Search results for: salt and peppers attacks
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 1270

Search results for: salt and peppers attacks

460 Effect of the pH on the Degradation Kinetics of Biodegradable Mg-0.8Ca Orthopedic Implants

Authors: A. Mohamed, A. El-Aziz

Abstract:

The pH of the body plays a great role in the degradation kinetics of biodegradable Mg-Ca orthopedic implants. At the location of fracture, the pH of the body becomes no longer neutral which draws the attention towards studying a range of different pH values of the body fluid. In this study, the pH of Hank’s balanced salt solution (HBSS) was modified by phosphate buffers into an aggressive acidic pH 1.8, a slightly acidic pH 5.3 and an alkaline pH 8.1. The biodegradation of Mg-0.8Ca implant was tested in those three different media using immersion test and electrochemical polarization means. It was proposed that the degradation rate has increased with decreasing the pH of HBSS. The immersion test revealed weight gain for all the samples followed by weight loss as the immersion time increased. The highest weight gain was pronounced for the acidic pH 1.8 and the least weight gain was observed for the alkaline pH 8.1. This was in agreement with the electrochemical polarization test results where the degradation rate was found to be high (7.29 ± 2.2 mm/year) in the aggressive acidic solution of pH 1.8 and relatively minimum (0.31 ± 0.06 mm/year) in the alkaline medium of pH 8.1. Furthermore, it was confirmed that the pH of HBSS has reached a steady state of an alkaline pH (~pH 11) at the end of the two-month immersion period regardless of the initial pH of the solution. Finally, the corrosion products formed on the samples’ surface were investigated by SEM, EDX and XRD analyses that revealed the formation of magnesium and calcium phosphates with different morphologies according to the pH.

Keywords: biodegradable, electrochemical polarization means, orthopedics, immersion test, simulated body fluid

Procedia PDF Downloads 103
459 Formation of Stable Aqueous Dispersions of Polyaniline-Silica Particles for Application in Anticorrosive Coatings on Steel

Authors: K. Kamburova, N. Boshkova, N. Boshkov, T. Radeva

Abstract:

Coatings based on polyaniline (PANI) can improve the resistance of steel against corrosion. Two forms of PANI are generally accepted to have effective protection of steel: the conducting emeraldine salt (ES) and the non-conducting emeraldine base (EB). The ability to intercept electrons at the metal surface and to transport them is typically attributed to ES, while the success of EB as an anticorrosive additive in the coating is attributed to its ability to oxidize and reduce in a reversible way. This electrochemical mechanism is probably combined with barrier effect against corrosion species. In this work, we describe the preparation of stable suspensions of colloidal PANI-SiO₂ particles, suitable for obtaining of composite anticorrosive coating on steel. Electrokinetic data as a function of pH are presented, showing that the zeta potentials of the PANI-SiO₂ particles are governed primarily by the charged groups at the silica oxide surface. Electrosteric stabilization of the PANI-SiO₂ particles’ suspension against aggregation is realized at pH > 5.5 (EB form of PANI) by adsorption of positively charged polyelectrolyte molecules onto negatively charged PANI-SiO₂ particles. We anticipate that incorporation of the small particles will provide a more homogeneous distribution in the coating matrix and will decrease the negative effect on barrier properties of the composite coating.

Keywords: particles, stable dispersion, composite coatings, corrosion protection

Procedia PDF Downloads 154
458 Biosynthesis of Silver Nanoparticles from Leaf Extract of Tithonia diversifolia and Its Antimicrobial Properties

Authors: Babatunde Oluwole Ogunsile, Omosola Monisola Fasoranti

Abstract:

High costs and toxicological hazards associated with the physicochemical methods of producing nanoparticles have limited their widespread use in clinical and biomedical applications. An ethically sound alternative is the utilization of plant bioresources as a low cost and eco–friendly biological approach. Silver nanoparticles (AgNPs) were synthesized from aqueous leaf extract of Tithonia diversifolia plant. The UV-Vis Spectrophotometer was used to monitor the formation of the AgNPs at different time intervals and different ratios of plant extract to the AgNO₃ solution. The biosynthesized AgNPs were characterized by FTIR, X-ray Diffraction (XRD) and Scanning Electron Microscope (SEM). Antimicrobial activities of the AgNPs were investigated against ten human pathogens using agar well diffusion method. The AgNPs yields were modeled using a second-order factorial design. The result showed that the rate of formation of the AgNPs increased with respect to time while the optimum ratio of plant extract to the AgNO₃ solution was 1:1. The hydroxyl group was strongly involved in the bioreduction of the silver salt as indicated by the FTIR spectra. The synthesized AgNPs were crystalline in nature, with a uniformly distributed network of the web-like structure. The factorial model predicted the nanoparticles yields with minimal errors. The nanoparticles were active against all the tested pathogens and thus have great potentials as antimicrobial agents.

Keywords: antimicrobial activities, green synthesis, silver nanoparticles, Tithonia diversifolia

Procedia PDF Downloads 125
457 Stack Overflow Detection and Prevention on Operating Systems Using Machine Learning and Control-Flow Enforcement Technology

Authors: Cao Jiayu, Lan Ximing, Huang Jingjia, Burra Venkata Durga Kumar

Abstract:

The first virus to attack personal computers was born in early 1986, called C-Brain, written by a pair of Pakistani brothers. In those days, people still used dos systems, manipulating computers with the most basic command lines. In the 21st century today, computer performance has grown geometrically. But computer viruses are also evolving and escalating. We never stop fighting against security problems. Stack overflow is one of the most common security vulnerabilities in operating systems. It may result in serious security issues for an operating system if a program in it has a vulnerability with administrator privileges. Certain viruses change the value of specific memory through a stack overflow, allowing computers to run harmful programs. This study developed a mechanism to detect and respond to time whenever a stack overflow occurs. We demonstrate the effectiveness of standard machine learning algorithms and control flow enforcement techniques in predicting computer OS security using generating suspicious vulnerability functions (SVFS) and associated suspect areas (SAS). The method can minimize the possibility of stack overflow attacks occurring.

