Search results for: unauthorized textures
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 177

Search results for: unauthorized textures

87 Intrusion Detection in Computer Networks Using a Hybrid Model of Firefly and Differential Evolution Algorithms

Authors: Mohammad Besharatloo

Abstract:

Intrusion detection is an important research topic in network security because of increasing growth in the use of computer network services. Intrusion detection is done with the aim of detecting the unauthorized use or abuse in the networks and systems by the intruders. Therefore, the intrusion detection system is an efficient tool to control the user's access through some predefined regulations. Since, the data used in intrusion detection system has high dimension, a proper representation is required to show the basis structure of this data. Therefore, it is necessary to eliminate the redundant features to create the best representation subset. In the proposed method, a hybrid model of differential evolution and firefly algorithms was employed to choose the best subset of properties. In addition, decision tree and support vector machine (SVM) are adopted to determine the quality of the selected properties. In the first, the sorted population is divided into two sub-populations. These optimization algorithms were implemented on these sub-populations, respectively. Then, these sub-populations are merged to create next repetition population. The performance evaluation of the proposed method is done based on KDD Cup99. The simulation results show that the proposed method has better performance than the other methods in this context.

Keywords: intrusion detection system, differential evolution, firefly algorithm, support vector machine, decision tree

Procedia PDF Downloads 91
86 Nuclear Terrorism Decision Making: A Comparative Study of South Asian Nuclear Weapons States

Authors: Muhammad Jawad Hashmi

Abstract:

The idea of nuclear terrorism is as old as nuclear weapons but the global concerns of likelihood of nuclear terrorism are uncertain. Post 9/11 trends manifest that terrorists are believers of massive causalities. Innovation in terrorist’s tactics, sophisticated weaponry, vulnerability, theft and smuggling of nuclear/radiological material, connections between terrorists, black market and rough regimes are signaling seriousness of upcoming challenges as well as global trends of “terror-transnationalism.” Furthermore, the International-Atomic-Energy-Agency’s database recorded 2734 incidents regarding misuse, unauthorized possession, trafficking of nuclear material etc. Since, this data also includes incidents from south Asia, so, there is every possibility to claim that such illicit activities may increase in future, mainly due to expansion of nuclear industry in South Asia. Moreover, due to such mishaps the region is vulnerable to threats of nuclear terrorism. This is also a reason that the region is in limelight along with issues such as rapidly growing nuclear arsenals, nuclear safety and security, terrorism and political instability. With this backdrop, this study is aimed to investigate the prevailing threats and challenges in South Asia vis a vis nuclear safety and security. A comparative analysis of the overall capabilities would be done to identify the areas of cooperation to eliminate the probability of nuclear/radiological terrorism in the region.

Keywords: nuclear terrorism, safety, security, South Asia, india, Pakistan

Procedia PDF Downloads 354
85 Malware Beaconing Detection by Mining Large-scale DNS Logs for Targeted Attack Identification

Authors: Andrii Shalaginov, Katrin Franke, Xiongwei Huang

Abstract:

One of the leading problems in Cyber Security today is the emergence of targeted attacks conducted by adversaries with access to sophisticated tools. These attacks usually steal senior level employee system privileges, in order to gain unauthorized access to confidential knowledge and valuable intellectual property. Malware used for initial compromise of the systems are sophisticated and may target zero-day vulnerabilities. In this work we utilize common behaviour of malware called ”beacon”, which implies that infected hosts communicate to Command and Control servers at regular intervals that have relatively small time variations. By analysing such beacon activity through passive network monitoring, it is possible to detect potential malware infections. So, we focus on time gaps as indicators of possible C2 activity in targeted enterprise networks. We represent DNS log files as a graph, whose vertices are destination domains and edges are timestamps. Then by using four periodicity detection algorithms for each pair of internal-external communications, we check timestamp sequences to identify the beacon activities. Finally, based on the graph structure, we infer the existence of other infected hosts and malicious domains enrolled in the attack activities.

Keywords: malware detection, network security, targeted attack, computational intelligence

Procedia PDF Downloads 263
84 Methods for Restricting Unwanted Access on the Networks Using Firewall

Authors: Bhagwant Singh, Sikander Singh Cheema

Abstract:

This paper examines firewall mechanisms routinely implemented for network security in depth. A firewall can't protect you against all the hazards of unauthorized networks. Consequently, many kinds of infrastructure are employed to establish a secure network. Firewall strategies have already been the subject of significant analysis. This study's primary purpose is to avoid unnecessary connections by combining the capability of the firewall with the use of additional firewall mechanisms, which include packet filtering and NAT, VPNs, and backdoor solutions. There are insufficient studies on firewall potential and combined approaches, but there aren't many. The research team's goal is to build a safe network by integrating firewall strength and firewall methods. The study's findings indicate that the recommended concept can form a reliable network. This study examines the characteristics of network security and the primary danger, synthesizes existing domestic and foreign firewall technologies, and discusses the theories, benefits, and disadvantages of different firewalls. Through synthesis and comparison of various techniques, as well as an in-depth examination of the primary factors that affect firewall effectiveness, this study investigated firewall technology's current application in computer network security, then introduced a new technique named "tight coupling firewall." Eventually, the article discusses the current state of firewall technology as well as the direction in which it is developing.

