Search results for: acid attack
3847 Evaluation of Collagen Synthesis in Macrophages/Fibroblasts Co-Culture Using Polylactic Acid Particles as Stimulants
Authors: Feng Ju Chuang, Yu Wen Wang, Tai Jung Hsieh, Shyh Ming Kuo
Abstract:
Polylactic acid is a synthetic polymer with good biocompatibility and degradability, is widely used in clinical applications. In this study, we utilized Polylactic acid particles as stimulants for macrophages and the collagen synthesis of co-cultured fibroblasts was evaluated. The results indicated that Polylactic acid particles were nontoxic to cells from 3-(4,5-Dimethylthiazol-2-yl)-2,5-diphenyltetrazolium bromide. No obvious inflammation effect was observed (under the PLLA concentration of 1 mg/mL) after 24-h co-culture of Raw264.7 and NIH3T3 cells (from TNF-α assay). The addition of PLLA particles to the Raw264.7 and NIH3T3 co-cultures increased the synthesis of collagen, the highest collagen synthesis from the fibroblast was the 0.2 mg/mL (approximately 60% increased as compared with without addition Polylactic acid particles). Moreover, a co-axial atomization delivery device was used to percutaneously introduce Polylactic acid particles into the dermis layer and stimulating macrophages to secrete growth factors promoting fibroblasts to produce collagen. The preliminary results demonstrated the synthesis of collagen was increased mildly after the introduction of Polylactic acid particles for 28-d post implantation. The Polylactic acid particles could be successfully introduced into the dermis layer from H&E staining examination, however, the optimum concentration of Polylactic acid particles and the time-period for collagen synthesis still need to be evaluated.Keywords: collagen synthesis, macrophage, NIH3T3 cells, polylactic acid particles
Procedia PDF Downloads 1133846 Public Wi-Fi Security Threat Evil Twin Attack Detection Based on Signal Variant and Hop Count
Authors: Said Abdul Ahad Ahadi, Elyas Baray, Nitin Rakesh, Sudeep Varshney
Abstract:
Wi-Fi is a widely used internet source that is used to provide internet access in many areas such as Stores, Cafes, University campuses, Restaurants and so on. This technology brought more facilities in communication and networking. On the other hand, due to the transmission of data over the air, which makes the network vulnerable, so it becomes prone to various threats such as Evil Twin and etc. The Evil Twin is a kind of adversary which impersonates a legitimate access point (LAP) as it can happen by spoofing the name (SSID) and MAC address (BSSID) of a legitimate access point (LAP). And this attack can cause many threats such as MITM, Service Interruption, Access point service blocking. Various Evil Twin Attack Detection Techniques are proposed, but they require additional hardware, or they require protocol modification. In this paper, we proposed a new technique based on Access Point’s two fingerprints, Received Signal Strength Indicator (RSSI) and Hop Count, that is hard to copy by an adversary. And we implemented the technique in a system called “ETDetector,” which can detect and prevent the attack.Keywords: evil twin, LAP, SSID, Wi-Fi security, signal variation, ETAD, kali linux, scapy, python
Procedia PDF Downloads 1443845 Acanthopanax koreanum and Major Ingredient, Impressic Acid, Possess Matrix Metalloproteinase-13 Down-Regulating Capacity and Protect Cartilage Destruction
Authors: Hyun Lim, Dong Sook Min, Han Eul Yun, Kil Tae Kim, Ya Nan Sun, Young Ho Kim, Hyun Pyo Kim
Abstract:
Matrix metalloproteinase (MMP)-13 has an important role for degrading cartilage materials under inflammatory conditions such as arthritis. Since the 70% ethanol extract of Acanthopanax koreanum inhibited MMP-13 expression in IL-1β-treated human chondrocyte cell line, SW1353, two major constituents including acanthoic acid and impressic acid were initially isolated from the same plant materials and their MMP-13 down-regulating capacity was examined. In IL-1β-treated SW1353 cells, acanthoic acid and impressic acid significantly and concentration-dependently inhibited MMP-13 expression at 10 – 100 μM and 0.5 – 10 μM, respectively. The potent one, impressic acid, was found to inhibit MMP-13 expression by blocking the phosphorylation of signal transducer and activator of transcription-1/-2 (STAT-1/-2) and activation of c-Jun and c-Fos among cellular signaling pathway involved, but did not affect the activation of mitogen-activated protein kinases (MAPKs) and nuclear transcription factor-κB (NF-κB). Further, impressic acid was also found to inhibit the expression of MMP-13 mRNA (47.7% inhibition at 10 μM), the glycosaminoglycan release (42.2% reduction at 10 μM) and proteoglycan loss in IL-1-treated rabbit cartilage explants culture. For a further study, 21 impressic acid derivatives were isolated from the same plant materials and their suppressive activities against MMP-13 expression were examined. Among the derivatives, 3α-hydroxy-lup-20(29)-en-23-oxo,28-oic acid, (20R)-3α-hydroxy-29-dimethoxylupan-23,28-dioic acid, acankoreoside F and acantrifoside A clearly down-regulated MMP-13 expression, but impressic acid being most potent. All these results suggest that impressic acid, 3α-hydroxy-lup-20(29)-en-23-oxo,28-oic acid, (20R)-3α-hydroxy-29-dimethoxylupan-23,28-dioic acid, acankoreoside F, acantrifoside A and A. koreanum may have a potential for therapeutic agents to prevent cartilage degradation possibly by inhibiting matrix protein degradation.Keywords: acanthoic acid, Acanthopanax koreanum, cartilage, impressic acid, matrix metalloproteinase
Procedia PDF Downloads 3643844 Degradation of Polycyclic Aromatic Hydrocarbons-Contaminated Soil by Proxy-Acid Method
Authors: Reza Samsami
Abstract:
The aim of the study was to degradation of polycyclic aromatic hydrocarbons (PAHs) by proxy-acid method. The amounts of PAHs were determined in a silty-clay soil sample of an aged oil refinery field in Abadan, Iran. Proxy-acid treatment method was investigated. The results have shown that the proxy-acid system is an effective method for degradation of PAHs. The results also demonstrated that the number of fused aromatic rings have not significant effects on PAH removal by proxy-acid method. The results also demonstrated that the number of fused aromatic rings have not significant effects on PAH removal by proxy-acid method.Keywords: proxy-acid treatment, silty-clay soil, PAHs, degradation
Procedia PDF Downloads 2693843 Effect of Different Salts on Pseudomonas taetrolens’ Ability to Lactobionic Acid Production
Authors: I. Sarenkova, I. Ciprovica, I. Cinkmanis
Abstract:
Lactobionic acid is a disaccharide formed from gluconic acid and galactose, and produced by oxidation of lactose. Productivity of lactobionic acid by microbial synthesis can be affected by various factors, and one of them is a presence of potassium, magnesium and manganese ions. In order to extend lactobionic acid production efficiency, it is necessary to increase the yield of lactobionic acid by optimising the fermentation conditions and available substrates for Pseudomonas taetrolens growth. The object of the research was to determinate the application of K2HPO4, MnSO4, MgSO4 × 7H2O salts in different concentration for effective lactose oxidation to lactobionic acid by Pseudomonas taetrolens. Pseudomonas taetrolens NCIB 9396 (NCTC, England) and Pseudomonas taetrolens DSM 21104 (DSMZ, Germany) were used for the study. The acid whey was used as the study object. The content of lactose in whey samples was determined using MilcoScanTM Mars (Foss, Denmark) and high performance liquid chromatography (Shimadzu LC 20 Prominence, Japan). The content of lactobionic acid in whey samples was determined using the high performance liquid chromatography. The impact of studied salts differs, Mn2+ and Mg2+ ions enhanced fermentation instead of K+ ions. Results approved that Mn2+ and Mg2+ ions are necessary for Pseudomonas taetrolens growth. The study results will help to improve the effectiveness of lactobionic acid production with Pseudomonas taetrolens NCIB 9396 and DSM 21104.Keywords: lactobionic acid, lactose oxidation, Pseudomonas taetrolens, whey
Procedia PDF Downloads 1573842 Deep Learning and Accurate Performance Measure Processes for Cyber Attack Detection among Web Logs
Authors: Noureddine Mohtaram, Jeremy Patrix, Jerome Verny
Abstract:
As an enormous number of online services have been developed into web applications, security problems based on web applications are becoming more serious now. Most intrusion detection systems rely on each request to find the cyber-attack rather than on user behavior, and these systems can only protect web applications against known vulnerabilities rather than certain zero-day attacks. In order to detect new attacks, we analyze the HTTP protocols of web servers to divide them into two categories: normal attacks and malicious attacks. On the other hand, the quality of the results obtained by deep learning (DL) in various areas of big data has given an important motivation to apply it to cybersecurity. Deep learning for attack detection in cybersecurity has the potential to be a robust tool from small transformations to new attacks due to its capability to extract more high-level features. This research aims to take a new approach, deep learning to cybersecurity, to classify these two categories to eliminate attacks and protect web servers of the defense sector which encounters different web traffic compared to other sectors (such as e-commerce, web app, etc.). The result shows that by using a machine learning method, a higher accuracy rate, and a lower false alarm detection rate can be achieved.Keywords: anomaly detection, HTTP protocol, logs, cyber attack, deep learning
Procedia PDF Downloads 2133841 Assessment of Vermiculite Concrete Containing Bio-Polymer Aggregate
Authors: Aliakbar Sayadi, Thomas R. Neitzert, G. Charles Clifton, Min Cheol Han
Abstract:
The present study aims to assess the performance of vermiculite concrete containing poly-lactic acid beads as an eco-friendly aggregate. Vermiculite aggregate was replaced by poly-lactic acid in percentages of 0%, 20%, 40%, 60% and 80%. Mechanical and thermal properties of concrete were investigated. Test results indicated that the inclusion of poly-lactic acid decreased the PH value of concrete and all the poly-lactic acid particles were dissolved due to the formation of sodium lactide and lactide oligomers when subjected to the high alkaline environment of concrete. In addition, an increase in thermal conductivity value of concrete was observed as the ratio of poly-lactic acid increased. Moreover, a set of equations was proposed to estimate the water-cement ratio, cement content and water absorption ratio of concrete.Keywords: poly-lactic acid (PLA), vermiculite concrete, eco-friendly, mechanical properties
Procedia PDF Downloads 4043840 Current Drainage Attack Correction via Adjusting the Attacking Saw-Function Asymmetry
Authors: Yuri Boiko, Iluju Kiringa, Tet Yeap
Abstract:
Current drainage attack suggested previously is further studied in regular settings of closed-loop controlled Brushless DC (BLDC) motor with Kalman filter in the feedback loop. Modeling and simulation experiments are conducted in a Matlab environment, implementing the closed-loop control model of BLDC motor operation in position sensorless mode under Kalman filter drive. The current increase in the motor windings is caused by the controller (p-controller in our case) affected by false data injection of substitution of the angular velocity estimates with distorted values. Operation of multiplication to distortion coefficient, values of which are taken from the distortion function synchronized in its periodicity with the rotor’s position change. A saw function with a triangular tooth shape is studied herewith for the purpose of carrying out the bias injection with current drainage consequences. The specific focus here is on how the asymmetry of the tooth in the