Keywords: operating system, security, stack overflow, buffer overflow, machine learning, control-flow enforcement technology

Procedia PDF Downloads 98
456 Multiscale Model of Blast Explosion Human Injury Biomechanics

Authors: Raj K. Gupta, X. Gary Tan, Andrzej Przekwas

Abstract:

Bomb blasts from Improvised Explosive Devices (IEDs) account for vast majority of terrorist attacks worldwide. Injuries caused by IEDs result from a combination of the primary blast wave, penetrating fragments, and human body accelerations and impacts. This paper presents a multiscale computational model of coupled blast physics, whole human body biodynamics and injury biomechanics of sensitive organs. The disparity of the involved space- and time-scales is used to conduct sequential modeling of an IED explosion event, CFD simulation of blast loads on the human body and FEM modeling of body biodynamics and injury biomechanics. The paper presents simulation results for blast-induced brain injury coupling macro-scale brain biomechanics and micro-scale response of sensitive neuro-axonal structures. Validation results on animal models and physical surrogates are discussed. Results of our model can be used to 'replicate' filed blast loadings in laboratory controlled experiments using animal models and in vitro neuro-cultures.

Keywords: blast waves, improvised explosive devices, injury biomechanics, mathematical models, traumatic brain injury

Procedia PDF Downloads 227
455 The Role of QX-314 and Capsaicin in Producing Long-Lasting Local Anesthesia in the Animal Model of Trigeminal Neuralgia

Authors: Ezzati Givi M., Ezzatigivi N., Eimani H.

Abstract:

Trigeminal Neuralgia (TN) consists of painful attacks often triggered with general activities, which cause impairment and disability. The first line of treatment consists of pharmacotherapy. However, the occurrence of many side-effects limits its application. Acute pain relief is crucial for titrating oral drugs and making time for neurosurgical intervention. This study aimed to examine the long-term anesthetic effect of QX-314 and capsaicin in trigeminal neuralgia using an animal model. TN was stimulated by surgical constriction of the infraorbital nerve in rats. After seven days, anesthesia infiltration was done, and the duration of mechanical allodynia was compared. Thirty-five male Wistar rats were randomly divided into seven groups as follows: control (normal saline); lidocaine (2%); QX314 (30 mM); lidocaine (2%)+QX314 (15 mM); lidocaine (2%)+QX314 (22 mM); lidocaine (2%)+QX314 (30 mM); and lidocaine (2%)+QX314 (30 mM) +capsaicin (1μg). QX314 in combination with lidocaine significantly increased the duration of anesthesia, which was dose-dependent. The combination of lidocaine+QX314+capsaicin could significantly increase the duration of anesthesia in trigeminal neuralgia. In the present study, we demonstrated that the combination of QX-314 with lidocaine and capsaicin produced a long-lasting, reversible local anesthesia and was superior to lidocaine alone in the fields of the duration of trigeminal neuropathic pain blockage.

Keywords: trigeminal neuralgia, capsaicin, lidocaine, long-lasting

Procedia PDF Downloads 95
454 Structural Performance of Prefabricated Concrete and Reinforced Concrete Structural Walls under Blast Loads

Authors: S. Kamil Akin, Turgut Acikara

Abstract:

In recent years the world and our country has experienced several explosion events occurred due to terrorist attacks and accidents. In these explosion events many people have lost their lives and many buildings have been damaged. If structures were designed taking the blast loads into account, these results may not have happened or the casualties would have been less. In this thesis analysis of the protection walls have been conducted to prevent the building damage from blast loads. These analyzes was carried out for two different types of wall, concrete and reinforced concrete. Analyses were carried out on four different thicknesses of each wall element. In each wall element the stresses and displacements of the exposed surface due to the detonation charge has been calculated. The limit shear stress and displacement of the wall element according to their material properties has been taken into account. As the result of the analyses the standoff distances and TNT equivalent amount has been determined. According to equivalent TNT amounts and standoff distances the structural response of the protective wall elements has been observed. These structural responses have been observed by ABAQUS finite element package. Explosion loads were brought into effect to the protective wall element models by using the ABAQUS / CONWEP.

Keywords: blast loading, blast wave, TNT equivalent method, CONWEP, finite element analysis, detonation

Procedia PDF Downloads 416
453 The Shadow of Terrorism in the World Tourism Industry: Impacts, Prevention and Recovery Strategies

Authors: Maria Brás

Abstract:

The main purpose of the presentation is to identify the impacts and appropriate measures to prevent potential attacks, or minimize the risk of an attack in tourist destination. Terrorism has been growing in the shadow of unpredictability, however, is possible to minimize the danger of a terrorist attack by doing the: (1) recognition; (2); evaluation; (3) avoidance; (4) threat reduction. The vulnerability of tourism industry to terrorism is an undeniable fact, and terrorists know it. They use this advantage attacking tourists for very specific reasons, such as the: (1) international coverage by the media, “if it bleeds it leads” ; (2) chances of getting different nationalities at the same place and time; (3) possibility of destroyed the economy of a destination, or destinations (“terrorism contamination effect”), through the reduction of tourist demand; (4) psychological, and social disruption based on fear of negative consequences. Security incidents, such as terrorism, include different preventive measures that can be conducted in partnership with: tourism industry (hotels, airports, tourist attractions, among others); central government; public and/or private sector; local community; and media. The recovery strategies must be based on the dissemination of positive information to the media; in creating new marketing strategies that emphasize the social and cultural values of the destination; encourage domestic tourism; get government, or state, financial support.

