Search results for: salt and peppers attacks
492 Characterization of Biosurfactant during Crude Oil Biodegradation Employing Pseudomonas sp. PG1: A Strain Isolated from Garage Soil
Authors: Kaustuvmani Patowary, Suresh Deka
Abstract:
Oil pollution accidents, nowadays, have become a common phenomenon and have caused ecological and social disasters. Microorganisms with high oil-degrading performance are essential for bioremediation of petroleum hydrocarbon. In this investigation, an effective biosurfactant producer and hydrocarbon degrading bacterial strain, Pseudomonas sp.PG1 (identified by 16s rDNA sequencing) was isolated from hydrocarbon contaminated garage soil of Pathsala, Assam, India, using crude oil enrichment technique. The growth parameters such as pH and temperature were optimized for the strain and upto 81.8% degradation of total petroleum hydrocarbon (TPH) has been achieved after 5 weeks when grown in mineral salt media (MSM) containing 2% (w/v) crude oil as the carbon source. The biosurfactant production during the course of hydrocarbon degradation was monitored by surface tension measurement and emulsification activity. The produced biosurfactant had the ability to decrease the surface tension of MSM from 72 mN/m to 29.6 mN/m, with the critical micelle concentration (CMC)of 56 mg/L. The biosurfactant exhibited 100% emulsification activity on crude oil. FTIR spectroscopy and LCMS-MS analysis of the purified biosurfactant revealed that the biosurfactant is Rhamnolipidic in nature with several rhamnolipid congeners. Gas Chromatography-Mass spectroscopy (GC-MS) analysis clearly demonstrated that the strain PG1 efficiently degrade different hydrocarbon fractions of the crude oil. The study suggeststhat application of the biosurfactant producing strain PG1 as an appropriate candidate for bioremediation of crude oil contaminants.Keywords: petroleum hydrocarbon, hydrocarbon contamination, bioremediation, biosurfactant, rhamnolipid
Procedia PDF Downloads 354491 Investigation on Corrosion Behavior of Copper Brazed Joints
Authors: A. M. Aminazad, A. M. Hadian, F. Ghasimakbari
Abstract:
DHP (Deoxidized High Phosphorus )copper is widely used in various heat transfer units such as, air conditioners refrigerators, evaporators and condensers. Copper sheets and tubes (ISODHP) were brazed with four different brazing alloys. Corrosion resistances of the joints were examined by polarization and salt spray tests. The selected fillers consisted of three silver-based brazing alloys (hard solder); AWS-BCu5 BAg8, DINLAg30, and a copper-based filler AWS BCuP2. All the joints were brazed utilizing four different brazing processes including furnace brazing under argon, vacuum, air atmosphere and torch brazing. All of the fillers were used with and without flux. The microstructure of the brazed sheets was examined using both optical and scanning electron microscope (SEM). Hardness and leak tests were carried out on all the brazed tubes. In all three silver brazing alloys selective and galvanic corrosion were observed in filler metals, but in copper phosphor alloys the copper adjacent to the joints were noticeably corroded by pitting method. Microstructure of damaged area showed selective attack of copper lamellae as well. Interfacial attack was observed along boundaries as well as copper attack within the filler metal itself. It was found that the samples brazed with BAg5 filler metal using vacuum furnace show a higher resistance to corrosion. They also have a good ductility in the brazed zone.Keywords: copper, brazing, corrosion, filler metal
Procedia PDF Downloads 470490 The Strategy of Orbit Avoidance for Optical Remote Sensing Satellite
Authors: Dianxun Zheng, Wuxing Jing, Lin Hetong
Abstract:
Optical remote sensing satellite, always running on the Sun-synchronous orbit, equipped laser warning equipment to alert CCD camera from laser attack. There have three ways to protect the CCD camera, closing the camera cover satellite attitude maneuver and satellite orbit avoidance. In order to enhance the safety of optical remote sensing satellite in orbit, this paper explores the strategy of satellite avoidance. The avoidance strategy is expressed as the evasion of pre-determined target points in the orbital coordinates of virtual satellite. The so-called virtual satellite is a passive vehicle which superposes a satellite at the initial stage of avoidance. The target points share the consistent cycle time and the same semi-major axis with the virtual satellite, which ensures the properties of the Sun-synchronous orbit remain unchanged. Moreover, to further strengthen the avoidance capability of satellite, it can perform multi-object avoid maneuvers. On occasions of fulfilling the orbit tasks of the satellite, the orbit can be restored back to virtual satellite through orbit maneuvers. There into, the avoid maneuvers adopts pulse guidance. and the fuel consumption is also optimized. The avoidance strategy discussed in this article is applicable to avoidance for optical remote sensing satellite when encounter the laser hostile attacks.Keywords: optical remote sensing satellite, always running on the sun-synchronous
Procedia PDF Downloads 400489 Detection of Cyberattacks on the Metaverse Based on First-Order Logic
Authors: Sulaiman Al Amro
Abstract:
There are currently considerable challenges concerning data security and privacy, particularly in relation to modern technologies. This includes the virtual world known as the Metaverse, which consists of a virtual space that integrates various technologies and is therefore susceptible to cyber threats such as malware, phishing, and identity theft. This has led recent studies to propose the development of Metaverse forensic frameworks and the integration of advanced technologies, including machine learning for intrusion detection and security. In this context, the application of first-order logic offers a formal and systematic approach to defining the conditions of cyberattacks, thereby contributing to the development of effective detection mechanisms. In addition, formalizing the rules and patterns of cyber threats has the potential to enhance the overall security posture of the Metaverse and, thus, the integrity and safety of this virtual environment. The current paper focuses on the primary actions employed by avatars for potential attacks, including Interval Temporal Logic (ITL) and behavior-based detection to detect an avatar’s abnormal activities within the Metaverse. The research established that the proposed framework attained an accuracy of 92.307%, resulting in the experimental results demonstrating the efficacy of ITL, including its superior performance in addressing the threats posed by avatars within the Metaverse domain.Keywords: security, privacy, metaverse, cyberattacks, detection, first-order logic
