Search results for: intrusion
93 Urban Poor: The Situations and Characteristics of the Problem and Social Welfare Service of Bangkok Metropolis
Authors: Sanchai Ratthanakwan
Abstract:
This research aims to study situations and characteristics of the problems facing the urban poor. The data and information are collected by focus group and in-depth interview leader and members of Four Regions Slum Network, community representatives and the social welfare officer. The research can be concluded that the problems of the urban poor faced with three major problems: Firstly, the shortage of housing and stability issues in housing; secondly, the problem of substandard quality of life; and thirdly, the debt problem. The study found that a solution will be found in two ways: First way is the creation of housing for the urban poor in slums or community intrusion by the state. Second way is the stability in the housing and subsistence provided by the community center called “housing stability”.Keywords: urban poor, social welfare, Bangkok metropolis, housing stability
Procedia PDF Downloads 42392 Wetting Induced Collapse Behavior of Loosely Compacted Kaolin Soil: A Microstructural Study
Authors: Dhanesh Sing Das, Bharat Tadikonda Venkata
Abstract:
Collapsible soils undergo significant volume reduction upon wetting under the pre-existing mechanically applied normal stress (inundation pressure). These soils exhibit a very high strength in air-dried conditions and can carry up to a considerable magnitude of normal stress without undergoing significant volume change. The soil strength is, however, lost upon saturation and results in a sudden collapse of the soil structure under the existing mechanical stress condition. The intrusion of water into the dry deposits of such soil causes ground subsidence leading to damages in the overlying buildings/structures. A study on the wetting-induced volume change behavior of collapsible soils is essential in dealing with the ground subsidence problems in various geotechnical engineering practices. The collapse of loosely compacted Kaolin soil upon wetting under various inundation pressures has been reported in recent studies. The collapse in the Kaolin soil is attributed to the alteration in the soil particle-particle association (fabric) resulting due to the changes in the various inter-particle (microscale) forces induced by the water saturation. The inundation pressure plays a significant role in the fabric evolution during the wetting process, thus controls the collapse potential of the compacted soil. A microstructural study is useful to understand the collapse mechanisms at various pore-fabric levels under different inundation pressure. Kaolin soil compacted to a dry density of 1.25 g/cc was used in this work to study the wetting-induced volume change behavior under different inundation pressures in the range of 10-1600 kPa. The compacted specimen of Kaolin soil exhibited a consistent collapse under all the studied inundation pressure. The collapse potential was observed to be increasing with an increase in the inundation pressure up to a maximum value of 13.85% under 800 kPa and then decreased to 11.7% under 1600 kPa. Microstructural analysis was carried out based on the fabric images and the pore size distributions (PSDs) obtained from FESEM analysis and mercury intrusion porosimetry (MIP), respectively. The PSDs and the soil fabric images of ‘as-compacted’ specimen and post-collapse specimen under 400 kPa were analyzed to understand the changes in the soil fabric and pores due to wetting. The pore size density curve for the post-collapse specimen was found to be on the finer side with respect to the ‘as-compacted’ specimen, indicating the reduction of the larger pores during the collapse. The inter-aggregate pores in the range of 0.1-0.5μm were identified as the major contributing pore size classes to the macroscopic volume change. Wetting under an inundation pressure results in the reduction of these pore sizes and lead to an increase in the finer pore sizes. The magnitude of inundation pressure influences the amount of reduction of these pores during the wetting process. The collapse potential was directly related to the degree of reduction in the pore volume contributed by these pore sizes.Keywords: collapse behavior, inundation pressure, kaolin, microstructure
Procedia PDF Downloads 13891 Mechanical and Micro-Structural Properties of Fly Ash Based Geopolymer with High-Temperature Exposure
Authors: Young-Cheol Choi, Joo-Hyung Kim, Gyu-Don Moon
Abstract:
This paper discusses the effect of Na2O (alkali) content, SiO2/Na2O mole ratio, and elevated temperature on the mechanical performance of fly-ash-based inorganic green geopolymer composites. Fly-ash-based geopolymers, which were manufactured with varying alkali contents (4–8 % of fly ash weight) and SiO2/Na2O mole ratios (0.6–1.4), were subjected to elevated temperatures up to 900 ºC ; the geopolymer composites and their performance were evaluated on the basis of weight loss and strength loss after temperature exposure. In addition, mineralogical changes due to the elevated temperature exposure were studied using x-ray diffraction. Investigations of microstructures and microprobe analysis were performed using mercury intrusion porosimetry. The results showed that the fly-ash-based geopolymer responded significantly to high-temperature conditions.Keywords: fly ash, geopolymer, micro-structure, high-temperature, mechanical structural
Procedia PDF Downloads 59790 A Reasoning Method of Cyber-Attack Attribution Based on Threat Intelligence