Keywords: terrorism, tourism, safety, security, impacts, prevention, recovery

Procedia PDF Downloads 323
452 Fulani Herdsmen and the Threat to Grassroots Security in Rural Nigeria

Authors: Akachi Odoemene

Abstract:

There is an ongoing grassroots war in Nigeria, particularly in its north central zone, as well as all through its southern parts, which have been most bloody. The war is between Fulani herdsmen and farming communities – an age-long problem which has escalated in the last decade and has assumed a very deadly dimension. In a typical scenario, Fulani herdsmen move into non-Fulani homelands with their cattle which graze on local farmlands, destroying farmers’ crops. This provokes their victims – the farmers – to acts of resistance, preventing the Fulani and their cattle from entering into farmlands. In some cases, there have been incidences of killing and/or stealing cattle, or poisoning of fields. In response, the herders wedge deadly attacks on farming communities, leading to the death of thousands of people. To be sure, this has been a major factor of instability in the rural areas of Nigeria. This paper aims at engaging the issues and cross-cutting issues of interest, as well as providing context and perspectives to the violent conflicts between Fulani herders and local communities in Nigeria. It particularly interrogates four central issues: (1) the nature and dynamics of the crisis, (2) the positions and stakes of the parties to the crisis, (3) the remedies available for containing/managing the conflicts and their desirability, and (4) perspectives on the positions of government(s) (and the African Union) on this conflict. Both primary and secondary sources were used for the purposes of this essay.

Keywords: Fulani Herdsmen, violent conflicts and insecurity, sustainable remedies, Nigeria

Procedia PDF Downloads 227
451 Conceptualizing the Cyber Insecurity Risk in the Ethics of Automated Warfare

Authors: Otto Kakhidze, Hoda Alkhzaimi, Adam Ramey, Nasir Memon

Abstract:

This paper provides an alternative, cyber security based a conceptual framework for the ethics of automated warfare. The large body of work produced on fully or partially autonomous warfare systems tends to overlook malicious security factors as in the possibility of technical attacks on these systems when it comes to the moral and legal decision-making. The argument provides a risk-oriented justification to why technical malicious risks cannot be dismissed in legal, ethical and policy considerations when warfare models are being implemented and deployed. The assumptions of the paper are supported by providing a broader model that contains the perspective of technological vulnerabilities through the lenses of the Game Theory, Just War Theory as well as standard and non-standard defense ethics. The paper argues that a conventional risk-benefit analysis without considering ethical factors is insufficient for making legal and policy decisions on automated warfare. This approach will provide the substructure for security and defense experts as well as legal scholars, ethicists and decision theorists to work towards common justificatory grounds that will accommodate the technical security concerns that have been overlooked in the current legal and policy models.

Keywords: automated warfare, ethics of automation, inherent hijacking, security vulnerabilities, risk, uncertainty

Procedia PDF Downloads 343
450 The Effect of Temperature and Salinity on the Growth and Carotenogenesis of Three Dunaliella Species (Dunaliella sp. Lake Isolate, D. salina CCAP 19/18, and D. bardawil LB 2538) Cultivated under Laboratory Conditions

Authors: Imen Hamed, Burcu Ak, Oya Işık, Leyla Uslu, Kubilay Kazım Vursavuş

Abstract:

In this study, 3 species of Dunaliella (Dunaliella sp. Salt Lake isoalte (Tuz Gölü), Dunaliella salina CCAP19/18, and Dunaliella bardawil LB 2538) and their optical density, dry matter, chlorophyll a, total carotenoids, and β-carotene production were investigated in a batch system. The aim of this research was to compare carotenoids, and β-carotene production were investigated in a batch those 3 species. Therefore 2 stress factors were used: 2 different temperatures (20°C and 30°C) and 2 different salinities (30‰, and 60‰) were tested over a 17-day study. The highest growth and chlorophyll a was reported for Dunaliella sp. under 20°C/30‰ and 20°C/60‰ conditions respectively followed by D. bardawil and D. salina. Significant differences were noticed (p<0.05) for the other 3 species. The growth decreased as temperature and salinity increased since the lowest growth was noticed for the 30°C/60‰ group. The chlorophyll a content decreased also as temperature increased however when the NaCl concentration increased an augmentation of the content was noticed . In the 17th day of experiment the highest carotenoids concentration was reported for D. bardawil 20°C/30‰ (65,639±0,400 μg.mL1) and the most important β carotene concentration was for D. salina 20°C/60‰ (8,98E-07±0,013 mol/L).

Keywords: Dunaliella sp., Dunaliella salina, Dunaliella bardawil, growth, pigments, stress factors

Procedia PDF Downloads 294
449 Quality Characteristics of Cured Dried Camel Meat Formulated with Different Medicinal Plants as Natural Preservatives

Authors: H. S. Aljabeili, E. A. Abd El-Hady, M. M. Abd El-Razik, M. Abd Elgadir

Abstract:

The aim of the study is determining the quality characteristics of produced curing and dried camel meat contained some medicinal plants of thyme, rosemary, clove and ginger as natural preservatives. Camel meat samples were sliced and divided into five batches, one batch recorded as control sample was treated by the curing mixture (2.5%) contained the following ingredients: black pepper 1 gm, cumin 0.4 gm, spices mixture 0.5 gm, dried onion 3 gm, dried garlic 0.5 gm and salt 2 gm. To evaluate the effect of different natural preservatives sources of thyme, rosemary, clove and ginger, 3.0% of the aforementioned natural preservatives was mixed with the aforementioned curing mixture and used for curing the four batches of sliced camel meat. After curing process, cured sliced camel meat (control and treated with the natural preservatives) were conducting to drying process at 35 ± 3 °C for 36 h in a drying cabinet. The quality characteristics of prepared dried camel meat were evaluated such as chemical composition, microbiological characteristics and sensory characteristics. Based on the microbiological and sensory characteristics, it could be suggested that the selected medicinal plants specially thyme and rosemary could be used as natural preservatives for preparing semi dry camel meat without negative effects.

