Search results for: salt and peppers attacks
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 1270

Search results for: salt and peppers attacks

490 Investigating Nanocrystalline CaF2:Tm for Carbon Beam and Gamma Radiation Dosimetry

Authors: Kanika Sharma, Shaila Bahl, Birendra Singh, Pratik Kumar, S. P. Lochab, A. Pandey

Abstract:

In the present investigation, initially nano-particles of CaF2 were prepared by the chemical co-precipitation method and later the prepared salt was activated by thulium (0.1 mol%) using the combustion technique. The final product was characterized and confirmed by X-Ray diffraction (XRD) and transmission electron microscopy (TEM). Further, the thermoluminescence (TL) properties of the nanophosphor were studied by irradiating it with 1.25 MeV of gamma radiation and 65 MeV of carbon (C6+) ion beam. For gamma rays, two prominent TL peaks were observed with a low temperature peak at around 1070C and a high temperature peak at around 1570C. Furthermore, the nanophosphor maintained a linear TL response for the entire range of studied doses i.e. 10 Gy to 2000 Gy for both the temperature peaks. Moreover, when the nanophosphor was irradiated with 65 MeV of C6+ ion beam the shape and structure of the glow curves remained spectacularly similar and the nanophosphor displayed a linear TL response for the full range of studied fluences i.e. 5*1010 ions/cm2 to 1 *1012 ions/ cm2. Finally, various tests like reproducibility test and batch homogeneity were also carried out to define the final product. Thus, co-precipitation method followed by combustion technique was successful in effectively producing dosimetric grade CaF2:Tm for dosimetry of gamma as well as carbon (C6+) beam.

Keywords: gamma radiation, ion beam, nanocrystalline, radiation dosimetry

Procedia PDF Downloads 162
489 Bridges Seismic Isolation Using CNT Reinforced Polymer Bearings

Authors: Mohamed Attia, Vissarion Papadopoulos

Abstract:

There is no doubt that there is a continuous deterioration of structures as a result of multiple hazards which can be divided into natural hazards (e.g., earthquakes, floods, winds) and other hazards due to human behavior (e.g., ship collisions, excessive traffic, terrorist attacks). There have been numerous attempts to address the catastrophic consequences of these hazards and traditional solutions through structural design and safety factors within the design codes, but there has not been much research addressing solutions through the use of new materials that have high performance and can be more effective than usual materials such as reinforced concrete and steel. To illustrate the effect of one of the new high-performance materials, carbon nanotube-reinforced polymer (CNT/polymer) bearings with different weight fractions were simulated as structural components of seismic isolation using ABAQUS in the connection between a bridge superstructure and the substructure. The results of the analyzes showed a significant increase in the time period of the bridge and a clear decrease in the bending moment at the base of the bridge piers at each time step of the time-history analysis in the case of using CNT/polymer bearings compared to the case of direct contact between the superstructure of the bridge and the substructure.

Keywords: seismic isolation, bridges damage, earthquake hazard, earthquake resistant structures

Procedia PDF Downloads 173
488 Isolation and Characterization White Spot Syndrome Protein Envelope Protein 19 from Black Tiger Shrimp (Penaeus monodon)

Authors: Andi Aliah Hidayani, Asmi Citra Malina A. R. Tassakka, Andi Parenrengi

Abstract:

Vanname Shrimp is one of the high yielding varieties that are more resistant to virus attacks. However, now this shrimp more death due to virus attack such as white spot disease caused by white spot syndrome virus (WSSV). Various efforts have done to prevent the disease, like immunostimulatory, probiotics, and vaccine. White spot syndrome virus (WSSV) envelope protein VP19 gene is important because of its involvement in the system infection of shrimp. This study aimed to isolate and characterize an envelope protein VP19 – encoding gene of WSSV using WSSV infected Vanname Shrimp sample from some areas in South Sulawesi (Pangkep, Barru and Pinrang). The genomic of DNA were isolated from shrimp muscle using DTAB-CTAB method. Isolation of gene encoding envelope protein VP19 WSSV ws successfully performed with the results of the length of DNA fragment was 387 bp. The results of homology analysis using BLASTn homology suggested that these isolates genes from Barru, Pangkep and Pinrang have closest relationship with isolates from Mexican.

Keywords: vanname, shrimp, WSSV, viral protein 19

Procedia PDF Downloads 515
487 Effect of Natural Molecular Crowding on the Structure and Stability of DNA Duplex

Authors: Chaudhari S. G., Saxena, S.

Abstract:

We systematically and quantitatively investigated the effect of glucose as a model of natural molecular crowding agent on the structure and thermodynamics of Watson-Crick base paired three duplexes (named as D1, D2 and D3) of different base compositions and lengths. Structural analyses demonstrated that duplexes (D1 and D2) folded into B-form with different cations in the absence and presence of glucose while duplex (D3) folded into mixed A and B-form. Moreover, we demonstrated that the duplex was more stable in the absence of glucose, and marginally destabilized in its presence because glucose act as a weak structure breaker on the tetrahedral network of water. In the absence of glucose, the values of ΔG°25 for duplex (D1) were -13.56, -13.76, -12.46, and -12.36 kcal/mol, for duplex (D2) were -13.64, -12.93, -12.86, and -12.30 kcal/mol, for duplex (D3) were -10.05, -11.76, -9.91, -9.70 kcal/mol in the presence of Na+, K+, Na+ + Mg++ and K+ + Mg++ respectively. At high concentration of glucose (1:10000), there was increase in ΔG°25 for duplex (D1) -12.47, -12.37, -11.96, -11.55 kcal/mol, for duplex (D2) -12.37, -11.47, -11.98, -11.01 kcal/mol and for duplex (D3) -8.47, -9.17, -9.16, -8.66 kcal/mol. Our results provide the information that structure and stability of DNA duplex depends on the structure of molecular crowding agent present in its close vicinity. In this study, I have taken the hydration of simple sugar as an essential model for understanding interactions between hydrophilic groups and interfacial water molecules and its effect on hydrogen bonded DNA duplexes. On the basis of these relatively simple building blocks I hope to gain some insights for understanding more generally the properties of sugar–water–salt systems with DNA duplexes.

