Search results for: image compression and salt and peppers attacks
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 4703

Search results for: image compression and salt and peppers attacks

4643 Comparison of Compression Properties of Stretchable Knitted Fabrics and Bi-Stretch Woven Fabrics for Compression Garments

Authors: Muhammad Maqsood, Yasir Nawab, Syed Talha Ali Hamdani

Abstract:

Stretchable fabrics have diverse applications ranging from casual apparel to performance sportswear and compression therapy. Compression therapy is the universally accepted treatment for the management of hypertrophic scarring after severe burns. Mostly stretchable knitted fabrics are used in compression therapy but in the recent past, some studies have also been found on bi-stretch woven fabrics being used as compression garments as they also have been found quite effective in the treatment of oedema. Therefore, the objective of the present study is to compare the compression properties of stretchable knitted and bi-stretch woven fabrics for compression garments. For this purpose four woven structures and four knitted structures were produced having the same areal density and their compression, comfort and mechanical properties were compared before and after 5, 10 and 15 washes. Four knitted structures used were single jersey, single locaste, plain pique and the honeycomb, whereas four woven structures produced were 1/1 plain, 2/1 twill, 3/1 twill and 4/1 twill. The compression properties of the produced samples were tested by using kikuhime pressure sensor and it was found that bi-stretch woven fabrics possessed better compression properties before and after washes and retain their durability after repeated use, whereas knitted stretchable fabrics lost their compression ability after repeated use and the required sub garment pressure of the knitted structures after 15 washes was almost half to that of woven bi-stretch fabrics.

Keywords: compression garments, knitted structures, medical textiles, woven bi-stretch

Procedia PDF Downloads 379
4642 Development of a Process to Manufacture High Quality Refined Salt from Crude Solar Salt

Authors: Rathnayaka D. D. T. , Vidanage P. W. , Wasalathilake K. C. , Wickramasingha H. W. , Wijayarathne U. P. L. , Perera S. A. S.

Abstract:

This paper describes the research carried out to develop a process to increase the NaCl percentage of crude salt which is obtained from the conventional solar evaporation process. In this study refined salt was produced from crude solar salt by a chemico-physical method which consists of coagulation, precipitation and filtration. Initially crude salt crystals were crushed and dissolved in water. Optimum amounts of calcium hydroxide, sodium carbonate and Poly Aluminium Chloride (PAC) were added to the solution respectively. Refined NaCl solution was separated out by a filtration process. The solution was tested for Total Suspended Solids, SO42-, Mg2+, Ca2+. With optimum dosage of reagents, the results showed that a level of 99.60% NaCl could be achieved. Further this paper discusses the economic viability of the proposed process. A 83% profit margin can be achieved by this process and it is an increase of 112.3% compared to the traditional process.

Keywords: chemico-physical, economic, optimum, refined, solar salt

Procedia PDF Downloads 228
4641 Clicking Based Graphical Password Scheme Resistant to Spyware

Authors: Bandar Alahmadi

Abstract:

The fact that people tend to remember pictures better than texts, motivates researchers to develop graphical passwords as an alternative to textual passwords. Graphical passwords as such were introduced as a possible alternative to traditional text passwords, in which users prove their identity by clicking on pictures rather than typing alphanumerical text. In this paper, we present a scheme for graphical passwords that are resistant to shoulder surfing attacks and spyware attacks. The proposed scheme introduces a clicking technique to chosen images. First, the users choose a set of images, the images are then included in a grid where users can click in the cells around each image, the location of the click and the number of clicks are saved. As a result, the proposed scheme can be safe from shoulder surface and spyware attacks.

Keywords: security, password, authentication, attack, applications

Procedia PDF Downloads 141
4640 Efficient Video Compression Technique Using Convolutional Neural Networks and Generative Adversarial Network

Authors: P. Karthick, K. Mahesh

Abstract:

Video has become an increasingly significant component of our digital everyday contact. With the advancement of greater contents and shows of the resolution, its significant volume poses serious obstacles to the objective of receiving, distributing, compressing, and revealing video content of high quality. In this paper, we propose the primary beginning to complete a deep video compression model that jointly upgrades all video compression components. The video compression method involves splitting the video into frames, comparing the images using convolutional neural networks (CNN) to remove duplicates, repeating the single image instead of the duplicate images by recognizing and detecting minute changes using generative adversarial network (GAN) and recorded with long short-term memory (LSTM). Instead of the complete image, the small changes generated using GAN are substituted, which helps in frame level compression. Pixel wise comparison is performed using K-nearest neighbours (KNN) over the frame, clustered with K-means, and singular value decomposition (SVD) is applied for each and every frame in the video for all three color channels [Red, Green, Blue] to decrease the dimension of the utility matrix [R, G, B] by extracting its latent factors. Video frames are packed with parameters with the aid of a codec and converted to video format, and the results are compared with the original video. Repeated experiments on several videos with different sizes, duration, frames per second (FPS), and quality results demonstrate a significant resampling rate. On average, the result produced had approximately a 10% deviation in quality and more than 50% in size when compared with the original video.