Keywords: curing, dried camel meat, medicinal plants, natural preservatives, quality characteristics

Procedia PDF Downloads 203
448 Identification and Classification of Gliadin Genes in Iranian Diploid Wheat

Authors: Jafar Ahmadi, Alireza Pour-Aboughadareh

Abstract:

Wheat is the first and the most important grain of the world and its bakery property is due to glutenin and gliadin qualities. Wheat seed proteins were divided into four groups according to solubility. Two groups are albumin and globulin dissolving in water and salt solutions possessing metabolic activities. Two other groups are inactive and non-dissolvable and contain glutelins or glutenins and prolamins or gliadins. Gliadins are major components of the storage proteins in wheat endosperm. Gliadin proteins are separated into three groups based on electrophoretic mobility: α/β-gliadin, γ-gliadin, and ω-gliadin. It seems that little information is available about gliadin genes in Iranian wild relatives of wheat. Thus, the aim of this study was the evaluation of the wheat wild relatives collected from different origins of Zagros Mountains in Iran, involving coding gliadin genes using specific primers. For this, forty accessions of Triticum boeoticum and Triticum urartu were selected. For each accession, genomic DNA was extracted and PCRs were performed in total volumes of 15 μl. The amplification products were separated on 1.5% agarose gels. In results, for Gli-2A locus, three allelic variants were detected by Gli-2As primer pairs. The sizes of PCR products for these alleles were 210, 490 and 700 bp. Only five (13%) and two accessions (5%) produced 700 and 490 bp fragments when their DNA was amplified with the Gli.As.2 primer pairs. However, 37 of the 40 accessions (93%) carried 210 bp allele, and three accessions (8%) did not yield any product for this marker. Therefore, these germplasm could be used as rich gene pool to broaden the genetic base of bread wheat.

Keywords: diploied wheat, gliadin, Triticum boeoticum, Triticum urartu

Procedia PDF Downloads 231
447 Bystanders' Behavior during Emergencies

Authors: Alan (Avi) Kirschenbaum, Carmit Rapaport

Abstract:

The behavior of bystanders in emergencies and disasters have been examined for over 50 years. Such acts have been cited as contributing to saving lives in terms of providing first responder help until official emergency units can arrive. Several reasons have been suggested for this type of behavior but most focused on a broad segment of individual psychological decision-making processes. Recent theoretical evidence suggests that the external factors for such bystander decisions, mainly disaster community based social contexts factors, are also important. We aim to test these competing arguments. Specifically, we examine alternative explanatory perspectives by focusing on self-efficacy as a proxy for the accepted individual psychological case and contrast it with potential bystander characteristics of the individual as well factors as embedded in the social context of the disaster community. To do so, we will utilize a random sampling of the population from a field study of an urban community in Israel that experienced five years of continuous terror attacks. The results strongly suggest that self-efficacy, as well as external factors: preparedness and having skills for intervention during emergencies along with gender best, predict potential helping behaviors. These results broaden our view of bystander behavior and open a window for enhancing this phenomenon as another element in disaster and crisis management.

Keywords: bystander behavior, disasters emergencies, psychological motivation to help, social context for helping

Procedia PDF Downloads 104
446 Unbranched, Saturated, Carboxylic Esters as Phase-Change Materials

Authors: Anastasia Stamatiou, Melissa Obermeyer, Ludger J. Fischer, Philipp Schuetz, Jörg Worlitschek

Abstract:

This study evaluates unbranched, saturated carboxylic esters with respect to their suitability to be used as storage media for latent heat storage applications. Important thermophysical properties are gathered both by means of literature research as well as by experimental measurements. Additionally, esters are critically evaluated against other common phase-change materials in terms of their environmental impact and their economic potential. The experimental investigations are performed for eleven selected ester samples with a focus on the determination of their melting temperature and their enthalpy of fusion using differential scanning calorimetry. Transient Hot Bridge was used to determine the thermal conductivity of the liquid samples while thermogravimetric analysis was employed for the evaluation of the 5% weight loss temperature as well as of the decomposition temperature of the non-volatile samples. Both experimental results and literature data reveal the high potential of esters as phase-change materials. Their good thermal and environmental properties as well as the possibility for production from natural sources (e.g. vegetable oils) render esters as very promising for future storage applications. A particularly high short term application potential of esters could lie in low temperature storage applications where the main alternative is using salt hydrates as phase-change material.

Keywords: esters, phase-change materials, thermal properties, latent heat storage

Procedia PDF Downloads 392
445 Interactive of Calcium, Potassium, and Dynamic Unequal Salt Distribution on the Growth of Tomato in Hydroponic System

Authors: Mohammad Koushafar, Amir Hossein Khoshgoftarmanesh

Abstract:

Due to water shortage, application of saline water for irrigation is an urgent requirement in agriculture. Thus, this study, the effect of calcium and potassium application as additive in saline root media for reduce salinity adverse effects was investigated on tomato growth in a hydroponic system with unequal distribution of salts in the root media, which was divided into two equal parts containing full Johnson nutrient solution and 40 mM NaCl solution, alone or in combination with KCl (6 mM), CaCl2 (4 mM), K+Ca (3+2 mM) or half-strength Johnson nutrient solution. The root splits were exchanged every 7 days. Results showed that addition of calcium, calcium-potassium and nutrition elements equivalent to half the concentration of Johnson formula to the saline-half of culture media minimized the reduction in plant growth caused by NaCl, although the addition of potassium to culture media was not effective. The greatest concentration of sodium was observed at the shoot of treatments which had the smallest growth. According to the results of this study, in the case of dynamic and non-uniform distribution of salts in the root media, by the addition of additive to the saline solution, it would be possible to use of saline water with no significant growth reduction.

