation, ion beam, nanocrystalline, radiation dosimetry
Procedia PDF Downloads 184506 CSRFDtool: Automated Detection and Prevention of a Reflected Cross-Site Request Forgery
Authors: Alaa A. Almarzuki, Nora A. Farraj, Aisha M. Alshiky, Omar A. Batarfi
Abstract:
The number of internet users is dramatically increased every year. Most of these users are exposed to the dangers of attackers in one way or another. The reason for this lies in the presence of many weaknesses that are not known for native users. In addition, the lack of user awareness is considered as the main reason for falling into the attackers’ snares. Cross Site Request Forgery (CSRF) has placed in the list of the most dangerous threats to security in OWASP Top Ten for 2013. CSRF is an attack that forces the user’s browser to send or perform unwanted request or action without user awareness by exploiting a valid session between the browser and the server. When CSRF attack successes, it leads to many bad consequences. An attacker may reach private and personal information and modify it. This paper aims to detect and prevent a specific type of CSRF, called reflected CSRF. In a reflected CSRF, a malicious code could be injected by the attackers. This paper explores how CSRF Detection Extension prevents the reflected CSRF by checking browser specific information. Our evaluation shows that the proposed solution succeeds in preventing this type of attack.Keywords: CSRF, CSRF detection extension, attackers, attacks
Procedia PDF Downloads 414505 Bridges Seismic Isolation Using CNT Reinforced Polymer Bearings
Authors: Mohamed Attia, Vissarion Papadopoulos
Abstract:
There is no doubt that there is a continuous deterioration of structures as a result of multiple hazards which can be divided into natural hazards (e.g., earthquakes, floods, winds) and other hazards due to human behavior (e.g., ship collisions, excessive traffic, terrorist attacks). There have been numerous attempts to address the catastrophic consequences of these hazards and traditional solutions through structural design and safety factors within the design codes, but there has not been much research addressing solutions through the use of new materials that have high performance and can be more effective than usual materials such as reinforced concrete and steel. To illustrate the effect of one of the new high-performance materials, carbon nanotube-reinforced polymer (CNT/polymer) bearings with different weight fractions were simulated as structural components of seismic isolation using ABAQUS in the connection between a bridge superstructure and the substructure. The results of the analyzes showed a significant increase in the time period of the bridge and a clear decrease in the bending moment at the base of the bridge piers at each time step of the time-history analysis in the case of using CNT/polymer bearings compared to the case of direct contact between the superstructure of the bridge and the substructure.Keywords: seismic isolation, bridges damage, earthquake hazard, earthquake resistant structures
Procedia PDF Downloads 195504 Effect of Natural Molecular Crowding on the Structure and Stability of DNA Duplex
Authors: Chaudhari S. G., Saxena, S.
Abstract:
We systematically and quantitatively investigated the effect of glucose as a model of natural molecular crowding agent on the structure and thermodynamics of Watson-Crick base paired three duplexes (named as D1, D2 and D3) of different base compositions and lengths. Structural analyses demonstrated that duplexes (D1 and D2) folded into B-form with different cations in the absence and presence of glucose while duplex (D3) folded into mixed A and B-form. Moreover, we demonstrated that the duplex was more stable in the absence of glucose, and marginally destabilized in its presence because glucose act as a weak structure breaker on the tetrahedral network of water. In the absence of glucose, the values of ΔG°25 for duplex (D1) were -13.56, -13.76, -12.46, and -12.36 kcal/mol, for duplex (D2) were -13.64, -12.93, -12.86, and -12.30 kcal/mol, for duplex (D3) were -10.05, -11.76, -9.91, -9.70 kcal/mol in the presence of Na+, K+, Na+ + Mg++ and K+ + Mg++ respectively. At high concentration of glucose (1:10000), there was increase in ΔG°25 for duplex (D1) -12.47, -12.37, -11.96, -11.55 kcal/mol, for duplex (D2) -12.37, -11.47, -11.98, -11.01 kcal/mol and for duplex (D3) -8.47, -9.17, -9.16, -8.66 kcal/mol. Our results provide the information that structure and stability of DNA duplex depends on the structure of molecular crowding agent present in its close vicinity. In this study, I have taken the hydration of simple sugar as an essential model for understanding interactions between hydrophilic groups and interfacial water molecules and its effect on hydrogen bonded DNA duplexes. On the basis of these relatively simple building blocks I hope to gain some insights for understanding more generally the properties of sugar–water–salt systems with DNA duplexes.Keywords: natural molecular crowding, DNA Duplex, structure of DNA, bioengineering and life sciences