Keywords: video compression, K-means clustering, convolutional neural network, generative adversarial network, singular value decomposition, pixel visualization, stochastic gradient descent, frame per second extraction, RGB channel extraction, self-detection and deciding system

Procedia PDF Downloads 163
4639 Robust Control of Cyber-Physical System under Cyber Attacks Based on Invariant Tubes

Authors: Bruno Vilić Belina, Jadranko Matuško

Abstract:

The rapid development of cyber-physical systems significantly influences modern control systems introducing a whole new range of applications of control systems but also putting them under new challenges to ensure their resiliency to possible cyber attacks, either in the form of data integrity attacks or deception attacks. This paper presents a model predictive approach to the control of cyber-physical systems robust to cyber attacks. We assume that a cyber attack can be modelled as an additive disturbance that acts in the measuring channel. For such a system, we designed a tube-based predictive controller based. The performance of the designed controller has been verified in Matlab/Simulink environment.

Keywords: control systems, cyber attacks, resiliency, robustness, tube based model predictive control

Procedia PDF Downloads 43
4638 Temperature Contour Detection of Salt Ice Using Color Thermal Image Segmentation Method

Authors: Azam Fazelpour, Saeed Reza Dehghani, Vlastimil Masek, Yuri S. Muzychka

Abstract:

The study uses a novel image analysis based on thermal imaging to detect temperature contours created on salt ice surface during transient phenomena. Thermal cameras detect objects by using their emissivities and IR radiance. The ice surface temperature is not uniform during transient processes. The temperature starts to increase from the boundary of ice towards the center of that. Thermal cameras are able to report temperature changes on the ice surface at every individual moment. Various contours, which show different temperature areas, appear on the ice surface picture captured by a thermal camera. Identifying the exact boundary of these contours is valuable to facilitate ice surface temperature analysis. Image processing techniques are used to extract each contour area precisely. In this study, several pictures are recorded while the temperature is increasing throughout the ice surface. Some pictures are selected to be processed by a specific time interval. An image segmentation method is applied to images to determine the contour areas. Color thermal images are used to exploit the main information. Red, green and blue elements of color images are investigated to find the best contour boundaries. The algorithms of image enhancement and noise removal are applied to images to obtain a high contrast and clear image. A novel edge detection algorithm based on differences in the color of the pixels is established to determine contour boundaries. In this method, the edges of the contours are obtained according to properties of red, blue and green image elements. The color image elements are assessed considering their information. Useful elements proceed to process and useless elements are removed from the process to reduce the consuming time. Neighbor pixels with close intensities are assigned in one contour and differences in intensities determine boundaries. The results are then verified by conducting experimental tests. An experimental setup is performed using ice samples and a thermal camera. To observe the created ice contour by the thermal camera, the samples, which are initially at -20° C, are contacted with a warmer surface. Pictures are captured for 20 seconds. The method is applied to five images ,which are captured at the time intervals of 5 seconds. The study shows the green image element carries no useful information; therefore, the boundary detection method is applied on red and blue image elements. In this case study, the results indicate that proposed algorithm shows the boundaries more effective than other edges detection methods such as Sobel and Canny. Comparison between the contour detection in this method and temperature analysis, which states real boundaries, shows a good agreement. This color image edge detection method is applicable to other similar cases according to their image properties.

Keywords: color image processing, edge detection, ice contour boundary, salt ice, thermal image

Procedia PDF Downloads 286
4637 Development of the Manufacturing Process of Low Salt-Fermented Soy Sauce

Authors: Young-Ran Song, Byeong-Uk Lim, Sang-Ho Baik

Abstract:

This study was initiated in order to develop a method for soy sauce fermentation at low salt concentrations without decreasing quality. Soy sauce was fermented with the fermentation starter (meju) and different salt contents (8-14%, w/v) by inoculating two strains or not, in which Torulaspora delbrueckii and Pichia guilliermondii strains having different abilities to induce sterilizing effects or enhance flavor production were used. As the results, there were microbial and biochemical differences among prepared soy sauce. First, Staphylococcus and Enterococcus spp. in addition to Bacillus genus that is the most important bacteria in Korean fermented soy product were detected by salt reduction. However, application of yeast starters can inhibit the undesirable bacterial growth. Moreover, PCA bi-plots of major principal components on various biochemical parameters (final pH, total acidity, soluble sugar, reducing sugar, ethanol and 32 volatile flavor compounds) were drawn to demonstrate the physicochemical differences and similarities among the samples. It was confirmed that the soy sauce samples produced with different salt concentrations were clearly different since salt reduction induced low contents of acids, alcohols and esters with higher acidity. However despite low salt concentration, combining two different yeasts appeared to have similar characteristics to the high salt-fermented soy sauce with elevated concentrations of ethanol, some alcohols, and most ketones, hence resulted in a balance of more complex and richer flavors with a flavor profile pattern identical to that of high-salt.

Keywords: Soy sauce, low salt, fermentation, yeast.