Keywords: calcium, hydroponic, local salinity, potassium, salin water, tomato

Procedia PDF Downloads 426
444 Investigating Message Timing Side Channel Attacks on Networks on Chip with Ring Topology

Authors: Mark Davey

Abstract:

Communications on a Network on Chip (NoC) produce timing information, i.e., network injection delays, packet traversal times, throughput metrics, and other attributes relating to the traffic being sent across the chip. The security requirements of a platform encompass each node to operate with confidentiality, integrity, and availability (ISO 27001). Inherently, a shared NoC interconnect is exposed to analysis of timing patterns created by contention for the network components, i.e., links and switches/routers. This phenomenon is defined as information leakage, which represents a ‘side channel’ of sensitive information that can be correlated to platform activity. The key algorithm presented in this paper evaluates how an adversary can control two platform neighbouring nodes of a target node to obtain sensitive information about communication with the target node. The actual information obtained is the period value of a periodic task communication. This enacts a breach of the expected confidentiality of a node operating in a multiprocessor platform. An experimental investigation of the side channel is undertaken to judge the level and significance of inferred information produced by access times to the NoC. Results are presented with a series of expanding task set scenarios to evaluate the efficacy of the side channel detection algorithm as the network load increases.

Keywords: embedded systems, multiprocessor, network on chip, side channel

Procedia PDF Downloads 51
443 Performance Analysis of Traffic Classification with Machine Learning

Authors: Htay Htay Yi, Zin May Aye

Abstract:

Network security is role of the ICT environment because malicious users are continually growing that realm of education, business, and then related with ICT. The network security contravention is typically described and examined centrally based on a security event management system. The firewalls, Intrusion Detection System (IDS), and Intrusion Prevention System are becoming essential to monitor or prevent of potential violations, incidents attack, and imminent threats. In this system, the firewall rules are set only for where the system policies are needed. Dataset deployed in this system are derived from the testbed environment. The traffic as in DoS and PortScan traffics are applied in the testbed with firewall and IDS implementation. The network traffics are classified as normal or attacks in the existing testbed environment based on six machine learning classification methods applied in the system. It is required to be tested to get datasets and applied for DoS and PortScan. The dataset is based on CICIDS2017 and some features have been added. This system tested 26 features from the applied dataset. The system is to reduce false positive rates and to improve accuracy in the implemented testbed design. The system also proves good performance by selecting important features and comparing existing a dataset by machine learning classifiers.

Keywords: false negative rate, intrusion detection system, machine learning methods, performance

Procedia PDF Downloads 103
442 Production of Amorphous Boron Powder via Chemical Vapor Deposition (CVD)

Authors: Meltem Bolluk, Ismail Duman

Abstract:

Boron exhibits the properties of high melting temperature (2273K to 2573 K), high hardness (Mohs: 9,5), low density (2,340 g/cm3), high chemical resistance, high strength, and semiconductivity (band gap:1,6-2,1 eV). These superior properties enable to use it in several high-tech areas from electronics to nuclear industry and especially in high temperature metallurgy. Amorphous boron and crystalline boron have different application areas. Amorphous boron powder (directly amorphous and/or α-rhombohedral) is preferred in rocket firing, airbag inflating and in fabrication of superconducting MgB2 wires. The conventional ways to produce elemental boron with a purity of 85 pct to 95 prc are metallothermic reduction, fused salt electrolysis and mechanochemical synthesis; but the only way to produce high-purity boron powders is Chemical Vapour Deposition (Hot Surface CVD). In this study; amorphous boron powders with a minimum purity of 99,9 prc were synthesized in quartz tubes using BCl3-H2 gas mixture by CVD. Process conditions based on temperature and gas flow rate were determined. Thermodynamical interpretation of BCl3-H2 system for different temperatures and molar rates were performed using Fact Sage software. The characterization of powders was examined by using Xray diffraction (XRD), Scanning Electron Microscope (SEM) and Transmission Electron Microscope (TEM), Stereo Microscope (SM), Helium gas pycnometer analysis. The purities of final products were determined by titration after lime fusion.

Keywords: amorphous boron, CVD, powder production, powder characterization

Procedia PDF Downloads 191
441 Lightweight Hardware Firewall for Embedded System Based on Bus Transactions

Authors: Ziyuan Wu, Yulong Jia, Xiang Zhang, Wanting Zhou, Lei Li

Abstract:

The Internet of Things (IoT) is a rapidly evolving field involving a large number of interconnected embedded devices. In the design of embedded System-on-Chip (SoC), the key issues are power consumption, performance, and security. However, the easy-to-implement software and untrustworthy third-party IP cores may threaten the safety of hardware assets. Considering that illegal access and malicious attacks against SoC resources pass through the bus that integrates IPs, we propose a Lightweight Hardware Firewall (LHF) to protect SoC, which monitors and disallows the offending bus transactions based on physical addresses. Furthermore, under the LHF architecture, this paper refines two types of firewalls: Destination Hardware Firewall (DHF) and Source Hardware Firewall (SHF). The former is oriented to fine-grained detection and configuration, whose core technology is based on the method of dynamic grading units. In addition, we design the SHF based on static entries to achieve lightweight. Finally, we evaluate the hardware consumption of the proposed method by both Field-Programmable Gate Array (FPGA) and IC. Compared with the exciting efforts, LHF introduces a bus latency of zero clock cycles for every read or write transaction implemented on Xilinx Kintex-7 FPGAs. Meanwhile, the DC synthesis results based on TSMC 90nm show that the area is reduced by about 25% compared with the previous method.

