Search results for: sulphuric acid attack resistance
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 6900

Search results for: sulphuric acid attack resistance

6780 Quality Rabbit Skin Gelatin with Acetic Acid Extract

Authors: Wehandaka Pancapalaga

Abstract:

This study aimed to analyze the water content, yield, fat content, protein content, viscosity, gel strength, pH, melting and organoleptic rabbit skin gelatin with acetic acid extraction levels are different. The materials used in this study were Rex rabbit skin male. Treatments that P1 = the extraction of acetic acid 2% (v / v); P2 = the extraction of acetic acid 3% (v / v); P3 = the extraction of acetic acid 4 % (v / v). P5 = the extraction of acetic acid 5% (v / v). The results showed that the greater the concentration of acetic acid as the extraction of rabbit skin can reduce the water content and fat content of rabbit skin gelatin but increase the protein content, viscosity, pH, gel strength, yield and melting point rabbit skin gelatin. texture, color and smell of gelatin rabbits there were no differences with cow skin gelatin. The results showed that the quality of rabbit skin gelatin accordance Indonesian National Standard (SNI). Conclusion 5% acetic acid extraction produces the best quality gelatin.

Keywords: gelatin, skin rabbit, acetic acid extraction, quality

Procedia PDF Downloads 417
6779 Isolation, Characterization and Biological Activities of Compounds Isolated from Callicarpa maingayi

Authors: Muhammad A. Ado, Intan S. Ismail, Hasanah M. Ghazali, Faridah Abas

Abstract:

In this study, we have investigated the phytochemical constituents of soluble fractions of dichloromethane (DCM) of methanolic leaves extract of the Callicarpa maingayi. The phytochemicals investigation has resulted in the isolation of three triterpenoids (euscaphic acid (1), arjunic acid (2), and ursolic acid (3)) together with two flavones apigenin (4) and acacetin (5)), two phytosterols (stigmasterol 3-O-β-glycopyranoside (6) and sitosterol 3-O-β-glycopyranoside (7)), and one fatty acid (n-hexacosanoic acid (8)). Six (6) compounds isolated from this species were isolated for the first time (1, 2, 3, 4, 5, and 8). Their structures were elucidated and identified by spectral methods of one and two-dimensional NMR techniques, gas chromatography-mass spectrometry, and comparison with the previously reported literature. The biological activity of three compounds (1-3) was carried out on acetylcholinesterase inhibition activity. Compound (3) was found to displayed good inhibition against AChE with an IC₅₀ value of 21.5 ± 0.022 μM.

Keywords: acetylcholinesterase, Callicarpa maingayi, euscaphic acid, ursolic acid

Procedia PDF Downloads 146
6778 Two-Level Graph Causality to Detect and Predict Random Cyber-Attacks

Authors: Van Trieu, Shouhuai Xu, Yusheng Feng

Abstract:

Tracking attack trajectories can be difficult, with limited information about the nature of the attack. Even more difficult as attack information is collected by Intrusion Detection Systems (IDSs) due to the current IDSs having some limitations in identifying malicious and anomalous traffic. Moreover, IDSs only point out the suspicious events but do not show how the events relate to each other or which event possibly cause the other event to happen. Because of this, it is important to investigate new methods capable of performing the tracking of attack trajectories task quickly with less attack information and dependency on IDSs, in order to prioritize actions during incident responses. This paper proposes a two-level graph causality framework for tracking attack trajectories in internet networks by leveraging observable malicious behaviors to detect what is the most probable attack events that can cause another event to occur in the system. Technically, given the time series of malicious events, the framework extracts events with useful features, such as attack time and port number, to apply to the conditional independent tests to detect the relationship between attack events. Using the academic datasets collected by IDSs, experimental results show that the framework can quickly detect the causal pairs that offer meaningful insights into the nature of the internet network, given only reasonable restrictions on network size and structure. Without the framework’s guidance, these insights would not be able to discover by the existing tools, such as IDSs. It would cost expert human analysts a significant time if possible. The computational results from the proposed two-level graph network model reveal the obvious pattern and trends. In fact, more than 85% of causal pairs have the average time difference between the causal and effect events in both computed and observed data within 5 minutes. This result can be used as a preventive measure against future attacks. Although the forecast may be short, from 0.24 seconds to 5 minutes, it is long enough to be used to design a prevention protocol to block those attacks.