Keywords: firewall strategies, firewall potential, packet filtering, NAT, VPN, proxy services, firewall techniques

Procedia PDF Downloads 98
83 A Systematic Literature Review on Security and Privacy Design Patterns

Authors: Ebtehal Aljedaani, Maha Aljohani

Abstract:

Privacy and security patterns are both important for developing software that protects users' data and privacy. Privacy patterns are designed to address common privacy problems, such as unauthorized data collection and disclosure. Security patterns are designed to protect software from attack and ensure reliability and trustworthiness. Using privacy and security patterns, software engineers can implement security and privacy by design principles, which means that security and privacy are considered throughout the software development process. These patterns are available to translate "security & privacy-by-design" into practical advice for software engineering. Previous research on privacy and security patterns has typically focused on one category of patterns at a time. This paper aims to bridge this gap by merging the two categories and identifying their similarities and differences. To do this, the authors conducted a systematic literature review of 25 research papers on privacy and security patterns. The papers were analysed based on the category of the pattern, the classification of the pattern, and the security requirements that the pattern addresses. This paper presents the results of a comprehensive review of privacy and security design patterns. The review is intended to help future IT designers understand the relationship between the two types of patterns and how to use them to design secure and privacy-preserving software. The paper provides a clear classification of privacy and security design patterns, along with examples of each type. The authors found that there is only one widely accepted classification of privacy design patterns, while there are several competing classifications of security design patterns. Three types of security design patterns were found to be the most commonly used.

Keywords: design patterns, security, privacy, classification of patterns, security patterns, privacy patterns

Procedia PDF Downloads 129
82 Computer-Aided Classification of Liver Lesions Using Contrasting Features Difference

Authors: Hussein Alahmer, Amr Ahmed

Abstract:

Liver cancer is one of the common diseases that cause the death. Early detection is important to diagnose and reduce the incidence of death. Improvements in medical imaging and image processing techniques have significantly enhanced interpretation of medical images. Computer-Aided Diagnosis (CAD) systems based on these techniques play a vital role in the early detection of liver disease and hence reduce liver cancer death rate.  This paper presents an automated CAD system consists of three stages; firstly, automatic liver segmentation and lesion’s detection. Secondly, extracting features. Finally, classifying liver lesions into benign and malignant by using the novel contrasting feature-difference approach. Several types of intensity, texture features are extracted from both; the lesion area and its surrounding normal liver tissue. The difference between the features of both areas is then used as the new lesion descriptors. Machine learning classifiers are then trained on the new descriptors to automatically classify liver lesions into benign or malignant. The experimental results show promising improvements. Moreover, the proposed approach can overcome the problems of varying ranges of intensity and textures between patients, demographics, and imaging devices and settings.

Keywords: CAD system, difference of feature, fuzzy c means, lesion detection, liver segmentation

Procedia PDF Downloads 323
81 Supercomputer Simulation of Magnetic Multilayers Films

Authors: Vitalii Yu. Kapitan, Aleksandr V. Perzhu, Konstantin V. Nefedev

Abstract:

The necessity of studying magnetic multilayer structures is explained by the prospects of their practical application as a technological base for creating new storages medium. Magnetic multilayer films have many unique features that contribute to increasing the density of information recording and the speed of storage devices. Multilayer structures are structures of alternating magnetic and nonmagnetic layers. In frame of the classical Heisenberg model, lattice spin systems with direct short- and long-range exchange interactions were investigated by Monte Carlo methods. The thermodynamic characteristics of multilayer structures, such as the temperature behavior of magnetization, energy, and heat capacity, were investigated. The processes of magnetization reversal of multilayer structures in external magnetic fields were investigated. The developed software is based on the new, promising programming language Rust. Rust is a new experimental programming language developed by Mozilla. The language is positioned as an alternative to C and C++. For the Monte Carlo simulation, the Metropolis algorithm and its parallel implementation using MPI and the Wang-Landau algorithm were used. We are planning to study of magnetic multilayer films with asymmetric Dzyaloshinskii–Moriya (DM) interaction, interfacing effects and skyrmions textures. This work was supported by the state task of the Ministry of Education and Science of the Russia # 3.7383.2017/8.9

Keywords: The Monte Carlo methods, Heisenberg model, multilayer structures, magnetic skyrmion

Procedia PDF Downloads 164
80 Deposit Characteristics of Jakarta, Indonesia: A Stratigraphy Study of Jakarta Subsurface

Authors: Girlly Marchlina Listyono, Abdurrokhim Abdurrokhim, Emi Sukiyah, Pulung Arya Pranantya

Abstract:

Jakarta Area is composed by deposit which has various lithology characteristics. Based on its lithology types, colors, textures, mineral dan organic content from 22 wells scattered on Jakarta, lithofacies analysis and intra-wells data correlation can be done. From the analysis, it can be interpretated that Jakarta deposit deposited in marine, transition and terrestrial depositional environments. Terrestrial deposit characterized by domination of relatively coarse clastics and content of remaining roots, woods, plants, high content of quartz, lithic fragment, calcareous and oxidated appearace. The thickness of terrestrial deposit is thickening to south. Transitional deposit characterized by fine to medium clastics with dark color, high content of organic matter, various thickness in any ways. Marine deposit characterized by finer clastics, contain remain of shells, fosil, coral, limestone fragments, glauconites, calcareous. Marine deposit relatively thickening to north. Those lateral variety caused by tectonic, subsidence and stratigraphic condition. Deposition of Jakarta deposit from the data research was started on marine depositional environment which surrounded by the event of cycle of regression and transgression then ended with regression which ongoing until form shore line in north Jakarta nowadays.

