Search results for: DDoS distribution flooding intrusion layer
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 7672

Search results for: DDoS distribution flooding intrusion layer

7552 Structural and Optical Characterization of Silica@PbS Core–Shell Nanoparticles

Authors: A. Pourahmad, Sh. Gharipour

Abstract:

The present work describes the preparation and characterization of nanosized SiO2@PbS core-shell particles by using a simple wet chemical route. This method utilizes silica spheres formation followed by successive ionic layer adsorption and reaction method assisted lead sulphide shell layer formation. The final product was characterized by X-ray diffraction (XRD), scanning electron microscopy (SEM), UV–vis spectroscopic, infrared spectroscopy (IR) and transmission electron microscopy (TEM) experiments. The morphological studies revealed the uniformity in size distribution with core size of 250 nm and shell thickness of 18 nm. The electron microscopic images also indicate the irregular morphology of lead sulphide shell layer. The structural studies indicate the face-centered cubic system of PbS shell with no other trace for impurities in the crystal structure.

Keywords: core-shell, nanostructure, semiconductor, optical property, XRD

Procedia PDF Downloads 275
7551 Estimation of Normalized Glandular Doses Using a Three-Layer Mammographic Phantom

Authors: Kuan-Jen Lai, Fang-Yi Lin, Shang-Rong Huang, Yun-Zheng Zeng, Po-Chieh Hsu, Jay Wu

Abstract:

The normalized glandular dose (DgN) estimates the energy deposition of mammography in clinical practice. The Monte Carlo simulations frequently use uniformly mixed phantom for calculating the conversion factor. However, breast tissues are not uniformly distributed, leading to errors of conversion factor estimation. This study constructed a three-layer phantom to estimated more accurate of normalized glandular dose. In this study, MCNP code (Monte Carlo N-Particles code) was used to create the geometric structure. We simulated three types of target/filter combinations (Mo/Mo, Mo/Rh, Rh/Rh), six voltages (25 ~ 35 kVp), six HVL parameters and nine breast phantom thicknesses (2 ~ 10 cm) for the three-layer mammographic phantom. The conversion factor for 25%, 50% and 75% glandularity was calculated. The error of conversion factors compared with the results of the American College of Radiology (ACR) was within 6%. For Rh/Rh, the difference was within 9%. The difference between the 50% average glandularity and the uniform phantom was 7.1% ~ -6.7% for the Mo/Mo combination, voltage of 27 kVp, half value layer of 0.34 mmAl, and breast thickness of 4 cm. According to the simulation results, the regression analysis found that the three-layer mammographic phantom at 0% ~ 100% glandularity can be used to accurately calculate the conversion factors. The difference in glandular tissue distribution leads to errors of conversion factor calculation. The three-layer mammographic phantom can provide accurate estimates of glandular dose in clinical practice.

Keywords: Monte Carlo simulation, mammography, normalized glandular dose, glandularity

Procedia PDF Downloads 167
7550 A Proposed Optimized and Efficient Intrusion Detection System for Wireless Sensor Network

Authors: Abdulaziz Alsadhan, Naveed Khan

Abstract:

In recent years intrusions on computer network are the major security threat. Hence, it is important to impede such intrusions. The hindrance of such intrusions entirely relies on its detection, which is primary concern of any security tool like Intrusion Detection System (IDS). Therefore, it is imperative to accurately detect network attack. Numerous intrusion detection techniques are available but the main issue is their performance. The performance of IDS can be improved by increasing the accurate detection rate and reducing false positive. The existing intrusion detection techniques have the limitation of usage of raw data set for classification. The classifier may get jumble due to redundancy, which results incorrect classification. To minimize this problem, Principle Component Analysis (PCA), Linear Discriminant Analysis (LDA), and Local Binary Pattern (LBP) can be applied to transform raw features into principle features space and select the features based on their sensitivity. Eigen values can be used to determine the sensitivity. To further classify, the selected features greedy search, back elimination, and Particle Swarm Optimization (PSO) can be used to obtain a subset of features with optimal sensitivity and highest discriminatory power. These optimal feature subset used to perform classification. For classification purpose, Support Vector Machine (SVM) and Multilayer Perceptron (MLP) used due to its proven ability in classification. The Knowledge Discovery and Data mining (KDD’99) cup dataset was considered as a benchmark for evaluating security detection mechanisms. The proposed approach can provide an optimal intrusion detection mechanism that outperforms the existing approaches and has the capability to minimize the number of features and maximize the detection rates.

