Search results for: internal sulfate attack
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 3302

Search results for: internal sulfate attack

3212 Effect of Surfactant on Thermal Conductivity of Ethylene Glycol/Silver Nanofluid

Authors: E. C. Muhammed Irshad

Abstract:

Nanofluids are a new class of solid-liquid colloidal mixture consisting of nanometer sized (< 100nm) solid particles suspended in heat transfer fluids such as water, ethylene/propylene glycol etc. Nanofluids offer excellent scope of enhancing thermal conductivity of common heat transfer fluids and it leads to enhancement of the heat transfer coefficient. In the present study, silver nanoparticles are dispersed in ethylene glycol water mixture. Low volume concentrations (0.05%, 0.1% and 0.15%) of silver nanofluids were synthesized. The thermal conductivity of these nanofluids was determined with thermal property analyzer (KD2 pro apparatus) and heat transfer coefficient was found experimentally. Initially, the thermal conductivity and viscosity of nanofluids were calculated with various correlations at different concentrations and were compared. Thermal conductivity of silver nanofluid at 0.02% and 0.1% concentration of silver nanoparticle increased to 23.3% and 27.7% for Sodium Dodecyl Sulfate (SDS) and to 33.6% and 36.7% for Poly Vinyl Pyrrolidone (PVP), respectively. The nanofluid maintains the stability for two days and it starts to settle down due to high density of silver. But it shows good improvement in the thermal conductivity for low volume concentration and it also shows better improvement with Poly Vinyl Pyrrolidone (PVP) surfactant than Sodium Dodecyl Sulfate (SDS).

Keywords: k-thermal conductivity, sodium dodecyl sulfate, vinyl pyrrolidone, mechatronics engineering

Procedia PDF Downloads 313
3211 Research on Executive Compensation Incentives and Internal Control: Evidence from China

Authors: Yinjie Han

Abstract:

This paper examines the impact of executive compensation incentives on internal control effectiveness and further analyzes the moderating role of digital transformation in this relationship. Through empirical analysis of relevant data of A-share listed companies in Shanghai and Shenzhen from 2012 to 2022, the results of the study show that there is a significant positive relationship between executive compensation incentives and internal control quality. Digital transformation plays an important moderating role in this relationship. Specifically, executive compensation incentives directly enhance the effectiveness of internal control by increasing executives' motivation and responsibility. At the same time, digital transformation further strengthens the positive impact of executive compensation incentives on the quality of internal controls by increasing information transparency and management efficiency. In addition, the study finds that the impact of executive compensation incentives on internal control quality is more significant in firms with higher levels of digital transformation. This study provides theoretical and practical guidance for enterprises to design and implement effective executive compensation incentives, promote digital transformation, and improve internal control quality.

Keywords: executive compensation incentives, internal control, digital transformation, corporate governance

Procedia PDF Downloads 22
3210 UV Light-Activated Peroxydisulfate Oxidation of Imidacloprid in Synthetic Wastewater

Authors: Yi-An Liao, Lu-Wei Kuo, Yu-Jen Shih, Yao-Hui Huang

Abstract:

Abstract—Imidacloprid (IMI, a widely used pesticide, iImidacloprid (IMI), a widely used pesticide, is known to affect the bee populations. A sulfate radical-based oxidation method was utilized to remove the commercial pesticide consisted of IMI, dimethylacetamide, N-methyl-2-pyrrolidone, and methanol (TOC0 = 497 ppm). The experimental results evidenced that sulfate radicals created by UV activation (254nm, 6.4 mW/cm2) of S2O82- could remove 97% of total organic carbon (TOC) from the synthetic wastewater in 4 h using 120 mM of oxidant dosage. The dose of oxidant, temperature and the light flux were the key factors to further improve the mineralization efficiency, while the ferrous ions decreased the efficacy of UV/S2O82- reaction due to the competition of UV-adsorption by complex formation of FeSO4+.s known to affect the bee populations. A sulfate radical-based oxidation method was utilized to remove the commercial pesticide consisted of IMI, dimethylacetamide, N-methyl-2-pyrrolidone, and methanol (TOC0 = 497 ppm). The experimental results evidenced that sulfate radicals created by UV activation (254nm, 6.4 mW/cm2) of S2O82- could remove 97% of total organic carbon (TOC) from the synthetic wastewater in 4 h using 120 mM of oxidant dosage. The dose of oxidant, temperature and the light flux were the key factors to further improve the mineralization efficiency, while the ferrous ions decreased the efficacy of UV/S2O82- reaction due to the competition of UV-adsorption by complex formation of FeSO4+.

Keywords: organic nitrogen, photochemical oxidation, imidacloprid, UV-persulfate, mineralization

Procedia PDF Downloads 209
3209 Improved Impossible Differential Cryptanalysis of Midori64

Authors: Zhan Chen, Wenquan Bi, Xiaoyun Wang

Abstract:

The Midori family of light weight block cipher is proposed in ASIACRYPT2015. It has attracted the attention of numerous cryptanalysts. There are two versions of Midori: Midori64 which takes a 64-bit block size and Midori128 the size of which is 128-bit. In this paper an improved 10-round impossible differential attack on Midori64 is proposed. Pre-whitening keys are considered in this attack. A better impossible differential path is used to reduce time complexity by decreasing the number of key bits guessed. A hash table is built in the pre-computation phase to reduce computational complexity. Partial abort technique is used in the key seiving phase. The attack requires 259 chosen plaintexts, 214.58 blocks of memory and 268.83 10-round Midori64 encryptions.