Authors: Li Qiang, Yang Ze-Ming, Liu Bao-Xu, Jiang Zheng-Wei
Abstract:
With the increasing complexity of cyberspace security, the cyber-attack attribution has become an important challenge of the security protection systems. The difficult points of cyber-attack attribution were forced on the problems of huge data handling and key data missing. According to this situation, this paper presented a reasoning method of cyber-attack attribution based on threat intelligence. The method utilizes the intrusion kill chain model and Bayesian network to build attack chain and evidence chain of cyber-attack on threat intelligence platform through data calculation, analysis and reasoning. Then, we used a number of cyber-attack events which we have observed and analyzed to test the reasoning method and demo system, the result of testing indicates that the reasoning method can provide certain help in cyber-attack attribution.Keywords: reasoning, Bayesian networks, cyber-attack attribution, Kill Chain, threat intelligence
Procedia PDF Downloads 45089 Attack Redirection and Detection using Honeypots
Authors: Chowduru Ramachandra Sharma, Shatunjay Rawat
Abstract:
A false positive state is when the IDS/IPS identifies an activity as an attack, but the activity is acceptable behavior in the system. False positives in a Network Intrusion Detection System ( NIDS ) is an issue because they desensitize the administrator. It wastes computational power and valuable resources when rules are not tuned properly, which is the main issue with anomaly NIDS. Furthermore, most false positives reduction techniques are not performed during the real-time of attempted intrusions; instead, they have applied afterward on collected traffic data and generate alerts. Of course, false positives detection in ‘offline mode’ is tremendously valuable. Nevertheless, there is room for improvement here; automated techniques still need to reduce False Positives in real-time. This paper uses the Snort signature detection model to redirect the alerted attacks to Honeypots and verify attacks.Keywords: honeypot, TPOT, snort, NIDS, honeybird, iptables, netfilter, redirection, attack detection, docker, snare, tanner
Procedia PDF Downloads 15588 Semi-Supervised Outlier Detection Using a Generative and Adversary Framework
Authors: Jindong Gu, Matthias Schubert, Volker Tresp
Abstract:
In many outlier detection tasks, only training data belonging to one class, i.e., the positive class, is available. The task is then to predict a new data point as belonging either to the positive class or to the negative class, in which case the data point is considered an outlier. For this task, we propose a novel corrupted Generative Adversarial Network (CorGAN). In the adversarial process of training CorGAN, the Generator generates outlier samples for the negative class, and the Discriminator is trained to distinguish the positive training data from the generated negative data. The proposed framework is evaluated using an image dataset and a real-world network intrusion dataset. Our outlier-detection method achieves state-of-the-art performance on both tasks.Keywords: one-class classification, outlier detection, generative adversary networks, semi-supervised learning
Procedia PDF Downloads 15187 Using Social Network Analysis for Cyber Threat Intelligence
Authors: Vasileios Anastopoulos
Abstract:
Cyber threat intelligence assists organizations in understanding the threats they face and helps them make educated decisions on preparing their defenses. Sharing of threat intelligence and threat information is increasingly leveraged by organizations and enterprises, and various software solutions are already available, with the open-source malware information sharing platform (MISP) being a popular one. In this work, a methodology for the production of cyber threat intelligence using the threat information stored in MISP is proposed. The methodology leverages the discipline of social network analysis and the diamond model, a model used for intrusion analysis, to produce cyber threat intelligence. The workings are demonstrated with a case study on a production MISP instance of a real organization. The paper concluded with a discussion on the proposed methodology and possible directions for further research.Keywords: cyber threat intelligence, diamond model, malware information sharing platform, social network analysis
Procedia PDF Downloads 17886 Investigating what Effects Aviation Fluids Have on the Flatwise Compressive Strength of Nomex® Honeycomb Core Material
Authors: G. Kim, R. Sterkenburg
Abstract:
One of the disadvantages of honeycomb sandwich structure is that they are prone to fluid intrusion. The purpose of this study is to determine if the structural properties of honeycomb core are affected by contact with a fluid. The test specimens were manufactured of fiberglass prepreg for the facesheets and Nomex® honeycomb core for the core material in accordance with ASTM C-365/365M. Test specimens were soaked in several different kinds of fluids, such as aircraft fuel, turbine engine oil, hydraulic fluid, and water for a period of 60 days. A flatwise compressive test was performed, and the test results were analyzed to determine how the contact with aircraft fluids affected the compressive strength of the Nomex® honeycomb core and how the strength was recovered when the specimens were dry. In addition, the investigation of de-bonding between facesheet and core material after soaking were performed to support the study.Keywords: sandwich structure, honeycomb, environmental degradation, debonding