Keywords: Particle Swarm Optimization (PSO), Principle Component Analysis (PCA), Linear Discriminant Analysis (LDA), Local Binary Pattern (LBP), Support Vector Machine (SVM), Multilayer Perceptron (MLP)

Procedia PDF Downloads 343
7549 Assessment of Spatial and Vertical Distribution of Heavy Metals in the Mid Sand Bars of Brahmaputra River in Assam, India

Authors: Vijay Meena, Arup Kumar Sarma, Chandan Mahanta

Abstract:

The environment has been getting contaminated by anthropogenic processes including those that discharge heavy metals to air, soil and water. The present work emphasizes the spatial distribution and vertical profile of six heavy metals (Cu, Zn, Mn, Ni, Fe, Cr) in three layers of mid sand bars (bed surface layer, 50 cm and 100 cm depth) at 42 sampling stations covering around 600 km stretch of the Brahmaputra River, India. Heavy metal analysis was conducted on the sample collected from mid-sand bars in the river stretch to examine the impact of dredging for various hydrological operations in the future. Sediment quality was assessed by calculating six different indices viz., EF, CF, CD, PLI, Igeo, and PERI. In all sediment layers, heavy metal concentrations have been observed to be the same as listed, Fe > Mn > Zn > Ni > Cr > Cu in μg/g. The average concentration of Cu, Mn, and Fe was found in the middle layer while Zn, Ni, and Cr were in the Surface layer. EF indicates higher enrichment in reach 2 which is likely to be due to anthropogenic sources of industrial and urbanized effluents. The sediment of the mid-sand bar was generally found moderately polluted possessing low risk to aquatic lives and the environment. Suggesting, Dredging can be possible in the future. An examination of correlation matrices, principal components analysis, and cluster analyses indicated that these heavy metals possess similar anthropogenic origins for their enrichment.

Keywords: heavy metal contamination, risk assessment, anthropogenic impacts, sediment

Procedia PDF Downloads 76
7548 Noise Reduction by Energising the Boundary Layer

Authors: Kiran P. Kumar, H. M. Nayana, R. Rakshitha, S. Sushmitha

Abstract:

Aircraft noise is a highly concerned problem in the field of the aviation industry. It is necessary to reduce the noise in order to be environment-friendly. Air-frame noise is caused because of the quick separation of the boundary layer over an aircraft body. So, we have to delay the boundary layer separation of an air-frame and engine nacelle. By following a certain procedure boundary layer separation can be reduced by converting laminar into turbulent and hence early separation can be prevented that leads to the noise reduction. This method has a tendency to reduce the noise of the aircraft hence it can prove efficient and environment-friendly than the present Aircraft.

Keywords: airframe, boundary layer, noise, reduction

Procedia PDF Downloads 455
7547 An Innovative Auditory Impulsed EEG and Neural Network Based Biometric Identification System

Authors: Ritesh Kumar, Gitanjali Chhetri, Mandira Bhatia, Mohit Mishra, Abhijith Bailur, Abhinav

Abstract:

The prevalence of the internet and technology in our day to day lives is creating more security issues than ever. The need for protecting and providing a secure access to private and business data has led to the development of many security systems. One of the potential solutions is to employ the bio-metric authentication technique. In this paper we present an innovative biometric authentication method that utilizes a person’s EEG signal, which is acquired in response to an auditory stimulus,and transferred wirelessly to a computer that has the necessary ANN algorithm-Multi layer perceptrol neural network because of is its ability to differentiate between information which is not linearly separable.In order to determine the weights of the hidden layer we use Gaussian random weight initialization. MLP utilizes a supervised learning technique called Back propagation for training the network. The complex algorithm used for EEG classification reduces the chances of intrusion into the protected public or private data.

Keywords: EEG signal, auditory evoked potential, biometrics, multilayer perceptron neural network, back propagation rule, Gaussian random weight initialization

Procedia PDF Downloads 366
7546 Dambreak Flood Analysis Using HEC-RAS and GIS Technologies

Authors: Oussama Derdous, Lakhdar Djemili, Hamza Bouchehed

Abstract:

The potential risks associated with dam break flooding could be considerable and result in major damage, including loss of life and property destruction. In the past, Algeria experienced such flood disasters; let’s recall the failure of Fergoug dam in 1881, this accident cost 200 lives, many houses and bridges were destroyed by the flooding. Recently the Algerian government have obligated to dam owners the development of detailed dam break Emergency Action Plans for its 64 major dams. The research presented here was conducted within this framework, Zardezas dam which is located in the city of Skikda in the North East of Algeria was the case of study. The model HEC-RAS was used for the hydrodynamic routing of the dam break flood wave. In addition, Geographic Information System (GIS) was used to create inundation maps and produce a visualization of the flood propagation in the Saf-Saf River.The simulation results that demonstrate the significance of Zardezas dam break flooding; constitute a real tool for developing emergency response plans and assisting territorial communities in land use planning.

Keywords: dam break, HEC-RAS, GIS, inundation maps, Emergency Action Plan

Procedia PDF Downloads 366
7545 Stochastic Nuisance Flood Risk for Coastal Areas

Authors: Eva L. Suarez, Daniel E. Meeroff, Yan Yong

Abstract:

The U.S. Federal Emergency Management Agency (FEMA) developed flood maps based on experts’ experience and estimates of the probability of flooding. Current flood-risk models evaluate flood risk with regional and subjective measures without impact from torrential rain and nuisance flooding at the neighborhood level. Nuisance flooding occurs in small areas in the community, where a few streets or blocks are routinely impacted. This type of flooding event occurs when torrential rainstorm combined with high tide and sea level rise temporarily exceeds a given threshold. In South Florida, this threshold is 1.7 ft above Mean Higher High Water (MHHW). The National Weather Service defines torrential rain as rain deposition at a rate greater than 0.3-inches per hour or three inches in a single day. Data from the Florida Climate Center, 1970 to 2020, shows 371 events with more than 3-inches of rain in a day in 612 months. The purpose of this research is to develop a data-driven method to determine comprehensive analytical damage-avoidance criteria that account for nuisance flood events at the single-family home level. The method developed uses the Failure Mode and Effect Analysis (FMEA) method from the American Society of Quality (ASQ) to estimate the Damage Avoidance (DA) preparation for a 1-day 100-year storm. The Consequence of Nuisance Flooding (CoNF) is estimated from community mitigation efforts to prevent nuisance flooding damage. The Probability of Nuisance Flooding (PoNF) is derived from the frequency and duration of torrential rainfall causing delays and community disruptions to daily transportation, human illnesses, and property damage. Urbanization and population changes are related to the U.S. Census Bureau's annual population estimates. Data collected by the United States Department of Agriculture (USDA) Natural Resources Conservation Service’s National Resources Inventory (NRI) and locally by the South Florida Water Management District (SFWMD) track the development and land use/land cover changes with time. The intent is to include temporal trends in population density growth and the impact on land development. Results from this investigation provide the risk of nuisance flooding as a function of CoNF and PoNF for coastal areas of South Florida. The data-based criterion provides awareness to local municipalities on their flood-risk assessment and gives insight into flood management actions and watershed development.

Keywords: flood risk, nuisance flooding, urban flooding, FMEA

Procedia PDF Downloads 69
7544 From Ondoy to Habagat: Comparison of the Community Coping Strategies between Barangay Tumana and Provident Village, Marikina City

Authors: Dinnah Feye H. Andal, Ann Laurice V. Salonga

Abstract:

The paper investigates the flooding event that was experienced by Marikina City residents during the onslaught of Tropical Storm Ondoy on September 26, 2009 and during the heavy downpour caused by the southwest monsoon (Habagat) on August 1-8, 2012. Typhoon Ketsana, locally known as Tropical Storm Ondoy, devastated the whole of Marikina City, displacing a lot of people from their homes and damages properties as well, as flood rose at a very short period of time. Meanwhile, the massive amount of rain water brought by the southwest monsoon lasted for a week that also caused flooding to different parts of Metro Manila including Marikina City. This paper examines how the respondents’ experiences of the flooding caused by Tropical Storm Ondoy informed the coping strategies that the households in Barangay Tumana and Provident Village employed during the flooding brought by the southwest monsoon rains. Specifically, the research compares the coping strategies to flood hazards between residents of Barangay Tumana and Provident Village before, during and after the flooding caused by the southwest monsoon rains. Both study sites have relatively low elevation and are located along rivers and creeks which make them highly susceptible to flood. Interviews with affected residents were undertaken to understand how a household's coping strategies contribute to the development of community coping strategies at the respective neighborhood level. Based from the findings, income levels, local politics, religion and social relations between and among neighbors affect the way household and community coping strategies differ in the two case study sites.

Keywords: community coping strategies, Habagat, Marikina, Ondoy

Procedia PDF Downloads 299
7543 A Review of Security Attacks and Intrusion Detection Schemes in Wireless Sensor Networks: A Survey

Authors: Maleh Yassine, Ezzati Abdellah

Abstract:

Wireless Sensor Networks (WSNs) are currently used in different industrial and consumer applications, such as earth monitoring, health related applications, natural disaster prevention, and many other areas. Security is one of the major aspects of wireless sensor networks due to the resource limitations of sensor nodes. However, these networks are facing several threats that affect their functioning and their life. In this paper we present security attacks in wireless sensor networks, and we focus on a review and analysis of the recent Intrusion Detection schemes in WSNs.

Keywords: wireless sensor networks, security attack, denial of service, IDS, cluster-based model, signature based IDS, hybrid IDS

Procedia PDF Downloads 355
7542 A Location-based Authentication and Key Management Scheme for Border Surveillance Wireless Sensor Networks

Authors: Walid Abdallah, Noureddine Boudriga

Abstract:

Wireless sensor networks have shown their effectiveness in the deployment of many critical applications especially in the military domain. Border surveillance is one of these applications where a set of wireless sensors are deployed along a country border line to detect illegal intrusion attempts to the national territory and report this to a control center to undergo the necessary measures. Regarding its nature, this wireless sensor network can be the target of many security attacks trying to compromise its normal operation. Particularly, in this application the deployment and location of sensor nodes are of great importance for detecting and tracking intruders. This paper proposes a location-based authentication and key distribution mechanism to secure wireless sensor networks intended for border surveillance where the key establishment is performed using elliptic curve cryptography and identity-based public key scheme. In this scheme, the public key of each sensor node will be authenticated by keys that depend on its position in the monitored area. Before establishing a pairwise key between two nodes, each one of them must verify the neighborhood location of the other node using a message authentication code (MAC) calculated on the corresponding public key and keys derived from encrypted beacon messages broadcast by anchor nodes. We show that our proposed public key authentication and key distribution scheme is more resilient to node capture and node replication attacks than currently available schemes. Also, the achievement of the key distribution between nodes in our scheme generates less communication overhead and hence increases network performances.