Keywords: deposit, Indonesia, Jakarta, sediment, stratigraphy

Procedia PDF Downloads 253
79 Synthesis and Characterization of New Thermotropic Monomers – Containing Phosphorus

Authors: Diana Serbezeanu, Ionela-Daniela Carja, Tachita Vlad-Bubulac, Sergiu Sova

Abstract:

New phosphorus-containing monomers having methoxy end functional groups were prepared from methyl 4-hydroxybenzoate and two different dichlorides with phosphorus, namely phenyl phosphonic dichloride and phenyl dichlorophosphate. The structures of the monomers were confirmed by FTIR and NMR spectroscopy. The assignments for the 1H, 13C and 31P chemical shifts are based on 1D and 2D NMR homo- and heteronuclear correlations (H,H-COSY (Correlation Spectroscopy), H,C-HMQC (Heteronuclear Multiple Quantum Correlation and H,C-HMBC (Heteronuclear Multiple Bond Correlation)) and 31P-13C couplings. The monomers exhibited good solubility in common organic solvents. Dimethyl sulfoxide was to be a good solvent to grow crystals of considerable size which were investigated by X-ray analysis. One of these two new monomers presented thermotropic liquid crystalline behaviour, as revealed by differential scanning calorimetry (DSC), polarized light microscopy (PLM) and X-ray diffraction (XRD). The transition temperature from crystal to liquid crystalline state (K→LC) was 143°C and from the LC to isotropic state (LC→I) was 167°C. Upon heating, bis(4-(methoxycarbonyl)phenyl formed fine textures, difficult to be ascribed to smectic or nematic phases. Upon cooling from the isotropic state, bis(4-(methoxycarbonyl)phenyl exhibited a mosaic-type texture. X-ray diffraction measurements at small angles (SAXS) of bis(4-(methoxycarbonyl)phenyl showed two peaks at 1.8 Å and 3.5 Å, respectively suggesting organization at supramolecular level.

Keywords: phosphorus-containing monomers, polarized light microscopy, structure investigation, thermotropic liquid crystalline properties

Procedia PDF Downloads 298
78 Assessing the Impact of Human Behaviour on Water Resource Systems Performance: A Conceptual Framework

Authors: N. J. Shanono, J. G. Ndiritu

Abstract:

The poor performance of water resource systems (WRS) has been reportedly linked to not only climate variability and the water demand dynamics but also human behaviour-driven unlawful activities. Some of these unlawful activities that have been adversely affecting water sector include unauthorized water abstractions, water wastage behaviour, refusal of water re‐use measures, excessive operational losses, discharging untreated or improperly treated wastewater, over‐application of chemicals by agricultural users and fraudulent WRS operation. Despite advances in WRS planning, operation, and analysis incorporating such undesirable human activities to quantitatively assess their impact on WRS performance remain elusive. This study was then inspired by the need to develop a methodological framework for WRS performance assessment that integrates the impact of human behaviour with WRS performance assessment analysis. We, therefore, proposed a conceptual framework for assessing the impact of human behaviour on WRS performance using the concept of socio-hydrology. The framework identifies and couples four major sources of WRS-related values (water values, water systems, water managers, and water users) using three missing links between human and water in the management of WRS (interactions, outcomes, and feedbacks). The framework is to serve as a database for choosing relevant social and hydrological variables and to understand the intrinsic relations between the selected variables to study a specific human-water problem in the context of WRS management.

Keywords: conceptual framework, human behaviour; socio-hydrology; water resource systems

Procedia PDF Downloads 133
77 Investigating the Environmental Impact of Tourists Activities on Yankari Resort and Safari

Authors: Eldah Ephraim Buba, Sanusi Abubakar Sadiq

Abstract:

Habitat can be degraded by tourism leisure activities for example wildlife viewing can bring abrupt stress for animals and alter their natural behaviors when tourist come too close and wildlife watching have degradation effects on the habitats as they often are accompanied by the noise and commotion created by tourist as they chase wild animals. It is observed that Jos Wild Life Park is usually congested during on-peak periods which causes littering and contamination of the environment by tourist which may lead to changes in the soil nutrient. The issue of unauthorized feeding of animals by a tourist in which the food might be dangerous and harmful to their health and making them be so aggressive is also observed. The aim of the study is to investigate the environmental impact of tourists’ activities in Jos Wild Life Park, Nigeria. The study used survey questionnaires to both tourists and the staff of the wildlife park. One hundred questionnaires were self-administered to randomly selected tourists as the visit the park and some staff. The average mean score of the response was used to show agreement or disagreement. Major findings show the negative impact of tourist’s activities to the environment as air pollution, overcrowding, and congestion, solid littering of the environment, distress to animals and alteration of the ecosystem. Furthermore, the study found the positive impact of tourists activities on the environment to be income generation through tourists activities and infrastructural development. It is recommended that the impact of tourism should be minimized through admitting the right carrying capacity and impact assessment.

Keywords: environmental, impact, investigation, tourists, activities

Procedia PDF Downloads 356
76 Texturing of Tool Insert Using Femtosecond Laser

Authors: Ashfaq Khan, Aftab Khan, Mushtaq Khan, Sarem Sattar, Mohammad A Sheikh, Lin Li

Abstract:

Chip removal processes are one of key processes of the manufacturing industry where chip removal is conducted by tool inserts of exceptionally hard materials. Tungsten carbide has been extensively used as tool insert for machining processes involving chip removal processes. These hard materials are generally fabricated by single step sintering process as further modification after fabrication in these materials cannot be done easily. Advances in tool surface modification have revealed that advantages such as improved tribological properties and extended tool life can be harnessed from the same tool by texturing the tool rake surface. Moreover, it has been observed that the shape and location of the texture also influences the behavior. Although texturing offers plentiful advantages the challenge lies in the generation of textures on the tool surface. Extremely hard material such as diamond is required to process tungsten carbide. Laser is unique processing tool that does not have a physical contact with the material and thus does not wear. In this research the potential of utilizing laser for texturing of tungsten carbide to develop custom features would be studied. A parametric study of texturing of Tungsten Carbide with a femtosecond laser would be conducted to investigate the process parameters and establish the feasible processing window. The effect of fluence, scan speed and number of repetition would be viewed in detail. Moreover, the mechanism for the generation of features would also be reviewed.