Procedia PDF Downloads 17685 Proposing a Boundary Coverage Algorithm for Underwater Sensor Network
Authors: Seyed Mohsen Jameii
Abstract:
Wireless underwater sensor networks are a type of sensor networks that are located in underwater environments and linked together by acoustic waves. The application of these kinds of network includes monitoring of pollutants (chemical, biological, and nuclear), oil fields detection, prediction of the likelihood of a tsunami in coastal areas, the use of wireless sensor nodes to monitor the passing submarines, and determination of appropriate locations for anchoring ships. This paper proposes a boundary coverage algorithm for intrusion detection in underwater sensor networks. In the first phase of the proposed algorithm, optimal deployment of nodes is done in the water. In the second phase, after the employment of nodes at the proper depth, clustering is executed to reduce the exchanges of messages between the sensors. In the third phase, the algorithm of "divide and conquer" is used to save energy and increase network efficiency. The simulation results demonstrate the efficiency of the proposed algorithm.Keywords: boundary coverage, clustering, divide and conquer, underwater sensor nodes
Procedia PDF Downloads 34184 Managing the Water Projects and Controlling Its Boundary Disturbances Which Affect the Water Supply
Authors: Sead A. Bakheet, Salah M. Elkoum, Asharaf A. Almaghribi
Abstract:
Disturbance defined as activity that malfunction, intrusion, or interruption. We have to look around for the source of the disturbance affecting the inputs and outputs of engineering projects, take the necessary actions to control them. In this paper we will present and discuss a production system consisting of three elements, inputs, the production process and outputs. The production process which we chose is the production of large diameter pre-stressed concrete cylinder pipes (out puts), in reality, the outputs are the starting points of the operation (laying the concrete pipes for transporting drinkable water). The main objective also to address the controlling methods of the natural resources and raw materials (basic inputs), study the disturbances affecting them as well as the output quality. The importance of making the right decision, which effect the final product quality will be summarized. Finally, we will address the proposals regarding the managing of secure water supply to the customers.Keywords: disturbances, management, inputs, outputs, decision
Procedia PDF Downloads 6283 Applications of AI, Machine Learning, and Deep Learning in Cyber Security
Authors: Hailyie Tekleselase
Abstract:
Deep learning is increasingly used as a building block of security systems. However, neural networks are hard to interpret and typically solid to the practitioner. This paper presents a detail survey of computing methods in cyber security, and analyzes the prospects of enhancing the cyber security capabilities by suggests that of accelerating the intelligence of the security systems. There are many AI-based applications used in industrial scenarios such as Internet of Things (IoT), smart grids, and edge computing. Machine learning technologies require a training process which introduces the protection problems in the training data and algorithms. We present machine learning techniques currently applied to the detection of intrusion, malware, and spam. Our conclusions are based on an extensive review of the literature as well as on experiments performed on real enterprise systems and network traffic. We conclude that problems can be solved successfully only when methods of artificial intelligence are being used besides human experts or operators.Keywords: artificial intelligence, machine learning, deep learning, cyber security, big data
Procedia PDF Downloads 12682 Localized Recharge Modeling of a Coastal Aquifer from a Dam Reservoir (Korba, Tunisia)
Authors: Nejmeddine Ouhichi, Fethi Lachaal, Radhouane Hamdi, Olivier Grunberger
Abstract:
Located in Cap Bon peninsula (Tunisia), the Lebna dam was built in 1987 to balance local water salt intrusion taking place in the coastal aquifer of Korba. The first intention was to reduce coastal groundwater over-pumping by supplying surface water to a large irrigation system. The unpredicted beneficial effect was recorded with the occurrence of a direct localized recharge to the coastal aquifer by leakage through the geological material of the southern bank of the lake. The hydrological balance of the reservoir dam gave an estimation of the annual leakage volume, but dynamic processes and sound quantification of recharge inputs are still required to understand the localized effect of the recharge in terms of piezometry and quality. Present work focused on simulating the recharge process to confirm the hypothesis, and established a sound quantification of the water supply to the coastal aquifer and extend it to multi-annual effects. A spatial frame of 30km² was used for modeling. Intensive outcrops and geophysical surveys based on 68 electrical resistivity soundings were used to characterize the aquifer 3D geometry and the limit of the Plio-quaternary geological material concerned by the underground flow paths. Permeabilities were determined using 17 pumping tests on wells and piezometers. Six seasonal piezometric surveys on 71 wells around southern reservoir dam banks were performed during the 2019-2021 period. Eight