Keywords: wireless sensor networks, border surveillance, security, key distribution, location-based

Procedia PDF Downloads 639
7541 Evaluation of Ensemble Classifiers for Intrusion Detection

Authors: M. Govindarajan

Abstract:

One of the major developments in machine learning in the past decade is the ensemble method, which finds highly accurate classifier by combining many moderately accurate component classifiers. In this research work, new ensemble classification methods are proposed with homogeneous ensemble classifier using bagging and heterogeneous ensemble classifier using arcing and their performances are analyzed in terms of accuracy. A Classifier ensemble is designed using Radial Basis Function (RBF) and Support Vector Machine (SVM) as base classifiers. The feasibility and the benefits of the proposed approaches are demonstrated by the means of standard datasets of intrusion detection. The main originality of the proposed approach is based on three main parts: preprocessing phase, classification phase, and combining phase. A wide range of comparative experiments is conducted for standard datasets of intrusion detection. The performance of the proposed homogeneous and heterogeneous ensemble classifiers are compared to the performance of other standard homogeneous and heterogeneous ensemble methods. The standard homogeneous ensemble methods include Error correcting output codes, Dagging and heterogeneous ensemble methods include majority voting, stacking. The proposed ensemble methods provide significant improvement of accuracy compared to individual classifiers and the proposed bagged RBF and SVM performs significantly better than ECOC and Dagging and the proposed hybrid RBF-SVM performs significantly better than voting and stacking. Also heterogeneous models exhibit better results than homogeneous models for standard datasets of intrusion detection. 

Keywords: data mining, ensemble, radial basis function, support vector machine, accuracy

Procedia PDF Downloads 227
7540 Cerebrum Maturity Damage Induced by Fluoride in Suckling Mice

Authors: Hanen Bouaziz, Françoise Croute, Najiba Zeghal

Abstract:

In order to investigate the toxic effects of fluoride on cerebrum maturity of suckling mice, we treated adult female mice of Swiss Albinos strain by 500 ppm NaF in their drinking water from the 15th day of pregnancy until the day 14 after delivery. All mice were sacrificed on day 14 after parturition. During treatment, levels of thiobarbituric acid reactive substances, the marker of lipid peroxidation extend, increased, while the activities of the antioxidant enzymes such as glutathione peroxidase, superoxide dismutase and catalase and the level of glutathione decreased significantly in cerebellum compared with those of the control group. These results suggested that fluoride enhanced oxidative stress, thereby disturbing the antioxidant defense of nursing pups. In addition, acetylcholinesterase activity in cerebellum was inhibited after treatment with fluoride. In cerebellum of mice, migration of neurons from the external granular layer to the internal granular layer occurred postnatally. Key guidance signals to these migrating neurons were provided by laminin, an extracellular matrix protein fixed to the surface of astrocytes. In the present study, we examined the expression and distribution of laminin in cerebellum of 14-day-old mice. Immunoreactive laminin was disappeared by postnatal day 14 in cerebellum parenchyma of control pups and was restricted to vasculature despite the continued presence of granular cells in the external granular layer. In contrast, in cerebellum of NaF treated pups, laminin was deposited in organised punctuate clusters in the molecular layer. These data indicated that the disruption of laminin distribution might play a major role in the profound derangement of neuronal migration observed in cerebellum of NaF treated pups.

Keywords: acetylcholinesterase activity, cerebellum, laminin, oxidative stress, suckling mice

Procedia PDF Downloads 373
7539 A Flexible Pareto Distribution Using α-Power Transformation

Authors: Shumaila Ehtisham

Abstract:

In Statistical Distribution Theory, considering an additional parameter to classical distributions is a usual practice. In this study, a new distribution referred to as α-Power Pareto distribution is introduced by including an extra parameter. Several properties of the proposed distribution including explicit expressions for the moment generating function, mode, quantiles, entropies and order statistics are obtained. Unknown parameters have been estimated by using maximum likelihood estimation technique. Two real datasets have been considered to examine the usefulness of the proposed distribution. It has been observed that α-Power Pareto distribution outperforms while compared to different variants of Pareto distribution on the basis of model selection criteria.

Keywords: α-power transformation, maximum likelihood estimation, moment generating function, Pareto distribution

Procedia PDF Downloads 197
7538 Development of Energy Management System Based on Internet of Things Technique

Authors: Wen-Jye Shyr, Chia-Ming Lin, Hung-Yun Feng

Abstract:

The purpose of this study was to develop an energy management system for university campuses based on the Internet of Things (IoT) technique. The proposed IoT technique based on WebAccess is used via network browser Internet Explore and applies TCP/IP protocol. The case study of IoT for lighting energy usage management system was proposed. Structure of proposed IoT technique included perception layer, equipment layer, control layer, application layer and network layer.