Keywords: natural molecular crowding, DNA Duplex, structure of DNA, bioengineering and life sciences

Procedia PDF Downloads 444
486 Determination of the Risks of Heart Attack at the First Stage as Well as Their Control and Resource Planning with the Method of Data Mining

Authors: İbrahi̇m Kara, Seher Arslankaya

Abstract:

Frequently preferred in the field of engineering in particular, data mining has now begun to be used in the field of health as well since the data in the health sector have reached great dimensions. With data mining, it is aimed to reveal models from the great amounts of raw data in agreement with the purpose and to search for the rules and relationships which will enable one to make predictions about the future from the large amount of data set. It helps the decision-maker to find the relationships among the data which form at the stage of decision-making. In this study, it is aimed to determine the risk of heart attack at the first stage, to control it, and to make its resource planning with the method of data mining. Through the early and correct diagnosis of heart attacks, it is aimed to reveal the factors which affect the diseases, to protect health and choose the right treatment methods, to reduce the costs in health expenditures, and to shorten the durations of patients’ stay at hospitals. In this way, the diagnosis and treatment costs of a heart attack will be scrutinized, which will be useful to determine the risk of the disease at the first stage, to control it, and to make its resource planning.

Keywords: data mining, decision support systems, heart attack, health sector

Procedia PDF Downloads 335
485 A Lifetime-Enhancing Monitoring Node Distribution Using Minimum Spanning Tree in Mobile Ad Hoc Networks

Authors: Sungchul Ha, Hyunwoo Kim

Abstract:

In mobile ad hoc networks, all nodes in a network only have limited resources and calculation ability. Therefore communication topology which have long lifetime is good for all nodes in mobile ad hoc networks. There are a variety of researches on security problems in wireless ad hoc networks. The existing many researches try to make efficient security schemes to reduce network power consumption and enhance network lifetime. Because a new node can join the network at any time, the wireless ad hoc networks are exposed to various threats and can be destroyed by attacks. Resource consumption is absolutely necessary to secure networks, but more resource consumption can be a critical problem to network lifetime. This paper focuses on efficient monitoring node distribution to enhance network lifetime in wireless ad hoc networks. Since the wireless ad hoc networks cannot use centralized infrastructure and security systems of wired networks, a new special IDS scheme is necessary. The scheme should not only cover all nodes in a network but also enhance the network lifetime. In this paper, we propose an efficient IDS node distribution scheme using minimum spanning tree (MST) method. The simulation results show that the proposed algorithm has superior performance in comparison with existing algorithms.

Keywords: MANETs, IDS, power control, minimum spanning tree

Procedia PDF Downloads 346
484 Three Dimensional Model of Full Scale Plate Load Test on Stone Column in Sabkha Deposit: Case Study from Jubail Industrial City - Saudi Arabia

Authors: Hassan. A. Abas, Saad A. Aiban

Abstract:

Soil improvement by means of stone column method is used to improve sabkha soils in order to limit total and differential settlement and to achieve the required bearing capacity. Full-scale plate test was performed on site to confirm the achievement of required bearing capacity at the specified settlement. Despite the fact that this technique is widely used to improve sabkha soils, there are no studies focusing on the behavior of stone columns in such problematic soils. Sabkha soils are known for its high compressibility, low strength and water sensitivity due to loss of salt cementation upon flooding during installation of stone columns. Numerical modeling of plate load test assist to understand complicated behavior of sabkha – stone column interaction. This paper presents a three-dimensional Finite element model, using PLAXIS 3D software, to simulate vertical plate load tests on a stone column installed in sabkha. The predicted settlement values are in reasonable agreement with the field measure values and the field load - settlement curve can be predicted with good accuracy.

Keywords: soil improvement, stone column, sabkha, PLAXIS 3D

Procedia PDF Downloads 362
483 The Preparation and Characterization of Conductive Poly(O-Toluidine)/Smectite Clay Nanocomposite

Authors: E. Erdem, M. Şahin, M. Saçak

Abstract:

Smectite is a layered silicate and modified with alkyl ammonium salts to make both the hydrophilic silicate surfaces organophilic, and to expand the clay layers. Thus, a nanocomposite structure can be formed enabling to enter various types of polymers between the layers. In this study, Na-smectite crystals were prepared by purification of bentonite. Benzyltributylammonium bromide (BTBAB) was used as a swelling agent. The mixing time and additive concentration were changed during the swelling process. It was determined that the 4 h of mixing time and 0.2 g of BTBAB were sufficient and the usage of higher amounts of salt did not increase the interlayer space between the clay layers. Then, the conductive poly(o-toluidine) (POT)/smectite nanocomposite was prepared in the presence of swollen Na-smectite using ammonium persulfate (APS) as oxidant in aqueous acidic medium. The POT content and conductivity of the prepared nanocomposite were systematically investigated as a function of polymerization conditions such as the treatment time of swollen smectite in monomer solution and o-toluidine/APS mol ratio. The POT content and conductivity of nanocomposite increased with increasing monomer/oxidant mol ratio up to 1 and did not change at higher ratios. The maximum polymer yield and the highest conductivity value of the composite were 26.0% and 4.0×10-5 S/cm, respectively. The structural and morphological analyses of the POT/smectite nanocomposite were carried out by XRD, FTIR and SEM techniques, respectively.