Keywords: IoT, security, SoC, bus architecture, lightweight hardware firewall, FPGA

Procedia PDF Downloads 39
440 Basics of SCADA Security: A Technical Approach

Authors: Michał Witas

Abstract:

This paper presents a technical approach to analysis of security of SCADA systems. Main goal of the paper is to make SCADA administrators aware of risks resulting from SCADA systems usage and to familiarize with methods that can be adopt to existing or planned system, to increase overall system security level. Because SCADA based systems become a industrial standard, more attention should be paid to the security of that systems. Industrial Control Systems (ICS) like SCADA are responsible for controlling crucial aspects of wide range of industrial processes. In pair with that responsibility, goes a lot of money that can be earned or lost – this fact is main reason of increased interest of attackers. Additionally ICS are often responsible for maintaining resources strategic from the point of view of national economy, like electricity (including nuclear power plants), heating, water resources or military facilities, so they can be targets of terrorist cybernetic attacks. Without proper risk analysis and management, vulnerabilities resulting from the usage of SCADA can be easily exploited by potential attacker. Paper is based mostly on own experience in systems security, gathered during academic studies and professional work in international company. As title suggests, it will cover only basics of topic, because every of points mentioned in the document can be base for additional research and papers.

Keywords: denial of service, SCADA, security policy, distributed network

Procedia PDF Downloads 347
439 Radical Islam and Transnational Security: West Africa and the Asia Pacific in View

Authors: Olumide A. Fafore, Khondlo Mtshali

Abstract:

The beginning of the 21st century saw the emergence of new and global threats to national and transnational security in West Africa and the Asia Pacific regions as a result of the spread of jihadist terrorism across borders, a manifestation of the rise of radical Islam. Extremist and armed Islamic movements influenced by Salafism, the Jihad in Afghanistan and the Muslim Brotherhood are prevalent in Northern Nigeria, Niger, Cameroon, Mali, Chad, Pakistan, Afghanistan, and India. Carrying out attacks across borders, including assassinations, murders, armed robberies, and kidnapping, assisted by open and porous borders and large flow of illegal immigrants across borders. This paper examines the effect of Radical Islam on Transnational security through a review of past literature and the social and security consequences on the people of the regions. Our findings indicate that the activities of armed Islamic movements such as Boko Haram, Ansaru and Al-Qaeda are having a negative impact on the economy, development, and security of the states and people of West Africa and the Asia Pacific. It stresses the importance of regional, transnational and international cooperation, as these threats to national and transnational security can no longer be solved in a national or regional framework.

Keywords: Islamic movements, jihadist terrorism, radical Islam, transnational security

Procedia PDF Downloads 144
438 Organic Substance Removal from Pla-Som Family Industrial Wastewater through APCW System

Authors: W. Wararam, K. Angchanpen, T. Pattamapitoon, K. Chunkao, O. Phewnil, M. Srichomphu, T. Jinjaruk

Abstract:

The research focused on the efficiency for treating high organic wastewater from pla-som production process by anaerobic tanks, oxidation ponds and constructed wetland treatment systems (APCW). The combined system consisted of 50-mm plastic screen, five 5.8 m3 oil-grease trap tanks (2-day hydraulic retention time; HRT), four 4.3 m3 anaerobic tanks (1-day HRT), 16.7 m3 oxidation pond no.1 (7-day HRT), 12.0 m3 oxidation pond no.2 (3-day HRT), and 8.2 m3 constructed wetland plot (1-day HRT). After washing fresh raw fishes, they were sliced in small pieces and were converted into ground fish meat by blender machine. The fish meat was rinsed for 8 rounds: 1, 2, 3, 5, 6 and 7 by tap water and 4 and 8 by rice-wash-water, before mixing with salt, garlic, steamed rice and monosodium glutamate, followed by plastic wrapping for 72-hour of edibility. During pla-som production processing, the rinsed wastewater about 5 m3/day was fed to the treatment systems and fully stagnating storage in its components. The result found that, 1) percentage of treatment efficiency for BOD, COD, TDS and SS were 93, 95, 32 and 98 respectively, 2) the treatment was conducted with 500-kg raw fishes along with full equipment of high organic wastewater treatment systems, 3) the trend of the treatment efficiency and quantity in all indicators was similarly processed and 4) the small pieces of fish meat and fish blood were needed more than 3-day HRT in anaerobic digestion process.

Keywords: organic substance, Pla-Som family industry, wastewater, APCW system

Procedia PDF Downloads 335
437 Evaluation of Deformable Boundary Condition Using Finite Element Method and Impact Test for Steel Tubes

Authors: Abed Ahmed, Mehrdad Asadi, Jennifer Martay

Abstract:

Stainless steel pipelines are crucial components to transportation and storage in the oil and gas industry. However, the rise of random attacks and vandalism on these pipes for their valuable transport has led to more security and protection for incoming surface impacts. These surface impacts can lead to large global deformations of the pipe and place the pipe under strain, causing the eventual failure of the pipeline. Therefore, understanding how these surface impact loads affect the pipes is vital to improving the pipes’ security and protection. In this study, experimental test and finite element analysis (FEA) have been carried out on EN3B stainless steel specimens to study the impact behaviour. Low velocity impact tests at 9 m/s with 16 kg dome impactor was used to simulate for high momentum impact for localised failure. FEA models of clamped and deformable boundaries were modelled to study the effect of the boundaries on the pipes impact behaviour on its impact resistance, using experimental and FEA approach. Comparison of experimental and FE simulation shows good correlation to the deformable boundaries in order to validate the robustness of the FE model to be implemented in pipe models with complex anisotropic structure.