monitoring boreholes of high frequency (15min) piezometric data were used to examine dynamical aspects. Model boundary conditions were specified using the geophysics interpretations coupled with the piezometric maps. The dam-groundwater flow model was performed using Visual MODFLOW software. Firstly, permanent state calibration based on the first piezometric map of February 2019 was established to estimate the permanent flow related to the different reservoir levels. Secondly, piezometric data for the 2019-2021 period were used for transient state calibration and to confirm the robustness of the model. Preliminary results confirmed the temporal link between the reservoir level and the localized recharge flow with a strong threshold effect for levels below 16 m.a.s.l. The good agreement of computed flow through recharge cells on the southern banks and hydrological budget of the reservoir open the path to future simulation scenarios of the dilution plume imposed by the localized recharge. The dam reservoir-groundwater flow-model simulation results approve a potential for storage of up to 17mm/year in existing wells, under gravity-feed conditions during level increases on the reservoir into the three years of operation. The Lebna dam groundwater flow model characterized a spatiotemporal relation between groundwater and surface water.Keywords: leakage, MODFLOW, saltwater intrusion, surface water-groundwater interaction
Procedia PDF Downloads 13881 Seismic Vulnerability Assessment of High-Rise Structures in Addis Ababa, Ethiopia: Implications for Urban Resilience Along the East African Rift Margin
Authors: Birhanu Abera Kibret
Abstract:
The abstract highlights findings from a seismicity study conducted in the Ethiopian Rift Valley and adjacent cities, including Semera, Adama, and Hawasa, located in Afar and the Main Ethiopian Rift system. The region experiences high seismicity, characterized by small to moderate earthquakes situated in the mid-to-upper crust. Additionally, the capital city of Ethiopia, Addis Ababa, situated in the rift margin, experiences seismic activity, with small to relatively moderate earthquakes observed to the east and southeast of the city, alongside the rift valley. These findings underscore the seismic vulnerability of the region, emphasizing the need for comprehensive seismic risk assessment and mitigation strategies to enhance resilience and preparedness.Keywords: seismic hazard, seismicity, crustal structure, magmatic intrusion, partial meltung
Procedia PDF Downloads 6880 Comparison of Physico-Mechanical Properties of Superplasticizer Stabilized Graphene Oxide and Carbon Nanotubes Reinforced Cement Nanocomposites
Authors: Ramanjit Kaur, N. C. Kothiyal
Abstract:
The present study compares the improved mechanical strength of cement mortar nanocomposites (CNCs) using polycarboxylate superplasticizer (PCE-SP) stabilized graphene oxide or functionalized carbon nanotubes (SP-GO and SP-FCNT) as reinforcing agents. So, in the present study, GO, and FCNT have been sterically stabilized via superplasticizer. The obtained results have shown that a dosage of 0.02 wt% of SP-GO and 0.08 wt% of SP-FCNTs showed an improvement in compressive strength by 23.2% and 16.5%, respectively. On the other hand, incorporation of 0.04% SP-GO and SP-FCNT resulted in an enhanced split tensile strength of 38.5% and 35.8%, respectively, as compared to the control sample at 90 days of curing. Mercury Intrusion Porosimetry (MIP) observations presented a decline in the porosity of 0.02% SP-GO-CNCs and 0.08% SP-FCNT-CNCs by 25% and 31% in comparison to the control sample. The improved hydration of CNCs contributing to the enhancement of physicomechanical strength has also been shown by SEM and XRD studies.Keywords: graphene oxide, functionalized CNTs, steric stabilization, microstructure, crystalline behavior, pore structure refinement
Procedia PDF Downloads 10679 The Journey of a Malicious HTTP Request
Authors: M. Mansouri, P. Jaklitsch, E. Teiniker
Abstract:
SQL injection on web applications is a very popular kind of attack. There are mechanisms such as intrusion detection systems in order to detect this attack. These strategies often rely on techniques implemented at high layers of the application but do not consider the low level of system calls. The problem of only considering the high level perspective is that an attacker can circumvent the detection tools using certain techniques such as URL encoding. One technique currently used for detecting low-level attacks on privileged processes is the tracing of system calls. System calls act as a single gate to the Operating System (OS) kernel; they allow catching the critical data at an appropriate level of detail. Our basic assumption is that any type of application, be it a system service, utility program or Web application, “speaks” the language of system calls when having a conversation with the OS kernel. At this level we can see the actual attack while it is happening. We conduct an experiment in order to demonstrate the suitability of system call analysis for detecting SQL injection. We are able to detect the attack. Therefore we conclude that system calls are not only powerful in detecting low-level attacks but that they also enable us to detect high-level attacks such as SQL injection.Keywords: Linux system calls, web attack detection, interception, SQL
Procedia PDF Downloads 35878 A Software Engineering Methodology for Developing Secure Obfuscated Software
Authors: Carlos Gonzalez, Ernesto Linan
Abstract:
We propose a methodology to conciliate two apparently contradictory processes in the development of secure obfuscated software and good software engineered software. Our methodology consists first in the system designers defining the type of security level required for the software. There are four types of attackers: casual attackers, hackers, institution attack, and government attack. Depending on the level of threat, the methodology we propose uses five or six teams to accomplish this task. One Software Engineer Team and one or two software Obfuscation Teams, and Compiler Team, these four teams will develop and compile the secure obfuscated software, a Code Breakers Team will test the results of the previous teams to see if the software is not broken at the required security level, and an Intrusion Analysis Team will analyze the results of the Code Breakers Team and propose solutions to the development teams to prevent the detected intrusions. We also present an analytical model to prove that our methodology is no only easier to use, but generates an economical way of producing secure obfuscated software.Keywords: development methodology, obfuscated software, secure software development, software engineering
Procedia PDF Downloads 25077 Reinforcement of an Electric Vehicle Battery Pack Using Honeycomb Structures
Authors: Brandon To, Yong S. Park
Abstract:
As more battery electric vehicles are being introduced into the automobile industry, continuous advancements are constantly made in the electric vehicle space. Improvements in lithium-ion battery technology allow electric vehicles to be capable of traveling long distances. The batteries are capable of being charged faster, allowing for a sufficient range in shorter amounts of time. With increased reliance on battery technology and the changes in vehicle power trains, new challenges arise from this. Resulting electric vehicle fires caused by collisions are potentially more dangerous than those of the typical internal combustion engine. To further reduce the battery failures involved with side collisions, this project intends to reinforce an existing battery pack of an electric vehicle with honeycomb structures such that intrusion into the batteries can be minimized with weight restrictions in place. Honeycomb structures of hexagonal geometry are implemented into the side extrusions of the battery pack. With the use of explicit dynamics simulations performed in ANSYS, quantitative results such as deformation, strain, and stress are used to compare the performance of the battery pack with and without the implemented honeycomb structures.Keywords: battery pack, electric vehicle, honeycomb, side impact
Procedia PDF Downloads 12176 Addressing Security and Privacy Issues in a Smart Environment by Using Block-Chain as a Preemptive Technique
Authors: Shahbaz Pervez, Aljawharah Almuhana, Zahida Parveen, Samina Naz, Hira Tariq, Seyed Hosseini, Muhammad Awais Azam
Abstract:
With the latest development in the field of cutting-edge technologies, there is a rapid increase in the use of technology-oriented gadgets. In a recent scenario of the tech era, there is increasing demand to fulfill our day-to-day routine tasks with the help of technological gadgets. We are living in an era of technology where trends have been changing, and a race to introduce a new technology gadget has already begun. Smart cities are getting more popular with every passing day; city councils and governments are under enormous pressure to provide the latest services for their citizens and equip them with all the latest facilities. Thus, ultimately, they are going more into smart cities infrastructure building, providing services to their inhabitants with a single click from their smart devices. This trend is very exciting, but on the other hand, if some incident of security breach happens due to any weaker link, the results would be catastrophic. This paper addresses potential security and privacy breaches with a possible solution by using Blockchain technology in IoT enabled environment.Keywords: blockchain, cybersecurity, DDOS, intrusion detection, IoT, RFID, smart devices security, smart services
Procedia PDF Downloads 11975 Analysis of Vapor-Phase Diffusion of Benzene from Contaminated Soil
Authors: Asma A. Parlin, K. Nakamura, N. Watanabe, T. Komai
Abstract:
Understanding the effective diffusion of benzene vapor in the soil-atmosphere interface is important as an intrusion of benzene into the atmosphere from the soil is largely driven by diffusion. To analyze the vertical one dimensional effective diffusion of benzene vapor in porous medium with high water content, diffusion experiments were conducted in soil columns using Andosol soil and Toyoura silica sand with different water content; for soil water content was from 0 to 30 wt.% and for sand it was from 0.06 to 10 wt.%. In soil, a linear relation was found between water content and effective diffusion coefficient while the effective diffusion coefficient didn’t change in the sand with increasing water. A numerical transport model following unsteady-state approaches based on Fick’s second law was used to match the required time for a steady state of the gas phase concentration profile of benzene to the experimentally measured concentration profile gas phase in the column. The result highlighted that both the water content and porosity might increase vertical diffusion of benzene vapor in soil.Keywords: benzene vapor-phase, effective diffusion, subsurface soil medium, unsteady state