Keywords: clay, composite, conducting polymer, poly(o-anisidine)

Procedia PDF Downloads 264
482 Preliminary Study of Fermented Pickle of Tabah Bamboo Shoot: Gigantochloa nigrociliata (Buese) Kurz

Authors: Luh Putu T. Darmayanti, A. A. Duwipayana, I. Nengah K. Putra, Nyoman S. Antara

Abstract:

Tabah Bamboo (Gigantochloa nigrociliata (Buese) Kurz) is the indigenous bamboo species which grows in District of Pupuan, Tabanan at Province of Bali. Compared to the others, this shoot has low concentration of hydrocyanide acid (HCN). However, as found for almost of bamboo shoot, its seasonal availability, perishable in nature, and short-lived. This study aimed to gather information about total of lactic acid bacteria (LAB), pH, total acidity, HCN content, detection of LAB’s type involved during fermentation, and organic acids’ profiles of fermented pickles of Tabah bamboo shoot. The pickle was made by natural fermentation with 6 % salt concentration and fermentation conducted for 13 days. The result showed during the fermentation time, in the fourth day we found LAB’s number was highest as much as 72 x 107 CFU/ml and the lowest pH was 3.09. We also found decreasing in HCN from 37.8 ppm at the beginning to 20.52 ppm at the end of fermentation process. The total number of indigenous LAB isolated from the pickle are 48 strains we found 18 out of these had rod shape. For the preliminary study, all of the LAB with rod shape were detected by PCR as member of Lactobacillus spp., in which 17 strains detected as L. plantarum. The organic acids detected during the fermentation were lactic acid with the highest concentration was 0.0546 g/100 g and small amount of acetic acid.

Keywords: fermentation, LAB, pickle, Tabah Bamboo shoot

Procedia PDF Downloads 326
481 Polyampholytic Resins: Advances in Ion Exchanging Properties

Authors: N. P. G. N. Chandrasekara, R. M. Pashley

Abstract:

Ion exchange (IEX) resins are commonly available as cationic or anionic resins but not as polyampholytic resins. This is probably because sequential acid and base washing cannot produce complete regeneration of polyampholytic resins with chemically attached anionic and cationic groups in close proximity. The ‘Sirotherm’ process, developed by the Commonwealth Scientific and Industrial Research Organization (CSIRO) in Melbourne, Australia was originally based on the use of a physical mixture of weakly basic (WB) and weakly acidic (WA) ion-exchange resin beads. These resins were regenerated thermally and they were capable of removing salts from an aqueous solution at higher temperatures compared to the salt sorbed at ambient temperatures with a significant reduction of the sorption capacity with increasing temperature. A new process for the efficient regeneration of mixed bead resins using ammonium bicarbonate with heat was studied recently and this chemical/thermal regeneration technique has the capability for completely regenerating polyampholytic resins. Even so, the low IEX capacities of polyampholytic resins restrict their commercial applications. Recently, we have established another novel process for increasing the IEX capacity of a typical polyampholytic resin. In this paper we will discuss the chemical/thermal regeneration of a polyampholytic (WA/WB) resin and a novel process for enhancing its ion exchange capacity, by increasing its internal pore area. We also show how effective this method is for completely recycled regeneration, with the potential of substantially reducing chemical waste.

Keywords: capacity, ion exchange, polyampholytic resin, regeneration

Procedia PDF Downloads 364
480 Crystallization Fouling from Potable Water in Heat Exchangers and Evaporators

Authors: Amthal Al-Gailani, Olujide Sanni, Thibaut Charpentier, Anne Neville

Abstract:

Formation of inorganic scale on heat transfer surfaces is a serious problem encountered in industrial, commercial, and domestic heat exchangers and systems. Several industries use potable/groundwater sources such as rivers, lakes, and oceans to use water as a working fluid in heat exchangers and steamers. As potable/surface water contains diverse salt ionic species, the scaling kinetics and deposit morphology are expected to be different from those found in artificially hardened solutions. In this work, scale formation on the heat transfer surfaces from potable water has been studied using a once-through open flow cell under atmospheric pressure. The surface scaling mechanism and deposit morphology are investigated at high surface temperature. Thus the water evaporation process has to be considered. The effect of surface temperature, flow rate, and inhibitor deployment on the thermal resistance and morphology of the scale have been investigated. The study findings show how an increase in surface temperature enhances the crystallization reaction kinetics on the surface. There is an increase in the amount of scale and the resistance to heat transfer. The fluid flow rate also increases the fouling resistance and the thickness of the scale layer.