Keywords: laser, texturing, femtosecond, tungsten carbide

Procedia PDF Downloads 656
75 Automatic Multi-Label Image Annotation System Guided by Firefly Algorithm and Bayesian Method

Authors: Saad M. Darwish, Mohamed A. El-Iskandarani, Guitar M. Shawkat

Abstract:

Nowadays, the amount of available multimedia data is continuously on the rise. The need to find a required image for an ordinary user is a challenging task. Content based image retrieval (CBIR) computes relevance based on the visual similarity of low-level image features such as color, textures, etc. However, there is a gap between low-level visual features and semantic meanings required by applications. The typical method of bridging the semantic gap is through the automatic image annotation (AIA) that extracts semantic features using machine learning techniques. In this paper, a multi-label image annotation system guided by Firefly and Bayesian method is proposed. Firstly, images are segmented using the maximum variance intra cluster and Firefly algorithm, which is a swarm-based approach with high convergence speed, less computation rate and search for the optimal multiple threshold. Feature extraction techniques based on color features and region properties are applied to obtain the representative features. After that, the images are annotated using translation model based on the Net Bayes system, which is efficient for multi-label learning with high precision and less complexity. Experiments are performed using Corel Database. The results show that the proposed system is better than traditional ones for automatic image annotation and retrieval.

Keywords: feature extraction, feature selection, image annotation, classification

Procedia PDF Downloads 584
74 Visual Inspection of Road Conditions Using Deep Convolutional Neural Networks

Authors: Christos Theoharatos, Dimitris Tsourounis, Spiros Oikonomou, Andreas Makedonas

Abstract:

This paper focuses on the problem of visually inspecting and recognizing the road conditions in front of moving vehicles, targeting automotive scenarios. The goal of road inspection is to identify whether the road is slippery or not, as well as to detect possible anomalies on the road surface like potholes or body bumps/humps. Our work is based on an artificial intelligence methodology for real-time monitoring of road conditions in autonomous driving scenarios, using state-of-the-art deep convolutional neural network (CNN) techniques. Initially, the road and ego lane are segmented within the field of view of the camera that is integrated into the front part of the vehicle. A novel classification CNN is utilized to identify among plain and slippery road textures (e.g., wet, snow, etc.). Simultaneously, a robust detection CNN identifies severe surface anomalies within the ego lane, such as potholes and speed bumps/humps, within a distance of 5 to 25 meters. The overall methodology is illustrated under the scope of an integrated application (or system), which can be integrated into complete Advanced Driver-Assistance Systems (ADAS) systems that provide a full range of functionalities. The outcome of the proposed techniques present state-of-the-art detection and classification results and real-time performance running on AI accelerator devices like Intel’s Myriad 2/X Vision Processing Unit (VPU).

Keywords: deep learning, convolutional neural networks, road condition classification, embedded systems

Procedia PDF Downloads 133
73 The Impact Of The Covid-19 Lockdown On Solid Waste Pollution And Environmental Hazard. A Blessing In Disguise? A Case Of Liberia

Authors: Eric Berry White

Abstract:

The paper examines the causality between solid waste pollution and lockdown. Particularly in 2020, the world experiences the takeover of the Corona virus pandemic, and most countries decided to adopt lockdown measure as the best solution to curtail the spread of the virus. On March 20, 2020, the Government of Liberia implemented a curfew that starts from 3:00PM to 6:00AM. This means that no unauthorized person is allowed to be in the streets during this time. In most developing countries, the issue of public waste and environmental hazard pollution tend to have a high effect among the slum communities where there are markets. This research covers 6 slums communities around the two biggest market hubs within Monrovia, and the result shows that the lockdown measure significantly reduced public waste pollution by reducing the movement of marketers in slum communities , where limited educational and sensitization for young people is reflected on their job market exclusion, jobless circle, and youth workforce concentration in informal work market. The study discovered that with public awareness and sensitization with females, solid waste could be reduced by 13 percentage point. But there is no evidence that awareness among male conduce pollution. within affected communities, Despite the impact of the lockdown on food consumption, these results emphasized that with the right monitoring of waste and aware, pollution could be reduce. By understanding these results and implementing the best policy, the paper recommends that dump sites be close at certain hours.

Keywords: lockdown, environmental, pollution, waste

Procedia PDF Downloads 79
72 Evaluation of Traditional Housing Texture in Context of Sustainability

Authors: Esra Yaldız, Dicle Aydın

Abstract:

Sustainability is a term that provides deciding about the future considering environment and investigates the harmony and balance between protection and usage of the resource. The main objective of sustainability is creating residential areas is nature compatible or providing continuance thereby adapting existing residential area to nature. In this context, historical and traditional areas must have utilized according to sustainability. Traditional housing texture are identified as a traditional architectural product has been designed based on this term. General characteristics of traditional housing within the context of sustainable architecture are their specific dynamics and components and their harmonisation of environment and nature. Owing to the fact that traditional housing texture harmonizes natural conditions of the region, topography, climate and their context, construction materials are provided from environment and traditional techniques and their forms are used and due to construction materials has natural insulation traditional housing create healthy and comfortable living environment, traditional housing is rather significant in terms of sustainable architecture. The basis of this study comprise the routers in traditional housing design in accordance with the principles of sustainability. These are, accommodating topography, climate, and geography, accessibility, structuring at the scale of human, utilization of green zones, unique to the region used construction materials, the form of construction, building envelope and space organization of dwelling. In this context, the purpose of this study is that vernacular architecture approaches of traditional housing textures which are in Central Anatolia Region Located in Anatolia are utilized with regard to sustainability.

