Search results for: salt and peppers attacks
462 Conceptualizing the Cyber Insecurity Risk in the Ethics of Automated Warfare
Authors: Otto Kakhidze, Hoda Alkhzaimi, Adam Ramey, Nasir Memon
Abstract:
This paper provides an alternative, cyber security based a conceptual framework for the ethics of automated warfare. The large body of work produced on fully or partially autonomous warfare systems tends to overlook malicious security factors as in the possibility of technical attacks on these systems when it comes to the moral and legal decision-making. The argument provides a risk-oriented justification to why technical malicious risks cannot be dismissed in legal, ethical and policy considerations when warfare models are being implemented and deployed. The assumptions of the paper are supported by providing a broader model that contains the perspective of technological vulnerabilities through the lenses of the Game Theory, Just War Theory as well as standard and non-standard defense ethics. The paper argues that a conventional risk-benefit analysis without considering ethical factors is insufficient for making legal and policy decisions on automated warfare. This approach will provide the substructure for security and defense experts as well as legal scholars, ethicists and decision theorists to work towards common justificatory grounds that will accommodate the technical security concerns that have been overlooked in the current legal and policy models.Keywords: automated warfare, ethics of automation, inherent hijacking, security vulnerabilities, risk, uncertainty
Procedia PDF Downloads 357461 Unbranched, Saturated, Carboxylic Esters as Phase-Change Materials
Authors: Anastasia Stamatiou, Melissa Obermeyer, Ludger J. Fischer, Philipp Schuetz, Jörg Worlitschek
Abstract:
This study evaluates unbranched, saturated carboxylic esters with respect to their suitability to be used as storage media for latent heat storage applications. Important thermophysical properties are gathered both by means of literature research as well as by experimental measurements. Additionally, esters are critically evaluated against other common phase-change materials in terms of their environmental impact and their economic potential. The experimental investigations are performed for eleven selected ester samples with a focus on the determination of their melting temperature and their enthalpy of fusion using differential scanning calorimetry. Transient Hot Bridge was used to determine the thermal conductivity of the liquid samples while thermogravimetric analysis was employed for the evaluation of the 5% weight loss temperature as well as of the decomposition temperature of the non-volatile samples. Both experimental results and literature data reveal the high potential of esters as phase-change materials. Their good thermal and environmental properties as well as the possibility for production from natural sources (e.g. vegetable oils) render esters as very promising for future storage applications. A particularly high short term application potential of esters could lie in low temperature storage applications where the main alternative is using salt hydrates as phase-change material.Keywords: esters, phase-change materials, thermal properties, latent heat storage
Procedia PDF Downloads 415460 Interactive of Calcium, Potassium, and Dynamic Unequal Salt Distribution on the Growth of Tomato in Hydroponic System
Authors: Mohammad Koushafar, Amir Hossein Khoshgoftarmanesh
Abstract:
Due to water shortage, application of saline water for irrigation is an urgent requirement in agriculture. Thus, this study, the effect of calcium and potassium application as additive in saline root media for reduce salinity adverse effects was investigated on tomato growth in a hydroponic system with unequal distribution of salts in the root media, which was divided into two equal parts containing full Johnson nutrient solution and 40 mM NaCl solution, alone or in combination with KCl (6 mM), CaCl2 (4 mM), K+Ca (3+2 mM) or half-strength Johnson nutrient solution. The root splits were exchanged every 7 days. Results showed that addition of calcium, calcium-potassium and nutrition elements equivalent to half the concentration of Johnson formula to the saline-half of culture media minimized the reduction in plant growth caused by NaCl, although the addition of potassium to culture media was not effective. The greatest concentration of sodium was observed at the shoot of treatments which had the smallest growth. According to the results of this study, in the case of dynamic and non-uniform distribution of salts in the root media, by the addition of additive to the saline solution, it would be possible to use of saline water with no significant growth reduction.Keywords: calcium, hydroponic, local salinity, potassium, salin water, tomato
Procedia PDF Downloads 443459 Robust Quantum Image Encryption Algorithm Leveraging 3D-BNM Chaotic Maps and Controlled Qubit-Level Operations
Authors: Vivek Verma, Sanjeev Kumar
Abstract:
This study presents a novel quantum image encryption algorithm, using a 3D chaotic map and controlled qubit-level scrambling operations. The newly proposed 3D-BNM chaotic map effectively reduces the degradation of chaotic dynamics resulting from the finite word length effect. It facilitates the generation of highly unpredictable random sequences and enhances chaotic performance. The system’s efficacy is additionally enhanced by the inclusion of a SHA-256 hash function. Initially, classical plain images are converted into their quantum equivalents using the Novel Enhanced Quantum Representation (NEQR) model. The Generalized Quantum Arnold Transformation (GQAT) is then applied to disrupt the coordinate information of the quantum image. Subsequently, to diffuse the pixel values of the scrambled image, XOR operations are performed using pseudorandom sequences generated by the 3D-BNM chaotic map. Furthermore, to enhance the randomness and reduce the correlation among the pixels in the resulting cipher image, a controlled qubit-level scrambling operation is employed. The encryption process utilizes fundamental quantum gates such as C-NOT and CCNOT. Both theoretical and numerical simulations validate the effectiveness of the proposed algorithm against various statistical and differential attacks. Moreover, the proposed encryption algorithm operates with low computational complexity.Keywords: 3D Chaotic map, SHA-256, quantum image encryption, Qubit level scrambling, NEQR
Procedia PDF Downloads 10458 Quantum Cryptography: Classical Cryptography Algorithms’ Vulnerability State as Quantum Computing Advances
Authors: Tydra Preyear, Victor Clincy
Abstract:
Quantum computing presents many computational advantages over classical computing methods due to the utilization of quantum mechanics. The capability of this computing infrastructure poses threats to standard cryptographic systems such as RSA and AES, which are designed for classical computing environments. This paper discusses the impact that quantum computing has on cryptography, while focusing on the evolution from classical cryptographic concepts to quantum and post-quantum cryptographic concepts. Standard Cryptography is essential for securing data by utilizing encryption and decryption methods, and these methods face vulnerability problems due to the advancement of quantum computing. In order to counter these vulnerabilities, the methods that are proposed are quantum cryptography and post-quantum cryptography. Quantum cryptography uses principles such as the uncertainty principle and photon polarization in order to provide secure data transmission. In addition, the concept of Quantum key distribution is introduced to ensure more secure communication channels by distributing cryptographic keys. There is the emergence of post-quantum cryptography which is used for improving cryptographic algorithms in order to be more secure from attacks by classical and quantum computers. Throughout this exploration, the paper mentions the critical role of the advancement of cryptographic methods to keep data integrity and privacy safe from quantum computing concepts. Future research directions that would be discussed would be more effective cryptographic methods through the advancement of technology.Keywords: quantum computing, quantum cryptography, cryptography, data integrity and privacy
Procedia PDF Downloads 25457 Bystanders' Behavior during Emergencies
Authors: Alan (Avi) Kirschenbaum, Carmit Rapaport
Abstract:
The behavior of bystanders in emergencies and disasters have been examined for over 50 years. Such acts have been cited as contributing to saving lives in terms of providing first responder help until official emergency units can arrive. Several reasons have been suggested for this type of behavior but most focused on a broad segment of individual psychological decision-making processes. Recent theoretical evidence suggests that the external factors for such bystander decisions, mainly disaster community based social contexts factors, are also important. We aim to test these competing arguments. Specifically, we examine alternative explanatory perspectives by focusing on self-efficacy as a proxy for the accepted individual psychological case and contrast it with potential bystander characteristics of the individual as well factors as embedded in the social context of the disaster community. To do so, we will utilize a random sampling of the population from a field study of an urban community in Israel that experienced five years of continuous terror attacks. The results strongly suggest that self-efficacy, as well as external factors: preparedness and having skills for intervention during emergencies along with gender best, predict potential helping behaviors. These results broaden our view of bystander behavior and open a window for enhancing this phenomenon as another element in disaster and crisis management.Keywords: bystander behavior, disasters emergencies, psychological motivation to help, social context for helping
Procedia PDF Downloads 122456 Investigating Message Timing Side Channel Attacks on Networks on Chip with Ring Topology
Authors: Mark Davey
Abstract:
Communications on a Network on Chip (NoC) produce timing information, i.e., network injection delays, packet traversal times, throughput metrics, and other attributes relating to the traffic being sent across the chip. The security requirements of a platform encompass each node to operate with confidentiality, integrity, and availability (ISO 27001). Inherently, a shared NoC interconnect is exposed to analysis of timing patterns created by contention for the network components, i.e., links and switches/routers. This phenomenon is defined as information leakage, which represents a ‘side channel’ of sensitive information that can be correlated to platform activity. The key algorithm presented in this paper evaluates how an adversary can control two platform neighbouring nodes of a target node to obtain sensitive information about communication with the target node. The actual information obtained is the period value of a periodic task communication. This enacts a breach of the expected confidentiality of a node operating in a multiprocessor platform. An experimental investigation of the side channel is undertaken to judge the level and significance of inferred information produced by access times to the NoC. Results are presented with a series of expanding task set scenarios to evaluate the efficacy of the side channel detection algorithm as the network load increases.Keywords: embedded systems, multiprocessor, network on chip, side channel
Procedia PDF Downloads 71455 Performance Analysis of Traffic Classification with Machine Learning
Authors: Htay Htay Yi, Zin May Aye
Abstract:
Network security is role of the ICT environment because malicious users are continually growing that realm of education, business, and then related with ICT. The network security contravention is typically described and examined centrally based on a security event management system. The firewalls, Intrusion Detection System (IDS), and Intrusion Prevention System are becoming essential to monitor or prevent of potential violations, incidents attack, and imminent threats. In this system, the firewall rules are set only for where the system policies are needed. Dataset deployed in this system are derived from the testbed environment. The traffic as in DoS and PortScan traffics are applied in the testbed with firewall and IDS implementation. The network traffics are classified as normal or attacks in the existing testbed environment based on six machine learning classification methods applied in the system. It is required to be tested to get datasets and applied for DoS and PortScan. The dataset is based on CICIDS2017 and some features have been added. This system tested 26 features from the applied dataset. The system is to reduce false positive rates and to improve accuracy in the implemented testbed design. The system also proves good performance by selecting important features and comparing existing a dataset by machine learning classifiers.Keywords: false negative rate, intrusion detection system, machine learning methods, performance
Procedia PDF Downloads 118454 Production of Amorphous Boron Powder via Chemical Vapor Deposition (CVD)
Authors: Meltem Bolluk, Ismail Duman
Abstract:
Boron exhibits the properties of high melting temperature (2273K to 2573 K), high hardness (Mohs: 9,5), low density (2,340 g/cm3), high chemical resistance, high strength, and semiconductivity (band gap:1,6-2,1 eV). These superior properties enable to use it in several high-tech areas from electronics to nuclear industry and especially in high temperature metallurgy. Amorphous boron and crystalline boron have different application areas. Amorphous boron powder (directly amorphous and/or α-rhombohedral) is preferred in rocket firing, airbag inflating and in fabrication of superconducting MgB2 wires. The conventional ways to produce elemental boron with a purity of 85 pct to 95 prc are metallothermic reduction, fused salt electrolysis and mechanochemical synthesis; but the only way to produce high-purity boron powders is Chemical Vapour Deposition (Hot Surface CVD). In this study; amorphous boron powders with a minimum purity of 99,9 prc were synthesized in quartz tubes using BCl3-H2 gas mixture by CVD. Process conditions based on temperature and gas flow rate were determined. Thermodynamical interpretation of BCl3-H2 system for different temperatures and molar rates were performed using Fact Sage software. The characterization of powders was examined by using Xray diffraction (XRD), Scanning Electron Microscope (SEM) and Transmission Electron Microscope (TEM), Stereo Microscope (SM), Helium gas pycnometer analysis. The purities of final products were determined by titration after lime fusion.Keywords: amorphous boron, CVD, powder production, powder characterization
Procedia PDF Downloads 217453 The Influence of a Vertical Rotation on the Fluid Dynamics of Compositional Plumes
Authors: Khaled Suleiman Mohammed Al-Mashrafi
Abstract:
A compositional plume is a fluid flow in a directional channel of finite width in another fluid of different material composition. The study of the dynamics of compositional plumes plays an essential role in many real-life applications like industrial applications (e.g., iron casting), environmental applications (e.g., salt fingers and sea ice), and geophysical applications (e.g., solidification at the inner core boundary (ICB) of the Earth, and mantle plumes). The dynamics of compositional plumes have been investigated experimentally and theoretically. The experimental works observed that the plume flow seems to be stable, although some experiments showed that it can be unstable. At the same time, the theoretical investigations showed that the plume flow is unstable. This is found to be true even if the plume is subject to rotation or/and in the presence of a magnetic field and even if another plume of different composition is also present. It is noticeable that all the theoretical studies on the dynamics of compositional plumes are conducted in unbounded domains. The present work is to investigate theoretically the influence of vertical walls (boundaries) on the dynamics of compositional plumes in the absence/presence of a rotation field. The mathematical model of the dynamics of compositional plumes used the equations of continuity, motion, heat, concentration of light material, and state. It is found that the presence of boundaries has a strong influence on the basic state solution as well as the stability of the plume, particularly when the plume is close to the boundary, but the compositional plume remains unstable.Keywords: compositional plumes, stability, bounded domain, vertical boundaries
Procedia PDF Downloads 31452 Organic Substance Removal from Pla-Som Family Industrial Wastewater through APCW System
Authors: W. Wararam, K. Angchanpen, T. Pattamapitoon, K. Chunkao, O. Phewnil, M. Srichomphu, T. Jinjaruk
Abstract:
The research focused on the efficiency for treating high organic wastewater from pla-som production process by anaerobic tanks, oxidation ponds and constructed wetland treatment systems (APCW). The combined system consisted of 50-mm plastic screen, five 5.8 m3 oil-grease trap tanks (2-day hydraulic retention time; HRT), four 4.3 m3 anaerobic tanks (1-day HRT), 16.7 m3 oxidation pond no.1 (7-day HRT), 12.0 m3 oxidation pond no.2 (3-day HRT), and 8.2 m3 constructed wetland plot (1-day HRT). After washing fresh raw fishes, they were sliced in small pieces and were converted into ground fish meat by blender machine. The fish meat was rinsed for 8 rounds: 1, 2, 3, 5, 6 and 7 by tap water and 4 and 8 by rice-wash-water, before mixing with salt, garlic, steamed rice and monosodium glutamate, followed by plastic wrapping for 72-hour of edibility. During pla-som production processing, the rinsed wastewater about 5 m3/day was fed to the treatment systems and fully stagnating storage in its components. The result found that, 1) percentage of treatment efficiency for BOD, COD, TDS and SS were 93, 95, 32 and 98 respectively, 2) the treatment was conducted with 500-kg raw fishes along with full equipment of high organic wastewater treatment systems, 3) the trend of the treatment efficiency and quantity in all indicators was similarly processed and 4) the small pieces of fish meat and fish blood were needed more than 3-day HRT in anaerobic digestion process.Keywords: organic substance, Pla-Som family industry, wastewater, APCW system
Procedia PDF Downloads 358451 Lightweight Hardware Firewall for Embedded System Based on Bus Transactions
Authors: Ziyuan Wu, Yulong Jia, Xiang Zhang, Wanting Zhou, Lei Li
Abstract:
The Internet of Things (IoT) is a rapidly evolving field involving a large number of interconnected embedded devices. In the design of embedded System-on-Chip (SoC), the key issues are power consumption, performance, and security. However, the easy-to-implement software and untrustworthy third-party IP cores may threaten the safety of hardware assets. Considering that illegal access and malicious attacks against SoC resources pass through the bus that integrates IPs, we propose a Lightweight Hardware Firewall (LHF) to protect SoC, which monitors and disallows the offending bus transactions based on physical addresses. Furthermore, under the LHF architecture, this paper refines two types of firewalls: Destination Hardware Firewall (DHF) and Source Hardware Firewall (SHF). The former is oriented to fine-grained detection and configuration, whose core technology is based on the method of dynamic grading units. In addition, we design the SHF based on static entries to achieve lightweight. Finally, we evaluate the hardware consumption of the proposed method by both Field-Programmable Gate Array (FPGA) and IC. Compared with the exciting efforts, LHF introduces a bus latency of zero clock cycles for every read or write transaction implemented on Xilinx Kintex-7 FPGAs. Meanwhile, the DC synthesis results based on TSMC 90nm show that the area is reduced by about 25% compared with the previous method.Keywords: IoT, security, SoC, bus architecture, lightweight hardware firewall, FPGA