Keywords: fouling, heat exchanger, thermal resistance, crystallization, potable water

Procedia PDF Downloads 135
479 The Strategy of Orbit Avoidance for Optical Remote Sensing Satellite

Authors: Dianxun Zheng, Wuxing Jing, Lin Hetong

Abstract:

Optical remote sensing satellite, always running on the Sun-synchronous orbit, equipped laser warning equipment to alert CCD camera from laser attack. There have three ways to protect the CCD camera, closing the camera cover satellite attitude maneuver and satellite orbit avoidance. In order to enhance the safety of optical remote sensing satellite in orbit, this paper explores the strategy of satellite avoidance. The avoidance strategy is expressed as the evasion of pre-determined target points in the orbital coordinates of virtual satellite. The so-called virtual satellite is a passive vehicle which superposes a satellite at the initial stage of avoidance. The target points share the consistent cycle time and the same semi-major axis with the virtual satellite, which ensures the properties of the Sun-synchronous orbit remain unchanged. Moreover, to further strengthen the avoidance capability of satellite, it can perform multi-object avoid maneuvers. On occasions of fulfilling the orbit tasks of the satellite, the orbit can be restored back to virtual satellite through orbit maneuvers. There into, the avoid maneuvers adopts pulse guidance. and the fuel consumption is also optimized. The avoidance strategy discussed in this article is applicable to avoidance for optical remote sensing satellite when encounter the laser hostile attacks.

Keywords: optical remote sensing satellite, always running on the sun-synchronous

Procedia PDF Downloads 378
478 Performance of an Anaerobic Osmotic Membrane Bioreactor Hybrid System for Wastewater Treatment and Phosphorus Recovery

Authors: Ming-Yeh Lu, Shiao-Shing Chen, Saikat Sinha Ray, Hung-Te Hsu

Abstract:

The submerged anaerobic osmotic membrane bioreactor (AnOMBR) integrated with periodic microfiltration (MF) extraction for simultaneous phosphorus and clean water recovery from wastewater was evaluated. A laboratory-scale AnOMBR used cellulose triacetate (CTA) membranes with effective membrane area of 130 cm² was fully submerged into a 5 L bioreactor at 30-35 ℃. Active layer was orientated to feed stream for minimizing membrane fouling and scaling. Additionally, a peristaltic pump was used to circulate magnesium sulphate (MgSO₄) solution applied as draw solution (DS). Microfiltration membrane periodically extracted about 1 L solution when the TDS reaches to 5 g/L to recover phosphorus and simultaneously control the salt accumulation in the bioreactor. During experiment progress, the average water flux was around 1.6 LMH. The AnOMBR process showed greater than 95% removal of soluble chemical oxygen demand (sCOD), nearly 100% of total phosphorous whereas only partial of ammonia was removed. On the other hand, the average methane production of 0.22 L/g sCOD was obtained. Subsequently, the overall performance demonstrates that a novel submerged AnOMBR system is potential for simultaneous wastewater treatment and resource recovery from wastewater. Therefore, the new concept of this system can be used to replace for the conventional AnMBR in the future.

Keywords: anaerobic treatment, forward osmosis, phosphorus recovery, membrane bioreactor

Procedia PDF Downloads 212
477 Effect of Marginal Quality Groundwater on Yield of Cotton Crop and Soil Salinity Status

Authors: A. L. Qureshi, A. A. Mahessar, R. K. Dashti, S. M. Yasin

Abstract:

In this paper, effect of marginal quality groundwater on yield of cotton crop and soil salinity was studied. In this connection, three irrigation treatments each with four replications were applied. These treatments were use of canal water, use of marginal quality groundwater from tube well, and conjunctive use by mixing with the ratio of 1:1 of canal water and marginal quality tubewell water. Water was applied to the crop cultivated in Kharif season 2011; its quantity has been measured using cut-throat flume. Total 11 watering each of 50 mm depth have been applied from 20th April to 20th July, 2011. Further, irrigations were stopped from last week of July, 2011 due to monsoon rainfall. Maximum crop yield (seed cotton) was observed under T1 which was 1,516.8 kg/ha followed by T3 (mixed canal and tube well water) having 1009 kg/ha and 709 kg/ha for T2 i.e. marginal quality groundwater. This concludes that crop yield in T2 and T3 with in comparison to T1was reduced by about 53 and 30% respectively. It has been observed that yield of cotton crop is below potential limit for three treatments due to unexpected rainfall at the time of full flowering season; thus the yield was adversely affected. However, salt deposition in soil profiles was not observed that is due to leaching effect of heavy rainfall occurred during monsoon season.

Keywords: conjunctive use, cotton crop, groundwater, soil salinity status, water use efficiency

Procedia PDF Downloads 422
476 Characterization of Biosurfactant during Crude Oil Biodegradation Employing Pseudomonas sp. PG1: A Strain Isolated from Garage Soil

Authors: Kaustuvmani Patowary, Suresh Deka

Abstract:

Oil pollution accidents, nowadays, have become a common phenomenon and have caused ecological and social disasters. Microorganisms with high oil-degrading performance are essential for bioremediation of petroleum hydrocarbon. In this investigation, an effective biosurfactant producer and hydrocarbon degrading bacterial strain, Pseudomonas sp.PG1 (identified by 16s rDNA sequencing) was isolated from hydrocarbon contaminated garage soil of Pathsala, Assam, India, using crude oil enrichment technique. The growth parameters such as pH and temperature were optimized for the strain and upto 81.8% degradation of total petroleum hydrocarbon (TPH) has been achieved after 5 weeks when grown in mineral salt media (MSM) containing 2% (w/v) crude oil as the carbon source. The biosurfactant production during the course of hydrocarbon degradation was monitored by surface tension measurement and emulsification activity. The produced biosurfactant had the ability to decrease the surface tension of MSM from 72 mN/m to 29.6 mN/m, with the critical micelle concentration (CMC)of 56 mg/L. The biosurfactant exhibited 100% emulsification activity on crude oil. FTIR spectroscopy and LCMS-MS analysis of the purified biosurfactant revealed that the biosurfactant is Rhamnolipidic in nature with several rhamnolipid congeners. Gas Chromatography-Mass spectroscopy (GC-MS) analysis clearly demonstrated that the strain PG1 efficiently degrade different hydrocarbon fractions of the crude oil. The study suggeststhat application of the biosurfactant producing strain PG1 as an appropriate candidate for bioremediation of crude oil contaminants.