Keywords: Anatolia, sustainability, traditional housing texture, vernacular architecture

Procedia PDF Downloads 452
71 The Design of Smart Tactile Textiles for Therapeutic Applications

Authors: Karen Hong

Abstract:

Smart tactile textiles are a series of textile-based products that incorporates smart embedded technology to be utilized as tactile therapeutic applications for 2 main groups of target users. The first group of users will be children with sensory processing disorder who are suffering from tactile sensory dysfunction. Children with tactile sensory issues may have difficulty tolerating the sensations generated from the touch of certain textures on the fabrics. A series of smart tactile textiles, collectively known as ‘Tactile Toys’ are developed as tactile therapy play objects, exposing children to different types of touch sensations within textiles, enabling them to enjoy tactile experiences together with interactive play which will help them to overcome fear of certain touch sensations. The second group of users will be the elderly or geriatric patients who are suffering from deteriorating sense of touch. One of the common consequences of aging is suffering from deteriorating sense of touch and a decline in motoric function. With the focus in stimulating the sense of touch for this particular group of end users, another series of smart tactile textiles, collectively known as ‘Tactile Aids’ are developed also as tactile therapy. This range of products can help to maintain touch sensitivity and at the same time allowing the elderly to enjoy interactive play to practice their hand-eye coordination and enhancing their motor skills. These smart tactile textile products are being designed and tested out by the end users and have proofed their efficacy as tactile therapy enabling the users to lead a better quality of life.

Keywords: smart textiles, embedded technology, tactile therapy, tactile aids, tactile toys

Procedia PDF Downloads 175
70 Removal of Lead (Pb) by the Microorganism Isolated from the Effluent of Lead Acid Battery Scrap

Authors: Harikrishna Yadav Nanganuru, Narasimhulu Korrapati

Abstract:

The demand for the lead (Pb) in the battery industry has been growing for last twenty years. On an average about 2.35 million tons of lead is used in the battery industry. According to the survey of supply and demand battery industry is using 75% of lead produced every year. Due to the increase in battery scrap, secondary lead production has been increasing in this decade. Europe and USA together account for 75% of the world’s secondary lead production. The effluent from used battery scrap consists of high concentrations of lead. Unauthorized disposal of spent batteries, which contain intolerable concentration of lead, into landfills or municipal water canals causes release of Pb into the environment. Lead is one of the toxic heavy metals that have large damaging effects on the human health. Due to its persistence and toxicity, the presence of Pb in drinking water is considered as a special concern. Accumulation of Pb in the human body for long period of time can result in the malfunctioning of some organs. Many technologies have been developed for the removal of lead using microorganisms. In this paper, effluent was taken from the spent battery scrap and was characterized by inductively coupled plasma atomic emission spectrometer. Microorganisms play an important role in removal of lead from the contaminated sites. So, the bacteria were isolated from the effluent. Optimum conditions for the microbial growth and applied for the lead removal. These bacterial cells were immobilized and used for the removal of Pb from the known concentration of metal solution. Scanning electron microscopic (SEM) studies were shown that the Pb was efficiently adsorbed by the immobilized bacteria. From the results of Atomic Absorption Spectroscopy (AAS), 83.40 percentage of Pb was removed in a batch culture.

Keywords: adsorption, effluent, immobilization, lead (Pb)

Procedia PDF Downloads 454
69 Urban Neighborhood Center Location Evaluating Method Based On UNA the GIS Spatial Analysis Tools: Kerman's Neighborhood in Tehran Case

Authors: Sepideh Jabbari Behnam, Shadabeh Gashtasbi Iraei, Elnaz Mohsenin, MohammadAli Aghajani

Abstract:

Urban neighborhoods, as important urban forming cells, play a key role in creating urban texture and integrated form. Nowadays, most of neighborhood divisions are based on urban management systems but without considering social issues and the other aspects of urban life. This can cause problems such as providing inappropriate services for city dwellers, the loss of local identity and etc. In this regard for regenerating of such neighborhoods, it is essential to locate neighborhood centers with appropriate access and services for all residents. The main objective of this article is reaching to the location of neighborhood centers in a way that, most of issues relating to the physical features (such as the form of access network and texture permeability and etc.) and other qualities such as land uses, densities and social and economic features can be done simultaneously. This paper attempts to use methods of spatial analysis in order to surveying spatial structure and space syntax of urban textures and Urban Network Analysis Systems. This can be done by one of GIS toolbars which is named UNA (Urban Network Analysis) with the use of its five functions (include: Reach, Betweenness, Gravity, Closeness, Straightness).These functions were written according to space syntax theory and offer its relating output. This paper tries to locate and evaluate the optimal location of neighborhood centers in order to create local centers. This is done through weighing of each of these functions and taking into account of spatial features.