Procedia PDF Downloads 466503 Isolation and Characterization White Spot Syndrome Protein Envelope Protein 19 from Black Tiger Shrimp (Penaeus monodon)
Authors: Andi Aliah Hidayani, Asmi Citra Malina A. R. Tassakka, Andi Parenrengi
Abstract:
Vanname Shrimp is one of the high yielding varieties that are more resistant to virus attacks. However, now this shrimp more death due to virus attack such as white spot disease caused by white spot syndrome virus (WSSV). Various efforts have done to prevent the disease, like immunostimulatory, probiotics, and vaccine. White spot syndrome virus (WSSV) envelope protein VP19 gene is important because of its involvement in the system infection of shrimp. This study aimed to isolate and characterize an envelope protein VP19 – encoding gene of WSSV using WSSV infected Vanname Shrimp sample from some areas in South Sulawesi (Pangkep, Barru and Pinrang). The genomic of DNA were isolated from shrimp muscle using DTAB-CTAB method. Isolation of gene encoding envelope protein VP19 WSSV ws successfully performed with the results of the length of DNA fragment was 387 bp. The results of homology analysis using BLASTn homology suggested that these isolates genes from Barru, Pangkep and Pinrang have closest relationship with isolates from Mexican.Keywords: vanname, shrimp, WSSV, viral protein 19
Procedia PDF Downloads 535502 Three Dimensional Model of Full Scale Plate Load Test on Stone Column in Sabkha Deposit: Case Study from Jubail Industrial City - Saudi Arabia
Authors: Hassan. A. Abas, Saad A. Aiban
Abstract:
Soil improvement by means of stone column method is used to improve sabkha soils in order to limit total and differential settlement and to achieve the required bearing capacity. Full-scale plate test was performed on site to confirm the achievement of required bearing capacity at the specified settlement. Despite the fact that this technique is widely used to improve sabkha soils, there are no studies focusing on the behavior of stone columns in such problematic soils. Sabkha soils are known for its high compressibility, low strength and water sensitivity due to loss of salt cementation upon flooding during installation of stone columns. Numerical modeling of plate load test assist to understand complicated behavior of sabkha – stone column interaction. This paper presents a three-dimensional Finite element model, using PLAXIS 3D software, to simulate vertical plate load tests on a stone column installed in sabkha. The predicted settlement values are in reasonable agreement with the field measure values and the field load - settlement curve can be predicted with good accuracy.Keywords: soil improvement, stone column, sabkha, PLAXIS 3D
Procedia PDF Downloads 388501 Determination of the Risks of Heart Attack at the First Stage as Well as Their Control and Resource Planning with the Method of Data Mining
Authors: İbrahi̇m Kara, Seher Arslankaya
Abstract:
Frequently preferred in the field of engineering in particular, data mining has now begun to be used in the field of health as well since the data in the health sector have reached great dimensions. With data mining, it is aimed to reveal models from the great amounts of raw data in agreement with the purpose and to search for the rules and relationships which will enable one to make predictions about the future from the large amount of data set. It helps the decision-maker to find the relationships among the data which form at the stage of decision-making. In this study, it is aimed to determine the risk of heart attack at the first stage, to control it, and to make its resource planning with the method of data mining. Through the early and correct diagnosis of heart attacks, it is aimed to reveal the factors which affect the diseases, to protect health and choose the right treatment methods, to reduce the costs in health expenditures, and to shorten the durations of patients’ stay at hospitals. In this way, the diagnosis and treatment costs of a heart attack will be scrutinized, which will be useful to determine the risk of the disease at the first stage, to control it, and to make its resource planning.Keywords: data mining, decision support systems, heart attack, health sector
Procedia PDF Downloads 356500 The Preparation and Characterization of Conductive Poly(O-Toluidine)/Smectite Clay Nanocomposite
Authors: E. Erdem, M. Şahin, M. Saçak
Abstract:
Smectite is a layered silicate and modified with alkyl ammonium salts to make both the hydrophilic silicate surfaces organophilic, and to expand the clay layers. Thus, a nanocomposite structure can be formed enabling to enter various types of polymers between the layers. In this study, Na-smectite crystals were prepared by purification of bentonite. Benzyltributylammonium bromide (BTBAB) was used as a swelling agent. The mixing time and additive concentration were changed during the swelling process. It was determined that the 4 h of mixing time and 0.2 g of BTBAB were sufficient and the usage of higher amounts of salt did not increase the interlayer space between the clay layers. Then, the conductive poly(o-toluidine) (POT)/smectite nanocomposite was prepared in the presence of swollen Na-smectite using ammonium persulfate (APS) as oxidant in aqueous acidic medium. The POT content and conductivity of the prepared nanocomposite were systematically investigated as a function of polymerization conditions such as the treatment time of swollen smectite in monomer solution and o-toluidine/APS mol ratio. The POT content and conductivity of nanocomposite increased with increasing monomer/oxidant mol ratio up to 1 and did not change at higher ratios. The maximum polymer yield and the highest conductivity value of the composite were 26.0% and 4.0×10-5 S/cm, respectively. The structural and morphological analyses of the POT/smectite nanocomposite were carried out by XRD, FTIR and SEM techniques, respectively.Keywords: clay, composite, conducting polymer, poly(o-anisidine)
Procedia PDF Downloads 288499 A Lifetime-Enhancing Monitoring Node Distribution Using Minimum Spanning Tree in Mobile Ad Hoc Networks
Authors: Sungchul Ha, Hyunwoo Kim
Abstract:
In mobile ad hoc networks, all nodes in a network only have limited resources and calculation ability. Therefore communication topology which have long lifetime is good for all nodes in mobile ad hoc networks. There are a variety of researches on security problems in wireless ad hoc networks. The existing many researches try to make efficient security schemes to reduce network power consumption and enhance network lifetime. Because a new node can join the network at any time, the wireless ad hoc networks are exposed to various threats and can be destroyed by attacks. Resource consumption is absolutely necessary to secure networks, but more resource consumption can be a critical problem to network lifetime. This paper focuses on efficient monitoring node distribution to enhance network lifetime in wireless ad hoc networks. Since the wireless ad hoc networks cannot use centralized infrastructure and security systems of wired networks, a new special IDS scheme is necessary. The scheme should not only cover all nodes in a network but also enhance the network lifetime. In this paper, we propose an efficient IDS node distribution scheme using minimum spanning tree (MST) method. The simulation results show that the proposed algorithm has superior performance in comparison with existing algorithms.Keywords: MANETs, IDS, power control, minimum spanning tree
Procedia PDF Downloads 372498 Preliminary Study of Fermented Pickle of Tabah Bamboo Shoot: Gigantochloa nigrociliata (Buese) Kurz
Authors: Luh Putu T. Darmayanti, A. A. Duwipayana, I. Nengah K. Putra, Nyoman S. Antara
Abstract:
Tabah Bamboo (Gigantochloa nigrociliata (Buese) Kurz) is the indigenous bamboo species which grows in District of Pupuan, Tabanan at Province of Bali. Compared to the others, this shoot has low concentration of hydrocyanide acid (HCN). However, as found for almost of bamboo shoot, its seasonal availability, perishable in nature, and short-lived. This study aimed to gather information about total of lactic acid bacteria (LAB), pH, total acidity, HCN content, detection of LAB’s type involved during fermentation, and organic acids’ profiles of fermented pickles of Tabah bamboo shoot. The pickle was made by natural fermentation with 6 % salt concentration and fermentation conducted for 13 days. The result showed during the fermentation time, in the fourth day we found LAB’s number was highest as much as 72 x 107 CFU/ml and the lowest pH was 3.09. We also found decreasing in HCN from 37.8 ppm at the beginning to 20.52 ppm at the end of fermentation process. The total number of indigenous LAB isolated from the pickle are 48 strains we found 18 out of these had rod shape. For the preliminary study, all of the LAB with rod shape were detected by PCR as member of Lactobacillus spp., in which 17 strains detected as L. plantarum. The organic acids detected during the fermentation were lactic acid with the highest concentration was 0.0546 g/100 g and small amount of acetic acid.Keywords: fermentation, LAB, pickle, Tabah Bamboo shoot
Procedia PDF Downloads 344497 Polyampholytic Resins: Advances in Ion Exchanging Properties
Authors: N. P. G. N. Chandrasekara, R. M. Pashley
Abstract:
Ion exchange (IEX) resins are commonly available as cationic or anionic resins but not as polyampholytic resins. This is probably because sequential acid and base washing cannot produce complete regeneration of polyampholytic resins with chemically attached anionic and cationic groups in close proximity. The ‘Sirotherm’ process, developed by the Commonwealth Scientific and Industrial Research Organization (CSIRO) in Melbourne, Australia was originally based on the use of a physical mixture of weakly basic (WB) and weakly acidic (WA) ion-exchange resin beads. These resins were regenerated thermally and they were capable of removing salts from an aqueous solution at higher temperatures compared to the salt sorbed at ambient temperatures with a significant reduction of the sorption capacity with increasing temperature. A new process for the efficient regeneration of mixed bead resins using ammonium bicarbonate with heat was studied recently and this chemical/thermal regeneration technique has the capability for completely regenerating polyampholytic resins. Even so, the low IEX capacities of polyampholytic resins restrict their commercial applications. Recently, we have established another novel process for increasing the IEX capacity of a typical polyampholytic resin. In this paper we will discuss the chemical/thermal regeneration of a polyampholytic (WA/WB) resin and a novel process for enhancing its ion exchange capacity, by increasing its internal pore area. We also show how effective this method is for completely recycled regeneration, with the potential of substantially reducing chemical waste.Keywords: capacity, ion exchange, polyampholytic resin, regeneration
Procedia PDF Downloads 376496 Crystallization Fouling from Potable Water in Heat Exchangers and Evaporators
Authors: Amthal Al-Gailani, Olujide Sanni, Thibaut Charpentier, Anne Neville
Abstract:
Formation of inorganic scale on heat transfer surfaces is a serious problem encountered in industrial, commercial, and domestic heat exchangers and systems. Several industries use potable/groundwater sources such as rivers, lakes, and oceans to use water as a working fluid in heat exchangers and steamers. As potable/surface water contains diverse salt ionic species, the scaling kinetics and deposit morphology are expected to be different from those found in artificially hardened solutions. In this work, scale formation on the heat transfer surfaces from potable water has been studied using a once-through open flow cell under atmospheric pressure. The surface scaling mechanism and deposit morphology are investigated at high surface temperature. Thus the water evaporation process has to be considered. The effect of surface temperature, flow rate, and inhibitor deployment on the thermal resistance and morphology of the scale have been investigated. The study findings show how an increase in surface temperature enhances the crystallization reaction kinetics on the surface. There is an increase in the amount of scale and the resistance to heat transfer. The fluid flow rate also increases the fouling resistance and the thickness of the scale layer.Keywords: fouling, heat exchanger, thermal resistance, crystallization, potable water
Procedia PDF Downloads 145495 Isolation, Identification and Crude Oil Biodegradation Potential of Providencia sp. BAZ 01
Authors: Aisami A., Z. A. Adamu, Lawan Bulama
Abstract:
Due to growing issues of crude oil pollution in both marine and terrestrial environments, Billions to Trillions of US Dollars were spent over the years for the treatment of this spill. There is an urgent need for effective bioremediation strategies. This current study focuses on the isolation and characterization of a crude oil-degrading bacterium from hydrocarbon-contaminated soil samples. Soil samples were collected from an oil spill site and subjected to enrichment culture techniques in a mineral salt medium supplemented with crude oil as the singular carbon source. The isolates were screened for their crude oil-degrading capabilities using gravimetric analysis. The most efficient isolation was identified through 16S rRNA gene sequencing. Cultural and physical conditions such pH, temperature salinity and crude oil concentrations were optimized. The isolates showed significant crude oil degradation efficiency, reducing oil concentration (2.5%) by 75% within 15 days of incubation. The strain was identified as Providencia sp. through molecular characterization, the sequence was deposited at the NCBI Genbank with accession number MN880494. The bacterium exhibited optimal growth at 32.5°C, pH 7.0 to 7.5, and in the presence of 1.5% (w/v) NaCl. The isolated Providencia sp. shows encouraging potential for bioremediation of crude oil-contaminated environments. This study successfully isolated and characterized a crude oil-degrading Providencia sp., highlighting its potential in bioremediation.Keywords: crude oil degradation, providencia sp., bioremediation, hydrocarbon utilization, environmental pollution.