Keywords: cryptanalysis, impossible differential, light weight block cipher, Midori

Procedia PDF Downloads 348
3208 Efficiency of an Algae-Zinc Complex Compared to Inorganic Zinc Sulfate on Broilers Performance

Authors: R. Boulmane, C. Alleno, D. Marzin

Abstract:

Trace minerals play an essential role in vital processes and are essential to many biological and physiological functions of the animal. They are usually incorporated in the form of inorganic salts such as sulfates and oxides. Most of these inorganic salts are excreted undigested by the animal causing economic losses as well as environmental pollution. In this context, the use of alternative organic trace minerals with higher bioavailability is emerging. This study was set up to evaluate the effect of using an algae-zinc complex in replacement of zinc sulfate in the feed, on growth performance of broiler chickens. One-thousand-two-hundred 1-day-old chicks were randomly distributed to 30 pens, allocated to 1 of 3 groups receiving different diets: the standard diet containing 35ppm of inorganic zinc sulfate (C+), a test diet containing 35ppm of algae-based zinc (T+), and a test diet containing half dose (16ppm) of algae-based zinc (T-). Three different feeds were distributed from D0-D11, D11-D21 and D21-D35. Individual weighing of the animals (D21 and D35), feed consumption (D11, D21 and D35) and pododermatitis occurrence (D35) were monitored. Data were submitted to analysis of variance. Results show that in finishing period the ADWG of the T+ and T- groups are significantly higher than the control C+ (+6%, P = 0.03). On the other hand, the FCR for the total period is lower for both the T+ and T- groups than the control C+ (-1.2%, P = 0.04). Pododermatitis scoring also shows less lesions for the test groups with algae-based zinc compared to the control group receiving inorganic one. In the end, this study shows a positive effect of the algae zinc-complex on growth performance of broilers compared to inorganic zinc, both when using full dose (35 ppm) or half dose (16 ppm). The use of algae-zinc complex in the premix shows to be a good alternative to reduce zinc excretion while maintaining performance.

Keywords: algae-zinc complex, broiler performance, organic trace minerals, zinc sulfate

Procedia PDF Downloads 241
3207 System Survivability in Networks in the Context of Defense/Attack Strategies: The Large Scale

Authors: Asma Ben Yaghlane, Mohamed Naceur Azaiez, Mehdi Mrad

Abstract:

We investigate the large scale of networks in the context of network survivability under attack. We use appropriate techniques to evaluate and the attacker-based- and the defender-based-network survivability. The attacker is unaware of the operated links by the defender. Each attacked link has some pre-specified probability to be disconnected. The defender choice is so that to maximize the chance of successfully sending the flow to the destination node. The attacker however will select the cut-set with the highest chance to be disabled in order to partition the network. Moreover, we extend the problem to the case of selecting the best p paths to operate by the defender and the best k cut-sets to target by the attacker, for arbitrary integers p,k > 1. We investigate some variations of the problem and suggest polynomial-time solutions.

Keywords: defense/attack strategies, large scale, networks, partitioning a network

Procedia PDF Downloads 283
3206 Interaction of Hemoglobin with Sodium Dodecyl Sulfate and Ascorbic Acid: A Chemometrics Study

Authors: Radnoosh Mirzajani, Ebrahim Mirzajani, Heshmatollah Ebrahimi-Najafabadi

Abstract:

Introduction: Hydrogen peroxide can be produced over the interaction of sodium dodecyl sulfate (SDS) with hemoglobin which would facilitate the oxidation process of hemoglobin. The presence of ascorbic acid (AA) can hinder the extreme oxidation of oxyhemoglobin. Methods: Hemoglobin was purified from blood samples according to the method of Williams. UV-V is spectra of Hb solutions mixed with different concentrations of SDS and AA were recorded. Chemical components, concentration, and spectral profiles were estimated using MCR-ALS techniques. Results: The intensity of soret band of OxyHb decreased due to the interaction of Hb with SDS. Furthermore, changes were also observed for peaks at 575 and 540. Subspace plots confirm the presence of OxyHb, MetHb, and Hemichrom in each mixture. The resolved concentration profiles using MCR-ALS reveal that the mole fraction of OxyHb increased upon the presence of AA up to a concentration level of 3 mM. The higher concentration of AA shows a reverse effect. AA demonstrated a dual effect on the interaction of hemoglobin with SDS. AA disturbs the interaction of SDS and hemoglobin and exhibits an antioxidative effect. However, it caused a tiny decrease in the mole fraction of OxyHb. Conclusions: H2O2 produces upon the interaction of OxyHb with SDS. Oxidation of OxyHb facilitates due to overproduction of H2O2. Ascorbic acid interacts with H2O2 to form dehydroascorbic acid. Furthermore, the available free SDS was reduced because the Gibbs free energy for micelle production of SDS became more negative in the presence of AA.