Keywords: evaluate optimal location, Local centers, location of neighborhood centers, Spatial analysis, Urban network

Procedia PDF Downloads 462
68 Modeling of Thermo Acoustic Emission Memory Effect in Rocks of Varying Textures

Authors: Vladimir Vinnikov

Abstract:

The paper proposes a model of an inhomogeneous rock mass with initially random distribution of microcracks on mineral grain boundaries. It describes the behavior of cracks in a medium under the effect of thermal field, the medium heated instantaneously to a predetermined temperature. Crack growth occurs according to the concept of fracture mechanics provided that the stress intensity factor K exceeds the critical value of Kc. The modeling of thermally induced acoustic emission memory effects is based on the assumption that every event of crack nucleation or crack growth caused by heating is accompanied with a single acoustic emission event. Parameters of the thermally induced acoustic emission memory effect produced by cyclic heating and cooling (with the temperature amplitude increasing from cycle to cycle) were calculated for several rock texture types (massive, banded, and disseminated). The study substantiates the adaptation of the proposed model to humidity interference with the thermally induced acoustic emission memory effect. The influence of humidity on the thermally induced acoustic emission memory effect in quasi-homogeneous and banded rocks is estimated. It is shown that such modeling allows the structure and texture of rocks to be taken into account and the influence of interference factors on the distinctness of the thermally induced acoustic emission memory effect to be estimated. The numerical modeling can be used to obtain information about the thermal impacts on rocks in the past and determine the degree of rock disturbance by means of non-destructive testing.

Keywords: crack growth, cyclic heating and cooling, rock texture, thermo acoustic emission memory effect

Procedia PDF Downloads 270
67 Intrusion Detection in Cloud Computing Using Machine Learning

Authors: Faiza Babur Khan, Sohail Asghar

Abstract:

With an emergence of distributed environment, cloud computing is proving to be the most stimulating computing paradigm shift in computer technology, resulting in spectacular expansion in IT industry. Many companies have augmented their technical infrastructure by adopting cloud resource sharing architecture. Cloud computing has opened doors to unlimited opportunities from application to platform availability, expandable storage and provision of computing environment. However, from a security viewpoint, an added risk level is introduced from clouds, weakening the protection mechanisms, and hardening the availability of privacy, data security and on demand service. Issues of trust, confidentiality, and integrity are elevated due to multitenant resource sharing architecture of cloud. Trust or reliability of cloud refers to its capability of providing the needed services precisely and unfailingly. Confidentiality is the ability of the architecture to ensure authorization of the relevant party to access its private data. It also guarantees integrity to protect the data from being fabricated by an unauthorized user. So in order to assure provision of secured cloud, a roadmap or model is obligatory to analyze a security problem, design mitigation strategies, and evaluate solutions. The aim of the paper is twofold; first to enlighten the factors which make cloud security critical along with alleviation strategies and secondly to propose an intrusion detection model that identifies the attackers in a preventive way using machine learning Random Forest classifier with an accuracy of 99.8%. This model uses less number of features. A comparison with other classifiers is also presented.

Keywords: cloud security, threats, machine learning, random forest, classification

Procedia PDF Downloads 319
66 Analysis of Kilistra (Gokyurt) Settlement within the Context of Traditional Residential Architecture

Authors: Esra Yaldız, Tugba Bulbul Bahtiyar, Dicle Aydın

Abstract:

Humans meet their need for shelter via housing which they structure in line with habits and necessities. In housing culture, traditional dwelling has an important role as a social and cultural transmitter. It provides concrete data by being planned in parallel with users’ life style and habits, having their own dynamics and components as well as their designs in harmony with nature, environment and the context they exist. Textures of traditional dwelling create a healthy and cozy living environment by means of adaptation to natural conditions, topography, climate, and context; utilization of construction materials found nearby and usage of traditional techniques and forms; and natural isolation of construction materials used. One of the examples of traditional settlements in Anatolia is Kilistra (Gökyurt) settlement of Konya province. Being among the important centers of Christianity in the past, besides having distinctive architecture, culture, natural features, and geographical differences (climate, geological structure, material), Kilistra can also be identified as a traditional settlement consisting of family, religious and economic structures as well as cultural interaction. The foundation of this study is the traditional residential texture of Kilistra with its unique features. The objective of this study is to assess the conformity of traditional residential texture of Kilistra with present topography, climatic data, and geographical values within the context of human scale construction, usage of green space, indigenous construction materials, construction form, building envelope, and space organization in housing.

Keywords: traditional residential architecture, Kilistra, Anatolia, Konya

Procedia PDF Downloads 410
65 Mobile Number Portability

Authors: R. Geetha, J. Arunkumar, P. Gopal, D. Loganathan, K. Pavithra, C. Vikashini

Abstract:

Mobile Number Portability is an attempt to switch over from one network to another network facility for mobile based on applications. This facility is currently not available for mobile handsets. This application is intended to assist the mobile network and its service customers in understanding the criteria; this will serve as a universal set of requirements which must be met by the customers. This application helps the user's network portability. Accessing permission from the network provider to enable services to the user and utilizing the available network signals. It is enabling the user to make a temporary switch over to other network. The main aim of this research work is to adapt multiple networks at the time of no network coverage. It can be accessed at rural and geographical areas. This can be achieved by this mobile application. The application is capable of temporary switch over between various networks. With this application both the service provider and the network user are benefited. The service provider is benefited by charging a minimum cost for utilizing other network. It provides security in terms of password that is unique to avoid unauthorized users and to prevent loss of balance. The goal intended to be attained is a complete utilization of available network at significant situations and to provide feature that satisfy the customer needs. The temporary switch over is done to manage emergency calls when user is in rural or geographical area, where there will be a very low network coverage. Since people find it trend in using Android mobile, this application is designed as an Android applications, which can be freely downloaded and installed from Play store. In the current scenario, the service provider enables the user to change their network without shifting their mobile network. This application affords a clarification for users while they are jammed in a critical situation. This application is designed by using Android 4.2 and SQLite Version3.