Keywords: energy management, IoT technique, sensor, WebAccess

Procedia PDF Downloads 309
7537 An Extension of the Generalized Extreme Value Distribution

Authors: Serge Provost, Abdous Saboor

Abstract:

A q-analogue of the generalized extreme value distribution which includes the Gumbel distribution is introduced. The additional parameter q allows for increased modeling flexibility. The resulting distribution can have a finite, semi-infinite or infinite support. It can also produce several types of hazard rate functions. The model parameters are determined by making use of the method of maximum likelihood. It will be shown that it compares favourably to three related distributions in connection with the modeling of a certain hydrological data set.

Keywords: extreme value theory, generalized extreme value distribution, goodness-of-fit statistics, Gumbel distribution

Procedia PDF Downloads 319
7536 Effect of Epoxy-ZrP Nanocomposite Top Coating on Inorganic Barrier Layer

Authors: Haesook Kim, Ha Na Ra, Mansu Kim, Hyun Gi Kim, Sung Soo Kim

Abstract:

Epoxy-ZrP (α-zirconium phosphate) nanocomposites were coated on inorganic barrier layer such as sputtering and atomic layer deposition (ALD) to improve the barrier properties and protect the layer. ZrP nanoplatelets were synthesized using a reflux method and exfoliated in the polymer matrix. The barrier properties of coating layer were characterized by measuring water vapor transmission rate (WVTR). The WVTR dramatically decreased after epoxy-ZrP nanocomposite coating, while maintaining the optical properties. It was also investigated the effect of epoxy-ZrP coating on inorganic layer after bending and reliability test. The optimal structure composed of inorganic and epoxy-ZrP nanocomposite layers was used in organic light emitting diodes (OLED) encapsulation.

Keywords: α-zirconium phosphate, barrier properties, epoxy nanocomposites, OLED encapsulation

Procedia PDF Downloads 334
7535 Evaluation of Groundwater and Seawater Intrusion at Tajoura Area, NW, Libya

Authors: Abdalraheem Huwaysh, Khalil Al Samarrai, Yasmin ElAhmar

Abstract:

Water quality is an important factor that determines its usage for domestic, agricultural and industrial uses. This study was carried out through the Tajoura Area, Jifarah Plain, Northwest Libya. Chemical and physical parameters were measured and analyzed for groundwater samples collected in 2021 from twenty-six wells distributed throughout the investigation area. Overexploitation of groundwater caused considerable deterioration in the water quality, especially at Tajoura Town (20 Km east of Tripoli). The aquifer shows an increase in salinization, which has reached an alarming level in many places during the past 25 years as a result of the seawater intrusion. The chemical composition of the water samples was compared with the drinking water standards of WHO and Libyan Standards. Groundwater from this area was not suitable to be a source for direct drinking based on Total Dissolved Solids. The dominant cation is sodium, while the dominant anion is chloride. Based on the Piper trilinear diagram, most of the groundwater samples (90%) were identified as sodium chloride type. The best groundwater quality exists at the southern part of the study area. Serious degradation in the water quality, expressed in salinity increase, occurs as we go towards the coastline. The abundance of NaCl waters is strong evidence to attribute the successive deterioration of the water quality to the seawater intrusion. Considering the values of Cl- concentration and the ratio of Cl-/HCO3-, about 70% of the groundwater samples were strongly affected by the saline water. Car wash stations in the study area as well as the unlined disposal pond used for the collection of untreated wastewater, contribute significantly to the deterioration of water quality. The water quality in this area needs to be monitored regularly and it is crucial to treat the water before consumption.

Keywords: Tajoura, groundwater, seawater intrusion, water quality

Procedia PDF Downloads 72
7534 Investigating the Effect of Adding the Window Layer and the Back Surface Field Layer of InₓGa₍₁₋ₓ₎P Material to GaAs Single Junction Solar Cell

Authors: Ahmad Taghinia, Negar Gholamishaker

Abstract:

GaAs (gallium arsenide) solar cells have gained significant attention for their use in space applications. These solar cells have the potential for efficient energy conversion and are being explored as potential power sources for electronic devices, satellites, and telecommunication equipment. In this study, the aim is to investigate the effect of adding a window layer and a back surface field (BSF) layer made of InₓGa₍₁₋ₓ₎P material to a GaAs single junction solar cell. In this paper, we first obtain the important electrical parameters of a single-junction GaAs solar cell by utilizing a two-dimensional simulator software for virtual investigation of the solar cell; then, we analyze the impact of adding a window layer and a back surface field layer made of InₓGa₍₁₋ₓ₎P on the solar cell. The results show that the incorporation of these layers led to enhancements in Jsc, Voc, FF, and the overall efficiency of the solar cell.