Keywords: hemoglobin, ascorbic acid, sodium dodecyl sulfate, multivariate curve resolution, antioxidant

Procedia PDF Downloads 119
3205 Research on Measuring Operational Risk in Commercial Banks Based on Internal Control

Authors: Baobao Li

Abstract:

Operational risk covers all operations of commercial banks and has a close relationship with the bank’s internal control. But in the commercial banks' management practice, internal control is always separated from the operational risk measurement. With the increasing of operational risk events in recent years, operational risk is paid more and more attention by regulators and banks’ managements. The paper first discussed the relationship between internal control and operational risk management and used CVaR-POT model to measure operational risk, and then put forward a modified measurement method (to use operational risk assessment results to modify the measurement results of the CVaR-POT model). The paper also analyzed the necessity and rationality of this method. The method takes into consideration the influence of internal control, improves the accuracy and effectiveness of operational risk measurement and save the economic capital for commercial banks, avoiding the drawbacks of using some mainstream models one-sidedly.

Keywords: commercial banks, internal control, operational risk, risk measurement

Procedia PDF Downloads 398
3204 Public Wi-Fi Security Threat Evil Twin Attack Detection Based on Signal Variant and Hop Count

Authors: Said Abdul Ahad Ahadi, Elyas Baray, Nitin Rakesh, Sudeep Varshney

Abstract:

Wi-Fi is a widely used internet source that is used to provide internet access in many areas such as Stores, Cafes, University campuses, Restaurants and so on. This technology brought more facilities in communication and networking. On the other hand, due to the transmission of data over the air, which makes the network vulnerable, so it becomes prone to various threats such as Evil Twin and etc. The Evil Twin is a kind of adversary which impersonates a legitimate access point (LAP) as it can happen by spoofing the name (SSID) and MAC address (BSSID) of a legitimate access point (LAP). And this attack can cause many threats such as MITM, Service Interruption, Access point service blocking. Various Evil Twin Attack Detection Techniques are proposed, but they require additional hardware, or they require protocol modification. In this paper, we proposed a new technique based on Access Point’s two fingerprints, Received Signal Strength Indicator (RSSI) and Hop Count, that is hard to copy by an adversary. And we implemented the technique in a system called “ETDetector,” which can detect and prevent the attack.

Keywords: evil twin, LAP, SSID, Wi-Fi security, signal variation, ETAD, kali linux, scapy, python

Procedia PDF Downloads 143
3203 Deep Learning and Accurate Performance Measure Processes for Cyber Attack Detection among Web Logs

Authors: Noureddine Mohtaram, Jeremy Patrix, Jerome Verny

Abstract:

As an enormous number of online services have been developed into web applications, security problems based on web applications are becoming more serious now. Most intrusion detection systems rely on each request to find the cyber-attack rather than on user behavior, and these systems can only protect web applications against known vulnerabilities rather than certain zero-day attacks. In order to detect new attacks, we analyze the HTTP protocols of web servers to divide them into two categories: normal attacks and malicious attacks. On the other hand, the quality of the results obtained by deep learning (DL) in various areas of big data has given an important motivation to apply it to cybersecurity. Deep learning for attack detection in cybersecurity has the potential to be a robust tool from small transformations to new attacks due to its capability to extract more high-level features. This research aims to take a new approach, deep learning to cybersecurity, to classify these two categories to eliminate attacks and protect web servers of the defense sector which encounters different web traffic compared to other sectors (such as e-commerce, web app, etc.). The result shows that by using a machine learning method, a higher accuracy rate, and a lower false alarm detection rate can be achieved.

Keywords: anomaly detection, HTTP protocol, logs, cyber attack, deep learning

Procedia PDF Downloads 210
3202 Current Drainage Attack Correction via Adjusting the Attacking Saw-Function Asymmetry

Authors: Yuri Boiko, Iluju Kiringa, Tet Yeap

Abstract:

Current drainage attack suggested previously is further studied in regular settings of closed-loop controlled Brushless DC (BLDC) motor with Kalman filter in the feedback loop. Modeling and simulation experiments are conducted in a Matlab environment, implementing the closed-loop control model of BLDC motor operation in position sensorless mode under Kalman filter drive. The current increase in the motor windings is caused by the controller (p-controller in our case) affected by false data injection of substitution of the angular velocity estimates with distorted values. Operation of multiplication to distortion coefficient, values of which are taken from the distortion function synchronized in its periodicity with the rotor’s position change. A saw function with a triangular tooth shape is studied herewith for the purpose of carrying out the bias injection with current drainage consequences. The specific focus here is on how the asymmetry of the tooth in the saw function affects the flow of current drainage. The purpose is two-fold: (i) to produce and collect the signature of an asymmetric saw in the attack for further pattern recognition process, and (ii) to determine conditions of improving stealthiness of such attack via regulating asymmetry in saw function used. It is found that modification of the symmetry in the saw tooth affects the periodicity of current drainage modulation. Specifically, the modulation frequency of the drained current for a fully asymmetric tooth shape coincides with the saw function modulation frequency itself. Increasing the symmetry parameter for the triangle tooth shape leads to an increase in the modulation frequency for the drained current. Moreover, such frequency reaches the switching frequency of the motor windings for fully symmetric triangular shapes, thus becoming undetectable and improving the stealthiness of the attack. Therefore, the collected signatures of the attack can serve for attack parameter identification via the pattern recognition route.