Keywords: mobile number, random number, alarm, imei number, call

Procedia PDF Downloads 361
64 Applied Spatial Mapping and Monitoring of Illegal Landfills for Deprived Urban Areas in Romania

Authors: Șercăianu Mihai, Aldea Mihaela, Iacoboaea Cristina, Luca Oana, Nenciu Ioana

Abstract:

The rise and mitigation of unauthorized illegal waste dumps are a significant global issue within waste management ecosystems, impacting disadvantaged communities. Globally, including in Romania, many individuals live in houses without legal recognition, lacking ownership or construction permits, in areas known as "informal settlements." An increasing number of regions and cities in Romania are struggling to manage their illegal waste dumps, especially in the context of increasing poverty and lack of regulation related to informal settlements. One such informal settlement is located at the end of Bistra Street in Câlnic, within the Reșița Municipality of Caras Severin County. The article presents a case study that focuses on employing remote sensing techniques and spatial data to monitor and map illegal waste practices, with subsequent integration into a geographic information system tailored for the Reșița community. In addition, the paper outlines the steps involved in devising strategies aimed at enhancing waste management practices in disadvantaged areas, aligning with the shift toward a circular economy. Results presented in the paper contain a spatial mapping and visualization methodology calibrated with in situ data collection applicable for identifying illegal landfills. The emergence and neutralization of illegal dumps pose a challenge in the field of waste management. These approaches, which prove effective where conventional solutions have failed, need to be replicated and adopted more wisely.

Keywords: informal settlements, GIS, waste dumps, waste management, monitoring

Procedia PDF Downloads 86
63 Non-Revenue Water Management in Palestine

Authors: Samah Jawad Jabari

Abstract:

Water is the most important and valuable resource not only for human life but also for all living things on the planet. The water supply utilities should fulfill the water requirement quantitatively and qualitatively. Drinking water systems are exposed to both natural (hurricanes and flood) and manmade hazards (risks) that are common in Palestine. Non-Revenue Water (NRW) is a manmade risk which remains a major concern in Palestine, as the NRW levels are estimated to be at a high level. In this research, Hebron city water distribution network was taken as a case study to estimate and audit the NRW levels. The research also investigated the state of the existing water distribution system in the study area by investigating the water losses and obtained more information on NRW prevention and management practices. Data and information have been collected from the Palestinian Water Authority (PWA) and Hebron Municipality (HM) archive. In addition to that, a questionnaire has been designed and administered by the researcher in order to collect the necessary data for water auditing. The questionnaire also assessed the views of stakeholder in PWA and HM (staff) on the current status of the NRW in the Hebron water distribution system. The important result obtained by this research shows that NRW in Hebron city was high and in excess of 30%. The main factors that contribute to NRW were the inaccuracies in billing volumes, unauthorized consumption, and the method of estimating consumptions through faulty meters. Policy for NRW reduction is available in Palestine; however, it is clear that the number of qualified staff available to carry out the activities related to leak detection is low, and that there is a lack of appropriate technologies to reduce water losses and undertake sufficient system maintenance, which needs to be improved to enhance the performance of the network and decrease the level of NRW losses.

Keywords: non-revenue water, water auditing, leak detection, water meters

Procedia PDF Downloads 296
62 Security Issues on Smart Grid and Blockchain-Based Secure Smart Energy Management Systems

Authors: Surah Aldakhl, Dafer Alali, Mohamed Zohdy

Abstract:

The next generation of electricity grid infrastructure, known as the "smart grid," integrates smart ICT (information and communication technology) into existing grids in order to alleviate the drawbacks of existing one-way grid systems. Future power systems' efficiency and dependability are anticipated to significantly increase thanks to the Smart Grid, especially given the desire for renewable energy sources. The security of the Smart Grid's cyber infrastructure is a growing concern, though, as a result of the interconnection of significant power plants through communication networks. Since cyber-attacks can destroy energy data, beginning with personal information leaking from grid members, they can result in serious incidents like huge outages and the destruction of power network infrastructure. We shall thus propose a secure smart energy management system based on the Blockchain as a remedy for this problem. The power transmission and distribution system may undergo a transformation as a result of the inclusion of optical fiber sensors and blockchain technology in smart grids. While optical fiber sensors allow real-time monitoring and management of electrical energy flow, Blockchain offers a secure platform to safeguard the smart grid against cyberattacks and unauthorized access. Additionally, this integration makes it possible to see how energy is produced, distributed, and used in real time, increasing transparency. This strategy has advantages in terms of improved security, efficiency, dependability, and flexibility in energy management. An in-depth analysis of the advantages and drawbacks of combining blockchain technology with optical fiber is provided in this paper.

Keywords: smart grids, blockchain, fiber optic sensor, security

Procedia PDF Downloads 118
61 Drop Impact Study on Flexible Superhydrophobic Surface Containing Micro-Nano Hierarchical Structures

Authors: Abinash Tripathy, Girish Muralidharan, Amitava Pramanik, Prosenjit Sen

Abstract:

Superhydrophobic surfaces are abundant in nature. Several surfaces such as wings of butterfly, legs of water strider, feet of gecko and the lotus leaf show extreme water repellence behaviour. Self-cleaning, stain-free fabrics, spill-resistant protective wears, drag reduction in micro-fluidic devices etc. are few applications of superhydrophobic surfaces. In order to design robust superhydrophobic surface, it is important to understand the interaction of water with superhydrophobic surface textures. In this work, we report a simple coating method for creating large-scale flexible superhydrophobic paper surface. The surface consists of multiple layers of silanized zirconia microparticles decorated with zirconia nanoparticles. Water contact angle as high as 159±10 and contact angle hysteresis less than 80 was observed. Drop impact studies on superhydrophobic paper surface were carried out by impinging water droplet and capturing its dynamics through high speed imaging. During the drop impact, the Weber number was varied from 20 to 80 by altering the impact velocity of the drop and the parameters such as contact time, normalized spread diameter were obtained. In contrast to earlier literature reports, we observed contact time to be dependent on impact velocity on superhydrophobic surface. Total contact time was split into two components as spread time and recoil time. The recoil time was found to be dependent on the impact velocity while the spread time on the surface did not show much variation with the impact velocity. Further, normalized spreading parameter was found to increase with increase in impact velocity.