Keywords: petroleum hydrocarbon, hydrocarbon contamination, bioremediation, biosurfactant, rhamnolipid

Procedia PDF Downloads 331
475 Detection of Cyberattacks on the Metaverse Based on First-Order Logic

Authors: Sulaiman Al Amro

Abstract:

There are currently considerable challenges concerning data security and privacy, particularly in relation to modern technologies. This includes the virtual world known as the Metaverse, which consists of a virtual space that integrates various technologies and is therefore susceptible to cyber threats such as malware, phishing, and identity theft. This has led recent studies to propose the development of Metaverse forensic frameworks and the integration of advanced technologies, including machine learning for intrusion detection and security. In this context, the application of first-order logic offers a formal and systematic approach to defining the conditions of cyberattacks, thereby contributing to the development of effective detection mechanisms. In addition, formalizing the rules and patterns of cyber threats has the potential to enhance the overall security posture of the Metaverse and, thus, the integrity and safety of this virtual environment. The current paper focuses on the primary actions employed by avatars for potential attacks, including Interval Temporal Logic (ITL) and behavior-based detection to detect an avatar’s abnormal activities within the Metaverse. The research established that the proposed framework attained an accuracy of 92.307%, resulting in the experimental results demonstrating the efficacy of ITL, including its superior performance in addressing the threats posed by avatars within the Metaverse domain.

Keywords: security, privacy, metaverse, cyberattacks, detection, first-order logic

Procedia PDF Downloads 20
474 Investigation on Corrosion Behavior of Copper Brazed Joints

Authors: A. M. Aminazad, A. M. Hadian, F. Ghasimakbari

Abstract:

DHP (Deoxidized High Phosphorus )copper is widely used in various heat transfer units such as, air conditioners refrigerators, evaporators and condensers. Copper sheets and tubes (ISODHP) were brazed with four different brazing alloys. Corrosion resistances of the joints were examined by polarization and salt spray tests. The selected fillers consisted of three silver-based brazing alloys (hard solder); AWS-BCu5 BAg8, DINLAg30, and a copper-based filler AWS BCuP2. All the joints were brazed utilizing four different brazing processes including furnace brazing under argon, vacuum, air atmosphere and torch brazing. All of the fillers were used with and without flux. The microstructure of the brazed sheets was examined using both optical and scanning electron microscope (SEM). Hardness and leak tests were carried out on all the brazed tubes. In all three silver brazing alloys selective and galvanic corrosion were observed in filler metals, but in copper phosphor alloys the copper adjacent to the joints were noticeably corroded by pitting method. Microstructure of damaged area showed selective attack of copper lamellae as well. Interfacial attack was observed along boundaries as well as copper attack within the filler metal itself. It was found that the samples brazed with BAg5 filler metal using vacuum furnace show a higher resistance to corrosion. They also have a good ductility in the brazed zone.

Keywords: copper, brazing, corrosion, filler metal

Procedia PDF Downloads 444
473 Human-Tiger Conflict in Chitwan National Park, Nepal

Authors: Abishek Poudel

Abstract:

Human-tiger conflicts are serious issues of conflicts between local people and park authority and the conflicting situation potentially play negative role in park management. The study aimed (1) To determine the trend and nature of human-tiger conflicts (2) To understand people's perception and mitigation measures towards tiger conservation. Both primary and secondary information were used to determine human- tiger conflicts in Chitwan National Park. Systematic random sampling with 5% intensity was done to collect the perception of the villagers regarding human-tiger conflicts. The study sites were selected based on frequencies of incidences of human attacks and livestock depredation viz. Rajahar and Ayodhyapuri VDCs respectively. The trend of human casualties by tiger has increased in last five year whereas the trend of livestock has decreased. Reportedly, between 2008 and 2012, tigers killed 22 people, injured 10 and killed at least 213 livestock. Conflict was less common in the park and more intense in the sub-optimal habitats of Buffer Zone. Goat was the most vulnerable livestock followed by cattle. The livestock grazing and human intrusion into tiger habitat were the causes of conflicts. Developing local stewardship and support for tiger conservation, livestock insurance, and compensation policy simplification may help reduce human-tiger conflicts.

Keywords: livestock depredation, sub optimal habitat, human-tiger, local stewardship

Procedia PDF Downloads 445
472 Effect Indol Acetic Acid on Liver of Albino Rats

Authors: Ezaldin A. M. Mohammed, Youssef K. H. Abdalhafid, Masoud. M. Zatout

Abstract:

The study aims to clarify the toxic effect of plant hormones, which are widely used in agriculture. One of these is the plant hormones (indole acetic acid); has been ٳata hormone to rats at 100 ppm salt solution of 0.2 per day after day for a period of forty days before conception until the fourteenth day or sixteenth or childbirth. Treatment brought about a marked shortage in the rate of increase in the weight of mice., And a percentage of the weight of the liver there was a distinct increase in the relative weight of the liver. As well as the increase in pathological changes and increase the size of the nuclei and Kupffer cell, as noted widespread and dense clusters of inflammatory cells accompanied by about the erosion of liver tissue and blood ٳrchah. Biochemical analyzes showed a marked decrease of the liver in antioxidant enzymes and an increase in the rate of free radicals. It was also noted an increase in cases of abortion. The owner of so many birth defects. It was also noted the lack of body weight in fetuses and increase the absorption rate of embryos in fetuses of mothers treatment compared to the control group. Showed microscopic examinations of the liver of mice born in the transaction and the decay in the presence of hepatic cells and edema, blood vessels and increase the rate of cell death.