Procedia PDF Downloads 365
4636 The Impact of Malicious Attacks on the Performance of Routing Protocols in Mobile Ad-Hoc Networks

Authors: Habib Gorine, Rabia Saleh

Abstract:

Mobile Ad-Hoc Networks are the special type of wireless networks which share common security requirements with other networks such as confidentiality, integrity, authentication, and availability, which need to be addressed in order to secure data transfer through the network. Their routing protocols are vulnerable to various malicious attacks which could have a devastating consequence on data security. In this paper, three types of attacks such as selfish, gray hole, and black hole attacks have been applied to the two most important routing protocols in MANET named dynamic source routing and ad-hoc on demand distance vector in order to analyse and compare the impact of these attacks on the Network performance in terms of throughput, average delay, packet loss, and consumption of energy using NS2 simulator.

Keywords: MANET, wireless networks, routing protocols, malicious attacks, wireless networks simulation

Procedia PDF Downloads 289
4635 DCT and Stream Ciphers for Improved Image Encryption Mechanism

Authors: T. R. Sharika, Ashwini Kumar, Kamal Bijlani

Abstract:

Encryption is the process of converting crucial information’s unreadable to unauthorized persons. Image security is an important type of encryption that secures all type of images from cryptanalysis. A stream cipher is a fast symmetric key algorithm which is used to convert plaintext to cipher text. In this paper we are proposing an image encryption algorithm with Discrete Cosine Transform and Stream Ciphers that can improve compression of images and enhanced security. The paper also explains the use of a shuffling algorithm for enhancing securing.

Keywords: decryption, DCT, encryption, RC4 cipher, stream cipher

Procedia PDF Downloads 339
4634 Phishing Attacks Facilitated by Open Source Intelligence

Authors: Urva Maryam

Abstract:

The information has become an important asset to the current cosmos. Globally, various tactics are being observed to confine the spread of information as it makes people vulnerable to security attacks. Open Source Intelligence (OSINT) is a publicly available source that has disseminated information about users or websites, companies, and various organizations. This paper focuses on the quantitative method of exploring various OSINT tools that reveal public information of personals. This information could further facilitate phishing attacks. Phishing attacks can be launched on email addresses, open ports, and unsecure web-surfing. This study allows to analyze the information retrieved from OSINT tools, i.e. theHarvester, and Maltego that can be used to send phishing attacks to individuals.

Keywords: e-mail spoofing, Maltego, OSINT, phishing, spear phishing, theHarvester

Procedia PDF Downloads 113
4633 Compression Index Estimation by Water Content and Liquid Limit and Void Ratio Using Statistics Method

Authors: Lizhou Chen, Abdelhamid Belgaid, Assem Elsayed, Xiaoming Yang

Abstract:

Compression index is essential in foundation settlement calculation. The traditional method for determining compression index is consolidation test which is expensive and time consuming. Many researchers have used regression methods to develop empirical equations for predicting compression index from soil properties. Based on a large number of compression index data collected from consolidation tests, the accuracy of some popularly empirical equations were assessed. It was found that primary compression index is significantly overestimated in some equations while it is underestimated in others. The sensitivity analyses of soil parameters including water content, liquid limit and void ratio were performed. The results indicate that the compression index obtained from void ratio is most accurate. The ANOVA (analysis of variance) demonstrates that the equations with multiple soil parameters cannot provide better predictions than the equations with single soil parameter. In other words, it is not necessary to develop the relationships between compression index and multiple soil parameters. Meanwhile, it was noted that secondary compression index is approximately 0.7-5.0% of primary compression index with an average of 2.0%. In the end, the proposed prediction equations using power regression technique were provided that can provide more accurate predictions than those from existing equations.

Keywords: compression index, clay, settlement, consolidation, secondary compression index, soil parameter

Procedia PDF Downloads 136
4632 Phishing Attacks Facilitated by Open Source Intelligence

Authors: Urva Maryam

Abstract:

Information has become an important asset to the current cosmos. Globally, various tactics are being observed to confine the spread of information as it makes people vulnerable to security attacks. Open Source Intelligence (OSINT) is a publicly available source that has disseminated information about users or website, companies, and various organizations. This paper focuses on the quantitative method of exploring various OSINT tools that reveal public information of personals. This information could further facilitate the phishing attacks. Phishing attacks can be launched on email addresses, open ports, and unsecured web-surfing. This study allows to analyze information retrieved from OSINT tools i.e., the Harvester, and Maltego, that can be used to send phishing attacks to individuals.