Procedia PDF Downloads 40488 Human-Tiger Conflict in Chitwan National Park, Nepal
Authors: Abishek Poudel
Abstract:
Human-tiger conflicts are serious issues of conflicts between local people and park authority and the conflicting situation potentially play negative role in park management. The study aimed (1) To determine the trend and nature of human-tiger conflicts (2) To understand people's perception and mitigation measures towards tiger conservation. Both primary and secondary information were used to determine human- tiger conflicts in Chitwan National Park. Systematic random sampling with 5% intensity was done to collect the perception of the villagers regarding human-tiger conflicts. The study sites were selected based on frequencies of incidences of human attacks and livestock depredation viz. Rajahar and Ayodhyapuri VDCs respectively. The trend of human casualties by tiger has increased in last five year whereas the trend of livestock has decreased. Reportedly, between 2008 and 2012, tigers killed 22 people, injured 10 and killed at least 213 livestock. Conflict was less common in the park and more intense in the sub-optimal habitats of Buffer Zone. Goat was the most vulnerable livestock followed by cattle. The livestock grazing and human intrusion into tiger habitat were the causes of conflicts. Developing local stewardship and support for tiger conservation, livestock insurance, and compensation policy simplification may help reduce human-tiger conflicts.Keywords: livestock depredation, sub optimal habitat, human-tiger, local stewardship
Procedia PDF Downloads 463487 Effect Indol Acetic Acid on Liver of Albino Rats
Authors: Ezaldin A. M. Mohammed, Youssef K. H. Abdalhafid, Masoud. M. Zatout
Abstract:
The study aims to clarify the toxic effect of plant hormones, which are widely used in agriculture. One of these is the plant hormones (indole acetic acid); has been ٳata hormone to rats at 100 ppm salt solution of 0.2 per day after day for a period of forty days before conception until the fourteenth day or sixteenth or childbirth. Treatment brought about a marked shortage in the rate of increase in the weight of mice., And a percentage of the weight of the liver there was a distinct increase in the relative weight of the liver. As well as the increase in pathological changes and increase the size of the nuclei and Kupffer cell, as noted widespread and dense clusters of inflammatory cells accompanied by about the erosion of liver tissue and blood ٳrchah. Biochemical analyzes showed a marked decrease of the liver in antioxidant enzymes and an increase in the rate of free radicals. It was also noted an increase in cases of abortion. The owner of so many birth defects. It was also noted the lack of body weight in fetuses and increase the absorption rate of embryos in fetuses of mothers treatment compared to the control group. Showed microscopic examinations of the liver of mice born in the transaction and the decay in the presence of hepatic cells and edema, blood vessels and increase the rate of cell death.Keywords: indol acetic acid, liver, pathological changes, albino rats
Procedia PDF Downloads 400486 Low-Density Polyethylene Film Biodegradation Potential by Fungal Species From Thailand
Authors: Patcharee Pripdeevech, Sarunpron Khruengsai
Abstract:
Thirty fungi were tested for their degradation ability on low-density polyethylene (LDPE) plastic film. Biodegradation of all fungi was screened in mineral salt medium broth containing LDPE film as the sole carbon source for 30 days. Diaporthe italiana, Thyrostroma jaczewskii, Colletotrichum fructicola, and Stagonosporopsis citrulli were able to colonize and cover the surface of LDPE film in media. The degradation test result was compared to those obtained from Aspergillus niger. LDPE films cocultured with D. italiana, T. jaczewskii, C. fructicola, S. citrulli, A. niger, and control showed weight loss of 43.90%, 46.34%, 48.78%, 45.12%, 28.78%, and 10.85%, respectively. The tensile strength of degraded LDPE films cocultured with D. italiana, T. jaczewskii, C. fructicola, S. citrulli, A. niger, and control also reduced significantly by 1.56 MPa, 1.78 MPa, 0.43 MPa, 1.86 MPa, 3.34 MPa, and 9.98 MPa, respectively. Analysis of LDPE films by Fourier transform infrared spectroscopy and scanning electron microscopy confirmed the biodegradation by the presence of morphological changes such as cracks, scions, and holes on the surface of the film. These fungi have the ability to break down and consume the LDPE film, especially C. fructicola. These findings showed the potential of fungi in Thailand that play an important role in LDPE film degradation.Keywords: plastic biodegradation, LDPE film, fungi, Fourier transform infrared, scanning electron microscopy
Procedia PDF Downloads 132485 An Immune-Inspired Web Defense Architecture
Authors: Islam Khalil, Amr El-Kadi
Abstract:
With the increased use of web technologies, microservices, and Application Programming Interface (API) for integration between systems, and with the development of containerization of services on the operating system level as a method of isolating system execution and for easing the deployment and scaling of systems, there is a growing need as well as opportunities for providing platforms that improve the security of such services. In our work, we propose an architecture for a containerization platform that utilizes various concepts derived from the human immune system. The goal of the proposed containerization platform is to introduce the concept of slowing down or throttling suspected malicious digital pathogens (intrusions) to reduce their damage footprint while providing more opportunities for forensic inspection of suspected pathogens in addition to the ability to snapshot, rollback, and recover from possible damage. The proposed platform also leverages existing intrusion detection algorithms by integrating and orchestrating their cooperative operation for more effective intrusion detection. We show how this model reduces the damage footprint of intrusions and gives a greater time window for forensic investigation. Moreover, during our experiments, our proposed platform was able to uncover unintentional system design flaws that resulted in internal DDoS-like attacks by submodules of the system itself rather than external intrusions.Keywords: containers, human immunity, intrusion detection, security, web services