Procedia PDF Downloads 61450 Basics of SCADA Security: A Technical Approach
Authors: Michał Witas
Abstract:
This paper presents a technical approach to analysis of security of SCADA systems. Main goal of the paper is to make SCADA administrators aware of risks resulting from SCADA systems usage and to familiarize with methods that can be adopt to existing or planned system, to increase overall system security level. Because SCADA based systems become a industrial standard, more attention should be paid to the security of that systems. Industrial Control Systems (ICS) like SCADA are responsible for controlling crucial aspects of wide range of industrial processes. In pair with that responsibility, goes a lot of money that can be earned or lost – this fact is main reason of increased interest of attackers. Additionally ICS are often responsible for maintaining resources strategic from the point of view of national economy, like electricity (including nuclear power plants), heating, water resources or military facilities, so they can be targets of terrorist cybernetic attacks. Without proper risk analysis and management, vulnerabilities resulting from the usage of SCADA can be easily exploited by potential attacker. Paper is based mostly on own experience in systems security, gathered during academic studies and professional work in international company. As title suggests, it will cover only basics of topic, because every of points mentioned in the document can be base for additional research and papers.Keywords: denial of service, SCADA, security policy, distributed network
Procedia PDF Downloads 371449 Radical Islam and Transnational Security: West Africa and the Asia Pacific in View
Authors: Olumide A. Fafore, Khondlo Mtshali
Abstract:
The beginning of the 21st century saw the emergence of new and global threats to national and transnational security in West Africa and the Asia Pacific regions as a result of the spread of jihadist terrorism across borders, a manifestation of the rise of radical Islam. Extremist and armed Islamic movements influenced by Salafism, the Jihad in Afghanistan and the Muslim Brotherhood are prevalent in Northern Nigeria, Niger, Cameroon, Mali, Chad, Pakistan, Afghanistan, and India. Carrying out attacks across borders, including assassinations, murders, armed robberies, and kidnapping, assisted by open and porous borders and large flow of illegal immigrants across borders. This paper examines the effect of Radical Islam on Transnational security through a review of past literature and the social and security consequences on the people of the regions. Our findings indicate that the activities of armed Islamic movements such as Boko Haram, Ansaru and Al-Qaeda are having a negative impact on the economy, development, and security of the states and people of West Africa and the Asia Pacific. It stresses the importance of regional, transnational and international cooperation, as these threats to national and transnational security can no longer be solved in a national or regional framework.Keywords: Islamic movements, jihadist terrorism, radical Islam, transnational security
Procedia PDF Downloads 163448 Effect of Temperature on Pervaporation Performance of Ag-Poly Vinyl Alcohol Nanocomposite Membranes
Authors: Asmaa Selim, Peter Mizsey
Abstract:
Bio-ethanol is considered of higher potential as a green renewable energy source owing to its environmental benefits and its high efficiency. In the present study, silver nanoparticles were in-situ generated in a poly (vinyl alcohol) in order to improve its potentials for pervaporation of ethanol-water mixture using solution-casting. Effect of silver content on the pervaporation separation index and the enrichment factor of the membrane at 15 percentage mass water at 40ᵒC was reported. Pervaporation data for nanocomposite membranes showed around 100% increase in the water permeance values while the intrinsic selectivity decreased. The water permeances of origin crosslinked PVA membrane, and the 2.5% silver loaded PVA membrane are 26.65 and 70.45 (g/m².kPa.h) respectively. The values of total flux and water flux are closed to each other, indicating that membranes could be effectively used to break the azeotropic point of ethanol-water. Effect of temperature on the pervaporation performance, permeation parameter and diffusion coefficient of both water and ethanol was discussed. The negative heat of sorption ∆Hs values calculated on the basis of the estimated Arrhenius activation energy values indicating that the sorption process was controlled by Langmuir’s mode. The overall results showed that the membrane containing 0.5 mass percentage of Ag salt exhibited excellent PV performance.Keywords: bio-ethanol, diffusion coefficient, nanocomposite, pervaporation, poly (vinyl alcohol), silver nanoparticles
Procedia PDF Downloads 170447 Selective Solvent Extraction of Co from Ni and Mn through Outer-Sphere Interactions
Authors: Korban Oosthuizen, Robert C. Luckay
Abstract:
Due to the growing popularity of electric vehicles and the importance of cobalt as part of the cathode material for lithium-ion batteries, demand for this metal is on the rise. Recycling of the cathode materials by means of solvent extraction is an attractive means of recovering cobalt and easing the pressure on limited natural resources. In this study, a series of straight chain and macrocyclic diamine ligands were developed for the selective recovery of cobalt from the solution containing nickel and manganese by means of solvent extraction. This combination of metals is the major cathode material used in electric vehicle batteries. The ligands can be protonated and function as ion-pairing ligands targeting the anionic [CoCl₄]²⁻, a species which is not observed for Ni or Mn. Selectivity for Co was found to be good at very high chloride concentrations and low pH. Longer chains or larger macrocycles were found to enhance selectivity, and linear chains on the amide side groups also resulted in greater selectivity over the branched groups. The cation of the chloride salt used for adjusting chloride concentrations seems to play a major role in extraction through salting-out effects. The ligands developed in this study show good selectivity for Co over Ni and Mn but require very high chloride concentrations to function. This research does, however, open the door for further investigations into using diamines as solvent extraction ligands for the recovery of cobalt from spent lithium-ion batteries.Keywords: hydrometallurgy, solvent extraction, cobalt, lithium-ion batteries
Procedia PDF Downloads 78446 Evaluation of Deformable Boundary Condition Using Finite Element Method and Impact Test for Steel Tubes