Keywords: OSINT, phishing, spear phishing, email spoofing, the harvester, maltego

Procedia PDF Downloads 51
4631 Relationship Salt Sensitivity and с825т Polymorphism of gnb3 Gene in Patients with Essential Hypertension

Authors: Aleksandr Nagay, Gulnoz Khamidullayeva

Abstract:

It is known that an unbalanced intake of salt (NaCI), lifestyle and genetic predisposition to pathology is a key component of the risk and the development of essential hypertension (EH). Purpose: To study the relationship between salt-sensitivity and blood pressure (BP) on systolic (SBP) and diastolic (DBP) blood pressure, depending on the C825T polymorphism of GNB3 in individuals of Uzbek nationality with EH. Method: studied 148 healthy and 148 patients with EH with I-II degree (WHO/ISH, 2003) with disease duration 6,5±1,3 years. Investigation of the gene GNB3 was produced by PCR-RFLP method. Determination of salt-sensitivity was performed by the method of R. Henkin. Results: For a comparative analysis of BP, the groups with carriage of CТ and TT genotypes were combined. The analysis showed that carriers of CC genotype and low salt-sensitivity were determined by higher levels of SBP compared with carriers of CT and TT genotypes, and low salt-sensitivity of SBP: 166,2±4,3 against 158,2±9,1 mm Hg (p=0,000). A similar analysis on the values of DBP also showed significantly higher values of blood pressure in carriers of CC genotype DBP: 105,8±10,6 vs. 100,5±7,2 mm Hg, respectively (p=0,001). The average values of SBP and DBP in groups with carriers of CC genotype at medium or high salt-sensitivity in comparison with carriers of CT or TT genotype did not differ statistically SBP: 165,0±0,1 vs. 160,0±8,6 mm Hg (p=0,275) and DBP: 100,1±0,1 vs. 101,6±7,6 mm Hg (p=0,687), respectively. Conclusion: It is revealed that in patients with EH CC genotype of the gene GNB3 given salt-sensitivity has a negative effect on blood pressure profile. Since patients with EH with the CC genotype of GNB3 gene with low-salt taste sensitivity is determined by a higher level of blood pressure, both on SBP and DBP.

Keywords: salt sensitivity, essential hypertension EH, blood pressure BP, genetic predisposition

Procedia PDF Downloads 253
4630 A Novel Gene Encoding Ankyrin-Repeat Protein, SHG1, Is Indispensable for Seed Germination under Moderate Salt Stress

Authors: H. Sakamoto, J. Tochimoto, S. Kurosawa, M. Suzuki, S. Oguri

Abstract:

Salt stress adversely affects plant growth at various stages of development including seed germination, seedling establishment, vegetative growth and finally reproduction. Because of their immobile nature, plants have evolved mechanisms to sense and respond to salt stress. Seed dormancy is an adaptive trait that enables seed germination to coincide with favorable environmental conditions. We identified a novel locus of Arabidopsis, designated SHG1 (salt hypersensitive germination 1), whose disruption leads to reduced germination rate under moderate salt stress conditions. SHG1 encodes a transmembrane protein with an ankyrin repeat motif that has been implicated in diverse cellular processes such as signal transduction. The SGH1-disrupted Arabidopsis mutant died at the cotyledon stage when sown on salt-containing medium, although wild type plants could form true leaves under the same conditions. On the other hand, this mutant showed similar phenotypes to wild type plants when sown on medium without salt and transferred to salt-containing medium at the vegetative stage. These results suggested that SHG1 played indispensable role in the seed germination and seedling establishment under moderate salt stress conditions. SHG1 may be involved in the release of seed dormancy.

Keywords: germination, ankyrin repeat, arabidopsis, salt tolerance

Procedia PDF Downloads 370
4629 Factors Controlling Durability of Some Egyptian Non-Stylolitic Marbleized Limestone to Salt Weathering

Authors: H. El Shayab, G. M. Kamh, N. G. Abdel Ghafour, M. L. Abdel Latif

Abstract:

Nowadays, marbleized limestone becomes one of the most important sources of the mineral wealth in Egypt as they have beautiful colors (white, grey, rose, yellow and creamy, etc.) make it very suitable for decoration purposes. Non-styolitic marbleized limestone which not contains styolitic surfaces. The current study aims to study different factors controlling durability of non-styolitic marbleized limestone against salt crystallization weathering. The achievement aim of the research was required nine representative samples were collected from the studied areas. Three samples from each of the studied areas. The studied samples was characterized by various instrumental methods before salt weathering, to determine its mineralogical composition, chemical composition and pore physical properties respectively. The obtained results revealed that both of Duwi and Delga studied samples nearly have the same average ∆M% 1.63 and 1.51 respectively and consequently A.I. stage of deformation. On the other hand, average ∆M% of Wata studied samples is 0.29 i.e. lower than two other studied areas. Wata studied samples are more durable against salt crystallization test than Duwi and Delga. The difference in salt crystallization durability may be resulted from one of the following factors: Microscopic textural effect as both of micrite and skeletal percent are in directly proportional to durability of stones to salt weathering. Dolomite mineral present as a secondary are in indirectly proportional to durability of stones to salt weathering. Increase in MgO% also associated with decrease the durability of studied samples against salt crystallization test. Finally, all factors affecting positively against salt crystallization test presents in Wadi Wata studied samples rather than others two areas.