Keywords: causality, multilevel graph, cyber-attacks, prediction

Procedia PDF Downloads 156
6777 Non-Targeted Adversarial Image Classification Attack-Region Modification Methods

Authors: Bandar Alahmadi, Lethia Jackson

Abstract:

Machine Learning model is used today in many real-life applications. The safety and security of such model is important, so the results of the model are as accurate as possible. One challenge of machine learning model security is the adversarial examples attack. Adversarial examples are designed by the attacker to cause the machine learning model to misclassify the input. We propose a method to generate adversarial examples to attack image classifiers. We are modifying the successfully classified images, so a classifier misclassifies them after the modification. In our method, we do not update the whole image, but instead we detect the important region, modify it, place it back to the original image, and then run it through a classifier. The algorithm modifies the detected region using two methods. First, it will add abstract image matrix on back of the detected image matrix. Then, it will perform a rotation attack to rotate the detected region around its axes, and embed the trace of image in image background. Finally, the attacked region is placed in its original position, from where it was removed, and a smoothing filter is applied to smooth the background with foreground. We test our method in cascade classifier, and the algorithm is efficient, the classifier confident has dropped to almost zero. We also try it in CNN (Convolutional neural network) with higher setting and the algorithm was successfully worked.

Keywords: adversarial examples, attack, computer vision, image processing

Procedia PDF Downloads 339
6776 Effect of Retained Austenite Stability in Corrosion Mechanism of Dual Phase High Carbon Steel

Authors: W. Handoko, F. Pahlevani, V. Sahajwalla

Abstract:

Dual-phase high carbon steels (DHCS) are commonly known for their improved strength, hardness, and abrasive resistance properties due to co-presence of retained austenite and martensite at the same time. Retained austenite is a meta-stable phase at room temperature, and stability of this phase governs the response of DHCS at different conditions. This research paper studies the effect of RA stability on corrosion behaviour of high carbon steels after they have been immersed into 1.0 M NaCl solution for various times. For this purpose, two different steels with different RA stabilities have been investigated. The surface morphology of the samples before and after corrosion attack was observed by secondary electron microscopy (SEM) and atomic force microscopy (AFM), along with the weight loss and Vickers hardness analysis. Microstructural investigations proved the preferential attack to retained austenite phase during corrosion. Hence, increase in the stability of retained austenite in dual-phase steels led to decreasing the weight loss rate.

Keywords: high carbon steel, austenite stability, atomic force microscopy, corrosion

Procedia PDF Downloads 210
6775 Diversities, Antibiogram and Antibiotic Resistance Genes in Staphylococcus Species in Raw Meat from a Research Farm

Authors: Anthony Ayodeji Adegoke, Olayinka Ayobami Aiyegoro, Thor Axel Stenstrom

Abstract:

A study to investigate the species diversities, antibiogram and antibiotic resistance genes in Staphylococcus species from raw meat and dairy products collected from an abattoir and a farm shop of a research institute in Irene, South Africa over a six-month period was conducted. Polymerase Chain Reaction was used to speciate the bacteria and to detect the presence and otherwise of resistance genes. Antibiotic susceptibility testing was performed by disk diffusion method on Mueller-Hinton agar according to the Clinical Laboratory Standards Institute standards. A total of twenty-six (26) antibiotics were used to determine the antibiotic susceptibility. S. xylosus was the predominant isolate with 30% total occurrence, followed by S. epidermis, S. aureus, S. saprophyticus and S. haemolyticus with 25%, 15%, 15%, and 10% abundance respectively. The isolates were resistant to ceftezidime, gentamycin, nalidixic acid, nortrafuration, ampicillin, penicillin, oxytetracycline, tetracycline, doxycycline, clindamycin and lincomycin. mecA genes was detected among the methicillin resistant Staphylococcus species (MRSS) but no vancomycin resistance genes (van A and van B) were detected in these isolates. The presence of MRSS and multidrug resistant Staphylococcus species in meat affirms the need to avoid consumption of partially cooked meat currently rampant in South Africa, to avoid the spread of difficult to control pathogens in epidemiological proportion.