Keywords: back surface field layer, solar cell, GaAs, InₓGa₍₁₋ₓ₎P, window layer

Procedia PDF Downloads 55
7533 Ultrafast Ground State Recovery Dynamics of a Cyanine Dye Molecule in Heterogeneous Environment

Authors: Tapas Goswami, Debabrata Goswami

Abstract:

We have studied the changes in ground state recovery dynamics of IR 144 dye using degenerate transient absorption spectroscopy technique when going from homogeneous solution phase to heterogeneous partially miscible liquid/liquid interface. Towards this aim, we set up a partially miscible liquid/liquid interface in which dye is insoluble in one solvent carbon tetrachloride (CCl₄) layer and soluble in other solvent dimethyl sulphoxide (DMSO). A gradual increase in ground state recovery time of the dye molecule is observed from homogenous bulk solution to more heterogeneous environment interface layer. In the bulk solution charge distribution of dye molecule is in equilibrium with polar DMSO solvent molecule. Near the interface micro transportation of non-polar solvent, CCl₄ disturbs the solvent equilibrium in DMSO layer and it relaxes to a new equilibrium state corresponding to a new charge distribution of dye with a heterogeneous mixture of polar and non-polar solvent. In this experiment, we have measured the time required for the dye molecule to relax to the new equilibrium state in different heterogeneous environment. As a result, dye remains longer time in the excited state such that even it can populate more triplet state. The present study of ground state recovery dynamics of a cyanine dye molecule in different solvent environment provides the important characteristics of effect of solvation on excited life time of a dye molecule.

Keywords: excited state, ground state recovery, solvation, transient absorption

Procedia PDF Downloads 262
7532 Mitigating Urban Flooding through Spatial Planning Interventions: A Case of Bhopal City

Authors: Rama Umesh Pandey, Jyoti Yadav

Abstract:

Flooding is one of the waterborne disasters that causes extensive destruction in urban areas. Developing countries are at a higher risk of such damage and more than half of the global flooding events take place in Asian countries including India. Urban flooding is more of a human-induced disaster rather than natural. This is highly influenced by the anthropogenic factors, besides metrological and hydrological causes. Unplanned urbanization and poor management of cities enhance the impact manifold and cause huge loss of life and property in urban areas. It is an irony that urban areas have been facing water scarcity in summers and flooding during monsoon. This paper is an attempt to highlight the factors responsible for flooding in a city especially from an urban planning perspective and to suggest mitigating measures through spatial planning interventions. Analysis has been done in two stages; first is to assess the impacts of previous flooding events and second to analyze the factors responsible for flooding at macro and micro level in cities. Bhopal, a city in Central India having nearly two million population, has been selected for the study. The city has been experiencing flooding during heavy rains in monsoon. The factors responsible for urban flooding were identified through literature review as well as various case studies from different cities across the world and India. The factors thus identified were analyzed for both macro and micro level influences. For macro level, the previous flooding events that have caused huge destructions were analyzed and the most affected areas in Bhopal city were identified. Since the identified area was falling within the catchment of a drain so the catchment area was delineated for the study. The factors analyzed were: rainfall pattern to calculate the return period using Weibull’s formula; imperviousness through mapping in ArcGIS; runoff discharge by using Rational method. The catchment was divided into micro watersheds and the micro watershed having maximum impervious surfaces was selected to analyze the coverage and effect of physical infrastructure such as: storm water management; sewerage system; solid waste management practices. The area was further analyzed to assess the extent of violation of ‘building byelaws’ and ‘development control regulations’ and encroachment over the natural water streams. Through analysis, the study has revealed that the main issues have been: lack of sewerage system; inadequate storm water drains; inefficient solid waste management in the study area; violation of building byelaws through extending building structures ether on to the drain or on the road; encroachments by slum dwellers along or on to the drain reducing the width and capacity of the drain. Other factors include faulty culvert’s design resulting in back water effect. Roads are at higher level than the plinth of houses which creates submersion of their ground floors. The study recommends spatial planning interventions for mitigating urban flooding and strategies for management of excess rain water during monsoon season. Recommendations have also been made for efficient land use management to mitigate water logging in areas vulnerable to flooding.

Keywords: mitigating strategies, spatial planning interventions, urban flooding, violation of development control regulations

Procedia PDF Downloads 305
7531 Using Vulnerability to Reduce False Positive Rate in Intrusion Detection Systems

Authors: Nadjah Chergui, Narhimene Boustia

Abstract:

Intrusion Detection Systems are an essential tool for network security infrastructure. However, IDSs have a serious problem which is the generating of massive number of alerts, most of them are false positive ones which can hide true alerts and make the analyst confused to analyze the right alerts for report the true attacks. The purpose behind this paper is to present a formalism model to perform correlation engine by the reduction of false positive alerts basing on vulnerability contextual information. For that, we propose a formalism model based on non-monotonic JClassicδє description logic augmented with a default (δ) and an exception (є) operator that allows a dynamic inference according to contextual information.

Keywords: context, default, exception, vulnerability

Procedia PDF Downloads 241
7530 Loss Analysis by Loading Conditions of Distribution Transformers

Authors: A. Bozkurt, C. Kocatepe, R. Yumurtaci, İ. C. Tastan, G. Tulun

Abstract:

Efficient use of energy, with the increase in demand of energy and also with the reduction of natural energy sources, has improved its importance in recent years. Most of the losses in the system from electricity produced until the point of consumption is mostly composed by the energy distribution system. In this study, analysis of the resulting loss in power distribution transformer and distribution power cable is realized which are most of the losses in the distribution system. Transformer losses in the real distribution system were analyzed by CYME Power Engineering Software program. These losses are disclosed for different voltage levels and different loading conditions.