Keywords: marbleized limestone, salt weathering, Wata, salt weathering

Procedia PDF Downloads 293
4628 Salinity Response of Some Cowpea Genotypes in Germination of Periods

Authors: Meryem Aydin, Serdar Karadas, Ercan Ceyhan

Abstract:

The research was conducted to determine effects of salt concentrations on emergence of cowpea genotypes. Trials were performed during the year of 2014 on the laboratory of Agricultural Faculty, Selcuk University. Emergency trial was set up according to “Randomized Plots Design” by two factors and four replications with three replications. Samandag, Akkiz-86, Karnikara and Sarigobek cowpea genotypes have been used as trial material in this study. Effects of the five doses of salt concentrations (control, 30 mM, 60 mM, 90 mM and 120 mM) on the ratio of emergency, speed of emergency, average time for emergency, index of sensibility were evaluated. Responses of the cowpea genotypes for salt concentrations were found different. Comparing to the control, all of the investigated characteristics on the cowpea genotypes showed significant reduction by depending on the increasing salt application. According to the effects of salt application, the cowpea genotypes Samandag and Karnikara were the most tolerant in respect to index of sensibility while the Sarigobek genotypes was the most sensitive.

Keywords: cowpea, Vigna sinensis, emergence, salt tolerant

Procedia PDF Downloads 235
4627 Application of Hyperspectral Remote Sensing in Sambhar Salt Lake, A Ramsar Site of Rajasthan, India

Authors: Rajashree Naik, Laxmi Kant Sharma

Abstract:

Sambhar lake is the largest inland Salt Lake of India, declared as a Ramsar site on 23 March 1990. Due to high salinity and alkalinity condition its biodiversity richness is contributed by haloalkaliphilic flora and fauna along with the diverse land cover including waterbody, wetland, salt crust, saline soil, vegetation, scrub land and barren land which welcome large number of flamingos and other migratory birds for winter harboring. But with the gradual increase in the irrational salt extraction activities, the ecological diversity is at stake. There is an urgent need to assess the ecosystem. Advanced technology like remote sensing and GIS has enabled to look into the past, compare with the present for the future planning and management of the natural resources in a judicious way. This paper is a research work intended to present a vegetation in typical inland lake environment of Sambhar wetland using satellite data of NASA’s EO-1 Hyperion sensor launched in November 2000. With the spectral range of 0.4 to 2.5 micrometer at approximately 10nm spectral resolution with 242 bands 30m spatial resolution and 705km orbit was used to produce a vegetation map for a portion of the wetland. The vegetation map was tested for classification accuracy with a pre-existing detailed GIS wetland vegetation database. Though the accuracy varied greatly for different classes the algal communities were successfully identified which are the major sources of food for flamingo. The results from this study have practical implications for uses of spaceborne hyperspectral image data that are now becoming available. Practical limitations of using these satellite data for wetland vegetation mapping include inadequate spatial resolution, complexity of image processing procedures, and lack of stereo viewing.

Keywords: Algal community, NASA’s EO-1 Hyperion, salt-tolerant species, wetland vegetation mapping

Procedia PDF Downloads 104
4626 Characterization of Anisotropic Deformation in Sandstones Using Micro-Computed Tomography Technique

Authors: Seyed Mehdi Seyed Alizadeh, Christoph Arns, Shane Latham

Abstract:

Geomechanical characterization of rocks in detail and its possible implications on flow properties is an important aspect of reservoir characterization workflow. In order to gain more understanding of the microstructure evolution of reservoir rocks under stress a series of axisymmetric triaxial tests were performed on two different analogue rock samples. In-situ compression tests were coupled with high resolution micro-Computed Tomography to elucidate the changes in the pore/grain network of the rocks under pressurized conditions. Two outcrop sandstones were chosen in the current study representing a various cementation status of well-consolidated and weakly-consolidated granular system respectively. High resolution images were acquired while the rocks deformed in a purpose-built compression cell. A detailed analysis of the 3D images in each series of step-wise compression tests (up to the failure point) was conducted which includes the registration of the deformed specimen images with the reference pristine dry rock image. Digital Image Correlation (DIC) technique based on the intensity of the registered 3D subsets and particle tracking are utilized to map the displacement fields in each sample. The results suggest the complex architecture of the localized shear zone in well-cemented Bentheimer sandstone whereas for the weakly-consolidated Castlegate sandstone no discernible shear band could be observed even after macroscopic failure. Post-mortem imaging a sister plug from the friable rock upon undergoing continuous compression reveals signs of a shear band pattern. This suggests that for friable sandstones at small scales loading mode may affect the pattern of deformation. Prior to mechanical failure, the continuum digital image correlation approach can reasonably capture the kinematics of deformation. As failure occurs, however, discrete image correlation (i.e. particle tracking) reveals superiority in both tracking the grains as well as quantifying their kinematics (in terms of translations/rotations) with respect to any stage of compaction. An attempt was made to quantify the displacement field in compression using continuum Digital Image Correlation which is based on the reference and secondary image intensity correlation. Such approach has only been previously applied to unconsolidated granular systems under pressure. We are applying this technique to sandstones with various degrees of consolidation. Such element of novelty will set the results of this study apart from previous attempts to characterize the deformation pattern in consolidated sands.