Keywords: Staphylococcus species, antibiotics, antibiotic resistance genes, food products, methicillin resistance, mecA gene

Procedia PDF Downloads 299
6774 The Proactive Approach of Digital Forensics Methodology against Targeted Attack Malware

Authors: Mohamed Fadzlee Sulaiman, Mohd Zabri Adil Talib, Aswami Fadillah Mohd Ariffin

Abstract:

Each individual organization has their own mechanism to build up cyber defense capability in protecting their information infrastructures from data breaches and cyber espionage. But, we can not deny the possibility of failing to detect and stop cyber attacks especially for those targeting credential information and intellectual property (IP). In this paper, we would like to share the modern approach of effective digital forensic methodology in order to identify the artifacts in tracing the trails of evidence while mitigating the infection from the target machine/s. This proposed approach will suit the digital forensic investigation to be conducted while resuming the business critical operation after mitigating the infection and minimizing the risk from the identified attack to transpire. Therefore, traditional digital forensics methodology has to be improvised to be proactive which not only focusing to discover the root caused and the threat actor but to develop the relevant mitigation plan in order to prevent from the same attack.

Keywords: digital forensic, detection, eradication, targeted attack, malware

Procedia PDF Downloads 275
6773 Application of Deep Eutectic Solvent in the Extraction of Ferulic Acid from Palm Pressed Fibre

Authors: Ng Mei Han, Nu'man Abdul Hadi

Abstract:

Extraction of ferulic acid from palm pressed fiber using deep eutectic solvent (DES) of choline chloride-acetic acid (ChCl-AA) and choline chloride-citric acid (ChCl-CA) are reported. Influence of water content in DES on the extraction efficiency was investigated. ChCl-AA and ChCl-CA experienced a drop in viscosity from 9.678 to 1.429 and 22.658 ± 1.655 mm2/s, respectively as the water content in the DES increased from 0 to 50 wt% which contributed to higher extraction efficiency for the ferulic acid. Between 41,155 ± 940 mg/kg ferulic acid was obtained after 6 h reflux when ChCl-AA with 30 wt% water was used for the extraction compared to 30,940 ± 621 mg/kg when neat ChCl-AA was used. Although viscosity of the DES could be improved with the addition of water, there is a threshold where the DES could tolerate the presence of water without changing its solvent behavior. The optimum condition for extraction of ferulic acid from palm pressed fiber was heating for 6 h with DES containing 30 wt% water.

Keywords: deep eutectic solvent, extraction, ferulic acid, palm fibre

Procedia PDF Downloads 82
6772 Spectrophotometric Determination of Photohydroxylated Products of Humic Acid in the Presence of Salicylate Probe

Authors: Julide Hizal Yucesoy, Batuhan Yardimci, Aysem Arda, Resat Apak

Abstract:

Humic substances produce reactive oxygene species such as hydroxyl, phenoxy and superoxide radicals by oxidizing in a wide pH and reduction potential range. Hydroxyl radicals, produced by reducing agents such as antioxidants and/or peroxides, attack on salicylate probe, and form 2,3-dihydroxybenzoate, 2,4-dihydroxybenzoate and 2,5-dihydroxybenzoate species. These species are quantitatively determined by using HPLC Method. Humic substances undergo photodegradation by UV radiation. As a result of their antioxidant properties, they produce hydroxyl radicals. In the presence of salicylate probe, these hydroxyl radicals react with salicylate molecules to form hydroxylated products (dihidroxybenzoate isomers). In this study, humic acid was photodegraded in a photoreactor at 254 nm (400W), formed hydroxyl radicals were caught by salicylate probe. The total concentration of hydroxylated salicylate species was measured by using spectrophotometric CUPRAC Method. And also, using results of time dependent experiments, kinetic of photohydroxylation was determined at different pHs. This method has been applied for the first time to measure the concentration of hydroxylated products. It allows to achieve the results easier than HPLC Method.