Keywords: distribution system, distribution transformer, power cable, technical losses

Procedia PDF Downloads 622
7529 Oil Recovery Study by Low Temperature Carbon Dioxide Injection in High-Pressure High-Temperature Micromodels

Authors: Zakaria Hamdi, Mariyamni Awang

Abstract:

For the past decades, CO2 flooding has been used as a successful method for enhanced oil recovery (EOR). However, high mobility ratio and fingering effect are considered as important drawbacka of this process. Low temperature injection of CO2 into high temperature reservoirs may improve the oil recovery, but simulating multiphase flow in the non-isothermal medium is difficult, and commercial simulators are very unstable in these conditions. Furthermore, to best of authors’ knowledge, no experimental work was done to verify the results of the simulations and to understand the pore-scale process. In this paper, we present results of investigations on injection of low temperature CO2 into a high-pressure high-temperature micromodel with injection temperature range from 34 to 75 °F. Effect of temperature and saturation changes of different fluids are measured in each case. The results prove the proposed method. The injection of CO2 at low temperatures increased the oil recovery in high temperature reservoirs significantly. Also, CO2 rich phases available in the high temperature system can affect the oil recovery through the better sweep of the oil which is initially caused by penetration of LCO2 inside the system. Furthermore, no unfavorable effect was detected using this method. Low temperature CO2 is proposed to be used as early as secondary recovery.

Keywords: enhanced oil recovery, CO₂ flooding, micromodel studies, miscible flooding

Procedia PDF Downloads 325
7528 Double Layer Security Model for Identification Friend or Foe

Authors: Buse T. Aydın, Enver Ozdemir

Abstract:

In this study, a double layer authentication scheme between the aircraft and the Air Traffic Control (ATC) tower is designed to prevent any unauthorized aircraft from introducing themselves as friends. The method is a combination of classical cryptographic methods and new generation physical layers. The first layer has employed the embedded key of the aircraft. The embedded key is assumed to installed during the construction of the utility. The other layer is a physical attribute (flight path, distance, etc.) between the aircraft and the ATC tower. We create a mathematical model so that two layers’ information is employed and an aircraft is authenticated as a friend or foe according to the accuracy of the results of the model. The results of the aircraft are compared with the results of the ATC tower and if the values found by the aircraft and ATC tower match within a certain error margin, we mark the aircraft as a friend. In this method, even if embedded key is captured by the enemy aircraft, without the information of the second layer, the enemy can easily be determined. Overall, in this work, we present a more reliable system by adding a physical layer in the authentication process.

Keywords: ADS-B, communication with physical layer security, cryptography, identification friend or foe

Procedia PDF Downloads 132
7527 The Effect of Backing Layer on Adhesion Properties of Single Layer Ketoprofen Transdermal Drug Delivery System

Authors: Maryam Hamedanlou, Shahla Hajializadeh

Abstract:

The transdermal drug delivery system is one of the types of novel drug delivery system that the drug is absorbed into the skin. The major considerations for designing and producing transdermal patch are small size, suitable drug release and good adhering. In this study, drug-in-adhesive transdermal patch contained non-steroidal anti-inflammatory ketoprofen is prepared. Also, the effect of non-woven fabric and plastic backing layers on adhesion properties is assessed. The results of the test, demonstrated the use of plastic backing layer increases tack and peel rather than non-woven fabric type. The balance tack with plastic backing layer patch is 6.7 (N/mm2), and the fabric one is 3.8 (N/mm2), and their peel is 9.2 (N/25mm) and 8.3 (N/25mm) by arrangement.

Keywords: transdermal drug delivery system, single layer patch of ketoprofen, plastic layer, fabric backing layer

Procedia PDF Downloads 230
7526 High and Low Salinity Polymer in Omani Oil Field

Authors: Intisar Al Busaidi, Rashid Al Maamari, Daowoud Al Mahroqi, Mahvash Karimi

Abstract:

In recent years, some research studies have been performed on the hybrid application of polymer and low salinity water flooding (LSWF). Numerous technical and economic benefits of low salinity polymer flooding (LSPF) have been reported. However, as with any EOR technology, there are various risks involved in using LSPF. Ions exchange between porous media and brine is one of the Crude oil/ brine/ rocks (COBR) reactions that is identified as a potential risk in LSPF. To the best of our knowledge, this conclusion was drawn based on bulk rheology measurements, and no explanation was provided on how water chemistry changed in the presence of polymer. Therefore, this study aimed to understand rock/ brine interactions with high and low salinity brine in the absence and presence of polymer with Omani reservoir core plugs. Many single-core flooding experiments were performed with low and high salinity polymer solutions to investigate the influence of partially hydrolyzed polyacrylic amide with different brine salinities on cation exchange reactions. Ion chromatography (IC), total organic carbon (TOC), rheological, and pH measurements were conducted for produced aqueous phase. A higher increase in pH and lower polymer adsorption was observed in LSPF compared with conventional polymer flooding. In addition, IC measurements showed that all produced fluids in the absence and presence of polymer showed elevated Ca²⁺, Mg²⁺, K+, Cl- and SO₄²⁻ ions compared to the injected fluids. However, the divalent cations levels, mainly Ca²⁺, were the highest and remained elevated for several pore volumes in the presence of LSP. The results are in line with rheological measurements where the highest viscosity reduction was recorded with the highest level of Ca²⁺ production. Despite the viscosity loss due to cation exchange reactions, LSP can be an attractive alternative to conventional polymer flooding in the Marmul field.