Procedia PDF Downloads 42494 Performance of an Anaerobic Osmotic Membrane Bioreactor Hybrid System for Wastewater Treatment and Phosphorus Recovery
Authors: Ming-Yeh Lu, Shiao-Shing Chen, Saikat Sinha Ray, Hung-Te Hsu
Abstract:
The submerged anaerobic osmotic membrane bioreactor (AnOMBR) integrated with periodic microfiltration (MF) extraction for simultaneous phosphorus and clean water recovery from wastewater was evaluated. A laboratory-scale AnOMBR used cellulose triacetate (CTA) membranes with effective membrane area of 130 cm² was fully submerged into a 5 L bioreactor at 30-35 ℃. Active layer was orientated to feed stream for minimizing membrane fouling and scaling. Additionally, a peristaltic pump was used to circulate magnesium sulphate (MgSO₄) solution applied as draw solution (DS). Microfiltration membrane periodically extracted about 1 L solution when the TDS reaches to 5 g/L to recover phosphorus and simultaneously control the salt accumulation in the bioreactor. During experiment progress, the average water flux was around 1.6 LMH. The AnOMBR process showed greater than 95% removal of soluble chemical oxygen demand (sCOD), nearly 100% of total phosphorous whereas only partial of ammonia was removed. On the other hand, the average methane production of 0.22 L/g sCOD was obtained. Subsequently, the overall performance demonstrates that a novel submerged AnOMBR system is potential for simultaneous wastewater treatment and resource recovery from wastewater. Therefore, the new concept of this system can be used to replace for the conventional AnMBR in the future.Keywords: anaerobic treatment, forward osmosis, phosphorus recovery, membrane bioreactor
Procedia PDF Downloads 235493 Effect of Marginal Quality Groundwater on Yield of Cotton Crop and Soil Salinity Status
Authors: A. L. Qureshi, A. A. Mahessar, R. K. Dashti, S. M. Yasin
Abstract:
In this paper, effect of marginal quality groundwater on yield of cotton crop and soil salinity was studied. In this connection, three irrigation treatments each with four replications were applied. These treatments were use of canal water, use of marginal quality groundwater from tube well, and conjunctive use by mixing with the ratio of 1:1 of canal water and marginal quality tubewell water. Water was applied to the crop cultivated in Kharif season 2011; its quantity has been measured using cut-throat flume. Total 11 watering each of 50 mm depth have been applied from 20th April to 20th July, 2011. Further, irrigations were stopped from last week of July, 2011 due to monsoon rainfall. Maximum crop yield (seed cotton) was observed under T1 which was 1,516.8 kg/ha followed by T3 (mixed canal and tube well water) having 1009 kg/ha and 709 kg/ha for T2 i.e. marginal quality groundwater. This concludes that crop yield in T2 and T3 with in comparison to T1was reduced by about 53 and 30% respectively. It has been observed that yield of cotton crop is below potential limit for three treatments due to unexpected rainfall at the time of full flowering season; thus the yield was adversely affected. However, salt deposition in soil profiles was not observed that is due to leaching effect of heavy rainfall occurred during monsoon season.Keywords: conjunctive use, cotton crop, groundwater, soil salinity status, water use efficiency
Procedia PDF Downloads 448