Keywords: CUPRAC method, humic acid, photohydroxylation, salicylate probe

Procedia PDF Downloads 206
6771 Studies on Virulence Factors Analysis in Streptococcus agalactiae from the Clinical Isolates

Authors: Natesan Balasubramanian, Palpandi Pounpandi, Venkatraman Thamil Priya, Vellasamy Shanmugaiah, Karubbiah Balakrishnan, Mandayam Anandam Thirunarayan

Abstract:

Streptococcus agalactiae is commonly known as Group B Streptococcus (GBS) and it is the most common cause of life-threatening bacterial infection. GBS first considered as a veterinary pathogen causing mastitis in cattle later becomes a human pathogen for severe neonatal infections. In this present study, a total of 20 new clinical isolates of S. agalactiae were collected from male (6) and female patient (14) with different age group. The isolates were from Urinary tract infection (UTI), blood, pus and eye ulcer. All the 20 S. agalactiae isolates has clear hemolysis properties on blood agar medium and were identified by serogrouping and MALTI-TOF-MS analysis. Antibiotic susceptibility/resistance test was performed for 20 S. agalactiae isolates, further phenotypic resistance pattern was observed for tetracycline, vancomycin, ampicillin and penicillin. Genotypically we found two antibiotic resistance genes such as Betalactem antibiotic resistance gene (Tem) (70%) and tetracycline resistance gene Tet(O) 15% in our isolates. Six virulence factors encoding genes were performed by PCR in twenty GBS isolates, cfb gene (100%), followed by, cylE(90.47%), lmp(85.7%), bca(71.42%), rib (38%) and low frequency in bac gene (4.76%) were determined. Most of the S. agalactiae isolates produced strong biofilm in the polystyrene surface (hydrophobic), and low-level biofilm formation was found in glass tube (hydrophilic) surface. lytR is secreted protein and localized in bacterial cell wall, extra cellular membrane, and cytoplasm. In silico docking studies were performed for lytR protein with four antibiofilm compounds, including a peptide (PR39) with the docking study showed peptide has strong interaction followed by ellagic acid and interaction length is 2.95, 2.97 and 2.95 A°. In ligand EGCGO10 and O11 two atoms intract with lytR (Leu271), with binding bond affinity length is 3.24 and 3.14. The aminoacid Leu 271 is act as an impartant aminoacid, since ellagic acid and EGCG interact with same aminoacid.

Keywords: antibiotics, biofilms, clinical isolates, S. agalactiae, virulence

Procedia PDF Downloads 108
6770 Deployment of Attack Helicopters in Conventional Warfare: The Gulf War

Authors: Mehmet Karabekir

Abstract:

Attack helicopters (AHs) are usually deployed in conventional warfare to destroy armored and mechanized forces of enemy. In addition, AHs are able to perform various tasks in the deep, and close operations – intelligence, surveillance, reconnaissance, air assault operations, and search and rescue operations. Apache helicopters were properly employed in the Gulf Wars and contributed the success of campaign by destroying a large number of armored and mechanized vehicles of Iraq Army. The purpose of this article is to discuss the deployment of AHs in conventional warfare in the light of Gulf Wars. First, the employment of AHs in deep and close operations will be addressed regarding the doctrine. Second, the US armed forces AH-64 doctrinal and tactical usage will be argued in the 1st and 2nd Gulf Wars.

Keywords: attack helicopter, conventional warfare, gulf wars

Procedia PDF Downloads 473
6769 Data Analysis to Uncover Terrorist Attacks Using Data Mining Techniques

Authors: Saima Nazir, Mustansar Ali Ghazanfar, Sanay Muhammad Umar Saeed, Muhammad Awais Azam, Saad Ali Alahmari

Abstract:

Terrorism is an important and challenging concern. The entire world is threatened by only few sophisticated terrorist groups and especially in Gulf Region and Pakistan, it has become extremely destructive phenomena in recent years. Predicting the pattern of attack type, attack group and target type is an intricate task. This study offers new insight on terrorist group’s attack type and its chosen target. This research paper proposes a framework for prediction of terrorist attacks using the historical data and making an association between terrorist group, their attack type and target. Analysis shows that the number of attacks per year will keep on increasing, and Al-Harmayan in Saudi Arabia, Al-Qai’da in Gulf Region and Tehreek-e-Taliban in Pakistan will remain responsible for many future terrorist attacks. Top main targets of each group will be private citizen & property, police, government and military sector under constant circumstances.