Procedia PDF Downloads 95484 Double Fortified Salt-An Effective Measure to Prevent Micronutrient Deficiencies in Indian Pregnant Women
Authors: Kejal Joshi Reddy, Sirimavo Nair
Abstract:
Micronutrient malnutrition affects pregnant women and children extremely with reference to growth manifestations in gestation as well as after birth. Early fetal development affected by iodine and iron deficiency leads to poor life quality. Various researchers have found interesting interrelations between iron and iodine. A few studies on impact assessment of DFS supplementation during pregnancy have been reported in India. Aim To provide meaningful contribution by assessing the efficacy of DFS supplementation on iodine and iron status of pregnant women. Design An interventional study. Setting A semi government hospital of urban Vadodara. Subjects Pregnant women (n=150) enrolled during first trimester (< 12 weeks) and followed up till the end of gestation, n=75 were divided in experimental (DFS supplemented) and control (Non supplemented) group. Results Impact on iron and iodine status was assessed by Hb concentration and UIE respectively. Mean Hb improved significantly (p < 0.001) (+0.42 g/dl) in experimental group and reduced non significantly (-0.20 g/dl) in control group at the end, since DFS provided additional 93 mg of iron within 6 months. Median UIE improved non significantly (278.6 to 299.01µg/L) in experimental group and decreased significantly (p < 0.05) (376.59 to 288.66 µg/L) in control group. Conclusion DFS could improve iron and iodine status of experimental group compared to control group. It is an effective measure to control two essential micronutrient deficiencies together.Keywords: DFS supplementation, anemia, pregnancy, iodine deficiency, iron
Procedia PDF Downloads 470483 Infestations of Olive Fruit Fly, Bactrocera oleae (Rossi) (Diptera: Tephritidae), in Different Olive Cultivars in Çanakkale, Turkey
Authors: Hanife Genç
Abstract:
The olive fruit fly, Bactrocera oleae (Rossi), is an economically important and endemic pest in olive (Oleae europae) orchards in Turkey. The aim of this study was to determine olive fruit fly infestation in different olive cultivars in the laboratory. Olive fly infested fruits were collected in Çanakkale province to establish wild fly population. After having reproductive olive fly colonies, 14 olive cultivars were tested in the controlled laboratory conditions, at 23±2 °C, 65% RH and 16:8 h (light: dark) photoperiod. The olive samples from 14 different olive cultivars were collected in October 2015, in Campus of Dardanos, Çanakkale Onsekiz Mart University. Observations were carried out detecting some biological parameters such as the number of oviposition stings, active infestation, total infestation, the number of pupae and the adult emergence. The results indicated that oviposition stings were not associated with pupal yield. A few pupae were found within olive fruits which were not able to exit. Screening of the varieties suggested that less susceptible cultivar to olive fruit fly attacks was Arbequin while Gemlik-2M 2/3 showed significant susceptibility. Ovipositional preference of olive fly females and the success of larval development in different olive varieties are crucial for establishing new olive orchards to prevent high olive fruit fly infestation.Keywords: infestation, olive fruit fly, olive cultivars, oviposition sting
Procedia PDF Downloads 217482 Recovery of Copper and Gold by Delamination of Printed Circuit Boards Followed by Leaching and Solvent Extraction Process
Authors: Kamalesh Kumar Singh
Abstract:
Due to increasing trends of electronic waste, specially the ICT related gadgets, their green recycling is still a greater challenge. This article presents a two-stage, eco-friendly hydrometallurgical route for the recovery of gold from the delaminated metallic layers of waste mobile phone Printed Circuit Boards (PCBs). Initially, mobile phone PCBs are downsized (1x1 cm²) and treated with an organic solvent dimethylacetamide (DMA) for the separation of metallic fraction from non-metallic glass fiber. In the first stage, liberated metallic sheets are used for the selective dissolution of copper in an aqueous leaching reagent. Influence of various parameters such as type of leaching reagent, the concentration of the solution, temperature, time and pulp density are optimized for the effective leaching (almost 100%) of copper. Results have shown that 3M nitric acid is a suitable reagent for copper leaching at room temperature and considering chemical features, gold remained in solid residue. In the second stage, the separated residue is used for the recovery of gold by using sulphuric acid with a combination of halide salt. In this halide leaching, Cl₂ or Br₂ is generated as an in-situ oxidant to improve the leaching of gold. Results have shown that almost 92 % of gold is recovered at the optimized parameters.Keywords: printed circuit boards, delamination, leaching, solvent extraction, recovery
Procedia PDF Downloads 56481 Modification Encryption Time and Permutation in Advanced Encryption Standard Algorithm
Authors: Dalal N. Hammod, Ekhlas K. Gbashi
Abstract:
Today, cryptography is used in many applications to achieve high security in data transmission and in real-time communications. AES has long gained global acceptance and is used for securing sensitive data in various industries but has suffered from slow processing and take a large time to transfer data. This paper suggests a method to enhance Advance Encryption Standard (AES) Algorithm based on time and permutation. The suggested method (MAES) is based on modifying the SubByte and ShiftRrows in the encryption part and modification the InvSubByte and InvShiftRows in the decryption part. After the implementation of the proposal and testing the results, the Modified AES achieved good results in accomplishing the communication with high performance criteria in terms of randomness, encryption time, storage space, and avalanche effects. The proposed method has good randomness to ciphertext because this method passed NIST statistical tests against attacks; also, (MAES) reduced the encryption time by (10 %) than the time of the original AES; therefore, the modified AES is faster than the original AES. Also, the proposed method showed good results in memory utilization where the value is (54.36) for the MAES, but the value for the original AES is (66.23). Also, the avalanche effects used for calculating diffusion property are (52.08%) for the modified AES and (51.82%) percentage for the original AES.Keywords: modified AES, randomness test, encryption time, avalanche effects