Procedia PDF Downloads 14374 Long-Term Mechanical and Structural Properties of Metakaolin-Based Geopolymers
Authors: Lenka Matulova
Abstract:
Geopolymers are alumosilicate materials that have long been studied. Despite this fact, little is known about the long-term stability of geopolymer mechanical and structural properties, so crucial for their successful industrial application. To improve understanding, we investigated the effect of four different types of environments on the mechanical and structural properties of a metakaolin-based geopolymer (MK GP). The MK GP samples were stored in laboratory conditions (control samples), in water at 20 °C, in water at 80 °C, and outside exposed to the weather. Compressive and tensile strengths were measured after 28, 56, 90, and 360 days. In parallel, structural properties were analyzed using XRD, SEM, and mercury intrusion porosimetry. Whereas the mechanical properties of the samples in laboratory conditions and in 20 °C water were stable, the mechanical properties of the outdoor samples and the samples 80 °C water decreased noticeably after 360 days. Structural analyses were focused on changes in sample microstructure (developing microcrack network, porosity) and identifying zeolites, the presence of which would indicate detrimental processes in the structure that can change it from amorphous to crystalline. No zeolites were found during the 360-day period in MK GP samples, but the reduction in mechanical properties coincided with a developing network of microcracks and changes in pore size distribution.Keywords: geopolymer, long-term properties, mechanical properties, metakaolin, structural properties
Procedia PDF Downloads 23973 The Influence of Water and Salt Crystals Content on Thermal Conductivity Coefficient of Red Clay Brick
Authors: Dalia Bednarska, Marcin Koniorczyk
Abstract:
This paper presents results of experiments aimed at studying hygro-thermal properties of red clay brick. The main objective of research was to investigate the relation between thermal conductivity coefficient of brick and its water or Na2SO4 solution content. The research was conducted using stationary technique for the totally dried specimens, as well as the ones 25%, 50%, 75% and 100% imbued with water or sodium sulfate solution. Additionally, a sorption isotherm test was conducted for seven relative humidity levels. Furthermore the change of red clay brick pore structure before and after imbuing with water and salt solution was investigated by multi-cycle mercury intrusion test. The experimental results confirm negative influence of water or sodium sulphate on thermal properties of material. The value of thermal conductivity coefficient increases along with growth of water or Na₂SO₄ solution content. The study shows that the presence of Na₂SO₄ solution has less negative influence on brick’s thermal conductivity coefficient than water.Keywords: building materials, red clay brick, sodium sulfate, thermal conductivity coefficient
Procedia PDF Downloads 40472 Impacts Of Salinity on Co2 Turnover in Some Gefara Soils of Libya
Authors: Fathi Elyaagubi
Abstract:
Salinization is a major threat to the productivity of agricultural land. The Gefara Plain located in the northwest of Libya; comprises about 80% of the total agricultural activity. The high water requirements for the populations and agriculture are depleting the groundwater aquifer, resulting in intrusion of seawater in the first few kilometers along the coast. Due to increasing salinity in the groundwater used for irrigation, the soils of the Gefara Plain are becoming increasingly saline. This research paper investigated the sensitivity of these soils to increased salinity using Co2 evolution as an integrating measure of soil function. Soil was collected from four sites located in the Gefara Plain, Almaya, Janzur, Gargaresh and Tajura. Soil collected from Tajura had the highest background salinity, and Janzur had the highest organic matter content. All of the soils had relatively low organic matter content, ranging between 0.49-%1.25. The cumulative rate of 14CO2 of added 14C-labelled Lolium shoots (Lolium perenne L.) to soils was decreased under effects of water containing different concentrations of NaCl at 20, 50, 70, 90, 150, and 200 mM compared to the control at any time of incubation in four sites.Keywords: soil salinity, gefara plain, organic matter, 14C-labelled lolium shoots
Procedia PDF Downloads 22171 A Study on the Impact of Artificial Intelligence on Human Society and the Necessity for Setting up the Boundaries on AI Intrusion
Authors: Swarna Pundir, Prabuddha Hans
Abstract:
As AI has already stepped into the daily life of human society, one cannot be ignorant about the data it collects and used it to provide a quality of services depending up on the individuals’ choices. It also helps in giving option for making decision Vs choice selection with a calculation based on the history of our search criteria. Over the past decade or so, the way Artificial Intelligence (AI) has impacted society is undoubtedly large.AI has changed the way we shop, the way we entertain and challenge ourselves, the way information is handled, and has automated some sections of our life. We have answered as to what AI is, but not why one may see it as useful. AI is useful because it is capable of learning and predicting outcomes, using Machine Learning (ML) and Deep Learning (DL) with the help of Artificial Neural Networks (ANN). AI can also be a system that can act like humans. One of the major impacts be Joblessness through automation via AI which is seen mostly in manufacturing sectors, especially in the routine manual and blue-collar occupations and those without a college degree. It raises some serious concerns about AI in regards of less employment, ethics in making moral decisions, Individuals privacy, human judgement’s, natural emotions, biased decisions, discrimination. So, the question is if an error occurs who will be responsible, or it will be just waved off as a “Machine Error”, with no one taking the responsibility of any wrongdoing, it is essential to form some rules for using the AI where both machines and humans are involved. Procedia PDF Downloads 9770 DISGAN: Efficient Generative Adversarial Network-Based Method for Cyber-Intrusion Detection