saw function affects the flow of current drainage. The purpose is two-fold: (i) to produce and collect the signature of an asymmetric saw in the attack for further pattern recognition process, and (ii) to determine conditions of improving stealthiness of such attack via regulating asymmetry in saw function used. It is found that modification of the symmetry in the saw tooth affects the periodicity of current drainage modulation. Specifically, the modulation frequency of the drained current for a fully asymmetric tooth shape coincides with the saw function modulation frequency itself. Increasing the symmetry parameter for the triangle tooth shape leads to an increase in the modulation frequency for the drained current. Moreover, such frequency reaches the switching frequency of the motor windings for fully symmetric triangular shapes, thus becoming undetectable and improving the stealthiness of the attack. Therefore, the collected signatures of the attack can serve for attack parameter identification via the pattern recognition route.Keywords: bias injection attack, Kalman filter, BLDC motor, control system, closed loop, P-controller, PID-controller, current drainage, saw-function, asymmetry
Procedia PDF Downloads 813839 Searching for Forensic Evidence in a Compromised Virtual Web Server against SQL Injection Attacks and PHP Web Shell
Authors: Gigih Supriyatno
Abstract:
SQL injection is one of the most common types of attacks and has a very critical impact on web servers. In the worst case, an attacker can perform post-exploitation after a successful SQL injection attack. In the case of forensics web servers, web server analysis is closely related to log file analysis. But sometimes large file sizes and different log types make it difficult for investigators to look for traces of attackers on the server. The purpose of this paper is to help investigator take appropriate steps to investigate when the web server gets attacked. We use attack scenarios using SQL injection attacks including PHP backdoor injection as post-exploitation. We perform post-mortem analysis of web server logs based on Hypertext Transfer Protocol (HTTP) POST and HTTP GET method approaches that are characteristic of SQL injection attacks. In addition, we also propose structured analysis method between the web server application log file, database application, and other additional logs that exist on the webserver. This method makes the investigator more structured to analyze the log file so as to produce evidence of attack with acceptable time. There is also the possibility that other attack techniques can be detected with this method. On the other side, it can help web administrators to prepare their systems for the forensic readiness.Keywords: web forensic, SQL injection, investigation, web shell
Procedia PDF Downloads 1483838 Determination of Bisphenol A and Uric Acid by Modified Single-Walled Carbon Nanotube with Magnesium Layered Hydroxide 3-(4-Methoxyphenyl)Propionic Acid Nanocomposite
Authors: Illyas Md Isa, Maryam Musfirah Che Sobry, Mohamad Syahrizal Ahmad, Nurashikin Abd Azis
Abstract:
A single-walled carbon nanotube (SWCNT) that has been modified with magnesium layered hydroxide 3-(4-methoxyphenyl)propionic acid nanocomposite was proposed for the determination of uric acid and bisphenol A by square wave voltammetry. The results obtained denote that MLH-MPP nanocomposites enhance the sensitivity of the voltammetry detection responses. The best performance is shown by the modified carbon nanotube paste electrode (CNTPE) with the composition of single-walled carbon nanotube: magnesium layered hydroxide 3-(4-methoxyphenyl)propionic acid nanocomposite at 100:15 (% w/w). The linear range where the sensor works well is within the concentration 1.0 10-7 – 1.0 10-4 and 3.0 10-7 – 1.0 10-4 for uric acid and bisphenol A respectively with the limit of detection of 1.0 10-7 M for both organics. The interferences of uric acid and bisphenol A with other organic were studied and most of them did not interfere. The results shown for each experimental parameter on the proposed CNTPE showed that it has high sensitivity, good selectivity, repeatability and reproducibility. Therefore, the modified CNTPE can be used for the determination of uric acid and bisphenol A in real samples such as blood, plastic bottles and foods.Keywords: bisphenol A, magnesium layered hydroxide 3-(4-methoxyphenyl)propionic acid nanocomposite, Nanocomposite, uric acid
Procedia PDF Downloads 2123837 Biodiesel Production from Fruit Pulp of Cassia fistula L. Using Green Microalga Chlorella minutissima
Authors: Rajesh Chandra, Uttam K. Ghosh
Abstract:
This study demonstrates microalgal bio-diesel generation from a cheap, abundant, non-edible fruit pulp of Cassia fistula L. The Cassia fistula L. fruit pulp aqueous extract (CFAE) was utilized as a growth medium for cultivation of microalga Chlorella minutissima (C. minutissima). This microalga accumulated a high amount of lipids when cultivated with CFAE as a source of nutrition in comparison to BG-11 medium. Different concentrations (10, 20, 30, 40 and 50%) of CFAE diluted with distilled water were used to cultivate microalga. Effects of light intensity and photoperiod were also observed on biomass and lipid yield of microalga. Light intensity of 8000 lux with a photoperiod of 18 h resulted in maximum biomass and lipid yield of 1.28 ± 0.03 and 0.3968 ± 0.05 g/L, respectively when cultivated with 40% CFAE. Fatty acid methyl ester (FAME) profile of bio-diesel obtained shown the presence of myristic acid (C14:0), palmitic acid (C16:0), palmitoleic acid (C16:1), stearic acid (C18:0), linoleic acid (C18:2), linolenic acid (C18:3), arachidic acid (C20:0), and gondoic acid (C20:1), as major fatty acids. These facts reflect that the fruit pulp of Cassia fistula L. can be used for cultivation of C. minutissima.Keywords: biomass, bio-diesel, Cassia fistula L., C. minutissima, GC-MS, lipid