Procedia PDF Downloads 247480 Social Media as a Source of Radicalization; A Case Study of Pakistan
Authors: Manam Hanfi
Abstract:
Pakistan is a victim of terrorism since 9/11 attacks. Since then it is a home for violence and extremism. One of the major reasons behind rising violence and extremism in Pakistan is radicalization. Pakistan has seen and suffered from the modification of terrorism from old to new. In new terrorism, the terrorist organizations incorporated internet to disseminate propaganda, to recruit and train people. The study focuses on the relationship between Pakistan and new terrorism and examines how the internet is being used by terrorist organizations. The study investigates radicalization through social media by terrorist organizations in Pakistan with the help of case studies. The study suggests five ways to counter radicalization, including, counter narrative on social media, content analysis of the data on the internet, curriculum and madrassa reforms, teaching peace education in the educational institutions and use of technical software such as eGLYPH to quickly remove violent data from social media. Lastly, the research attempted to contribute in counter-radicalization by combining the media dependency model and ideas for counter-radicalization. The dependency model elaborates the impact of mass media content on the audience. If media dependency is high, it will cause cognitive, affective and behavioral changes. In order to counter radicalization through social media, it is important to make cognitive, affective and behavioral changes with the help of counter-radicalization suggestions.Keywords: counter radicalization, extremism, social media, terrorism
Procedia PDF Downloads 155479 The Potential Threat of Cyberterrorism to the National Security: Theoretical Framework
Authors: Abdulrahman S. Alqahtani
Abstract:
The revolution of computing and networks could revolutionise terrorism in the same way that it has brought about changes in other aspects of life. The modern technological era has faced countries with a new set of security challenges. There are many states and potential adversaries who have the potential and capacity in cyberspace, which makes them able to carry out cyber-attacks in the future. Some of them are currently conducting surveillance, gathering and analysis of technical information, and mapping of networks and nodes and infrastructure of opponents, which may be exploited in future conflicts. This poster presents the results of the quantitative study (survey) to test the validity of the proposed theoretical framework for the cyber terrorist threats. This theoretical framework will help to in-depth understand these new digital terrorist threats. It may also be a practical guide for managers and technicians in critical infrastructure, to understand and assess the threats they face. It might also be the foundation for building a national strategy to counter cyberterrorism. In the beginning, it provides basic information about the data. To purify the data, reliability and exploratory factor analysis, as well as confirmatory factor analysis (CFA) were performed. Then, Structural Equation Modelling (SEM) was utilised to test the final model of the theory and to assess the overall goodness-of-fit between the proposed model and the collected data set.Keywords: cyberterrorism, critical infrastructure, , national security, theoretical framework, terrorism
Procedia PDF Downloads 404478 An Investigation to Study the Moisture Dependency of Ground Enhancement Compound
Authors: Arunima Shukla, Vikas Almadi, Devesh Jaiswal, Sunil Saini, Bhusan S. Patil
Abstract:
Lightning protection consists of three main parts; mainly air termination system, down conductor, and earth termination system. Earth termination system is the most important part as earth is the sink and source of charges. Therefore, even when the charges are captured and delivered to the ground, and an easy path is not provided to the charges, earth termination system would lead to problems. Soil has significantly different resistivities ranging from 10 Ωm for wet organic soil to 10000 Ωm for bedrock. Different methods have been discussed and used conventionally such as deep-ground-well method and altering the length of the rod. Those methods are not considered economical. Therefore, it was a general practice to use charcoal along with salt to reduce the soil resistivity. Bentonite is worldwide acceptable material, that had led our interest towards study of bentonite at first. It was concluded that bentonite is a clay which is non-corrosive, environment friendly. Whereas bentonite is suitable only when there is moisture present in the soil, as in the absence of moisture, cracks will appear on the surface which will provide an open passage to the air, resulting into increase in the resistivity. Furthermore, bentonite without moisture does not have enough bonding property, moisture retention, conductivity, and non-leachability. Therefore, bentonite was used along with the other backfill material to overcome the dependency of bentonite on moisture. Different experiments were performed to get the best ratio of bentonite and carbon backfill. It was concluded that properties will highly depend on the quantity of bentonite and carbon-based backfill material.Keywords: backfill material, bentonite, grounding material, low resistivity
Procedia PDF Downloads 147477 Effect of the pH on the Degradation Kinetics of Biodegradable Mg-0.8Ca Orthopedic Implants
Authors: A. Mohamed, A. El-Aziz
Abstract:
The pH of the body plays a great role in the degradation kinetics of biodegradable Mg-Ca orthopedic implants. At the location of fracture, the pH of the body becomes no longer neutral which draws the attention towards studying a range of different pH values of the body fluid. In this study, the pH of Hank’s balanced salt solution (HBSS) was modified by phosphate buffers into an aggressive acidic pH 1.8, a slightly acidic pH 5.3 and an alkaline pH 8.1. The biodegradation of Mg-0.8Ca implant was tested in those three different media using immersion test and electrochemical polarization means. It was proposed that the degradation rate has increased with decreasing the pH of HBSS. The immersion test revealed weight gain for all the samples followed by weight loss as the immersion time increased. The highest weight gain was pronounced for the acidic pH 1.8 and the least weight gain was observed for the alkaline pH 8.1. This was in agreement with the electrochemical polarization test results where the degradation rate was found to be high (7.29 ± 2.2 mm/year) in the aggressive acidic solution of pH 1.8 and relatively minimum (0.31 ± 0.06 mm/year) in the alkaline medium of pH 8.1. Furthermore, it was confirmed that the pH of HBSS has reached a steady state of an alkaline pH (~pH 11) at the end of the two-month immersion period regardless of the initial pH of the solution. Finally, the corrosion products formed on the samples’ surface were investigated by SEM, EDX and XRD analyses that revealed the formation of magnesium and calcium phosphates with different morphologies according to the pH.Keywords: biodegradable, electrochemical polarization means, orthopedics, immersion test, simulated body fluid
Procedia PDF Downloads 123476 Developing a Secure Iris Recognition System by Using Advance Convolutional Neural Network
Authors: Kamyar Fakhr, Roozbeh Salmani
Abstract:
Alphonse Bertillon developed the first biometric security system in the 1800s. Today, many governments and giant companies are considering or have procured biometrically enabled security schemes. Iris is a kaleidoscope of patterns and colors. Each individual holds a set of irises more unique than their thumbprint. Every single day, giant companies like Google and Apple are experimenting with reliable biometric systems. Now, after almost 200 years of improvements, face ID does not work with masks, it gives access to fake 3D images, and there is no global usage of biometric recognition systems as national identity (ID) card. The goal of this paper is to demonstrate the advantages of iris recognition overall biometric recognition systems. It make two extensions: first, we illustrate how a very large amount of internet fraud and cyber abuse is happening due to bugs in face recognition systems and in a very large dataset of 3.4M people; second, we discuss how establishing a secure global network of iris recognition devices connected to authoritative convolutional neural networks could be the safest solution to this dilemma. Another aim of this study is to provide a system that will prevent system infiltration caused by cyber-attacks and will block all wireframes to the data until the main user ceases the procedure.Keywords: biometric system, convolutional neural network, cyber-attack, secure
Procedia PDF Downloads 218475 Formation of Stable Aqueous Dispersions of Polyaniline-Silica Particles for Application in Anticorrosive Coatings on Steel
Authors: K. Kamburova, N. Boshkova, N. Boshkov, T. Radeva
Abstract:
Coatings based on polyaniline (PANI) can improve the resistance of steel against corrosion. Two forms of PANI are generally accepted to have effective protection of steel: the conducting emeraldine salt (ES) and the non-conducting emeraldine base (EB). The ability to intercept electrons at the metal surface and to transport them is typically attributed to ES, while the success of EB as an anticorrosive additive in the coating is attributed to its ability to oxidize and reduce in a reversible way. This electrochemical mechanism is probably combined with barrier effect against corrosion species. In this work, we describe the preparation of stable suspensions of colloidal PANI-SiO₂ particles, suitable for obtaining of composite anticorrosive coating on steel. Electrokinetic data as a function of pH are presented, showing that the zeta potentials of the PANI-SiO₂ particles are governed primarily by the charged groups at the silica oxide surface. Electrosteric stabilization of the PANI-SiO₂ particles’ suspension against aggregation is realized at pH > 5.5 (EB form of PANI) by adsorption of positively charged polyelectrolyte molecules onto negatively charged PANI-SiO₂ particles. We anticipate that incorporation of the small particles will provide a more homogeneous distribution in the coating matrix and will decrease the negative effect on barrier properties of the composite coating.Keywords: particles, stable dispersion, composite coatings, corrosion protection
Procedia PDF Downloads 175474 Exploring the Need to Study the Efficacy of VR Training Compared to Traditional Cybersecurity Training
Authors: Shaila Rana, Wasim Alhamdani
Abstract:
Effective cybersecurity training is of the utmost importance, given the plethora of attacks that continue to increase in complexity and ubiquity. VR cybersecurity training remains a starkly understudied discipline. Studies that evaluated the effectiveness of VR cybersecurity training over traditional methods are required. An engaging and interactive platform can support knowledge retention of the training material. Consequently, an effective form of cybersecurity training is required to support a culture of cybersecurity awareness. Measurements of effectiveness varied throughout the studies, with surveys and observations being the two most utilized forms of evaluating effectiveness. Further research is needed to evaluate the effectiveness of VR cybersecurity training and traditional training. Additionally, research for evaluating if VR cybersecurity training is more effective than traditional methods is vital. This paper proposes a methodology to compare the two cybersecurity training methods and their effectiveness. The proposed framework includes developing both VR and traditional cybersecurity training methods and delivering them to at least 100 users. A quiz along with a survey will be administered and statistically analyzed to determine if there is a difference in knowledge retention and user satisfaction. The aim of this paper is to bring attention to the need to study VR cybersecurity training and its effectiveness compared to traditional training methods. This paper hopes to contribute to the cybersecurity training field by providing an effective way to train users for security awareness. If VR training is deemed more effective, this could create a new direction for cybersecurity training practices.Keywords: virtual reality cybersecurity training, VR cybersecurity training, traditional cybersecurity training