Authors: Abed Ahmed, Mehrdad Asadi, Jennifer Martay
Abstract:
Stainless steel pipelines are crucial components to transportation and storage in the oil and gas industry. However, the rise of random attacks and vandalism on these pipes for their valuable transport has led to more security and protection for incoming surface impacts. These surface impacts can lead to large global deformations of the pipe and place the pipe under strain, causing the eventual failure of the pipeline. Therefore, understanding how these surface impact loads affect the pipes is vital to improving the pipes’ security and protection. In this study, experimental test and finite element analysis (FEA) have been carried out on EN3B stainless steel specimens to study the impact behaviour. Low velocity impact tests at 9 m/s with 16 kg dome impactor was used to simulate for high momentum impact for localised failure. FEA models of clamped and deformable boundaries were modelled to study the effect of the boundaries on the pipes impact behaviour on its impact resistance, using experimental and FEA approach. Comparison of experimental and FE simulation shows good correlation to the deformable boundaries in order to validate the robustness of the FE model to be implemented in pipe models with complex anisotropic structure.Keywords: dynamic impact, deformable boundary conditions, finite element modelling, LS-DYNA, stainless steel pipe
Procedia PDF Downloads 149445 Copper (II) Complex of New Tetradentate Asymmetrical Schiff Base Ligand: Synthesis, Characterization, and Catecholase-Mimetic Activity
Authors: Cahit Demetgul, Sahin Bayraktar, Neslihan Beyazit
Abstract:
Metalloenzymes are enzyme proteins containing metal ions, which are directly bound to the protein or to enzyme-bound nonprotein components. One of the major metalloenzymes that play a key role in oxidation reactions is catechol oxidase, which shows catecholase activity i.e. oxidation of a broad range of catechols to quinones through the four-electron reduction of molecular oxygen to water. Studies on the model compounds mimicking the catecholase activity are very useful and promising for the development of new, more efficient bioinspired catalysts, for in vitro oxidation reactions. In this study, a new tetradentate asymmetrical Schiff-base and its Cu(II) complex were synthesized by condensation of 4-nitro-1,2-phenylenediamine with 6-formyl-7-hydroxy-5-methoxy-2-methylbenzopyran-4-one and by using an appropriate Cu(II) salt, respectively. The prepared compounds were characterized by elemental analysis, FT-IR, NMR, UV-Vis and magnetic susceptibility. The catecholase-mimicking activity of the new Schiff Base Cu(II) complex was performed for the oxidation of 3,5-di-tert-butylcatechol (3,5-DTBC) in methanol at 25 °C, where the electronic spectra were recorded at different time intervals. The yield of the quinone (3,5-DTBQ) was determined from the measured absorbance at 400 nm of the resulting solution. The compatibility of catalytic reaction with Michaelis-Menten kinetics was also investigated. In conclusion, we have found that our new Schiff Base Cu(II) complex presents a significant capacity to catalyze the oxidation reaction of the catechol to o-quinone.Keywords: catecholase activity, Michaelis-Menten kinetics, Schiff base, transition metals
Procedia PDF Downloads 309444 Modifiable Poly Methacrylic Acid-Co-Acrylonitrile Microgels Fabricated with Cu and Co Nanoparticles for Simultaneous Catalytic Reduction of Multiple Compounds
Authors: Muhammad Ajmal, Muhammad Siddiq, Nurettin Sahiner
Abstract:
We prepared poly(methacrylic acid-co-acrylonitrile) (p(MAc-co-AN)) microgels by inverse suspension polymerization, and converted the nitrile groups into amidoxime groups to obtain more hydrophilic amidoximated poly(methacrylic acid-co-acrylonitile) (amid-p(MAc-co-AN)) microgels. Amid-microgels were used as microreactors for in situ synthesis of copper and cobalt nanoparticles. Cu (II) and Co (II) ions were loaded into microgels from their aqueous metal salt solutions and then converted to corresponding metal nanoparticle (MNP) by treating the loaded metal ions with sodium borohydride (NaBH4). The characterization of the prepared microgels and microgel metal nanoparticle composites was carried out by SEM, TEM and TG analysis. The amounts of metal nanoparticles within microgels were estimated by AAS measurements by dissolving the MNP entrapped within microgels by concentrated HCl acid treatment. Catalytic performances of the prepared amid-p(MAc-co-AN)-M (M: Cu, Co) microgel composites were investigated by using them as catalyst for the degradation of cationic and anionic organic dyes such as eosin Y (EY), methylene blue (MB) and methyl Orange (MO), and for the reduction of nitro aromatic pollutants like 2-nitrophenol (2-NP) and 4-nitrophenol (4-NP) to their corresponding amino phenols. Here, we also report for the first time, the simultaneous degradation/reduction of MB, EY, and 4-NP by amid-p(MAc-co-AN)-Cu microgel composites. Different parameters affecting the reduction rates such as metal types, amount of catalysts, temperature and the amount of reducing agent were investigated.Keywords: microgels, nanoparticles, catalyst, pollutants
Procedia PDF Downloads 356443 Identification Strategies for Unknown Victims from Mass Disasters and Unknown Perpetrators from Violent Crime or Terrorist Attacks
Authors: Michael Josef Schwerer
Abstract:
Background: The identification of unknown victims from mass disasters, violent crimes, or terrorist attacks is frequently facilitated through information from missing persons lists, portrait photos, old or recent pictures showing unique characteristics of a person such as scars or tattoos, or simply reference samples from blood relatives for DNA analysis. In contrast, the identification or at least the characterization of an unknown perpetrator from criminal or terrorist actions remains challenging, particularly in the absence of material or data for comparison, such as fingerprints, which had been previously stored in criminal records. In scenarios that result in high levels of destruction of the perpetrator’s corpse, for instance, blast or fire events, the chance for a positive identification using standard techniques is further impaired. Objectives: This study shows the forensic genetic procedures in the Legal Medicine Service of the German Air Force for the identification of unknown individuals, including such cases in which reference samples are not available. Scenarios requiring such efforts predominantly involve aircraft crash investigations, which are routinely carried out by the German Air Force Centre of Aerospace Medicine as one of the Institution’s essential missions. Further, casework