Procedia PDF Downloads 1583836 Characteristic Composition and Sensory Contributions of Acidic Aroma in Mainstream Cigarette Smoke of Cherry-Red Tobacco
Authors: Tian Yangyang, Xu Zihe, Lu Junping, Yang Jizhou, Xu Yiqun, Wang Jiansong, Chen Chao, Yang Mengmeng, Guo Jianhua, Mu Wenjun, Wang Guiyao, Xue Chaoqun, Liang Taibo, Hu Liwei
Abstract:
Cherry-red tobacco is receiving constant attention from cigarette enterprises because of its special flavor. This study aims to explore the material basis for the formation of the characteristic flavor of cherry-red tobacco and to clarify the distribution characteristics of the acidic aroma component groups in its mainstream smoke. In order to reach the aims of current study, this study employs GC/MS to examine the differences of distribution characteristics in particulate matter of mainstream cigarette smoke between cherry-red and common tobacco, meanwhile the aroma activity values (OVA) was used to compare the contribution of acidic aroma of cherry-red tobacco. The results showed that: 1) Isovaleric acid, acetic acid and butyric acid were the key acidic components in the mainstream smoke of the samples, followed by 3-methylvaleric acid, 4-methylvaleric acid and n-valeric acid. 2)Analysis of the release of these key sour fragrance components showed that the acidic aroma of "YUN 85" mainstream smoke was stronger than the leaf group, cherry-red tobacco was the weakest. In addition, aging had the effect of reducing the acidic components of cherry-red tobacco and the addition of cherry-red tobacco had little effect on the acidic components of the original leaf group. 3) For 14 acidic aroma(OAV>1) in smoke of cherry-red tobacco, 3-methylpentanoic acid, 4-methylpentanoic acid, pentanoic acid, and isovaleric acid were very prominent in contributing to acidic aroma, while pyruvic acid, 2-methylbutyric acid, hydrogenated acid, and propionic acid were less contribution.Keywords: cherry-red tobacco, acidic aroma, GC/MS, mainstream cigarette smoke, odor activity value
Procedia PDF Downloads 1383835 Characterization of Fatty Acid Glucose Esters as Os9BGlu31 Transglucosidase Substrates in Rice
Authors: Juthamath Komvongsa, Bancha Mahong, Kannika Phasai, Sukanya Luang, Jong-Seong Jeon, James Ketudat-Cairns
Abstract:
Os9BGlu31 is a rice transglucosidase that transfers glucosyl moieties to various acceptors such as carboxylic acids and alcohols, including phenolic acids and flavonoids, in vitro. The role of Os9BGlu31 transglucosidase in rice plant metabolism has not been reported to date. Methanolic extracts of rice bran and flag leaves were found to contain substrates to which Os9BGlu31 could transfer glucose from 4-nitrophenyl β -D-glucopyranoside donor. The semi-purified substrate from rice bran was found to contain oleic acid and linoleic acid and the pure fatty acids were found to act as acceptor substrates for Os9BGlu31 transglucosidase to form 1-O-acyl glucose esters. Os9BGlu31 showed higher activity with oleic acid (18:1) and linoleic acid (18:2) than stearic acid (18:0), and had both higher kcat and higher Km for linoleic than oleic acid in the presence of 8 mM 4NPGlc donor. This transglucosidase reaction is reversible, Os9bglu31 knockout rice lines of flag leaves were found to have higher amounts of fatty acid glucose esters than wild type control lines, these data conclude that fatty acid glucose esters act as glucosyl donor substrates for Os9BGlu31 transglucosidase in rice.Keywords: fatty acid, fatty acid glucose ester, transglucosidase, rice flag leaf, homologous knockout lines, tandam mass spectrometry
Procedia PDF Downloads 3683834 Optimization of Batch to Up-Scaling of Soy-Based Prepolymer Polyurethane
Authors: Flora Elvistia Firdaus
Abstract:
The chemical structure of soybean oils have to be chemically modified through its tryglyceride to attain resemblance properties with petrochemicals. Sulfur acid catalyst in peracetic acid co-reagent has good performance on modified soybean oil strucutures through its unsaturated fatty acid moiety to the desired hydroxyl functional groups. A series of screening reactions have indicated that the ratio of acetic/peroxide acid 1:7.25 (mol/mol) with temperature of 600°C for soy-epoxide synthesis are prevailed for up-scaling of bodied soybean into 10 and 20 folds from initials. A two-step process was conducted for the preparation of soy-polyol in designated temperatures.Keywords: soybean, polyol, up-scaling, polyurethane
Procedia PDF Downloads 3603833 Experimental Investigation of S822 and S823 Wind Turbine Airfoils Wake
Authors: Amir B. Khoshnevis, Morteza Mirhosseini
Abstract:
The paper deals with a sub-part of an extensive research program on the wake survey method in various Reynolds numbers and angles of attack. This research experimentally investigates the wake flow characteristics behind S823 and S822 airfoils in which designed for small wind turbines. Velocity measurements determined by using hot-wire anemometer. Data acquired in the wake of the airfoil at locations(c is the chord length): 0.01c - 3c. Reynolds number increased due to increase of free stream velocity. Results showed that mean velocity profiles depend on the angle of attack and location of data collections. Data acquired at the low Reynolds numbers (smaller than 10^5). Effects of Reynolds numbers on the mean velocity profiles are more significant in near locations the trailing edge and these effects decrease by taking distance from trailing edge toward downstream. Mean velocity profiles region increased by increasing the angle of attack, except for 7°, and also the maximum velocity deficit (velocity defect) increased. The difference of mean velocity in and out of the wake decreased by taking distance from trailing edge, and mean velocity profile become wider and more uniform.Keywords: angle of attack, Reynolds number, velocity deficit, separation
Procedia PDF Downloads 3783832 New Practical and Non-Malleable Elgamal Encryption for E-Voting Protoco
Authors: Karima Djebaili, Lamine Melkemi
Abstract:
Elgamal encryption is a fundamental public-key encryption in cryptography, which is based on the difficulty of discrete logarithm problem and the Diffie-Hellman problem. Supposing the Diffie–Hellman problem is computationally infeasible then Elgamal is secure under a chosen plaintext attack, where security indicates it is difficult for the attacker, given the ciphertext, to restore the whole of the plaintext. However, although it is secure against chosen plaintext attack, Elgamal is absolutely malleable i.e. is not secure against an adaptive chosen ciphertext attack, where the attacker can recover the plaintext. We present a extension on Elgamal encryption which result in non-malleability against adaptive chosen plaintext attack using concatenation and a cryptographic hash function, our evidence utilizes the device of plaintext aware. The algorithm proposed can be used in cryptography voting protocol given its level security. Our protocol protects the confidentiality of voters because each voter encrypts their choice before casting their vote, offers public verifiability using a signing algorithm, the final result is correctly computed using homomorphic property, and works even in the presence of an adversary due to the propriety of non-malleability. Moreover, the protocol prevents some parties colluding to fix the vote results.Keywords: Elgamal encryption, non-malleability, plaintext aware, e-voting
Procedia PDF Downloads 4523831 Corrosion of Steel in Relation with Hydrogen Activity of Concentrated HClO4 Media: Realisation Sensor and Reference Electrode
Authors: B. Hammouti, H. Oudda, A. Benabdellah, A. Benayada, A. Aouniti
Abstract:
Corrosion behaviour of carbon steel was studied in various concentrated HClO4 solutions. To explain the acid attack in relation of H+ activity, new sensor was realised: two carbon paste electrodes (CPE) were constructed by incorporating ferrocene (Fc) and orthoquinone into the carbon paste matrix and crossed by weak current to stabilize potential difference. The potentiometric method at imposed weak current between these two electrodes permits the in situ determination of both concentration and acidity level of various concentrated HClO4 solutions. The different factors affecting the potential at imposed current as current intensity, temperature and H+ ion concentration are studied. The potentials measured between ferrocene and chloranil electrodes are directly linked to the acid concentration. The acidity Ri(H) function defined represents the determination of the H+ activity and constitutes the extend of pH is concentrated acid solutions. Ri(H) has been determined and compared to Strehlow Ro(H), Janata HGF and Hammett Ho functions. The collected data permit to give a scale of strength of mineral concentrated acids at a given concentration. Ri(H) is numerically equal to the thermodynamic Ro(H), but deviated from Hammett functions based on indicator determination. The CPE electrode with inserted ferrocene in presence of ferricinium (Fc+) ion in concentrated HClO4 at various concentrations is realized without junction potential and may plays the role of a practical reference electrode (FRE) in concentrated acids. Fc+ was easily prepared in biphasic medium HClO4-acid by the quantitative oxidation of ferrocene by the ortho-chloranil (oQ). Potential of FRE is stable with time. The variation of equilibrium potential of the interface Fc/ Fc+ at various concentrations of Fc+ (10-4 - 2 10-2 M) obeyed to the Nernst equation with a slope 0.059 Volt per decade. Corrosion rates obtained by weight loss and electrochemical techniques were then easily linked to acidity level.Keywords: ferrocene, strehlow, concentrated acid, corrosion, Generalised pH, sensor carbon paste electrode
Procedia PDF Downloads 3563830 Investigation of Flow Structure over X-45 Type Non-Slender Delta Wing Planform
Authors: B. Yanıktepe, C. Özalp, B. Şahin
Abstract:
Delta wing planform is an essential aerodynamic configuration, which could be effectively used at relatively high angles of attack than conventional wings in subsonic flow conditions. The flow over delta wings can be characterized by a pair of leading edge vortices emanating from wing apex. Boundary layer separation causes these vortical structures formed by rolling up of viscous flow sheet. This flow separation mechanism is occurred due to angle of attack and sharp leading edges of the delta wing. Therefore, complexity and variety in planform designs rise to catch the best under abnormal flow conditions. The present experimental study investigates the near surface flow structure and aerodynamic flow characteristics of X-45 type non-slender delta wing planform using dye visualization, Stereoscopic Particle Image Velocimetry (stereo-PIV). The instantaneous images are acquired on the plan-view plane within 5o≤α≤20o to calculate the time-averaged flow data. It can be concluded that vortical flow with a pair of well-defined LEVs over X-45 develop at very low angles of attack, secondary vortex are also evident and form close to the wing surface similar to delta and lambda planforms. The stall occurs at an angle of attack α=32o.Keywords: aerodynamic, delta wing, PIV, vortex breakdown
Procedia PDF Downloads 4203829 Finding the Reaction Constant between Humic Acid and Aluminum Ion by Fluorescence Quenching Effect
Authors: Wen Po Cheng, Chen Zhao Feng, Ruey Fang Yu, Lin Jia Jun, Lin Ji Ye, Chen Yuan Wei
Abstract:
Humic acid was used as the removal target for evaluating the coagulation efficiency in this study. When the coagulant ions mix with a humic acid solution, a Fluorescence quenching effect may be observed conditionally. This effect can be described by Stern-Volmer linear equation which can be used for quantifying the quenching value (Kq) of the Fluorescence quenching effect. In addition, a Complex-Formation Titration (CFT) theory was conducted and the result was used to explain the electron-neutralization capability of the coagulant (AlCl₃) at different pH. The results indicated that when pH of the ACl₃ solution was between 6 and 8, fluorescence quenching effect obviously occurred. The maximum Kq value was found to be 102,524 at pH 6. It means that the higher the Kq value is, the better complex reaction between a humic acid and aluminum salts will be. Through the Kq value study, the optimum pH can be quantified when the humic acid solution is coagulated with aluminum ions.Keywords: humic acid, fluorescence quenching effect, complex reaction, titration