Keywords: indol acetic acid, liver, pathological changes, albino rats

Procedia PDF Downloads 381
471 An Immune-Inspired Web Defense Architecture

Authors: Islam Khalil, Amr El-Kadi

Abstract:

With the increased use of web technologies, microservices, and Application Programming Interface (API) for integration between systems, and with the development of containerization of services on the operating system level as a method of isolating system execution and for easing the deployment and scaling of systems, there is a growing need as well as opportunities for providing platforms that improve the security of such services. In our work, we propose an architecture for a containerization platform that utilizes various concepts derived from the human immune system. The goal of the proposed containerization platform is to introduce the concept of slowing down or throttling suspected malicious digital pathogens (intrusions) to reduce their damage footprint while providing more opportunities for forensic inspection of suspected pathogens in addition to the ability to snapshot, rollback, and recover from possible damage. The proposed platform also leverages existing intrusion detection algorithms by integrating and orchestrating their cooperative operation for more effective intrusion detection. We show how this model reduces the damage footprint of intrusions and gives a greater time window for forensic investigation. Moreover, during our experiments, our proposed platform was able to uncover unintentional system design flaws that resulted in internal DDoS-like attacks by submodules of the system itself rather than external intrusions.

Keywords: containers, human immunity, intrusion detection, security, web services

Procedia PDF Downloads 69
470 Infestations of Olive Fruit Fly, Bactrocera oleae (Rossi) (Diptera: Tephritidae), in Different Olive Cultivars in Çanakkale, Turkey

Authors: Hanife Genç

Abstract:

The olive fruit fly, Bactrocera oleae (Rossi), is an economically important and endemic pest in olive (Oleae europae) orchards in Turkey. The aim of this study was to determine olive fruit fly infestation in different olive cultivars in the laboratory. Olive fly infested fruits were collected in Çanakkale province to establish wild fly population. After having reproductive olive fly colonies, 14 olive cultivars were tested in the controlled laboratory conditions, at 23±2 °C, 65% RH and 16:8 h (light: dark) photoperiod. The olive samples from 14 different olive cultivars were collected in October 2015, in Campus of Dardanos, Çanakkale Onsekiz Mart University. Observations were carried out detecting some biological parameters such as the number of oviposition stings, active infestation, total infestation, the number of pupae and the adult emergence. The results indicated that oviposition stings were not associated with pupal yield. A few pupae were found within olive fruits which were not able to exit. Screening of the varieties suggested that less susceptible cultivar to olive fruit fly attacks was Arbequin while Gemlik-2M 2/3 showed significant susceptibility. Ovipositional preference of olive fly females and the success of larval development in different olive varieties are crucial for establishing new olive orchards to prevent high olive fruit fly infestation.

Keywords: infestation, olive fruit fly, olive cultivars, oviposition sting

Procedia PDF Downloads 193
469 Low-Density Polyethylene Film Biodegradation Potential by Fungal Species From Thailand

Authors: Patcharee Pripdeevech, Sarunpron Khruengsai

Abstract:

Thirty fungi were tested for their degradation ability on low-density polyethylene (LDPE) plastic film. Biodegradation of all fungi was screened in mineral salt medium broth containing LDPE film as the sole carbon source for 30 days. Diaporthe italiana, Thyrostroma jaczewskii, Colletotrichum fructicola, and Stagonosporopsis citrulli were able to colonize and cover the surface of LDPE film in media. The degradation test result was compared to those obtained from Aspergillus niger. LDPE films cocultured with D. italiana, T. jaczewskii, C. fructicola, S. citrulli, A. niger, and control showed weight loss of 43.90%, 46.34%, 48.78%, 45.12%, 28.78%, and 10.85%, respectively. The tensile strength of degraded LDPE films cocultured with D. italiana, T. jaczewskii, C. fructicola, S. citrulli, A. niger, and control also reduced significantly by 1.56 MPa, 1.78 MPa, 0.43 MPa, 1.86 MPa, 3.34 MPa, and 9.98 MPa, respectively. Analysis of LDPE films by Fourier transform infrared spectroscopy and scanning electron microscopy confirmed the biodegradation by the presence of morphological changes such as cracks, scions, and holes on the surface of the film. These fungi have the ability to break down and consume the LDPE film, especially C. fructicola. These findings showed the potential of fungi in Thailand that play an important role in LDPE film degradation.