Keywords: polymer, ions, exchange, recovery, low salinity

Procedia PDF Downloads 84
7525 Improvement of the Geometric of Dental Bridge Framework through Automatic Program

Authors: Rong-Yang Lai, Jia-Yu Wu, Chih-Han Chang, Yung-Chung Chen

Abstract:

The dental bridge is one of the clinical methods of the treatment for missing teeth. The dental bridge is generally designed for two layers, containing the inner layer of the framework(zirconia) and the outer layer of the porcelain-fused to framework restorations. The design of a conventional bridge is generally based on the antagonist tooth profile so that the framework evenly indented by an equal thickness from outer contour. All-ceramic dental bridge made of zirconia have well demonstrated remarkable potential to withstand a higher physiological occlusal load in posterior region, but it was found that there is still the risk of all-ceramic bridge failure in five years. Thus, how to reduce the incidence of failure is still a problem to be solved. Therefore, the objective of this study is to develop mechanical designs for all-ceramic dental bridges framework by reducing the stress and enhancing fracture resistance under given loading conditions by finite element method. In this study, dental design software is used to design dental bridge based on tooth CT images. After building model, Bi-directional Evolutionary Structural Optimization (BESO) Method algorithm implemented in finite element software was employed to analyze results of finite element software and determine the distribution of the materials in dental bridge; BESO searches the optimum distribution of two different materials, namely porcelain and zirconia. According to the previous calculation of the stress value of each element, when the element stress value is higher than the threshold value, the element would be replaced by the framework material; besides, the difference of maximum stress peak value is less than 0.1%, calculation is complete. After completing the design of dental bridge, the stress distribution of the whole structure is changed. BESO reduces the peak values of principle stress of 10% in outer-layer porcelain and avoids producing tensile stress failure.

Keywords: dental bridge, finite element analysis, framework, automatic program

Procedia PDF Downloads 265
7524 TiN/TiO2 Nanostructure Coating on Glass Substrate

Authors: F. Dabir, R. Sarraf-Mamoory, N. Riahi-Noori

Abstract:

In this work, a nanostructured TiO2 layer was coated onto a FTO-less glass substrate using screen printing technique for back contact DSSC application. Then, titanium nitride thin film was applied on TiO2 layer by plasma assisted chemical vapor deposition (PACVD) as charge collector layer. The microstructure of prepared TiO2 layer was characterized by SEM. The sheet resistance, microstructure and elemental composition of titanium nitride thin films were analysed by four point probe, SEM, and EDS, respectively. TiO2 layer had porous nanostructure. The EDS analysis of TiN thin film showed presence of chlorine impurity. Sheet resistance of TiN thin film was 30 Ω/sq. With respect to the results, PACVD TiN can be a good candidate as a charge collector layer in back contacts DSSC.

Keywords: TiO2, TiN, charge collector, DSSC

Procedia PDF Downloads 445
7523 Numerical Simulation of Convective and Transport Processes in the Nocturnal Atmospheric Surface Layer

Authors: K. R. Sreenivas, Shaurya Kaushal

Abstract:

After sunset, under calm & clear-sky nocturnal conditions, the air layer near the surface containing aerosols cools through radiative processes to the upper atmosphere. Due to this cooling, surface air-layer temperature can fall 2-6 degrees C lower than the ground-surface temperature. This unstable convection layer, on the top, is capped by a stable inversion-boundary layer. Radiative divergence, along with the convection within the surface layer, governs the vertical transport of heat and moisture. Micro-physics in this layer have implications for the occurrence and growth of the fog layer. This particular configuration, featuring a convective mixed layer beneath a stably stratified inversion layer, exemplifies a classic case of penetrative convection. In this study, we conduct numerical simulations of the penetrative convection phenomenon within the nocturnal atmospheric surface layer and elucidate its relevance to the dynamics of fog layers. We employ field and laboratory measurements of aerosol number density to model the strength of the radiative cooling. Our analysis encompasses horizontally averaged, vertical profiles of temperature, density, and heat flux. The energetic incursion of the air from the mixed layer into the stable inversion layer across the interface results in entrainment and the growth of the mixed layer, modeling of which is the key focus of our investigation. In our research, we ascertain the appropriate length scale to employ in the Richardson number correlation, which allows us to estimate the entrainment rate and model the growth of the mixed layer. Our analysis of the mixed layer and the entrainment zone reveals a close alignment with previously reported laboratory experiments on penetrative convection. Additionally, we demonstrate how aerosol number density influences the growth or decay of the mixed layer. Furthermore, our study suggests that the presence of fog near the ground surface can induce extensive vertical mixing, a phenomenon observed in field experiments.

Keywords: inversion layer, penetrative convection, radiative cooling, fog occurrence

Procedia PDF Downloads 50