Procedia PDF Downloads 5783828 Low Probability of Intercept (LPI) Signal Detection and Analysis Using Choi-Williams Distribution
Authors: V. S. S. Kumar, V. Ramya
Abstract:
In the modern electronic warfare, the signal scenario is changing at a rapid pace with the introduction of Low Probability of Intercept (LPI) radars. In the modern battlefield, radar system faces serious threats from passive intercept receivers such as Electronic Attack (EA) and Anti-Radiation Missiles (ARMs). To perform necessary target detection and tracking and simultaneously hide themselves from enemy attack, radar systems should be LPI. These LPI radars use a variety of complex signal modulation schemes together with pulse compression with the aid of advancement in signal processing capabilities of the radar such that the radar performs target detection and tracking while simultaneously hiding enemy from attack such as EA etc., thus posing a major challenge to the ES/ELINT receivers. Today an increasing number of LPI radars are being introduced into the modern platforms and weapon systems so these LPI radars created a requirement for the armed forces to develop new techniques, strategies and equipment to counter them. This paper presents various modulation techniques used in generation of LPI signals and development of Time Frequency Algorithms to analyse those signals.Keywords: anti-radiation missiles, cross terms, electronic attack, electronic intelligence, electronic warfare, intercept receiver, low probability of intercept
Procedia PDF Downloads 4743827 Determination of the Risks of Heart Attack at the First Stage as Well as Their Control and Resource Planning with the Method of Data Mining
Authors: İbrahi̇m Kara, Seher Arslankaya
Abstract:
Frequently preferred in the field of engineering in particular, data mining has now begun to be used in the field of health as well since the data in the health sector have reached great dimensions. With data mining, it is aimed to reveal models from the great amounts of raw data in agreement with the purpose and to search for the rules and relationships which will enable one to make predictions about the future from the large amount of data set. It helps the decision-maker to find the relationships among the data which form at the stage of decision-making. In this study, it is aimed to determine the risk of heart attack at the first stage, to control it, and to make its resource planning with the method of data mining. Through the early and correct diagnosis of heart attacks, it is aimed to reveal the factors which affect the diseases, to protect health and choose the right treatment methods, to reduce the costs in health expenditures, and to shorten the durations of patients’ stay at hospitals. In this way, the diagnosis and treatment costs of a heart attack will be scrutinized, which will be useful to determine the risk of the disease at the first stage, to control it, and to make its resource planning.Keywords: data mining, decision support systems, heart attack, health sector
Procedia PDF Downloads 3583826 Aerodynamic Coefficients Prediction from Minimum Computation Combinations Using OpenVSP Software
Authors: Marine Segui, Ruxandra Mihaela Botez
Abstract:
OpenVSP is an aerodynamic solver developed by National Aeronautics and Space Administration (NASA) that allows building a reliable model of an aircraft. This software performs an aerodynamic simulation according to the angle of attack of the aircraft makes between the incoming airstream, and its speed. A reliable aerodynamic model of the Cessna Citation X was designed but it required a lot of computation time. As a consequence, a prediction method was established that allowed predicting lift and drag coefficients for all Mach numbers and for all angles of attack, exclusively for stall conditions, from a computation of three angles of attack and only one Mach number. Aerodynamic coefficients given by the prediction method for a Cessna Citation X model were finally compared with aerodynamics coefficients obtained using a complete OpenVSP study.Keywords: aerodynamic, coefficient, cruise, improving, longitudinal, openVSP, solver, time
Procedia PDF Downloads 2353825 Evaluation of Esters Production by Oleic Acid Epoxidation Reaction
Authors: Flavio A. F. Da Ponte, Jackson Q. Malveira, Monica C. G. Albuquerque
Abstract:
In recent years a worldwide interest in renewable resources from the biomass has spurred the industry. In this work the chemical structure of oleic acid chains was modified by homogeneous and heterogeneous catalysis in order to produce esters. The homogeneous epoxidation was carried out at H2O2 to oleic acid unsaturation molar ratio of 20:1. The reaction temperature was 338 K and reaction time 16 h. Formic acid was used as catalyst. For heterogeneous catalysis reaction temperature was 343 K and reaction time 24 h. The esters production was carried out by heterogeneous catalysis of the epoxidized oleic acid and butanol using Mg/SBA-15 as catalyst. The resulting products were confirmed by NMR (1H and 13C) and FTIR spectroscopy. The products were characterized before and after each reaction. The catalysts were characterized by X-ray diffraction, X-ray fluorescence, thermogravimetric analysis (TGA) and BET surface areas. The results were satisfactory for the bioproducts formed.Keywords: acid oleic, bioproduct, esters, epoxidation
Procedia PDF Downloads 3563824 A Grey-Box Text Attack Framework Using Explainable AI
Authors: Esther Chiramal, Kelvin Soh Boon Kai
Abstract:
Explainable AI is a strong strategy implemented to understand complex black-box model predictions in a human-interpretable language. It provides the evidence required to execute the use of trustworthy and reliable AI systems. On the other hand, however, it also opens the door to locating possible vulnerabilities in an AI model. Traditional adversarial text attack uses word substitution, data augmentation techniques, and gradient-based attacks on powerful pre-trained Bidirectional Encoder Representations from Transformers (BERT) variants to generate adversarial sentences. These attacks are generally white-box in nature and not practical as they can be easily detected by humans e.g., Changing the word from “Poor” to “Rich”. We proposed a simple yet effective Grey-box cum Black-box approach that does not require the knowledge of the model while using a set of surrogate Transformer/BERT models to perform the attack using Explainable AI techniques. As Transformers are the current state-of-the-art models for almost all Natural Language Processing (NLP) tasks, an attack generated from BERT1 is transferable to BERT2. This transferability is made possible due to the attention mechanism in the transformer that allows the model to capture long-range dependencies in a sequence. Using the power of BERT generalisation via attention, we attempt to exploit how transformers learn by attacking a few surrogate transformer variants which are all based on a different architecture. We demonstrate that this approach is highly effective to generate semantically good sentences by changing as little as one word that is not detectable by humans while still fooling other BERT models.Keywords: BERT, explainable AI, Grey-box text attack, transformer
Procedia PDF Downloads 1383823 Synergistic Extraction Study of Cobalt (II) from Sulfate Medium by Mixtures of Capric Acid and Tri-N-Octylphosphine Oxide in Chloroform
Authors: F. Adjel, S. Almi, D. Barkat
Abstract:
The synergistic solvent extraction of cobalt (II) from 0.33 mol dm-3 Na2SO4 aqueous solutions with capric acid (HL) in the absence and presence of tri-n-octylphosphine oxide (TOPO) in chloroform at 25°C, has been studied. The extracted species when the capric acid compound was used alone, is CoL2(HL)2. In the presence of TOPO, a remarkable enhancement on the extraction of nickel (II) with 0.02 mol dm-3 capric acid was observed upon the addition of 0.0025 to 0.01 mol dm-3 TOPO in chloroform. From an synergistic extraction- equilibrium study, the synergistic enhancement was ascribed to the adduct formation CoL2(HL)2 n(TOPO). The TOPO-HL interaction strongly influences the synergistic extraction efficiency. The synergistic extraction stoichiometry of cobalt (II) with capric acid and TOPO is studied with the methods of slope analysis. The equilibrium constants were determined.Keywords: solvent extraction, cobalt (II), capric acid, TOPO, synergism
Procedia PDF Downloads 5253822 Real Time Detection of Application Layer DDos Attack Using Log Based Collaborative Intrusion Detection System
Authors: Farheen Tabassum, Shoab Ahmed Khan
Abstract:
The brutality of attacks on networks and decisive infrastructures are on the climb over recent years and appears to continue to do so. Distributed Denial of service attack is the most prevalent and easy attack on the availability of a service due to the easy availability of large botnet computers at cheap price and the general lack of protection against these attacks. Application layer DDoS attack is DDoS attack that is targeted on wed server, application server or database server. These types of attacks are much more sophisticated and challenging as they get around most conventional network security devices because attack traffic often impersonate normal traffic and cannot be recognized by network layer anomalies. Conventional techniques of single-hosted security systems are becoming gradually less effective in the face of such complicated and synchronized multi-front attacks. In order to protect from such attacks and intrusion, corporation among all network devices is essential. To overcome this issue, a collaborative intrusion detection system (CIDS) is proposed in which multiple network devices share valuable information to identify attacks, as a single device might not be capable to sense any malevolent action on its own. So it helps us to take decision after analyzing the information collected from different sources. This novel attack detection technique helps to detect seemingly benign packets that target the availability of the critical infrastructure, and the proposed solution methodology shall enable the incident response teams to detect and react to DDoS attacks at the earliest stage to ensure that the uptime of the service remain unaffected. Experimental evaluation shows that the proposed collaborative detection approach is much more effective and efficient than the previous approaches.Keywords: Distributed Denial-of-Service (DDoS), Collaborative Intrusion Detection System (CIDS), Slowloris, OSSIM (Open Source Security Information Management tool), OSSEC HIDS
Procedia PDF Downloads 3553821 Effect of the Addition of Additives on the Improvement of the Performances of Lead–Acid Batteries
Authors: Malika Foudia, Larbi Zerroual
Abstract:
The objective of this work is to improve the electrical proprieties of lead-acid battery with the addition of additives in electrolyte and in the cured plates before oxidation. The results showed that the addition of surfactant in sulfuric acid and 3% mineral additive in the cured plates change the morphology and the crystallite size of PAM after oxidation. The discharge capacity increases with the decrease of the crystallite size and the resistance of the active mass. This shows that the addition of mineral additive and the surfactant additive to the PAM, the electrical performance and the cycle life of lead- acid battery are significantly increases.Keywords: lead-acid battery, additives, positive plate, impedance (EIS).