Keywords: bias injection attack, Kalman filter, BLDC motor, control system, closed loop, P-controller, PID-controller, current drainage, saw-function, asymmetry

Procedia PDF Downloads 80
3201 Searching for Forensic Evidence in a Compromised Virtual Web Server against SQL Injection Attacks and PHP Web Shell

Authors: Gigih Supriyatno

Abstract:

SQL injection is one of the most common types of attacks and has a very critical impact on web servers. In the worst case, an attacker can perform post-exploitation after a successful SQL injection attack. In the case of forensics web servers, web server analysis is closely related to log file analysis. But sometimes large file sizes and different log types make it difficult for investigators to look for traces of attackers on the server. The purpose of this paper is to help investigator take appropriate steps to investigate when the web server gets attacked. We use attack scenarios using SQL injection attacks including PHP backdoor injection as post-exploitation. We perform post-mortem analysis of web server logs based on Hypertext Transfer Protocol (HTTP) POST and HTTP GET method approaches that are characteristic of SQL injection attacks. In addition, we also propose structured analysis method between the web server application log file, database application, and other additional logs that exist on the webserver. This method makes the investigator more structured to analyze the log file so as to produce evidence of attack with acceptable time. There is also the possibility that other attack techniques can be detected with this method. On the other side, it can help web administrators to prepare their systems for the forensic readiness.

Keywords: web forensic, SQL injection, investigation, web shell

Procedia PDF Downloads 148
3200 Mixed-ownership Reform and Quality of Internal Control of State-owned Enterprises: Logic and Evidence

Authors: Mao Ju

Abstract:

As a capital organizing form, the mixed-ownership reform of state-owned enterprises (SOEs) is an important way to stimulate enterprises’ vitality through reshaping the shareholding structure, enhancing mutual complementation of shareholders’ resources, and improving corporate governance and the quality of internal control. Based on the process of mixed-ownership reform and according to IPO and the change in the key shareholding structure of the listed companies, this paper divides the reform into two stages: primary mixed-ownership reform and secondary mixed-ownership reform (deeper mixed-ownership reform), and uses this as the basis to construct the proxy variable of the mixed-ownership reform of SOEs, research on the relationship between the mixed-ownership reform of SOEs and the quality of internal control. The research reveals that: (1) SOEs completing a secondary mixed-ownership reform can enhance the quality of internal control; (2) In the secondary mixed-ownership reform, the introduction of heterogeneous major shareholders will generate more obvious enhancement in the quality of internal control than the introduction of homogeneous major shareholders. Further research shows that the internal environment and marketization process play a moderating role in the process of the secondary mixed-ownership reform affecting the quality of internal control, that is, a better internal environment or a higher degree of marketization can promote the improvement of the quality of internal control in secondary mixed-ownership reform. The conclusion of the research provides experimental evidence for the expected results of the mixed-ownership reform policy.

Keywords: mixed-ownership reform of state-owned enterprises, secondary mixed-ownership reform, quality of internal control, primary mixed-ownership reform

Procedia PDF Downloads 20
3199 Experimental Investigation of S822 and S823 Wind Turbine Airfoils Wake

Authors: Amir B. Khoshnevis, Morteza Mirhosseini

Abstract:

The paper deals with a sub-part of an extensive research program on the wake survey method in various Reynolds numbers and angles of attack. This research experimentally investigates the wake flow characteristics behind S823 and S822 airfoils in which designed for small wind turbines. Velocity measurements determined by using hot-wire anemometer. Data acquired in the wake of the airfoil at locations(c is the chord length): 0.01c - 3c. Reynolds number increased due to increase of free stream velocity. Results showed that mean velocity profiles depend on the angle of attack and location of data collections. Data acquired at the low Reynolds numbers (smaller than 10^5). Effects of Reynolds numbers on the mean velocity profiles are more significant in near locations the trailing edge and these effects decrease by taking distance from trailing edge toward downstream. Mean velocity profiles region increased by increasing the angle of attack, except for 7°, and also the maximum velocity deficit (velocity defect) increased. The difference of mean velocity in and out of the wake decreased by taking distance from trailing edge, and mean velocity profile become wider and more uniform.

Keywords: angle of attack, Reynolds number, velocity deficit, separation

Procedia PDF Downloads 377
3198 New Practical and Non-Malleable Elgamal Encryption for E-Voting Protoco

Authors: Karima Djebaili, Lamine Melkemi

Abstract:

Elgamal encryption is a fundamental public-key encryption in cryptography, which is based on the difficulty of discrete logarithm problem and the Diffie-Hellman problem. Supposing the Diffie–Hellman problem is computationally infeasible then Elgamal is secure under a chosen plaintext attack, where security indicates it is difficult for the attacker, given the ciphertext, to restore the whole of the plaintext. However, although it is secure against chosen plaintext attack, Elgamal is absolutely malleable i.e. is not secure against an adaptive chosen ciphertext attack, where the attacker can recover the plaintext. We present a extension on Elgamal encryption which result in non-malleability against adaptive chosen plaintext attack using concatenation and a cryptographic hash function, our evidence utilizes the device of plaintext aware. The algorithm proposed can be used in cryptography voting protocol given its level security. Our protocol protects the confidentiality of voters because each voter encrypts their choice before casting their vote, offers public verifiability using a signing algorithm, the final result is correctly computed using homomorphic property, and works even in the presence of an adversary due to the propriety of non-malleability. Moreover, the protocol prevents some parties colluding to fix the vote results.