Keywords: plastic biodegradation, LDPE film, fungi, Fourier transform infrared, scanning electron microscopy

Procedia PDF Downloads 104
468 Double Fortified Salt-An Effective Measure to Prevent Micronutrient Deficiencies in Indian Pregnant Women

Authors: Kejal Joshi Reddy, Sirimavo Nair

Abstract:

Micronutrient malnutrition affects pregnant women and children extremely with reference to growth manifestations in gestation as well as after birth. Early fetal development affected by iodine and iron deficiency leads to poor life quality. Various researchers have found interesting interrelations between iron and iodine. A few studies on impact assessment of DFS supplementation during pregnancy have been reported in India. Aim To provide meaningful contribution by assessing the efficacy of DFS supplementation on iodine and iron status of pregnant women. Design An interventional study. Setting A semi government hospital of urban Vadodara. Subjects Pregnant women (n=150) enrolled during first trimester (< 12 weeks) and followed up till the end of gestation, n=75 were divided in experimental (DFS supplemented) and control (Non supplemented) group. Results Impact on iron and iodine status was assessed by Hb concentration and UIE respectively. Mean Hb improved significantly (p < 0.001) (+0.42 g/dl) in experimental group and reduced non significantly (-0.20 g/dl) in control group at the end, since DFS provided additional 93 mg of iron within 6 months. Median UIE improved non significantly (278.6 to 299.01µg/L) in experimental group and decreased significantly (p < 0.05) (376.59 to 288.66 µg/L) in control group. Conclusion DFS could improve iron and iodine status of experimental group compared to control group. It is an effective measure to control two essential micronutrient deficiencies together.

Keywords: DFS supplementation, anemia, pregnancy, iodine deficiency, iron

Procedia PDF Downloads 448
467 Modification Encryption Time and Permutation in Advanced Encryption Standard Algorithm

Authors: Dalal N. Hammod, Ekhlas K. Gbashi

Abstract:

Today, cryptography is used in many applications to achieve high security in data transmission and in real-time communications. AES has long gained global acceptance and is used for securing sensitive data in various industries but has suffered from slow processing and take a large time to transfer data. This paper suggests a method to enhance Advance Encryption Standard (AES) Algorithm based on time and permutation. The suggested method (MAES) is based on modifying the SubByte and ShiftRrows in the encryption part and modification the InvSubByte and InvShiftRows in the decryption part. After the implementation of the proposal and testing the results, the Modified AES achieved good results in accomplishing the communication with high performance criteria in terms of randomness, encryption time, storage space, and avalanche effects. The proposed method has good randomness to ciphertext because this method passed NIST statistical tests against attacks; also, (MAES) reduced the encryption time by (10 %) than the time of the original AES; therefore, the modified AES is faster than the original AES. Also, the proposed method showed good results in memory utilization where the value is (54.36) for the MAES, but the value for the original AES is (66.23). Also, the avalanche effects used for calculating diffusion property are (52.08%) for the modified AES and (51.82%) percentage for the original AES.

Keywords: modified AES, randomness test, encryption time, avalanche effects

Procedia PDF Downloads 225
466 Social Media as a Source of Radicalization; A Case Study of Pakistan

Authors: Manam Hanfi

Abstract:

Pakistan is a victim of terrorism since 9/11 attacks. Since then it is a home for violence and extremism. One of the major reasons behind rising violence and extremism in Pakistan is radicalization. Pakistan has seen and suffered from the modification of terrorism from old to new. In new terrorism, the terrorist organizations incorporated internet to disseminate propaganda, to recruit and train people. The study focuses on the relationship between Pakistan and new terrorism and examines how the internet is being used by terrorist organizations. The study investigates radicalization through social media by terrorist organizations in Pakistan with the help of case studies. The study suggests five ways to counter radicalization, including, counter narrative on social media, content analysis of the data on the internet, curriculum and madrassa reforms, teaching peace education in the educational institutions and use of technical software such as eGLYPH to quickly remove violent data from social media. Lastly, the research attempted to contribute in counter-radicalization by combining the media dependency model and ideas for counter-radicalization. The dependency model elaborates the impact of mass media content on the audience. If media dependency is high, it will cause cognitive, affective and behavioral changes. In order to counter radicalization through social media, it is important to make cognitive, affective and behavioral changes with the help of counter-radicalization suggestions.

Keywords: counter radicalization, extremism, social media, terrorism

Procedia PDF Downloads 134
465 The Potential Threat of Cyberterrorism to the National Security: Theoretical Framework

Authors: Abdulrahman S. Alqahtani

Abstract:

The revolution of computing and networks could revolutionise terrorism in the same way that it has brought about changes in other aspects of life. The modern technological era has faced countries with a new set of security challenges. There are many states and potential adversaries who have the potential and capacity in cyberspace, which makes them able to carry out cyber-attacks in the future. Some of them are currently conducting surveillance, gathering and analysis of technical information, and mapping of networks and nodes and infrastructure of opponents, which may be exploited in future conflicts. This poster presents the results of the quantitative study (survey) to test the validity of the proposed theoretical framework for the cyber terrorist threats. This theoretical framework will help to in-depth understand these new digital terrorist threats. It may also be a practical guide for managers and technicians in critical infrastructure, to understand and assess the threats they face. It might also be the foundation for building a national strategy to counter cyberterrorism. In the beginning, it provides basic information about the data. To purify the data, reliability and exploratory factor analysis, as well as confirmatory factor analysis (CFA) were performed. Then, Structural Equation Modelling (SEM) was utilised to test the final model of the theory and to assess the overall goodness-of-fit between the proposed model and the collected data set.