Keywords: dynamic impact, deformable boundary conditions, finite element modelling, LS-DYNA, stainless steel pipe

Procedia PDF Downloads 129
436 Effect of Temperature on Pervaporation Performance of Ag-Poly Vinyl Alcohol Nanocomposite Membranes

Authors: Asmaa Selim, Peter Mizsey

Abstract:

Bio-ethanol is considered of higher potential as a green renewable energy source owing to its environmental benefits and its high efficiency. In the present study, silver nanoparticles were in-situ generated in a poly (vinyl alcohol) in order to improve its potentials for pervaporation of ethanol-water mixture using solution-casting. Effect of silver content on the pervaporation separation index and the enrichment factor of the membrane at 15 percentage mass water at 40ᵒC was reported. Pervaporation data for nanocomposite membranes showed around 100% increase in the water permeance values while the intrinsic selectivity decreased. The water permeances of origin crosslinked PVA membrane, and the 2.5% silver loaded PVA membrane are 26.65 and 70.45 (g/m².kPa.h) respectively. The values of total flux and water flux are closed to each other, indicating that membranes could be effectively used to break the azeotropic point of ethanol-water. Effect of temperature on the pervaporation performance, permeation parameter and diffusion coefficient of both water and ethanol was discussed. The negative heat of sorption ∆Hs values calculated on the basis of the estimated Arrhenius activation energy values indicating that the sorption process was controlled by Langmuir’s mode. The overall results showed that the membrane containing 0.5 mass percentage of Ag salt exhibited excellent PV performance.

Keywords: bio-ethanol, diffusion coefficient, nanocomposite, pervaporation, poly (vinyl alcohol), silver nanoparticles

Procedia PDF Downloads 149
435 Identification Strategies for Unknown Victims from Mass Disasters and Unknown Perpetrators from Violent Crime or Terrorist Attacks

Authors: Michael Josef Schwerer

Abstract:

Background: The identification of unknown victims from mass disasters, violent crimes, or terrorist attacks is frequently facilitated through information from missing persons lists, portrait photos, old or recent pictures showing unique characteristics of a person such as scars or tattoos, or simply reference samples from blood relatives for DNA analysis. In contrast, the identification or at least the characterization of an unknown perpetrator from criminal or terrorist actions remains challenging, particularly in the absence of material or data for comparison, such as fingerprints, which had been previously stored in criminal records. In scenarios that result in high levels of destruction of the perpetrator’s corpse, for instance, blast or fire events, the chance for a positive identification using standard techniques is further impaired. Objectives: This study shows the forensic genetic procedures in the Legal Medicine Service of the German Air Force for the identification of unknown individuals, including such cases in which reference samples are not available. Scenarios requiring such efforts predominantly involve aircraft crash investigations, which are routinely carried out by the German Air Force Centre of Aerospace Medicine as one of the Institution’s essential missions. Further, casework by military police or military intelligence is supported based on administrative cooperation. In the talk, data from study projects, as well as examples from real casework, will be demonstrated and discussed with the audience. Methods: Forensic genetic identification in our laboratories involves the analysis of Short Tandem Repeats and Single Nucleotide Polymorphisms in nuclear DNA along with mitochondrial DNA haplotyping. Extended DNA analysis involves phenotypic markers for skin, hair, and eye color together with the investigation of a person’s biogeographic ancestry. Assessment of the biological age of an individual employs CpG-island methylation analysis using bisulfite-converted DNA. Forensic Investigative Genealogy assessment allows the detection of an unknown person’s blood relatives in reference databases. Technically, end-point-PCR, real-time PCR, capillary electrophoresis, pyrosequencing as well as next generation sequencing using flow-cell-based and chip-based systems are used. Results and Discussion: Optimization of DNA extraction from various sources, including difficult matrixes like formalin-fixed, paraffin-embedded tissues, degraded specimens from decomposed bodies or from decedents exposed to blast or fire events, provides soil for successful PCR amplification and subsequent genetic profiling. For cases with extremely low yields of extracted DNA, whole genome preamplification protocols are successfully used, particularly regarding genetic phenotyping. Improved primer design for CpG-methylation analysis, together with validated sampling strategies for the analyzed substrates from, e.g., lymphocyte-rich organs, allows successful biological age estimation even in bodies with highly degraded tissue material. Conclusions: Successful identification of unknown individuals or at least their phenotypic characterization using pigmentation markers together with age-informative methylation profiles, possibly supplemented by family tree search employing Forensic Investigative Genealogy, can be provided in specialized laboratories. However, standard laboratory procedures must be adapted to work with difficult and highly degraded sample materials.

Keywords: identification, forensic genetics, phenotypic markers, CPG methylation, biological age estimation, forensic investigative genealogy

Procedia PDF Downloads 27
434 Selective Solvent Extraction of Co from Ni and Mn through Outer-Sphere Interactions

Authors: Korban Oosthuizen, Robert C. Luckay

Abstract:

Due to the growing popularity of electric vehicles and the importance of cobalt as part of the cathode material for lithium-ion batteries, demand for this metal is on the rise. Recycling of the cathode materials by means of solvent extraction is an attractive means of recovering cobalt and easing the pressure on limited natural resources. In this study, a series of straight chain and macrocyclic diamine ligands were developed for the selective recovery of cobalt from the solution containing nickel and manganese by means of solvent extraction. This combination of metals is the major cathode material used in electric vehicle batteries. The ligands can be protonated and function as ion-pairing ligands targeting the anionic [CoCl₄]²⁻, a species which is not observed for Ni or Mn. Selectivity for Co was found to be good at very high chloride concentrations and low pH. Longer chains or larger macrocycles were found to enhance selectivity, and linear chains on the amide side groups also resulted in greater selectivity over the branched groups. The cation of the chloride salt used for adjusting chloride concentrations seems to play a major role in extraction through salting-out effects. The ligands developed in this study show good selectivity for Co over Ni and Mn but require very high chloride concentrations to function. This research does, however, open the door for further investigations into using diamines as solvent extraction ligands for the recovery of cobalt from spent lithium-ion batteries.