by military police or military intelligence is supported based on administrative cooperation. In the talk, data from study projects, as well as examples from real casework, will be demonstrated and discussed with the audience. Methods: Forensic genetic identification in our laboratories involves the analysis of Short Tandem Repeats and Single Nucleotide Polymorphisms in nuclear DNA along with mitochondrial DNA haplotyping. Extended DNA analysis involves phenotypic markers for skin, hair, and eye color together with the investigation of a person’s biogeographic ancestry. Assessment of the biological age of an individual employs CpG-island methylation analysis using bisulfite-converted DNA. Forensic Investigative Genealogy assessment allows the detection of an unknown person’s blood relatives in reference databases. Technically, end-point-PCR, real-time PCR, capillary electrophoresis, pyrosequencing as well as next generation sequencing using flow-cell-based and chip-based systems are used. Results and Discussion: Optimization of DNA extraction from various sources, including difficult matrixes like formalin-fixed, paraffin-embedded tissues, degraded specimens from decomposed bodies or from decedents exposed to blast or fire events, provides soil for successful PCR amplification and subsequent genetic profiling. For cases with extremely low yields of extracted DNA, whole genome preamplification protocols are successfully used, particularly regarding genetic phenotyping. Improved primer design for CpG-methylation analysis, together with validated sampling strategies for the analyzed substrates from, e.g., lymphocyte-rich organs, allows successful biological age estimation even in bodies with highly degraded tissue material. Conclusions: Successful identification of unknown individuals or at least their phenotypic characterization using pigmentation markers together with age-informative methylation profiles, possibly supplemented by family tree search employing Forensic Investigative Genealogy, can be provided in specialized laboratories. However, standard laboratory procedures must be adapted to work with difficult and highly degraded sample materials.Keywords: identification, forensic genetics, phenotypic markers, CPG methylation, biological age estimation, forensic investigative genealogy
Procedia PDF Downloads 51442 On the Design of a Secure Two-Party Authentication Scheme for Internet of Things Using Cancelable Biometrics and Physically Unclonable Functions
Authors: Behnam Zahednejad, Saeed Kosari
Abstract:
Widespread deployment of Internet of Things (IoT) has raised security and privacy issues in this environment. Designing a secure two-factor authentication scheme between the user and server is still a challenging task. In this paper, we focus on Cancelable Biometric (CB) as an authentication factor in IoT. We show that previous CB-based scheme fail to provide real two-factor security, Perfect Forward Secrecy (PFS) and suffer database attacks and traceability of the user. Then we propose our improved scheme based on CB and Physically Unclonable Functions (PUF), which can provide real two-factor security, PFS, user’s unlinkability, and resistance to database attack. In addition, Key Compromise Impersonation (KCI) resilience is achieved in our scheme. We also prove the security of our proposed scheme formally using both Real-Or-Random (RoR) model and the ProVerif analysis tool. For the usability of our scheme, we conducted a performance analysis and showed that our scheme has the least communication cost compared to the previous CB-based scheme. The computational cost of our scheme is also acceptable for the IoT environment.Keywords: IoT, two-factor security, cancelable biometric, key compromise impersonation resilience, perfect forward secrecy, database attack, real-or-random model, ProVerif
Procedia PDF Downloads 102441 Phishing Detection: Comparison between Uniform Resource Locator and Content-Based Detection
Authors: Nuur Ezaini Akmar Ismail, Norbazilah Rahim, Norul Huda Md Rasdi, Maslina Daud
Abstract:
A web application is the most targeted by the attacker because the web application is accessible by the end users. It has become more advantageous to the attacker since not all the end users aware of what kind of sensitive data already leaked by them through the Internet especially via social network in shake on ‘sharing’. The attacker can use this information such as personal details, a favourite of artists, a favourite of actors or actress, music, politics, and medical records to customize phishing attack thus trick the user to click on malware-laced attachments. The Phishing attack is one of the most popular attacks for social engineering technique against web applications. There are several methods to detect phishing websites such as Blacklist/Whitelist based detection, heuristic-based, and visual similarity-based detection. This paper illustrated a comparison between the heuristic-based technique using features of a uniform resource locator (URL) and visual similarity-based detection techniques that compares the content of a suspected phishing page with the legitimate one in order to detect new phishing sites based on the paper reviewed from the past few years. The comparison focuses on three indicators which are false positive and negative, accuracy of the method, and time consumed to detect phishing website.Keywords: heuristic-based technique, phishing detection, social engineering and visual similarity-based technique
Procedia PDF Downloads 177440 Removal of Heavy Metals Pb, Zn and Cu from Sludge Waste of Paper Industries Using Biosurfactant
Authors: Nurul Hidayati
Abstract:
Increasing public awareness of environmental pollution influences the search and development of technologies that help in clean up of organic and inorganic contaminants such as metals. Sludge waste of paper industries as toxic and hazardous material from specific source contains Pb, Zn, and Cu metal from waste soluble ink. An alternative and eco-friendly method of remediation technology is the use of biosurfactants and biosurfactant-producing microorganisms. Soil washing is among the methods available to remove heavy metal from sediments. The purpose of this research is to study effectiveness of biosurfactant with concentration = CMC for the removal of heavy metals, lead, zinc and copper in batch washing test under four different biosurfactant production by microbial origin. Pseudomonas putida T1(8), Bacillus subtilis 3K, Acinetobacter sp, and Actinobacillus sp was grown on mineral salt medium that had been already added with 2% concentration of molasses that it is a low cost application. The samples were kept in a shaker 120 rpm at room temperature for 3 days. Supernatants and sediments of sludge were separated by using a centrifuge and samples from supernatants were measured by atomic absorption spectrophotometer. The highest removal of Pb was up to 14,04% by Acinetobacter sp. Biosurfactant of Pseudomonas putida T1(8) have the highest removal for Zn and Cu up to 6,5% and 2,01% respectively. Biosurfactants have a role for removal process of the metals, including wetting, contact of biosurfactant to the surface of the sediments and detachment of the metals from the sediment. Biosurfactant has proven its ability as a washing agent in heavy metals removal from sediments, but more research is needed to optimize the process of removal heavy metals.Keywords: biosurfactant, removal of heavy metals, sludge waste, paper industries