Procedia PDF Downloads 215473 Biosynthesis of Silver Nanoparticles from Leaf Extract of Tithonia diversifolia and Its Antimicrobial Properties
Authors: Babatunde Oluwole Ogunsile, Omosola Monisola Fasoranti
Abstract:
High costs and toxicological hazards associated with the physicochemical methods of producing nanoparticles have limited their widespread use in clinical and biomedical applications. An ethically sound alternative is the utilization of plant bioresources as a low cost and eco–friendly biological approach. Silver nanoparticles (AgNPs) were synthesized from aqueous leaf extract of Tithonia diversifolia plant. The UV-Vis Spectrophotometer was used to monitor the formation of the AgNPs at different time intervals and different ratios of plant extract to the AgNO₃ solution. The biosynthesized AgNPs were characterized by FTIR, X-ray Diffraction (XRD) and Scanning Electron Microscope (SEM). Antimicrobial activities of the AgNPs were investigated against ten human pathogens using agar well diffusion method. The AgNPs yields were modeled using a second-order factorial design. The result showed that the rate of formation of the AgNPs increased with respect to time while the optimum ratio of plant extract to the AgNO₃ solution was 1:1. The hydroxyl group was strongly involved in the bioreduction of the silver salt as indicated by the FTIR spectra. The synthesized AgNPs were crystalline in nature, with a uniformly distributed network of the web-like structure. The factorial model predicted the nanoparticles yields with minimal errors. The nanoparticles were active against all the tested pathogens and thus have great potentials as antimicrobial agents.Keywords: antimicrobial activities, green synthesis, silver nanoparticles, Tithonia diversifolia
Procedia PDF Downloads 148472 Stack Overflow Detection and Prevention on Operating Systems Using Machine Learning and Control-Flow Enforcement Technology
Authors: Cao Jiayu, Lan Ximing, Huang Jingjia, Burra Venkata Durga Kumar
Abstract:
The first virus to attack personal computers was born in early 1986, called C-Brain, written by a pair of Pakistani brothers. In those days, people still used dos systems, manipulating computers with the most basic command lines. In the 21st century today, computer performance has grown geometrically. But computer viruses are also evolving and escalating. We never stop fighting against security problems. Stack overflow is one of the most common security vulnerabilities in operating systems. It may result in serious security issues for an operating system if a program in it has a vulnerability with administrator privileges. Certain viruses change the value of specific memory through a stack overflow, allowing computers to run harmful programs. This study developed a mechanism to detect and respond to time whenever a stack overflow occurs. We demonstrate the effectiveness of standard machine learning algorithms and control flow enforcement techniques in predicting computer OS security using generating suspicious vulnerability functions (SVFS) and associated suspect areas (SAS). The method can minimize the possibility of stack overflow attacks occurring.Keywords: operating system, security, stack overflow, buffer overflow, machine learning, control-flow enforcement technology
Procedia PDF Downloads 115471 Multiscale Model of Blast Explosion Human Injury Biomechanics
Authors: Raj K. Gupta, X. Gary Tan, Andrzej Przekwas
Abstract:
Bomb blasts from Improvised Explosive Devices (IEDs) account for vast majority of terrorist attacks worldwide. Injuries caused by IEDs result from a combination of the primary blast wave, penetrating fragments, and human body accelerations and impacts. This paper presents a multiscale computational model of coupled blast physics, whole human body biodynamics and injury biomechanics of sensitive organs. The disparity of the involved space- and time-scales is used to conduct sequential modeling of an IED explosion event, CFD simulation of blast loads on the human body and FEM modeling of body biodynamics and injury biomechanics. The paper presents simulation results for blast-induced brain injury coupling macro-scale brain biomechanics and micro-scale response of sensitive neuro-axonal structures. Validation results on animal models and physical surrogates are discussed. Results of our model can be used to 'replicate' filed blast loadings in laboratory controlled experiments using animal models and in vitro neuro-cultures.Keywords: blast waves, improvised explosive devices, injury biomechanics, mathematical models, traumatic brain injury
Procedia PDF Downloads 249470 Convergence and Stability in Federated Learning with Adaptive Differential Privacy Preservation
Authors: Rizwan Rizwan
Abstract:
This paper provides an overview of Federated Learning (FL) and its application in enhancing data security, privacy, and efficiency. FL utilizes three distinct architectures to ensure privacy is never compromised. It involves training individual edge devices and aggregating their models on a server without sharing raw data. This approach not only provides secure models without data sharing but also offers a highly efficient privacy--preserving solution with improved security and data access. Also we discusses various frameworks used in FL and its integration with machine learning, deep learning, and data mining. In order to address the challenges of multi--party collaborative modeling scenarios, a brief review FL scheme combined with an adaptive gradient descent strategy and differential privacy mechanism. The adaptive learning rate algorithm adjusts the gradient descent process to avoid issues such as model overfitting and fluctuations, thereby enhancing modeling efficiency and performance in multi-party computation scenarios. Additionally, to cater to ultra-large-scale distributed secure computing, the research introduces a differential privacy mechanism that defends against various background knowledge attacks.Keywords: federated learning, differential privacy, gradient descent strategy, convergence, stability, threats
Procedia PDF Downloads 30469 The Role of QX-314 and Capsaicin in Producing Long-Lasting Local Anesthesia in the Animal Model of Trigeminal Neuralgia
Authors: Ezzati Givi M., Ezzatigivi N., Eimani H.