Keywords: deformation mechanism, displacement field, shear behavior, triaxial compression, X-ray micro-CT

Procedia PDF Downloads 161
4625 In-Situ Quasistatic Compression and Microstructural Characterization of Aluminium Foams of Different Cell Topology

Authors: M. A. Islam, P. J. Hazell, J. P. Escobedo, M. Saadatfar

Abstract:

Quasistatic compression and micro structural characterization of closed cell aluminium foams of different pore size and cell distributions has been carried out. Metallic foams have good potential for lightweight structures for impact and blast mitigation and therefore it is important to find out the optimized foam structure (i.e. cell size, shape, relative density, and distribution) to maximize energy absorption. In this paper, we present results for two different aluminium metal foams of density 0.5 g/cc and 0.7 g/cc respectively that have been tested in quasi-static compression. The influence of cell geometry and cell topology on quasistatic compression behavior has been investigated using computed tomography (micro-CT) analysis. The compression behavior and micro structural characterization will be presented.

Keywords: metal foams, micro-CT, cell topology, quasistatic compression

Procedia PDF Downloads 433
4624 On Dynamic Chaotic S-BOX Based Advanced Encryption Standard Algorithm for Image Encryption

Authors: Ajish Sreedharan

Abstract:

Security in transmission and storage of digital images has its importance in today’s image communications and confidential video conferencing. Due to the increasing use of images in industrial process, it is essential to protect the confidential image data from unauthorized access. Advanced Encryption Standard (AES) is a well known block cipher that has several advantages in data encryption. However, it is not suitable for real-time applications. This paper presents modifications to the Advanced Encryption Standard to reflect a high level security and better image encryption. The modifications are done by adjusting the ShiftRow Transformation and using On Dynamic chaotic S-BOX. In AES the Substitute bytes, Shift row and Mix columns by themselves would provide no security because they do not use the key. In Dynamic chaotic S-BOX Based AES the Substitute bytes provide security because the S-Box is constructed from the key. Experimental results verify and prove that the proposed modification to image cryptosystem is highly secure from the cryptographic viewpoint. The results also prove that with a comparison to original AES encryption algorithm the modified algorithm gives better encryption results in terms of security against statistical attacks.

Keywords: advanced encryption standard (AES), on dynamic chaotic S-BOX, image encryption, security analysis, ShiftRow transformation

Procedia PDF Downloads 411
4623 Identification of Salt Responsive Proteins in Rice Leaf Sheath (Oryza sativa L.) with Nanoliquid Chromatography-Tandem Mass Spectrometry

Authors: Kanlaya Kong-Ngern, Chutima Homwonk, Sittiruk Roytrakul

Abstract:

In this research, we compared the proteomic profile of two rice leaf sheaths under salt stress, Thai moderately salt tolerant rice (Leaung Anan), and high salt tolerant rice (Pokkali). Seeds were grown in hydroponic culture for 21 days before NaCl was introduced initially at the level of 12 dS m⁻¹ for 10 days. Then the leaf sheath proteomes were analyzed by 1D-SDS-PAGE and NanoLC-MS/MS. In this study, 873 proteins were detected. Among these proteins, 219 proteins were known proteins and the other proteins were unnamed and unknown proteins. By using Mev software, we found that only 31 proteins in treated plants of both rice cultivars significantly expressed, 21 proteins were up-regulated and 10 proteins were down-regulated. Interestingly, the intensity of the 3 proteins in the Leaung Anan more expressed than in the Pokkali. The results indicate that the up-regulated proteins were more expressed in less tolerant rice may play an important role in helping rice to survive under salt stress.

Keywords: mass spectrometry, proteomics, rice leaf sheaths, salt stress

Procedia PDF Downloads 104
4622 A Tutorial on Network Security: Attacks and Controls

Authors: Belbahi Ahlam

Abstract:

With the phenomenal growth in the Internet, network security has become an integral part of computer and information security. In order to come up with measures that make networks more secure, it is important to learn about the vulnerabilities that could exist in a computer network and then have an understanding of the typical attacks that have been carried out in such networks. The first half of this paper will expose the readers to the classical network attacks that have exploited the typical vulnerabilities of computer networks in the past and solutions that have been adopted since then to prevent or reduce the chances of some of these attacks. The second half of the paper will expose the readers to the different network security controls including the network architecture, protocols, standards and software/ hardware tools that have been adopted in modern day computer networks.