Keywords: Elgamal encryption, non-malleability, plaintext aware, e-voting

Procedia PDF Downloads 451
3197 Investigation of Flow Structure over X-45 Type Non-Slender Delta Wing Planform

Authors: B. Yanıktepe, C. Özalp, B. Şahin

Abstract:

Delta wing planform is an essential aerodynamic configuration, which could be effectively used at relatively high angles of attack than conventional wings in subsonic flow conditions. The flow over delta wings can be characterized by a pair of leading edge vortices emanating from wing apex. Boundary layer separation causes these vortical structures formed by rolling up of viscous flow sheet. This flow separation mechanism is occurred due to angle of attack and sharp leading edges of the delta wing. Therefore, complexity and variety in planform designs rise to catch the best under abnormal flow conditions. The present experimental study investigates the near surface flow structure and aerodynamic flow characteristics of X-45 type non-slender delta wing planform using dye visualization, Stereoscopic Particle Image Velocimetry (stereo-PIV). The instantaneous images are acquired on the plan-view plane within 5o≤α≤20o to calculate the time-averaged flow data. It can be concluded that vortical flow with a pair of well-defined LEVs over X-45 develop at very low angles of attack, secondary vortex are also evident and form close to the wing surface similar to delta and lambda planforms. The stall occurs at an angle of attack α=32o.

Keywords: aerodynamic, delta wing, PIV, vortex breakdown

Procedia PDF Downloads 420
3196 Low Probability of Intercept (LPI) Signal Detection and Analysis Using Choi-Williams Distribution

Authors: V. S. S. Kumar, V. Ramya

Abstract:

In the modern electronic warfare, the signal scenario is changing at a rapid pace with the introduction of Low Probability of Intercept (LPI) radars. In the modern battlefield, radar system faces serious threats from passive intercept receivers such as Electronic Attack (EA) and Anti-Radiation Missiles (ARMs). To perform necessary target detection and tracking and simultaneously hide themselves from enemy attack, radar systems should be LPI. These LPI radars use a variety of complex signal modulation schemes together with pulse compression with the aid of advancement in signal processing capabilities of the radar such that the radar performs target detection and tracking while simultaneously hiding enemy from attack such as EA etc., thus posing a major challenge to the ES/ELINT receivers. Today an increasing number of LPI radars are being introduced into the modern platforms and weapon systems so these LPI radars created a requirement for the armed forces to develop new techniques, strategies and equipment to counter them. This paper presents various modulation techniques used in generation of LPI signals and development of Time Frequency Algorithms to analyse those signals.

Keywords: anti-radiation missiles, cross terms, electronic attack, electronic intelligence, electronic warfare, intercept receiver, low probability of intercept

Procedia PDF Downloads 471
3195 Determination of the Risks of Heart Attack at the First Stage as Well as Their Control and Resource Planning with the Method of Data Mining

Authors: İbrahi̇m Kara, Seher Arslankaya

Abstract:

Frequently preferred in the field of engineering in particular, data mining has now begun to be used in the field of health as well since the data in the health sector have reached great dimensions. With data mining, it is aimed to reveal models from the great amounts of raw data in agreement with the purpose and to search for the rules and relationships which will enable one to make predictions about the future from the large amount of data set. It helps the decision-maker to find the relationships among the data which form at the stage of decision-making. In this study, it is aimed to determine the risk of heart attack at the first stage, to control it, and to make its resource planning with the method of data mining. Through the early and correct diagnosis of heart attacks, it is aimed to reveal the factors which affect the diseases, to protect health and choose the right treatment methods, to reduce the costs in health expenditures, and to shorten the durations of patients’ stay at hospitals. In this way, the diagnosis and treatment costs of a heart attack will be scrutinized, which will be useful to determine the risk of the disease at the first stage, to control it, and to make its resource planning.

Keywords: data mining, decision support systems, heart attack, health sector

Procedia PDF Downloads 356
3194 Aerodynamic Coefficients Prediction from Minimum Computation Combinations Using OpenVSP Software

Authors: Marine Segui, Ruxandra Mihaela Botez

Abstract:

OpenVSP is an aerodynamic solver developed by National Aeronautics and Space Administration (NASA) that allows building a reliable model of an aircraft. This software performs an aerodynamic simulation according to the angle of attack of the aircraft makes between the incoming airstream, and its speed. A reliable aerodynamic model of the Cessna Citation X was designed but it required a lot of computation time. As a consequence, a prediction method was established that allowed predicting lift and drag coefficients for all Mach numbers and for all angles of attack, exclusively for stall conditions, from a computation of three angles of attack and only one Mach number. Aerodynamic coefficients given by the prediction method for a Cessna Citation X model were finally compared with aerodynamics coefficients obtained using a complete OpenVSP study.