Abstract:
Trigeminal Neuralgia (TN) consists of painful attacks often triggered with general activities, which cause impairment and disability. The first line of treatment consists of pharmacotherapy. However, the occurrence of many side-effects limits its application. Acute pain relief is crucial for titrating oral drugs and making time for neurosurgical intervention. This study aimed to examine the long-term anesthetic effect of QX-314 and capsaicin in trigeminal neuralgia using an animal model. TN was stimulated by surgical constriction of the infraorbital nerve in rats. After seven days, anesthesia infiltration was done, and the duration of mechanical allodynia was compared. Thirty-five male Wistar rats were randomly divided into seven groups as follows: control (normal saline); lidocaine (2%); QX314 (30 mM); lidocaine (2%)+QX314 (15 mM); lidocaine (2%)+QX314 (22 mM); lidocaine (2%)+QX314 (30 mM); and lidocaine (2%)+QX314 (30 mM) +capsaicin (1μg). QX314 in combination with lidocaine significantly increased the duration of anesthesia, which was dose-dependent. The combination of lidocaine+QX314+capsaicin could significantly increase the duration of anesthesia in trigeminal neuralgia. In the present study, we demonstrated that the combination of QX-314 with lidocaine and capsaicin produced a long-lasting, reversible local anesthesia and was superior to lidocaine alone in the fields of the duration of trigeminal neuropathic pain blockage.Keywords: trigeminal neuralgia, capsaicin, lidocaine, long-lasting
Procedia PDF Downloads 114468 Structural Performance of Prefabricated Concrete and Reinforced Concrete Structural Walls under Blast Loads
Authors: S. Kamil Akin, Turgut Acikara
Abstract:
In recent years the world and our country has experienced several explosion events occurred due to terrorist attacks and accidents. In these explosion events many people have lost their lives and many buildings have been damaged. If structures were designed taking the blast loads into account, these results may not have happened or the casualties would have been less. In this thesis analysis of the protection walls have been conducted to prevent the building damage from blast loads. These analyzes was carried out for two different types of wall, concrete and reinforced concrete. Analyses were carried out on four different thicknesses of each wall element. In each wall element the stresses and displacements of the exposed surface due to the detonation charge has been calculated. The limit shear stress and displacement of the wall element according to their material properties has been taken into account. As the result of the analyses the standoff distances and TNT equivalent amount has been determined. According to equivalent TNT amounts and standoff distances the structural response of the protective wall elements has been observed. These structural responses have been observed by ABAQUS finite element package. Explosion loads were brought into effect to the protective wall element models by using the ABAQUS / CONWEP.Keywords: blast loading, blast wave, TNT equivalent method, CONWEP, finite element analysis, detonation
Procedia PDF Downloads 439467 The Shadow of Terrorism in the World Tourism Industry: Impacts, Prevention and Recovery Strategies
Authors: Maria Brás
Abstract:
The main purpose of the presentation is to identify the impacts and appropriate measures to prevent potential attacks, or minimize the risk of an attack in tourist destination. Terrorism has been growing in the shadow of unpredictability, however, is possible to minimize the danger of a terrorist attack by doing the: (1) recognition; (2); evaluation; (3) avoidance; (4) threat reduction. The vulnerability of tourism industry to terrorism is an undeniable fact, and terrorists know it. They use this advantage attacking tourists for very specific reasons, such as the: (1) international coverage by the media, “if it bleeds it leads” ; (2) chances of getting different nationalities at the same place and time; (3) possibility of destroyed the economy of a destination, or destinations (“terrorism contamination effect”), through the reduction of tourist demand; (4) psychological, and social disruption based on fear of negative consequences. Security incidents, such as terrorism, include different preventive measures that can be conducted in partnership with: tourism industry (hotels, airports, tourist attractions, among others); central government; public and/or private sector; local community; and media. The recovery strategies must be based on the dissemination of positive information to the media; in creating new marketing strategies that emphasize the social and cultural values of the destination; encourage domestic tourism; get government, or state, financial support.Keywords: terrorism, tourism, safety, security, impacts, prevention, recovery
Procedia PDF Downloads 342466 The Effect of Temperature and Salinity on the Growth and Carotenogenesis of Three Dunaliella Species (Dunaliella sp. Lake Isolate, D. salina CCAP 19/18, and D. bardawil LB 2538) Cultivated under Laboratory Conditions
Authors: Imen Hamed, Burcu Ak, Oya Işık, Leyla Uslu, Kubilay Kazım Vursavuş
Abstract:
In this study, 3 species of Dunaliella (Dunaliella sp. Salt Lake isoalte (Tuz Gölü), Dunaliella salina CCAP19/18, and Dunaliella bardawil LB 2538) and their optical density, dry matter, chlorophyll a, total carotenoids, and β-carotene production were investigated in a batch system. The aim of this research was to compare carotenoids, and β-carotene production were investigated in a batch those 3 species. Therefore 2 stress factors were used: 2 different temperatures (20°C and 30°C) and 2 different salinities (30‰, and 60‰) were tested over a 17-day study. The highest growth and chlorophyll a was reported for Dunaliella sp. under 20°C/30‰ and 20°C/60‰ conditions respectively followed by D. bardawil and D. salina. Significant differences were noticed (p<0.05) for the other 3 species. The growth decreased as temperature and salinity increased since the lowest growth was noticed for the 30°C/60‰ group. The chlorophyll a content decreased also as temperature increased however when the NaCl concentration increased an augmentation of the content was noticed . In the 17th day of experiment the highest carotenoids concentration was reported for D. bardawil 20°C/30‰ (65,639±0,400 μg.mL−1) and the most important β carotene concentration was for D. salina 20°C/60‰ (8,98E-07±0,013 mol/L).Keywords: Dunaliella sp., Dunaliella salina, Dunaliella bardawil, growth, pigments, stress factors