Keywords: hydrometallurgy, solvent extraction, cobalt, lithium-ion batteries

Procedia PDF Downloads 52
433 Copper (II) Complex of New Tetradentate Asymmetrical Schiff Base Ligand: Synthesis, Characterization, and Catecholase-Mimetic Activity

Authors: Cahit Demetgul, Sahin Bayraktar, Neslihan Beyazit

Abstract:

Metalloenzymes are enzyme proteins containing metal ions, which are directly bound to the protein or to enzyme-bound nonprotein components. One of the major metalloenzymes that play a key role in oxidation reactions is catechol oxidase, which shows catecholase activity i.e. oxidation of a broad range of catechols to quinones through the four-electron reduction of molecular oxygen to water. Studies on the model compounds mimicking the catecholase activity are very useful and promising for the development of new, more efficient bioinspired catalysts, for in vitro oxidation reactions. In this study, a new tetradentate asymmetrical Schiff-base and its Cu(II) complex were synthesized by condensation of 4-nitro-1,2-phenylenediamine with 6-formyl-7-hydroxy-5-methoxy-2-methylbenzopyran-4-one and by using an appropriate Cu(II) salt, respectively. The prepared compounds were characterized by elemental analysis, FT-IR, NMR, UV-Vis and magnetic susceptibility. The catecholase-mimicking activity of the new Schiff Base Cu(II) complex was performed for the oxidation of 3,5-di-tert-butylcatechol (3,5-DTBC) in methanol at 25 °C, where the electronic spectra were recorded at different time intervals. The yield of the quinone (3,5-DTBQ) was determined from the measured absorbance at 400 nm of the resulting solution. The compatibility of catalytic reaction with Michaelis-Menten kinetics was also investigated. In conclusion, we have found that our new Schiff Base Cu(II) complex presents a significant capacity to catalyze the oxidation reaction of the catechol to o-quinone.

Keywords: catecholase activity, Michaelis-Menten kinetics, Schiff base, transition metals

Procedia PDF Downloads 289
432 On the Design of a Secure Two-Party Authentication Scheme for Internet of Things Using Cancelable Biometrics and Physically Unclonable Functions

Authors: Behnam Zahednejad, Saeed Kosari

Abstract:

Widespread deployment of Internet of Things (IoT) has raised security and privacy issues in this environment. Designing a secure two-factor authentication scheme between the user and server is still a challenging task. In this paper, we focus on Cancelable Biometric (CB) as an authentication factor in IoT. We show that previous CB-based scheme fail to provide real two-factor security, Perfect Forward Secrecy (PFS) and suffer database attacks and traceability of the user. Then we propose our improved scheme based on CB and Physically Unclonable Functions (PUF), which can provide real two-factor security, PFS, user’s unlinkability, and resistance to database attack. In addition, Key Compromise Impersonation (KCI) resilience is achieved in our scheme. We also prove the security of our proposed scheme formally using both Real-Or-Random (RoR) model and the ProVerif analysis tool. For the usability of our scheme, we conducted a performance analysis and showed that our scheme has the least communication cost compared to the previous CB-based scheme. The computational cost of our scheme is also acceptable for the IoT environment.

Keywords: IoT, two-factor security, cancelable biometric, key compromise impersonation resilience, perfect forward secrecy, database attack, real-or-random model, ProVerif

Procedia PDF Downloads 77
431 Modifiable Poly Methacrylic Acid-Co-Acrylonitrile Microgels Fabricated with Cu and Co Nanoparticles for Simultaneous Catalytic Reduction of Multiple Compounds

Authors: Muhammad Ajmal, Muhammad Siddiq, Nurettin Sahiner

Abstract:

We prepared poly(methacrylic acid-co-acrylonitrile) (p(MAc-co-AN)) microgels by inverse suspension polymerization, and converted the nitrile groups into amidoxime groups to obtain more hydrophilic amidoximated poly(methacrylic acid-co-acrylonitile) (amid-p(MAc-co-AN)) microgels. Amid-microgels were used as microreactors for in situ synthesis of copper and cobalt nanoparticles. Cu (II) and Co (II) ions were loaded into microgels from their aqueous metal salt solutions and then converted to corresponding metal nanoparticle (MNP) by treating the loaded metal ions with sodium borohydride (NaBH4). The characterization of the prepared microgels and microgel metal nanoparticle composites was carried out by SEM, TEM and TG analysis. The amounts of metal nanoparticles within microgels were estimated by AAS measurements by dissolving the MNP entrapped within microgels by concentrated HCl acid treatment. Catalytic performances of the prepared amid-p(MAc-co-AN)-M (M: Cu, Co) microgel composites were investigated by using them as catalyst for the degradation of cationic and anionic organic dyes such as eosin Y (EY), methylene blue (MB) and methyl Orange (MO), and for the reduction of nitro aromatic pollutants like 2-nitrophenol (2-NP) and 4-nitrophenol (4-NP) to their corresponding amino phenols. Here, we also report for the first time, the simultaneous degradation/reduction of MB, EY, and 4-NP by amid-p(MAc-co-AN)-Cu microgel composites. Different parameters affecting the reduction rates such as metal types, amount of catalysts, temperature and the amount of reducing agent were investigated.

Keywords: microgels, nanoparticles, catalyst, pollutants

Procedia PDF Downloads 333