Keywords: network security, attacks and controls, computer and information, solutions

Procedia PDF Downloads 424
4621 Geomechanics Properties of Tuzluca (Eastern. Turkey) Bedded Rock Salt and Geotechnical Safety

Authors: Mehmet Salih Bayraktutan

Abstract:

Geomechanical properties of Rock Salt Deposits in Tuzluca Salt Mine Area (Eastern Turkey) are studied for modeling the operation- excavation strategy. The purpose of this research focused on calculating the critical value of span height- which will meet the safety requirements. The Mine Site Tuzluca Hills consist of alternating parallel bedding of Salt ( NaCl ) and Gypsum ( CaS04 + 2 H20) rocks. Rock Salt beds are more resistant than narrow Gypsum interlayers. Rock Salt beds formed almost 97 percent of the total height of the Hill. Therefore, the geotechnical safety of Galleries depends on the mechanical criteria of Rock Salt Cores. General deposition of Tuzluca Basin was finally completed by Tuzluca Evaporites, as for the uppermost stratigraphic unit. They are currently running mining operations performed by classic mechanical excavation, room and pillar method. Rooms and Pillars are currently experiencing an initial stage of fracturing in places. Geotechnical safety of the whole mining area evaluated by Rock Mass Rating (RMR), Rock Quality Designation (RQD) spacing of joints, and the interaction of groundwater and fracture system. In general, bedded rock salt Show large lateral deformation capacity (while deformation modulus stays in relative small values, here E= 9.86 GPa). In such litho-stratigraphic environments, creep is a critical mechanism in failure. Rock Salt creep rate in steady-state is greater than interbedding layers. Under long-lasted compressive stresses, creep may cause shear displacements, partly using bedding planes. Eventually, steady-state creep in time returns to accelerated stages. Uniaxial compression creep tests on specimens were performed to have an idea of rock salt strength. To give an idea, on Rock Salt cores, average axial strength and strain are found as 18 - 24 MPa and 0.43-0.45 %, respectively. Uniaxial Compressive strength of 26- 32 MPa, from bedded rock salt cores. Elastic modulus is comparatively low, but lateral deformation of the rock salt is high under the uniaxial compression stress state. Poisson ratio = 0.44, break load = 156 kN, cohesion c= 12.8 kg/cm2, specific gravity SG=2.17 gr/cm3. Fracture System; spacing of fractures, joints, faults, offsets are evaluated under acting geodynamic mechanism. Two sand beds, each 4-6 m thick, exist near to upper level and at the top of the evaporating sequence. They act as aquifers and keep infiltrated water on top for a long duration, which may result in the failure of roofs or pillars. Two major active seismic ( N30W and N70E ) striking Fault Planes and parallel fracture strands have seismically triggered moderate risk of structural deformation of rock salt bedding sequence. Earthquakes and Floods are two prevailing sources of geohazards in this region—the seismotectonic activity of the Mine Site based on the crossing framework of Kagizman Faults and Igdir Faults. Dominant Hazard Risk sources include; a) Weak mechanical properties of rock salt, gypsum, anhydrite beds-creep. b) Physical discontinuities cutting across the thick parallel layers of Evaporite Mass, c) Intercalated beds of weak cemented or loose sand, clayey sandy sediments. On the other hand, absorbing the effects of salt-gyps parallel bedded deposits on seismic wave amplitudes has a reducing effect on the Rock Mass.

Keywords: bedded rock salt, creep, failure mechanism, geotechnical safety

Procedia PDF Downloads 173
4620 Fused Salt Electrolysis of Rare-Earth Materials from the Domestic Ore and Preparation of Rare-Earth Hydrogen Storage Alloys

Authors: Jeong-Hyun Yoo, Hanjung Kwon, Sung-Wook Cho

Abstract:

Fused salt electrolysis was studied to make the high purity rare-earth metals using domestic rare-earth ore. The target metals of the fused salt electrolysis were Mm (Misch metal), La, Ce, Nd, etc. Fused salt electrolysis was performed with the supporting salt such as chloride and fluoride at the various temperatures and ampere. The metals made by fused salt electrolysis were analyzed to identify the phase and composition using the methods of XRD and ICP. As a result, the acquired rare-earth metals were the high purity ones which had more than 99% purity. Also, VIM (vacuum induction melting) was studied to make the kg level rare-earth alloy for the use of secondary battery and hydrogen storage. In order to indentify the physicochemical properties such as phase, impurity gas, alloy composition and hydrogen storage, the alloys were investigated. The battery characteristics were also analyzed through the various tests in the real production line of a battery company.

Keywords: domestic rare-earth ore, fused salt electrolysis, rare-earth materials, hydrogen storage alloy, secondary battery

Procedia PDF Downloads 508
4619 In vitro Assessment of Tomato (Lycopersicon esculentum) and Cauliflower (Brassica oleracea) Seedlings Growth and Proline Production under Salt Stress

Authors: Amir Wahid, Fazal Hadi, Amin Ullah Jan

Abstract:

Tomato and Cauliflower seedlings were grown in-vitro under salt concentrations (0, 2, 4, 8, and 10 dSm-1) with objectives to investigate; (1) The effect of salinity on seedling growth and free proline production, (2) the correlation between seedling growth and proline contents, (3) comparative salt tolerance of both species. Different concentrations of salt showed considerable effect on percent (%) germination of seeds, length and biomass of shoot and root and also showed effect on percent water content of both plants seedlings. Germination rate in cauliflower was two times higher than tomato even at highest salt concentration (10 dSm-1). Seedling growth of both species was less effected at low salt concentrations (2 and 4 dSm-1) but at high concentrations (6 and 8 dSm-1) the seedling growth of both species was significantly decreased. Particularly the tomato root was highly significantly reduced. The proline level linearly increased in both species with increasing salt concentrations up-to 4 dSm-1 and then declined. The cauliflower showed higher free proline level than tomato under all salt treatments. Overall, the cauliflower seedlings showed better growth response along with higher proline contents on comparison with tomato seedlings.