Procedia PDF Downloads 315465 Quality Characteristics of Cured Dried Camel Meat Formulated with Different Medicinal Plants as Natural Preservatives
Authors: H. S. Aljabeili, E. A. Abd El-Hady, M. M. Abd El-Razik, M. Abd Elgadir
Abstract:
The aim of the study is determining the quality characteristics of produced curing and dried camel meat contained some medicinal plants of thyme, rosemary, clove and ginger as natural preservatives. Camel meat samples were sliced and divided into five batches, one batch recorded as control sample was treated by the curing mixture (2.5%) contained the following ingredients: black pepper 1 gm, cumin 0.4 gm, spices mixture 0.5 gm, dried onion 3 gm, dried garlic 0.5 gm and salt 2 gm. To evaluate the effect of different natural preservatives sources of thyme, rosemary, clove and ginger, 3.0% of the aforementioned natural preservatives was mixed with the aforementioned curing mixture and used for curing the four batches of sliced camel meat. After curing process, cured sliced camel meat (control and treated with the natural preservatives) were conducting to drying process at 35 ± 3 °C for 36 h in a drying cabinet. The quality characteristics of prepared dried camel meat were evaluated such as chemical composition, microbiological characteristics and sensory characteristics. Based on the microbiological and sensory characteristics, it could be suggested that the selected medicinal plants specially thyme and rosemary could be used as natural preservatives for preparing semi dry camel meat without negative effects.Keywords: curing, dried camel meat, medicinal plants, natural preservatives, quality characteristics
Procedia PDF Downloads 225464 Identification and Classification of Gliadin Genes in Iranian Diploid Wheat
Authors: Jafar Ahmadi, Alireza Pour-Aboughadareh
Abstract:
Wheat is the first and the most important grain of the world and its bakery property is due to glutenin and gliadin qualities. Wheat seed proteins were divided into four groups according to solubility. Two groups are albumin and globulin dissolving in water and salt solutions possessing metabolic activities. Two other groups are inactive and non-dissolvable and contain glutelins or glutenins and prolamins or gliadins. Gliadins are major components of the storage proteins in wheat endosperm. Gliadin proteins are separated into three groups based on electrophoretic mobility: α/β-gliadin, γ-gliadin, and ω-gliadin. It seems that little information is available about gliadin genes in Iranian wild relatives of wheat. Thus, the aim of this study was the evaluation of the wheat wild relatives collected from different origins of Zagros Mountains in Iran, involving coding gliadin genes using specific primers. For this, forty accessions of Triticum boeoticum and Triticum urartu were selected. For each accession, genomic DNA was extracted and PCRs were performed in total volumes of 15 μl. The amplification products were separated on 1.5% agarose gels. In results, for Gli-2A locus, three allelic variants were detected by Gli-2As primer pairs. The sizes of PCR products for these alleles were 210, 490 and 700 bp. Only five (13%) and two accessions (5%) produced 700 and 490 bp fragments when their DNA was amplified with the Gli.As.2 primer pairs. However, 37 of the 40 accessions (93%) carried 210 bp allele, and three accessions (8%) did not yield any product for this marker. Therefore, these germplasm could be used as rich gene pool to broaden the genetic base of bread wheat.Keywords: diploied wheat, gliadin, Triticum boeoticum, Triticum urartu
Procedia PDF Downloads 251463 Fulani Herdsmen and the Threat to Grassroots Security in Rural Nigeria
Authors: Akachi Odoemene
Abstract:
There is an ongoing grassroots war in Nigeria, particularly in its north central zone, as well as all through its southern parts, which have been most bloody. The war is between Fulani herdsmen and farming communities – an age-long problem which has escalated in the last decade and has assumed a very deadly dimension. In a typical scenario, Fulani herdsmen move into non-Fulani homelands with their cattle which graze on local farmlands, destroying farmers’ crops. This provokes their victims – the farmers – to acts of resistance, preventing the Fulani and their cattle from entering into farmlands. In some cases, there have been incidences of killing and/or stealing cattle, or poisoning of fields. In response, the herders wedge deadly attacks on farming communities, leading to the death of thousands of people. To be sure, this has been a major factor of instability in the rural areas of Nigeria. This paper aims at engaging the issues and cross-cutting issues of interest, as well as providing context and perspectives to the violent conflicts between Fulani herders and local communities in Nigeria. It particularly interrogates four central issues: (1) the nature and dynamics of the crisis, (2) the positions and stakes of the parties to the crisis, (3) the remedies available for containing/managing the conflicts and their desirability, and (4) perspectives on the positions of government(s) (and the African Union) on this conflict. Both primary and secondary sources were used for the purposes of this essay.Keywords: Fulani Herdsmen, violent conflicts and insecurity, sustainable remedies, Nigeria
Procedia PDF Downloads 253