Keywords: contact angle, contact angle hysteresis, contact time, superhydrophobic

Procedia PDF Downloads 425
60 Electronic Payment Recording with Payment History Retrieval Module: A System Software

Authors: Adrian Forca, Simeon Cainday III

Abstract:

The Electronic Payment Recording with Payment History Retrieval Module is developed intendedly for the College of Science and Technology. This system software innovates the manual process of recording the payments done in the department through the development of electronic payment recording system software shifting from the slow and time-consuming procedure to quick yet reliable and accurate way of recording payments because it immediately generates receipts for every transaction. As an added feature to its software process, generation of recorded payment report is integrated eliminating the manual reporting to a more easy and consolidated report. As an added feature to the system, all recorded payments of the students can be retrieved immediately making the system transparent and reliable payment recording software. Viewing the whole process, the system software will shift from the manual process to an organized software technology because the information will be stored in a logically correct and normalized database. Further, the software will be developed using the modern programming language and implement strict programming methods to validate all users accessing the system, evaluate all data passed into the system and information retrieved to ensure data accuracy and reliability. In addition, the system will identify the user and limit its access privilege to establish boundaries of the specific access to information allowed for the store, modify, and update making the information secure against unauthorized data manipulation. As a result, the System software will eliminate the manual procedure and replace with an innovative modern information technology resulting to the improvement of the whole process of payment recording fast, secure, accurate and reliable software innovations.

Keywords: collection, information system, manual procedure, payment

Procedia PDF Downloads 162
59 Identify the Risks Factors and Problems of Waste Management in Developing Countries as Hurdles

Authors: Zubair Ahmad

Abstract:

The aim of this study is to analyze the risks factors and issues with waste management in developing nations as barriers. Depending on their content and categorization, wastes are managed differently. Waste management strategies differ for liquid, solid, and organic wastes. The final stage of trash disposal entails procedures like burning, interment, recycling, and treatment. Due to the rising creation of solid waste, the growing urban population has a magnified impact on the environment and public health. All regions, but especially informal urban neighborhoods, tribal villages, and official rural settlements have a protracted backlog in waste services. Another significant impediment seen in the developing world is a lack of education and awareness of effective waste-management practices. Unauthorized dumpsites pose a serious risk to the environment since they could contain dangerous elements like radioactive, infectious, and toxic waste. Wealthier individuals are more inclined to think that their actions will have an impact on environmental problems and to act to address them. Waste managers need to take action to make sure the public is given information that is consistent with what they currently know. The results of the data analysis conducted with the aid of the various methodologies discussed in the preceding chapter are presented in this chapter by the researcher. Descriptive analysis has been used in research to determine whether or not there are relationships between variables and to determine the importance of the variables. According to a survey, there are no efforts being made to lessen the odor that garbage dump sites emit (in terms of treating or recycling the material placed at dumpsite) This might be the case since respondents only commented on the waste management conditions in their immediate surroundings and may not have fully understood the steps taken to resolve this issue.

Keywords: risk factor of waste material, lack of awareness, developing countries struggles, waste management

Procedia PDF Downloads 70
58 The Marketing Development of Cloth Products Woven in Krasaesin, Songkhla Province

Authors: Auntika Thipjumnong

Abstract:

This research study aimed to investigate the production process and the market target of Kraseasin’s woven cloth including the customers’ behaviors towards the local woven products. The suggestions of a better process of production were recommended in this study. This survey research was conducted by using a questionnaire and interview, which were considered as the practical instruments to collect the data. The 200 Kraseasin’s woven makers and consumers were subjects by using a purposive sampling. Percentages, means and standard deviation were used to analyze data. The findings revealed that only 22 local woven members owned their 18 manual weavers in producing the raw materials like cotton or fiber. The main products were flowery woven cloth e.g. pikul, puangchompoo, pakakrong and ban mai roo roiy, and the others were rainy, glass wall, dice glass ball and yok dok etc. At the present, all local woven products were applied to be modernized but the strong point of those products were keeping the quality standard and firming textures, not thickness. The main objective of producing these local woven products was to earn and increase their extra incomes. Moreover, there were two dominant sales: Firstly, the makers sold their own products by themselves in their community and malls; and secondly, they would weave their products by customers’ orders. The prices’ allocation was on the difficulties in producing process. The government officials and non-government officials in local were normally customers. However the drawback of producing this local product was lack of raw material and this brought about the higher investment. The community’s customers were now lacking of interest in wearing these local products, even though they maintained their quality standard. The factors in customers’ purchasing decision were product (M = 3.93), price (M = 3.74), distribution (M = 3.73) and promotion (M = 3.97) for marketing mix well-known. Suggestion was a designing pattern of products had to be matched to the customers’ needs.

Keywords: marketing, consumer behavior, cloth products weaves, Songkhla Thailand

Procedia PDF Downloads 282