Procedia PDF Downloads 4183820 Synergistic Extraction of Cobalt (II) from Sulfate Medium by Mixtures of Capric Acid and Methyl Isobutyl Cétone in Chloroform
Authors: F. Adjel, C. Bensmail, S. Almi, D. Barkat
Abstract:
The synergistic solvent extraction of cobalt (II) from 0.33 mol dm^-3 Na2SO4 aqueous solutions with capric acid (HL) in the absence and presence of methyl isobutyl cétone (MIBK) in chloroform at 25°C, has been studied. The extracted species when the capric acid compound was used alone, is CoL2(HL)2. In the presence of MIBK, a remarkable enhancement on the extraction of nickel (II) with 0.02 mol dm^-3 capric acid was observed upon the addition of 0.0025 to 0.01 mol dm^-3 MIBK in chloroform. From a synergistic extraction-equilibrium study, the synergistic enhancement was ascribed to the adduct formation CoL2(HL)2 n(MIBK). The MIBK-HL interaction strongly influences the synergistic extraction efficiency. The synergistic extraction stoichiometry of cobalt (II) with capric acid and MIBK is studied with the methods of slope analysis. The equilibrium constants were determined.Keywords: solvent extraction, cobalt (II), capric acid, MIBK, synergism
Procedia PDF Downloads 4953819 Synthesis and Characterization of Lactic Acid Grafted TiO2 Nanocomposites
Authors: Qasar Saleem
Abstract:
The aim of this project was to synthesize and analyze Polylactic acid-grafted TiO2 nanocomposite. When dispersed at the nanoscale TiO2 can behave as see through transparent UV filters and thermomechanical materials. The synthesis plan involved three stages. First, dispersion of TiO2 white powder in water/ethanol solvent system. Second grafting TiO2 surface by oligomers of lactic acid aimed at changing its surface features. Third polymerization of lactic acid monomer with grafted TiO2 in the presence of anhydrous stannous chloride as a catalyst. Polylactic acid grafted-TiO2 nanocomposite was synthesized by melt polycondensation in situ of lactic acid onto titanium oxide (TiO2) nanoparticles surface. The product was characterized by TGA, DSC, FTIR, and UV analysis and degradation observation. An idea regarding bonds between the grafting polymer and surface modified titanium oxide nanoparticles. Characteristics peaks of Ti–carbonyl bond, the related intensities of the Fourier transmission absorption peaks of graft composite, the melt and decomposition behavior stages of Polylactic acid-grafted TiO2 nanocomposite convinced that oligomers of polylactic acid were chemically bonded on the surface of TiO2 nanoparticles. Through grafting polylactic acid, the Polylactic acid grafted -TiO2 sample shown good absorption in UV region and degradation behavior under normal atmospheric conditions. Regaining transparency of degraded white opaque Polylactic acid-grafted TiO2 nanocomposite on heating was another character. Polylactic acid-grafted TiO2 nanocomposite will be a potential candidate in future for biomedical, UV shielding and environment friendly material.Keywords: condensation, nanocomposites, oligomers, polylactic
Procedia PDF Downloads 2093818 Fermentable Sugars from Palm Empty Fruit Bunch Biomass for Bioethanol Production
Authors: U. A. Asli, H. Hamid, Z. A. Zakaria, A. N. Sadikin, R. Rasit
Abstract:
This study investigated the effect of a dilute acid, lime and ammonia aqueous pretreatment on the fermentable sugars conversion from empty fruit bunch (EFB) biomass. The dilute acid treatment was carried out in an autoclave, at 121ºC with 4 % of sulphuric acid. In the lime pretreatment, 3 wt % of calcium hydroxide was used, whereas the third method was done by soaking EFB with 28 % ammonia solution. Then the EFB biomass was subjected to a two-stage-acid hydrolysis process. Subsequently, the hydrolysate was fermented by using instant baker’s yeast to produce bioethanol. The highest glucose yield was 890 mg/g of biomass, obtained from the sample which underwent lime pretreatment. The highest bioethanol yield of 6.1mg/g of glucose was achieved from acid pretreatment. This showed that the acid pretreatment gave the most fermentable sugars compared to the other two pretreatments.Keywords: bioethanol, biomass, empty fruit bunch (EFB), fermentable sugars
Procedia PDF Downloads 618