Keywords: aerodynamic, coefficient, cruise, improving, longitudinal, openVSP, solver, time

Procedia PDF Downloads 235
3193 A Grey-Box Text Attack Framework Using Explainable AI

Authors: Esther Chiramal, Kelvin Soh Boon Kai

Abstract:

Explainable AI is a strong strategy implemented to understand complex black-box model predictions in a human-interpretable language. It provides the evidence required to execute the use of trustworthy and reliable AI systems. On the other hand, however, it also opens the door to locating possible vulnerabilities in an AI model. Traditional adversarial text attack uses word substitution, data augmentation techniques, and gradient-based attacks on powerful pre-trained Bidirectional Encoder Representations from Transformers (BERT) variants to generate adversarial sentences. These attacks are generally white-box in nature and not practical as they can be easily detected by humans e.g., Changing the word from “Poor” to “Rich”. We proposed a simple yet effective Grey-box cum Black-box approach that does not require the knowledge of the model while using a set of surrogate Transformer/BERT models to perform the attack using Explainable AI techniques. As Transformers are the current state-of-the-art models for almost all Natural Language Processing (NLP) tasks, an attack generated from BERT1 is transferable to BERT2. This transferability is made possible due to the attention mechanism in the transformer that allows the model to capture long-range dependencies in a sequence. Using the power of BERT generalisation via attention, we attempt to exploit how transformers learn by attacking a few surrogate transformer variants which are all based on a different architecture. We demonstrate that this approach is highly effective to generate semantically good sentences by changing as little as one word that is not detectable by humans while still fooling other BERT models.

Keywords: BERT, explainable AI, Grey-box text attack, transformer

Procedia PDF Downloads 136
3192 Real Time Detection of Application Layer DDos Attack Using Log Based Collaborative Intrusion Detection System

Authors: Farheen Tabassum, Shoab Ahmed Khan

Abstract:

The brutality of attacks on networks and decisive infrastructures are on the climb over recent years and appears to continue to do so. Distributed Denial of service attack is the most prevalent and easy attack on the availability of a service due to the easy availability of large botnet computers at cheap price and the general lack of protection against these attacks. Application layer DDoS attack is DDoS attack that is targeted on wed server, application server or database server. These types of attacks are much more sophisticated and challenging as they get around most conventional network security devices because attack traffic often impersonate normal traffic and cannot be recognized by network layer anomalies. Conventional techniques of single-hosted security systems are becoming gradually less effective in the face of such complicated and synchronized multi-front attacks. In order to protect from such attacks and intrusion, corporation among all network devices is essential. To overcome this issue, a collaborative intrusion detection system (CIDS) is proposed in which multiple network devices share valuable information to identify attacks, as a single device might not be capable to sense any malevolent action on its own. So it helps us to take decision after analyzing the information collected from different sources. This novel attack detection technique helps to detect seemingly benign packets that target the availability of the critical infrastructure, and the proposed solution methodology shall enable the incident response teams to detect and react to DDoS attacks at the earliest stage to ensure that the uptime of the service remain unaffected. Experimental evaluation shows that the proposed collaborative detection approach is much more effective and efficient than the previous approaches.

Keywords: Distributed Denial-of-Service (DDoS), Collaborative Intrusion Detection System (CIDS), Slowloris, OSSIM (Open Source Security Information Management tool), OSSEC HIDS

Procedia PDF Downloads 354
3191 A Review on Microbial Enhanced Oil Recovery and Controlling Its Produced Hydrogen Sulfide Effects on Reservoir and Transporting Pipelines

Authors: Ali Haratian, Soroosh Emami Meybodi

Abstract:

Using viable microbial cultures within hydrocarbon reservoirs so as to the enhancement of oil recovery through metabolic activities is exactly what we recognize as microbial enhanced oil recovery (MEOR). In similar to many other processes in industries, there are some cons and pros following with MEOR. The creation of sulfides such as hydrogen sulfide as a result of injecting the sulfate-containing seawater into hydrocarbon reservoirs in order to maintain the required reservoir pressure leads to production and growth of sulfate reducing bacteria (SRB) approximately near the injection wells, turning the reservoir into sour; however, SRB is not considered as the only microbial process stimulating the formation of sulfides. Along with SRB, thermochemical sulfate reduction or thermal redox reaction (TSR) is also known to be highly effective at resulting in having extremely concentrated zones of ?2S in the reservoir fluids eligible to cause corrosion. Owing to extent of the topic, more information on the formation of ?₂S is going to be put finger on. Besides, confronting the undesirable production of sulfide species in the reservoirs can lead to serious operational, environmental, and financial problems, in particular the transporting pipelines. Consequently, conjuring up reservoir souring control strategies on the way production of oil and gas is the only way to prevent possible damages in terms of environment, finance, and manpower which requires determining the compound’s reactivity, origin, and partitioning behavior. This article is going to provide a comprehensive review of progress made in this field and the possible advent of new strategies in this technologically advanced world of the petroleum industry.