Keywords: NaCl (Sodium Chloride), EC (Electrical Conductivity), MS (Murashig and Skoog), ANOVA (Analysis of Variance), LSD (Least Significant Differences)

Procedia PDF Downloads 533
4618 A Systematic Approach for Analyzing Multiple Cyber-Physical Attacks on the Smart Grid

Authors: Yatin Wadhawan, Clifford Neuman, Anas Al Majali

Abstract:

In this paper, we evaluate the resilience of the smart grid system in the presence of multiple cyber-physical attacks on its distinct functional components. We discuss attack-defense scenarios and their effect on smart grid resilience. Through contingency simulations in the Network and PowerWorld Simulator, we analyze multiple cyber-physical attacks that propagate from the cyber domain to power systems and discuss how such attacks destabilize the underlying power grid. The analysis of such simulations helps system administrators develop more resilient systems and improves the response of the system in the presence of cyber-physical attacks.

Keywords: smart grid, gas pipeline, cyber- physical attack, security, resilience

Procedia PDF Downloads 284
4617 A Study of General Attacks on Elliptic Curve Discrete Logarithm Problem over Prime Field and Binary Field

Authors: Tun Myat Aung, Ni Ni Hla

Abstract:

This paper begins by describing basic properties of finite field and elliptic curve cryptography over prime field and binary field. Then we discuss the discrete logarithm problem for elliptic curves and its properties. We study the general common attacks on elliptic curve discrete logarithm problem such as the Baby Step, Giant Step method, Pollard’s rho method and Pohlig-Hellman method, and describe in detail experiments of these attacks over prime field and binary field. The paper finishes by describing expected running time of the attacks and suggesting strong elliptic curves that are not susceptible to these attacks.c

Keywords: discrete logarithm problem, general attacks, elliptic curve, prime field, binary field

Procedia PDF Downloads 202
4616 Application of Adaptive Neural Network Algorithms for Determination of Salt Composition of Waters Using Laser Spectroscopy

Authors: Tatiana A. Dolenko, Sergey A. Burikov, Alexander O. Efitorov, Sergey A. Dolenko

Abstract:

In this study, a comparative analysis of the approaches associated with the use of neural network algorithms for effective solution of a complex inverse problem – the problem of identifying and determining the individual concentrations of inorganic salts in multicomponent aqueous solutions by the spectra of Raman scattering of light – is performed. It is shown that application of artificial neural networks provides the average accuracy of determination of concentration of each salt no worse than 0.025 M. The results of comparative analysis of input data compression methods are presented. It is demonstrated that use of uniform aggregation of input features allows decreasing the error of determination of individual concentrations of components by 16-18% on the average.

Keywords: inverse problems, multi-component solutions, neural networks, Raman spectroscopy

Procedia PDF Downloads 499
4615 Prosperous Digital Image Watermarking Approach by Using DCT-DWT

Authors: Prabhakar C. Dhavale, Meenakshi M. Pawar

Abstract:

In this paper, everyday tons of data is embedded on digital media or distributed over the internet. The data is so distributed that it can easily be replicated without error, putting the rights of their owners at risk. Even when encrypted for distribution, data can easily be decrypted and copied. One way to discourage illegal duplication is to insert information known as watermark, into potentially valuable data in such a way that it is impossible to separate the watermark from the data. These challenges motivated researchers to carry out intense research in the field of watermarking. A watermark is a form, image or text that is impressed onto paper, which provides evidence of its authenticity. Digital watermarking is an extension of the same concept. There are two types of watermarks visible watermark and invisible watermark. In this project, we have concentrated on implementing watermark in image. The main consideration for any watermarking scheme is its robustness to various attacks

Keywords: watermarking, digital, DCT-DWT, security

Procedia PDF Downloads 393
4614 Study on Network-Based Technology for Detecting Potentially Malicious Websites

Authors: Byung-Ik Kim, Hong-Koo Kang, Tae-Jin Lee, Hae-Ryong Park

Abstract:

Cyber terrors against specific enterprises or countries have been increasing recently. Such attacks against specific targets are called advanced persistent threat (APT), and they are giving rise to serious social problems. The malicious behaviors of APT attacks mostly affect websites and penetrate enterprise networks to perform malevolent acts. Although many enterprises invest heavily in security to defend against such APT threats, they recognize the APT attacks only after the latter are already in action. This paper discusses the characteristics of APT attacks at each step as well as the strengths and weaknesses of existing malicious code detection technologies to check their suitability for detecting APT attacks. It then proposes a network-based malicious behavior detection algorithm to protect the enterprise or national networks.

Keywords: Advanced Persistent Threat (APT), malware, network security, network packet, exploit kits

Procedia PDF Downloads 339