Keywords: data mining, counter terrorism, machine learning, SVM

Procedia PDF Downloads 408
6768 Non-Targeted Adversarial Object Detection Attack: Fast Gradient Sign Method

Authors: Bandar Alahmadi, Manohar Mareboyana, Lethia Jackson

Abstract:

Today, there are many applications that are using computer vision models, such as face recognition, image classification, and object detection. The accuracy of these models is very important for the performance of these applications. One challenge that facing the computer vision models is the adversarial examples attack. In computer vision, the adversarial example is an image that is intentionally designed to cause the machine learning model to misclassify it. One of very well-known method that is used to attack the Convolution Neural Network (CNN) is Fast Gradient Sign Method (FGSM). The goal of this method is to find the perturbation that can fool the CNN using the gradient of the cost function of CNN. In this paper, we introduce a novel model that can attack Regional-Convolution Neural Network (R-CNN) that use FGSM. We first extract the regions that are detected by R-CNN, and then we resize these regions into the size of regular images. Then, we find the best perturbation of the regions that can fool CNN using FGSM. Next, we add the resulted perturbation to the attacked region to get a new region image that looks similar to the original image to human eyes. Finally, we placed the regions back to the original image and test the R-CNN with the attacked images. Our model could drop the accuracy of the R-CNN when we tested with Pascal VOC 2012 dataset.

Keywords: adversarial examples, attack, computer vision, image processing

Procedia PDF Downloads 193
6767 Longitudinal Vortices Mixing in Three-Stream Micromixers with Two Inlets

Authors: Yi-Tun Huang, Chih-Yang Wu, Shu-Wei Huang

Abstract:

In this work, we examine fluid mixing in a full three-stream mixing channel with longitudinal vortex generators (LVGs) built on the channel bottom by numerical simulation and experiment. The effects of the asymmetrical arrangement and the attack angle of the LVGs on fluid mixing are investigated. The results show that the micromixer with LVGs at a small asymmetry index (defined by the ratio of the distance from the center plane of the gap between the winglets to the center plane of the main channel to the width of the main channel) is superior to the micromixer with symmetric LVGs and that with LVGs at a large asymmetry index. The micromixer using five mixing modules of the LVGs with an attack angle between 16.5 degrees and 22.5 degrees can achieve excellent mixing over a wide range of Reynolds numbers. Here, we call a section of channel with two pairs of staggered asymmetrical LVGs a mixing module. Besides, the micromixer with LVGs at a small attack angle is more efficient than that with a larger attack angle when pressure losses are taken into account.

Keywords: microfluidics, mixing, longitudinal vortex generators, two stream interfaces

Procedia PDF Downloads 521
6766 SEC-MALLS Study of Hyaluronic Acid and BSA Thermal Degradation in Powder and in Solution

Authors: Vasile Simulescu, Jakub Mondek, Miloslav Pekař

Abstract:

Hyaluronic acid (HA) is an anionic glycosaminoglycan distributed throughout connective, epithelial and neural tissues. The importance of hyaluronic acid increased in the last decades. It has many applications in medicine and cosmetics. Hyaluronic acid has been used in attempts to treat osteoarthritis of the knee via injecting it into the joint. Bovine serum albumin (also known as BSA) is a protein derived from cows, which has many biochemical applications. The aim of our research work was to compare the thermal degradation of hyaluronic acid and BSA in powder and in solution, by determining changes in molar mass and conformation, by using SEC-MALLS (size exclusion chromatography -multi angle laser light scattering). The aim of our research work was to observe the degradation in powder and in solution of different molar mass hyaluronic acid samples, at different temperatures for certain periods. The degradation of the analyzed samples was mainly observed by modifications in molar mass.