Keywords: cyberterrorism, critical infrastructure, , national security, theoretical framework, terrorism

Procedia PDF Downloads 377
464 Recovery of Copper and Gold by Delamination of Printed Circuit Boards Followed by Leaching and Solvent Extraction Process

Authors: Kamalesh Kumar Singh

Abstract:

Due to increasing trends of electronic waste, specially the ICT related gadgets, their green recycling is still a greater challenge. This article presents a two-stage, eco-friendly hydrometallurgical route for the recovery of gold from the delaminated metallic layers of waste mobile phone Printed Circuit Boards (PCBs). Initially, mobile phone PCBs are downsized (1x1 cm²) and treated with an organic solvent dimethylacetamide (DMA) for the separation of metallic fraction from non-metallic glass fiber. In the first stage, liberated metallic sheets are used for the selective dissolution of copper in an aqueous leaching reagent. Influence of various parameters such as type of leaching reagent, the concentration of the solution, temperature, time and pulp density are optimized for the effective leaching (almost 100%) of copper. Results have shown that 3M nitric acid is a suitable reagent for copper leaching at room temperature and considering chemical features, gold remained in solid residue. In the second stage, the separated residue is used for the recovery of gold by using sulphuric acid with a combination of halide salt. In this halide leaching, Cl₂ or Br₂ is generated as an in-situ oxidant to improve the leaching of gold. Results have shown that almost 92 % of gold is recovered at the optimized parameters.

Keywords: printed circuit boards, delamination, leaching, solvent extraction, recovery

Procedia PDF Downloads 33
463 Developing a Secure Iris Recognition System by Using Advance Convolutional Neural Network

Authors: Kamyar Fakhr, Roozbeh Salmani

Abstract:

Alphonse Bertillon developed the first biometric security system in the 1800s. Today, many governments and giant companies are considering or have procured biometrically enabled security schemes. Iris is a kaleidoscope of patterns and colors. Each individual holds a set of irises more unique than their thumbprint. Every single day, giant companies like Google and Apple are experimenting with reliable biometric systems. Now, after almost 200 years of improvements, face ID does not work with masks, it gives access to fake 3D images, and there is no global usage of biometric recognition systems as national identity (ID) card. The goal of this paper is to demonstrate the advantages of iris recognition overall biometric recognition systems. It make two extensions: first, we illustrate how a very large amount of internet fraud and cyber abuse is happening due to bugs in face recognition systems and in a very large dataset of 3.4M people; second, we discuss how establishing a secure global network of iris recognition devices connected to authoritative convolutional neural networks could be the safest solution to this dilemma. Another aim of this study is to provide a system that will prevent system infiltration caused by cyber-attacks and will block all wireframes to the data until the main user ceases the procedure.

Keywords: biometric system, convolutional neural network, cyber-attack, secure

Procedia PDF Downloads 192
462 Exploring the Need to Study the Efficacy of VR Training Compared to Traditional Cybersecurity Training

Authors: Shaila Rana, Wasim Alhamdani

Abstract:

Effective cybersecurity training is of the utmost importance, given the plethora of attacks that continue to increase in complexity and ubiquity. VR cybersecurity training remains a starkly understudied discipline. Studies that evaluated the effectiveness of VR cybersecurity training over traditional methods are required. An engaging and interactive platform can support knowledge retention of the training material. Consequently, an effective form of cybersecurity training is required to support a culture of cybersecurity awareness. Measurements of effectiveness varied throughout the studies, with surveys and observations being the two most utilized forms of evaluating effectiveness. Further research is needed to evaluate the effectiveness of VR cybersecurity training and traditional training. Additionally, research for evaluating if VR cybersecurity training is more effective than traditional methods is vital. This paper proposes a methodology to compare the two cybersecurity training methods and their effectiveness. The proposed framework includes developing both VR and traditional cybersecurity training methods and delivering them to at least 100 users. A quiz along with a survey will be administered and statistically analyzed to determine if there is a difference in knowledge retention and user satisfaction. The aim of this paper is to bring attention to the need to study VR cybersecurity training and its effectiveness compared to traditional training methods. This paper hopes to contribute to the cybersecurity training field by providing an effective way to train users for security awareness. If VR training is deemed more effective, this could create a new direction for cybersecurity training practices.

Keywords: virtual reality cybersecurity training, VR cybersecurity training, traditional cybersecurity training

Procedia PDF Downloads 186
461 An Investigation to Study the Moisture Dependency of Ground Enhancement Compound

Authors: Arunima Shukla, Vikas Almadi, Devesh Jaiswal, Sunil Saini, Bhusan S. Patil

Abstract:

Lightning protection consists of three main parts; mainly air termination system, down conductor, and earth termination system. Earth termination system is the most important part as earth is the sink and source of charges. Therefore, even when the charges are captured and delivered to the ground, and an easy path is not provided to the charges, earth termination system would lead to problems. Soil has significantly different resistivities ranging from 10 Ωm for wet organic soil to 10000 Ωm for bedrock. Different methods have been discussed and used conventionally such as deep-ground-well method and altering the length of the rod. Those methods are not considered economical. Therefore, it was a general practice to use charcoal along with salt to reduce the soil resistivity. Bentonite is worldwide acceptable material, that had led our interest towards study of bentonite at first. It was concluded that bentonite is a clay which is non-corrosive, environment friendly. Whereas bentonite is suitable only when there is moisture present in the soil, as in the absence of moisture, cracks will appear on the surface which will provide an open passage to the air, resulting into increase in the resistivity. Furthermore, bentonite without moisture does not have enough bonding property, moisture retention, conductivity, and non-leachability. Therefore, bentonite was used along with the other backfill material to overcome the dependency of bentonite on moisture. Different experiments were performed to get the best ratio of bentonite and carbon backfill. It was concluded that properties will highly depend on the quantity of bentonite and carbon-based backfill material.

Keywords: backfill material, bentonite, grounding material, low resistivity

Procedia PDF Downloads 128