Keywords: corrosion, hydrogen sulfide, NRB, reservoir souring, SRB

Procedia PDF Downloads 222
3190 Design Criteria for an Internal Information Technology Cost Allocation to Support Business Information Technology Alignment

Authors: Andrea Schnabl, Mario Bernhart

Abstract:

The controlling instrument of an internal cost allocation (IT chargeback) is commonly used to make IT costs transparent and controllable. Information Technology (IT) became, especially for information industries, a central competitive factor. Consequently, the focus is not on minimizing IT costs but on the strategic aligned application of IT. Hence, an internal IT cost allocation should be designed to enhance the business-IT alignment (strategic alignment of IT) in order to support the effective application of IT from a company’s point of view. To identify design criteria for an internal cost allocation to support business alignment a case study analysis at a typical medium-sized firm in information industry is performed. Documents, Key Performance Indicators, and cost accounting data over a period of 10 years are analyzed and interviews are performed. The derived design criteria are evaluated by 6 heads of IT departments from 6 different companies, which have an internal IT cost allocation at use. By applying these design criteria an internal cost allocation serves not only for cost controlling but also as an instrument in strategic IT management.

Keywords: accounting for IT services, Business IT Alignment, internal cost allocation, IT controlling, IT governance, strategic IT management

Procedia PDF Downloads 155
3189 Efficient and Timely Mutual Authentication Scheme for RFID Systems

Authors: Hesham A. El Zouka, Mustafa M. Hosni ka

Abstract:

The Radio Frequency Identification (RFID) technology has a diverse base of applications, but it is also prone to security threats. There are different types of security attacks that limit the range of the RFID applications. For example, deploying the RFID networks in insecure environments could make the RFID system vulnerable to many types of attacks such as spoofing attack, location traceability attack, physical attack and many more. Therefore, security is often an important requirement for RFID systems. In this paper, RFID mutual authentication protocol is implemented based on mobile agent technology and timestamp, which are used to provide strong authentication and integrity assurances to both the RFID readers and their corresponding RFID tags. The integration of mobile agent technology and timestamp provides promising results towards achieving this goal and towards reducing the security threats in RFID systems.

Keywords: RFID, security, authentication protocols, privacy, agent-based architecture, time-stamp, digital signature

Procedia PDF Downloads 269
3188 Investigation of Zeolite and Silica Fume Addition on Durability of Cement Composites

Authors: Martina Kovalcikova, Adriana Estokova

Abstract:

Today, concrete belongs to the most frequently used materials in the civil engineering industry for many years. Consuming energy in cement industry is very high and CO₂ emissions generated during the production of Portland cement has serious environmental threatens. Therefore, utilization of pozzolanic material as a supplementary cementitious material has a direct relationship with the sustainable development. The paper presents the results of the comparative study of the resistance of the Slovak origin zeolite based cement composites with addition of silica fume exposed to the sulfate environment. The various aggressive media were used for the experiment: sulfuric acid with pH 4, distilled water and magnesium sulfate solution with a concentration of 3 g/L of SO₄²−. The laboratory experiment proceeded during 180 days under model conditions. The changes in the elemental concentrations of calcium and silicon in liquid leachates were observed.

Keywords: concrete, leaching, silica fume, sulfuric acid, zeolite

Procedia PDF Downloads 270
3187 SEM and FTIR Study of Adsorption Characteristics Using Xanthate (KIBX) Synthesized Collectors on Sphalerite

Authors: Zohir Nedjar, Djamel Barkat

Abstract:

Thiols such as alkyl xanthates are commonly used as collectors in the froth flotation of sulfide minerals. Under the concen-tration, pH and Eh conditions relevant to flotation, the thermodynamically favoured reaction between a thiol and a sulfide mineral surface is charge transfechemisorption in which the collector becomes bonded to metal atoms in the outermost layer of the sulfide lattice. The adsorption of potassium isobutyl xanthate (KIBX 3.10-3M) on sphalerite has been also studied using electrochemical potential, FTIR technique and SEM. Non activated minerals and minerals activated with copper sulfate (10-4 M) and copper nitrate (10-4 M) have been investigated at pH = 7.5. Surface species have been identified by FTIR and correlated with SEM. After copper sulfate activation, copper xanthate exists on all of the minerals studied. Neutral pH is most favorable for potassium isobutyl xanthate adsorption on sphalerite.

Keywords: flotation, adsorption, xanthate KIBX, sphalerite

Procedia PDF Downloads 307
3186 An Earth Mover’s Distance Algorithm Based DDoS Detection Mechanism in SDN

Authors: Yang Zhou, Kangfeng Zheng, Wei Ni, Ren Ping Liu

Abstract:

Software-defined networking (SDN) provides a solution for scalable network framework with decoupled control and data plane. However, this architecture also induces a particular distributed denial-of-service (DDoS) attack that can affect or even overwhelm the SDN network. DDoS attack detection problem has to date been mostly researched as entropy comparison problem. However, this problem lacks the utilization of SDN, and the results are not accurate. In this paper, we propose a DDoS attack detection method, which interprets DDoS detection as a signature matching problem and is formulated as Earth Mover’s Distance (EMD) model. Considering the feasibility and accuracy, we further propose to define the cost function of EMD to be a generalized Kullback-Leibler divergence. Simulation results show that our proposed method can detect DDoS attacks by comparing EMD values with the ones computed in the case without attacks. Moreover, our method can significantly increase the true positive rate of detection.