Keywords: thermal degradation, hyaluronic acid, BSA, SEC-MALLS

Procedia PDF Downloads 505
6765 Stenotrophomonas maltophilia: The Major Carbapenem Resistance Bacteria from Waste Water Treatment Plant of Pig Farm

Authors: Young-Ji Kim, Jin-Hyeong Park, Hong-Seok Kim, Jung-Whan Chon, Kwang-Yeop Kim, Dong-Hyeon Kim, Il-Byeong Kang, Da-Na Jeong, Jin-Hyeok Yim, Ho-Seok Jang, Kwang-Young Song, Kun-Ho Seo

Abstract:

Stenotrophomonas maltophilia is one of the emerging opportunistic pathogens, and also known to have extensive drug resistance intrinsically including carbepenems which is last resort for most serious infections. One possible way for S. maltophilia to infect human is via wastewater treatment plant (WWTP). In the period between October 2016 and February 2017, effluent samples of WWTP from 3 different pig farms were collected once a month and screened for isolation of S. maltophilia. Total 16 strains of S. maltophilia were isolated and, the antibiotic susceptibility phenotypes were determined by Vitek 2 system for 16 antibiotics, ampicillin (AMP), amoxicillin/clavulanic acid (AMC), piperacillin/tazobactam (TZP), cefazolin (CZ), cefoxitin (FOX), cefotaxime (CTX), ceftazidime (CAZ), cefepime (FEP), aztreonam (AZT), ertapenem (ETP), imipenem (IMP), amikacin (AK), gentamicin (GN), ciprofloxacin (CIP), tigecycline (TGC) and trimethoprim/sulfamethoxazole (SXT). All isolates showed high resistance to AMP (100%), CZ (100%), FOX (100%), CTX (100%), CAZ (100%), FEP (94%), AZT (100%), ETP (100%), IMP (100%), AK (100%), GN (100%) whereas were susceptible to CIP (0%), TGC (0%), SXT (6%). All strains harbored at least one of the antibiotic resistance determinant such as spgM, rmlA, and rpfF. Some isolates had similar MLST (multilocus sequence typing) types with clinical isolates, suggesting WWTP could have potential role in the transmission of S. maltophilia to aquatic environment and, possibly, to humans.

Keywords: Stenotrophomonas maltophilia, Carbapenem resistance, waste water treatment plant, pig farm

Procedia PDF Downloads 463
6764 Poly (Diphenylamine-4-Sulfonic Acid) Modified Glassy Carbon Electrode for Voltammetric Determination of Gallic Acid in Honey and Peanut Samples

Authors: Zelalem Bitew, Adane Kassa, Beyene Misgan

Abstract:

In this study, a sensitive and selective voltammetric method based on poly(diphenylamine-4-sulfonic acid) modified glassy carbon electrode (poly(DPASA)/GCE) was developed for determination of gallic acid. Appearance of an irreversible oxidative peak at both bare GCE and poly(DPASA)/GCE for gallic acid with about three folds current enhancement and much reduced potential at poly(DPASA)/GCE showed catalytic property of the modifier towards oxidation of gallic acid. Under optimized conditions, Adsorptive stripping square wave voltammetric peak current response of the poly(DPASA)/GCE showed linear dependence with gallic acid concentration in the range 5.00 × 10-7 − 3.00 × 10-4 mol L-1 with limit of detection of 4.35 × 10-9. Spike recovery results between 94.62-99.63, 95.00-99.80 and 97.25-103.20% of gallic acid in honey, raw peanut, and commercial peanut butter samples respectively, interference recovery results with less than 4.11% error in the presence of uric acid and ascorbic acid, lower LOD and relatively wider dynamic range than most of the previously reported methods validated the potential applicability of the method based on poly(DPASA)/GCE for determination of gallic acid real samples including in honey and peanut samples.

Keywords: gallic acid, diphenyl amine sulfonic acid, adsorptive anodic striping square wave voltammetry, honey, peanut

Procedia PDF Downloads 78
6763 The Investigation of the Active Constituents, Danshen for Angiogenesis

Authors: Liang Zhou, Xiaojing Zhu, Yin Lu

Abstract:

Danshen can induce the angiogenesis in advanced ischemic heart disease while inhibiting the angiogenesis in cancer. Additionally, Danshen mainly contains two groups of ingredients: the hydrophilic phenolic acids (danshensu, caffeic acid and salvianolic acid B), and the lipophilic tanshinones (dihydrotanshinone I, tanshinone II A, and cryptotanshinone). The lipophilic tanshinones reduced the VEGF- and bFGF-induced proliferation of HUVECs in dose-dependent manner, but cannot perform in others. Conversely, caffeic acid and salvianolic acid B had the opposite effect. Danshensu inhibited the VEGF- and bFGF-induced migration of HUVECs, and others were not. Most of them interrupted the forming capillary-like structures of HUVECs, except the danshensu and caffeic acid. Oppositely, caffeic acid enhanced the ability of forming capillary-like structures of HUVECs. Ultimately, the lipophilic tanshinones, danshensu and salvianolic acid B inhibited the angiogenesis, whereas the caffeic acid induced the angiogenesis. These data provide useful information for the classification of ingredients of Danshen for angiogenesis.

Keywords: angiogenesis, Danshen, HUVECs, ingredients

Procedia PDF Downloads 396
6762 Vulnerable Paths Assessment for Distributed Denial of Service Attacks in a Cloud Computing Environment

Authors: Manas Tripathi, Arunabha Mukhopadhyay

Abstract:

In Cloud computing environment, cloud servers, sometimes may crash after receiving huge amount of request and cloud services may stop which can create huge loss to users of that cloud services. This situation is called Denial of Service (DoS) attack. In Distributed Denial of Service (DDoS) attack, an attacker targets multiple network paths by compromising various vulnerable systems (zombies) and floods the victim with huge amount of request through these zombies. There are many solutions to mitigate this challenge but most of the methods allows the attack traffic to arrive at Cloud Service Provider (CSP) and then only takes actions against mitigation. Here in this paper we are rather focusing on preventive mechanism to deal with these attacks. We analyze network topology and find most vulnerable paths beforehand without waiting for the traffic to arrive at CSP. We have used Dijkstra's and Yen’s algorithm. Finally, risk assessment of these paths can be done by multiplying the probabilities of attack for these paths with the potential loss.

Keywords: cloud computing, DDoS, Dijkstra, Yen’s k-shortest path, network security

Procedia PDF Downloads 278
6761 Adversarial Attacks and Defenses on Deep Neural Networks

Authors: Jonathan Sohn

Abstract:

Deep neural networks (DNNs) have shown state-of-the-art performance for many applications, including computer vision, natural language processing, and speech recognition. Recently, adversarial attacks have been studied in the context of deep neural networks, which aim to alter the results of deep neural networks by modifying the inputs slightly. For example, an adversarial attack on a DNN used for object detection can cause the DNN to miss certain objects. As a result, the reliability of DNNs is undermined by their lack of robustness against adversarial attacks, raising concerns about their use in safety-critical applications such as autonomous driving. In this paper, we focus on studying the adversarial attacks and defenses on DNNs for image classification. There are two types of adversarial attacks studied which are fast gradient sign method (FGSM) attack and projected gradient descent (PGD) attack. A DNN forms decision boundaries that separate the input images into different categories. The adversarial attack slightly alters the image to move over the decision boundary, causing the DNN to misclassify the image. FGSM attack obtains the gradient with respect to the image and updates the image once based on the gradients to cross the decision boundary. PGD attack, instead of taking one big step, repeatedly modifies the input image with multiple small steps. There is also another type of attack called the target attack. This adversarial attack is designed to make the machine classify an image to a class chosen by the attacker. We can defend against adversarial attacks by incorporating adversarial examples in training. Specifically, instead of training the neural network with clean examples, we can explicitly let the neural network learn from the adversarial examples. In our experiments, the digit recognition accuracy on the MNIST dataset drops from 97.81% to 39.50% and 34.01% when the DNN is attacked by FGSM and PGD attacks, respectively. If we utilize FGSM training as a defense method, the classification accuracy greatly improves from 39.50% to 92.31% for FGSM attacks and from 34.01% to 75.63% for PGD attacks. To further improve the classification accuracy under adversarial attacks, we can also use a stronger PGD training method. PGD training improves the accuracy by 2.7% under FGSM attacks and 18.4% under PGD attacks over FGSM training. It is worth mentioning that both FGSM and PGD training do not affect the accuracy of clean images. In summary, we find that PGD attacks can greatly degrade the performance of DNNs, and PGD training is a very effective way to defend against such attacks. PGD attacks and defence are overall significantly more effective than FGSM methods.