Procedia PDF Downloads 330439 Cloning and Functional Analysis of NtPIN1a Promoter Under Various Abiotic Stresses in Nicotiana Tabacum
Authors: Zia Ullah, Muhammad Asim, Shi Sujuan, Rayyan Khan, Aaqib Shaheen, LIU Haobao
Abstract:
The plant-specific auxin efflux proteins PIN-FORMED (PIN) have been well depicted in many plant species for their essential roles in regulating the transport of auxins in several phases of plant growth. Little is known about the various functions of the PIN family genes in the Nicotiana tabacum (N. tabacum) species during plant growth. To define the expression pattern of the NtPIN1a gene under abiotic stresses and hormone treatment, transgenic tobacco with promoterNtPIN1a::GUS construct was employed. Comprehensive computational analyses of the NtPIN1a promoter confirmed the existence of common core promoter elements including CAAT-box, TATA-box, hormone, and abiotic stress-responsive elements such as ABRE, P-box, MYC, MYB, ARE, and GC-motifs. The transgenic plants with the promoter of NtPIN1a displayed a promising expression of β-glucuronidase (GUS) in germinating seeds, root tips, shoot-apex, and developing leaves under optimal conditions. While the differential expression of GUS in moderate salt, drought, low potassium stresses, and externally high auxin level at two different time points, suggested NtPIN1a played a key role in growth processes and the plants’ response to abiotic stresses. This analysis provides a foundation for more in-depth discoveries of the biological functions of NtPIN1a in Nicotiana species and this promoter may be employed in genetic engineering of other crops for enhanced stress tolerance.Keywords: tobacco, nicotiana tabacum, pin, promoter, GUS, abiotic stresses, auxin
Procedia PDF Downloads 95438 A Spatio-Temporal Analysis and Change Detection of Wetlands in Diamond Harbour, West Bengal, India Using Normalized Difference Water Index
Authors: Lopita Pal, Suresh V. Madha
Abstract:
Wetlands are areas of marsh, fen, peat land or water, whether natural or artificial, permanent or temporary, with water that is static or flowing, fresh, brackish or salt, including areas of marine water the depth of which at low tide does not exceed six metres. The rapidly expanding human population, large scale changes in land use/land cover, burgeoning development projects and improper use of watersheds all has caused a substantial decline of wetland resources in the world. Major degradations have been impacted from agricultural, industrial and urban developments leading to various types of pollutions and hydrological perturbations. Regular fishing activities and unsustainable grazing of animals are degrading the wetlands in a slow pace. The paper focuses on the spatio-temporal change detection of the area of the water body and the main cause of this depletion. The total area under study (22°19’87’’ N, 88°20’23’’ E) is a wetland region in West Bengal of 213 sq.km. The procedure used is the Normalized Difference Water Index (NDWI) from multi-spectral imagery and Landsat to detect the presence of surface water, and the datasets have been compared of the years 2016, 2006 and 1996. The result shows a sharp decline in the area of water body due to a rapid increase in the agricultural practices and the growing urbanization.Keywords: spatio-temporal change, NDWI, urbanization, wetland
Procedia PDF Downloads 283437 Soft Computing Approach for Diagnosis of Lassa Fever
Authors: Roseline Oghogho Osaseri, Osaseri E. I.
Abstract:
Lassa fever is an epidemic hemorrhagic fever caused by the Lassa virus, an extremely virulent arena virus. This highly fatal disorder kills 10% to 50% of its victims, but those who survive its early stages usually recover and acquire immunity to secondary attacks. One of the major challenges in giving proper treatment is lack of fast and accurate diagnosis of the disease due to multiplicity of symptoms associated with the disease which could be similar to other clinical conditions and makes it difficult to diagnose early. This paper proposed an Adaptive Neuro Fuzzy Inference System (ANFIS) for the prediction of Lass Fever. In the design of the diagnostic system, four main attributes were considered as the input parameters and one output parameter for the system. The input parameters are Temperature on admission (TA), White Blood Count (WBC), Proteinuria (P) and Abdominal Pain (AP). Sixty-one percent of the datasets were used in training the system while fifty-nine used in testing. Experimental results from this study gave a reliable and accurate prediction of Lassa fever when compared with clinically confirmed cases. In this study, we have proposed Lassa fever diagnostic system to aid surgeons and medical healthcare practictionals in health care facilities who do not have ready access to Polymerase Chain Reaction (PCR) diagnosis to predict possible Lassa fever infection.Keywords: anfis, lassa fever, medical diagnosis, soft computing
Procedia PDF Downloads 269436 In vitro Comparison Study of Biologically Synthesized Cupper-Disulfiram Nanoparticles with Its Free Corresponding Complex as Therapeutic Approach for Breast and Liver Cancer
Authors: Marwa M. Abu-Serie, Marwa M. Eltarahony
Abstract:
The search for reliable, effective, and safe nanoparticles (NPs) as a treatment for cancer is a pressing priority. In this study, Cu-NPs were fabricated by Streptomyces cyaneofuscatus through simultaneous bioreduction strategy of copper nitrate salt. The as-prepared Cu-NPs subjected to structural analysis; energy-dispersive X-ray spectroscopy, elemental mapping, X-ray diffraction, transmission electron microscopy, and ζ-potential. These biological synthesized Cu-NPs were mixed with disulfiram (DS), forming a nanocomplex of Cu-DS with a size of ~135 nm. The prepared nanocomplex (nanoCu-DS) exhibited higher anticancer activity than that of free complex of DS-Cu, Cu-NPs, and DS alone. This was illustrated by the lowest IC50 of nanoCu-DS (< 4 µM) against human breast and liver cancer cell lines comparing with DS-Cu, Cu-NPs, and DS (~8, 22.98-33.51 and 11.95-14.86, respectively). Moreover, flow cytometric analysis confirmed that higher apoptosis percentage range of nanoCu-DS-treated in MDA-MB 231, MCF-7, Huh-7, and HepG-2 cells (51.24-65.28%) than free complex of Cu-DS ( < 4.5%). Regarding inhibition potency of liver and breast cancer cell migration, no significant difference was recorded between free and nanocomplex. Furthermore, nanoCu-DS suppressed gene expression of β-catenine, Akt, and NF-κB and upregulated p53 expression (> 3, >15, > 5 and ≥ 3 folds, respectively) more efficiently than free complex (all ~ 1 fold) in MDA-MB 231 and Huh-7 cells. Our finding proved this prepared nano complex has a powerful anticancer activity relative to free complex, thereby offering a promising cancer treatment.Keywords: biologically prepared Cu-NPs, breast cancer cell lines, liver cancer cell lines, nanoCu- disulfiram
Procedia PDF Downloads 189435 Effects of Transformational Leadership and Political Competition on Corporate Performance of Nigeria National Petroleum Corporation
Authors: Justine Ugochukwu Osuagwu, Sazali Abd Wahab
Abstract:
The performance and operation of NNPC have faced series of attacks by all stakeholders as many have observed lots of inefficiency not only on the part of the management but the staff. This has raised questions of whether their operations and performance are being seriously affected by lack of transformational leadership, and the political competition prevalent in the country. The author has applied the administrative leadership theory and institutional theory as a guide to this study and empirically relates such theories to the study. The study also has utilized the quantitative approach where questionnaires were distributed to 370 participants, and the correctly filled and returned questionnaires were used for the analysis using structural equation modeling. The path coefficient of transformational leadership to performance is strong and positive with β = 0.672; t-value = 14.245; p-value = 0.000. Also, the result found that political competition does not mediate the relationship between transformational leadership and performance of NNPC. (β = -0.008; t-value = -0.600; p- value > 0.05). However, the indirect path is all insignificant, meaning that transformational leadership has relationship with corporate performance.The study found that,while political competition does not serve as a mediator in the relationship between transformational leadership and corporate performance, these styles of leadership have a direct and positive impact on corporate performance. The direct relationship between transformational leadership and political competition was not discovered, despite the fact that political competition has a direct and significant impact, both positive and negative, on corporate performance. As a result, both political competition and transformational leadership have the potential to significantly alter corporate performance.Keywords: performance, transformational leadership, political competition, corporation performance, Nigeria national petroleum corporation
Procedia PDF Downloads 116434 Investigation of the Effect of Impulse Voltage to Flashover by Using Water Jet
Authors: Harun Gülan, Muhsin Tunay Gencoglu, Mehmet Cebeci
Abstract:
The main function of the insulators used in high voltage (HV) transmission lines is to insulate the energized conductor from the pole and hence from the ground. However, when the insulators fail to perform this insulation function due to various effects, failures occur. The deterioration of the insulation results either from breakdown or surface flashover. The surface flashover is caused by the layer of pollution that forms conductivity on the surface of the insulator, such as salt, carbonaceous compounds, rain, moisture, fog, dew, industrial pollution and desert dust. The source of the majority of failures and interruptions in HV lines is surface flashover. This threatens the continuity of supply and causes significant economic losses. Pollution flashover in HV insulators is still a serious problem that has not been fully resolved. In this study, a water jet test system has been established in order to investigate the behavior of insulators under dirty conditions and to determine their flashover performance. Flashover behavior of the insulators is examined by applying impulse voltages in the test system. This study aims to investigate the insulator behaviour under high impulse voltages. For this purpose, a water jet test system was installed and experimental results were obtained over a real system and analyzed. By using the water jet test system instead of the actual insulator, the damage to the insulator as a result of the flashover that would occur under impulse voltage was prevented. The results of the test system performed an important role in determining the insulator behavior and provided predictability.Keywords: insulator, pollution flashover, high impulse voltage, water jet model
Procedia PDF Downloads 110433 Turkey-Syria Relations between 2002-2011 from the Perspective of Social Construction
Authors: Didem Aslantaş
Abstract:
In this study, the reforms carried out by the Justice and Development Party, which came to power in 2002, and how the foreign policy understanding it transformed reflected on the relations with Syria will be analyzed from the social constructivist theory. Contrary to the increasing security concerns of the states after the September 11 attacks, the main problem of the research is how the relations between Syria and Turkey developed and how they progressed in non-security dimensions. In order to find an answer to this question, the basic assumptions of the constructivist theory will be used. Since there is a limited number of studies in the literature, a comparative analysis of the Adana Consensus and the Cooperation Agreement between the Republic of Turkey and the Syrian Arab Republic, and the Joint Cooperation Agreement Against Terrorism and Terrorist Organizations will be included. In order to answer the main problem of the research and to support the arguments, document and archive scanning methods from qualitative research methods will be used. In the first part of the study, what the social constructivist theory is and its basic assumptions are explained, while in the second part, Turkey-Syria relations between 2002-2011 are included. In the third and last part, the relations between the two countries will be tried to be read through social constructivism by referring to the foreign policy features of the Ak Party period.Keywords: Social Constructivist Theory, foreign policy analysis, Justice and Development Party, Syria
Procedia PDF Downloads 83