Authors: Hongyu Chen, Li Jiang
Abstract:
Ubiquitous anomalies endanger the security of our system con- stantly. They may bring irreversible damages to the system and cause leakage of privacy. Thus, it is of vital importance to promptly detect these anomalies. Traditional supervised methods such as Decision Trees and Support Vector Machine (SVM) are used to classify normality and abnormality. However, in some case, the abnormal status are largely rarer than normal status, which leads to decision bias of these methods. Generative adversarial network (GAN) has been proposed to handle the case. With its strong generative ability, it only needs to learn the distribution of normal status, and identify the abnormal status through the gap between it and the learned distribution. Nevertheless, existing GAN-based models are not suitable to process data with discrete values, leading to immense degradation of detection performance. To cope with the discrete features, in this paper, we propose an efficient GAN-based model with specifically-designed loss function. Experiment results show that our model outperforms state-of-the-art models on discrete dataset and remarkably reduce the overhead.Keywords: GAN, discrete feature, Wasserstein distance, multiple intermediate layers
Procedia PDF Downloads 12969 An Innovative Auditory Impulsed EEG and Neural Network Based Biometric Identification System
Authors: Ritesh Kumar, Gitanjali Chhetri, Mandira Bhatia, Mohit Mishra, Abhijith Bailur, Abhinav
Abstract:
The prevalence of the internet and technology in our day to day lives is creating more security issues than ever. The need for protecting and providing a secure access to private and business data has led to the development of many security systems. One of the potential solutions is to employ the bio-metric authentication technique. In this paper we present an innovative biometric authentication method that utilizes a person’s EEG signal, which is acquired in response to an auditory stimulus,and transferred wirelessly to a computer that has the necessary ANN algorithm-Multi layer perceptrol neural network because of is its ability to differentiate between information which is not linearly separable.In order to determine the weights of the hidden layer we use Gaussian random weight initialization. MLP utilizes a supervised learning technique called Back propagation for training the network. The complex algorithm used for EEG classification reduces the chances of intrusion into the protected public or private data.Keywords: EEG signal, auditory evoked potential, biometrics, multilayer perceptron neural network, back propagation rule, Gaussian random weight initialization
Procedia PDF Downloads 40868 Deep Learning and Accurate Performance Measure Processes for Cyber Attack Detection among Web Logs
Authors: Noureddine Mohtaram, Jeremy Patrix, Jerome Verny
Abstract:
As an enormous number of online services have been developed into web applications, security problems based on web applications are becoming more serious now. Most intrusion detection systems rely on each request to find the cyber-attack rather than on user behavior, and these systems can only protect web applications against known vulnerabilities rather than certain zero-day attacks. In order to detect new attacks, we analyze the HTTP protocols of web servers to divide them into two categories: normal attacks and malicious attacks. On the other hand, the quality of the results obtained by deep learning (DL) in various areas of big data has given an important motivation to apply it to cybersecurity. Deep learning for attack detection in cybersecurity has the potential to be a robust tool from small transformations to new attacks due to its capability to extract more high-level features. This research aims to take a new approach, deep learning to cybersecurity, to classify these two categories to eliminate attacks and protect web servers of the defense sector which encounters different web traffic compared to other sectors (such as e-commerce, web app, etc.). The result shows that by using a machine learning method, a higher accuracy rate, and a lower false alarm detection rate can be achieved.Keywords: anomaly detection, HTTP protocol, logs, cyber attack, deep learning
Procedia PDF Downloads 21067 What It Means to Be an Internally Displaced Person: The Story of the Abu-Shouk Camp
Authors: Mawa Abdelbagi Mohamed Mohamed, Eslam Alaa Elbahlawan
Abstract:
This study examines the complex social fabric woven within the Abu-Shouk internally displaced persons camp, shaped by the chaotic waves of armed conflict and displacement in the early 2000s. The impact of war, economic constraints, and altered living conditions have fundamentally reshaped families and traditions, presenting both challenges and opportunities. In this exploration, we navigate the resilience of a community thrust into adversity, spotlighting how it emerged as essential in rebuilding social bonds. Exchanges of culture, intertribal marriages, and communal gathering spots have become essential tools in fostering cohesion and understanding amidst diversity. However, this resilience has been tested by the intrusion of politics, leading to shifts in governance structures and community dynamics. As we conclude, it is evident that while the scars of displacement and political disruptions are present, the community's enduring spirit and adaptability shine through. Empowering the community to rebuild their social tapestry, bridging the gaps, and restoring unity amid evolving political realities remain the beacon guiding their journey toward a shared, purposeful future.Keywords: darfur, internally displaced person, social fabric, conflict
Procedia PDF Downloads 6466 Advanced Seismic Retrofit of a School Building by a DFP Base Isolation Solution
Authors: Stefano Sorace, Gloria Terenzi
Abstract:
The study of a base isolation seismic retrofit solution for a reinforced concrete school building is presented in this paper. The building was assumed as a benchmark structure for a Research Project financed by the Italian Department of Civil Protection, and is representative of several similar public edifices designed with earlier Technical Standards editions, in Italy as well as in other earthquake-prone European countries. The structural characteristics of the building, and a synthesis of the investigation campaigns developed on it, are initially presented. The mechanical parameters, dimensions, locations and installation details of the base isolation system, incorporating double friction pendulum sliding bearings as protective devices, are then illustrated, along with the performance assessment analyses carried out in original and rehabilitated conditions according to a full non-linear dynamic approach. The results of the analyses show a remarkable enhancement of the seismic response capacities of the structure in base-isolated configuration. This allows reaching the high performance levels postulated in the rehabilitation design with notably lower costs and architectural intrusion as compared to traditional retrofit interventions designed for the same objectives.Keywords: seismic retrofit, seismic assessment, r/c structures, school buildings, base isolation
Procedia PDF Downloads 27065 Smart-Textile Containers for Urban Mobility
Authors: René Vieroth, Christian Dils, M. V. Krshiwoblozki, Christine Kallmayer, Martin Schneider-Ramelow, Klaus-Dieter Lang
Abstract:
Green urban mobility in commercial and private contexts is one of the great challenges for the continuously growing cities all over the world. Bicycle based solutions are already and since a long time the key to success. Modern developments like e-bikes and high-end cargo-bikes complement the portfolio. Weight, aerodynamic drag, and security for the transported goods are the key factors for working solutions. Recent achievements in the field of smart-textiles allowed the creation of a totally new generation of intelligent textile cargo containers, which fulfill those demands. The fusion of technical textiles, design and electrical engineering made it possible to create an ecological solution which is very near to become a product. This paper shows all the details of this solution that includes an especially developed sensor textile for cut detection, a protective textile layer for intrusion prevention, an universal-charging-unit for energy harvesting from diverse sources and a low-energy alarm system with GSM/GPRS connection, GPS location and RFID interface.Keywords: cargo-bike, cut-detection, e-bike, energy-harvesting, green urban mobility, logistics, smart-textiles, textile-integrity sensor
Procedia PDF Downloads 31564 Detection of Cyberattacks on the Metaverse Based on First-Order Logic
Authors: Sulaiman Al Amro
Abstract:
There are currently considerable challenges concerning data security and privacy, particularly in relation to modern technologies. This includes the virtual world known as the Metaverse, which consists of a virtual space that integrates various technologies and is therefore susceptible to cyber threats such as malware, phishing, and identity theft. This has led recent studies to propose the development of Metaverse forensic frameworks and the integration of advanced technologies, including machine learning for intrusion detection and security. In this context, the application of first-order logic offers a formal and systematic approach to defining the conditions of cyberattacks, thereby contributing to the development of effective detection mechanisms. In addition, formalizing the rules and patterns of cyber threats has the potential to enhance the overall security posture of the Metaverse and, thus, the integrity and safety of this virtual environment. The current paper focuses on the primary actions employed by avatars for potential attacks, including Interval Temporal Logic (ITL) and behavior-based detection to detect an avatar’s abnormal activities within the Metaverse. The research established that the proposed framework attained an accuracy of 92.307%, resulting in the experimental results demonstrating the efficacy of ITL, including its superior performance in addressing the threats posed by avatars within the Metaverse domain.Keywords: security, privacy, metaverse, cyberattacks, detection, first-order logic
Procedia PDF Downloads 40