Keywords: DDoS detection, EMD, relative entropy, SDN

Procedia PDF Downloads 337
3185 Comparison of Microwave-Assisted and Conventional Leaching for Extraction of Copper from Chalcopyrite Concentrate

Authors: Ayfer Kilicarslan, Kubra Onol, Sercan Basit, Muhlis Nezihi Saridede

Abstract:

Chalcopyrite (CuFeS2) is the most common primary mineral used for the commercial production of copper. The low dissolution efficiency of chalcopyrite in sulfate media has prevented an efficient industrial leaching of this mineral in sulfate media. Ferric ions, bacteria, oxygen and other oxidants have been used as oxidizing agents in the leaching of chalcopyrite in sulfate and chloride media under atmospheric or pressure leaching conditions. Two leaching methods were studied to evaluate chalcopyrite (CuFeS2) dissolution in acid media. First, the conventional oxidative acid leaching method was carried out using sulfuric acid (H2SO4) and potassium dichromate (K2Cr2O7) as oxidant at atmospheric pressure. Second, microwave-assisted acid leaching was performed using the microwave accelerated reaction system (MARS) for same reaction media. Parameters affecting the copper extraction such as leaching time, leaching temperature, concentration of H2SO4 and concentration of K2Cr2O7 were investigated. The results of conventional acid leaching experiments were compared to the microwave leaching method. It was found that the copper extraction obtained under high temperature and high concentrations of oxidant with microwave leaching is higher than those obtained conventionally. 81% copper extraction was obtained by the conventional oxidative acid leaching method in 180 min, with the concentration of 0.3 mol/L K2Cr2O7 in 0.5M H2SO4 at 50 ºC, while 93.5% copper extraction was obtained in 60 min with microwave leaching method under same conditions.

Keywords: extraction, copper, microwave-assisted leaching, chalcopyrite, potassium dichromate

Procedia PDF Downloads 370
3184 Numerical Investigation of Effect of Throat Design on the Performance of a Rectangular Ramjet Intake

Authors: Subrat Partha Sarathi Pattnaik, Rajan N.K.S.

Abstract:

Integrated rocket ramjet engines are highly suitable for long range missile applications. Designing the fixed geometry intakes for such missiles that can operate efficiently over a range of operating conditions is a highly challenging task. Hence, the present study aims to evaluate the effect of throat design on the performance of a rectangular mixed compression intake for operation in the Mach number range of 1.8 – 2.5. The analysis has been carried out at four different Mach numbers of 1.8, 2, 2.2, 2.5 and two angle-of-attacks of +5 and +10 degrees. For the throat design, three different throat heights have been considered, one corresponding to a 3- external shock design and two heights corresponding to a 2-external shock design leading to different internal contraction ratios. The on-design Mach number for the study is M 2.2. To obtain the viscous flow field in the intake, the theoretical designs have been considered for computational fluid dynamic analysis. For which Favre averaged Navier- Stokes (FANS) equations with two equation SST k-w model have been solved. The analysis shows that for zero angle of attack at on-design and high off-design Mach number operations the three-ramp design leads to a higher total pressure recovery (TPR) compared to the two-ramp design at both contraction ratios maintaining same mass flow ratio (MFR). But at low off-design Mach numbers the total pressure shows an opposite trend that is maximum for the two-ramp low contraction ratio design due to lower shock loss across the external shocks similarly the MFR is higher for low contraction ratio design as the external ramp shocks move closer to the cowl. At both the angle of attack conditions and complete range of Mach numbers the total pressure recovery and mass flow ratios are highest for two ramp low contraction design due to lower stagnation pressure loss across the detached bow shock formed at the ramp and lower mass spillage. Hence, low contraction design is found to be suitable for higher off-design performance.

Keywords: internal contraction ratio, mass flow ratio, mixed compression intake, performance, supersonic flows

Procedia PDF Downloads 108
3183 Attack Redirection and Detection using Honeypots

Authors: Chowduru Ramachandra Sharma, Shatunjay Rawat

Abstract:

A false positive state is when the IDS/IPS identifies an activity as an attack, but the activity is acceptable behavior in the system. False positives in a Network Intrusion Detection System ( NIDS ) is an issue because they desensitize the administrator. It wastes computational power and valuable resources when rules are not tuned properly, which is the main issue with anomaly NIDS. Furthermore, most false positives reduction techniques are not performed during the real-time of attempted intrusions; instead, they have applied afterward on collected traffic data and generate alerts. Of course, false positives detection in ‘offline mode’ is tremendously valuable. Nevertheless, there is room for improvement here; automated techniques still need to reduce False Positives in real-time. This paper uses the Snort signature detection model to redirect the alerted attacks to Honeypots and verify attacks.

Keywords: honeypot, TPOT, snort, NIDS, honeybird, iptables, netfilter, redirection, attack detection, docker, snare, tanner

Procedia PDF Downloads 155