Keywords: deep neural network, adversarial attack, adversarial defense, adversarial machine learning

Procedia PDF Downloads 195
6760 Investigation of Alumina Membrane Coated Titanium Implants on Osseointegration

Authors: Pinar Erturk, Sevde Altuntas, Fatih Buyukserin

Abstract:

In order to obtain an effective integration between an implant and a bone, implant surfaces should have similar properties to bone tissue surfaces. Especially mimicry of the chemical, mechanical and topographic properties of the implant to the bone is crucial for fast and effective osseointegration. Titanium-based biomaterials are more preferred in clinical use, and there are studies of coating these implants with oxide layers that have chemical/nanotopographic properties stimulating cell interactions for enhanced osseointegration. There are low success rates of current implantations, especially in craniofacial implant applications, which are large and vital zones, and the oxide layer coating increases bone-implant integration providing long-lasting implants without requiring revision surgery. Our aim in this study is to examine bone-cell behavior on titanium implants with an aluminum oxide layer (AAO) on effective osseointegration potential in the deformation of large zones with difficult spontaneous healing. In our study, aluminum layer coated titanium surfaces were anodized in sulfuric, phosphoric, and oxalic acid, which are the most common used AAO anodization electrolytes. After morphologic, chemical, and mechanical tests on AAO coated Ti substrates, viability, adhesion, and mineralization of adult bone cells on these substrates were analyzed. Besides with atomic layer deposition (ALD) as a sensitive and conformal technique, these surfaces were coated with pure alumina (5 nm); thus, cell studies were performed on ALD-coated nanoporous oxide layers with suppressed ionic content too. Lastly, in order to investigate the effect of the topography on the cell behavior, flat non-porous alumina layers on silicon wafers formed by ALD were compared with the porous ones. Cell viability ratio was similar between anodized surfaces, but pure alumina coated titanium and anodized surfaces showed a higher viability ratio compared to bare titanium and bare anodized ones. Alumina coated titanium surfaces, which anodized in phosphoric acid, showed significantly different mineralization ratios after 21 days over other bare titanium and titanium surfaces which anodized in other electrolytes. Bare titanium was the second surface that had the highest mineralization ratio. Otherwise, titanium, which is anodized in oxalic acid electrolyte, demonstrated the lowest mineralization. No significant difference was shown between bare titanium and anodized surfaces except AAO titanium surface anodized in phosphoric acid. Currently, osteogenic activities of these cells on the genetic level are investigated by quantitative real-time polymerase chain reaction (qRT-PCR) analysis results of RUNX-2, VEGF, OPG, and osteopontin genes. Also, as a result of the activities of the genes mentioned before, Western Blot will be used for protein detection. Acknowledgment: The project is supported by The Scientific and Technological Research Council of Turkey.

Keywords: alumina, craniofacial implant, MG-63 cell line, osseointegration, oxalic acid, phosphoric acid, sulphuric acid, titanium

Procedia PDF Downloads 131
6759 Survey of the Elimination of Red Acid Dye by Wood Dust

Authors: N. Ouslimani, T. Abadlia, M. Fadel

Abstract:

This work focused on the elimination of acid textile dye (red bermacide acid dye BN-CL-200), widely used for dyeing wool and polyamide fibers, by adsorption on a natural material, wood sawdust, in the static mode by keeping under continuous stirring, a specific mass of the adsorbent, with a dye solution of known concentration. The influence of various parameters is studied like the influence of particle size, mass, pH and time. The best results were obtained with 0.4 mm grain size, mass of 3g, Temperature of 20 °C, pH 2 and Time contact of 120 min.

Keywords: acid dye, environment, wood sawdust, wastewater

Procedia PDF Downloads 442
6758 Association of Serum Uric Acid Level and Bone Mineral Density of Menopausal Women

Authors: Soyeon Kang, Youn-Jee Chung, Jung Namkung

Abstract:

Objective: This retrospective study investigated the association between uric acid level and bone mineral density (BMD) in the postmenopausal period. Methods: The study included 328 menopausal women (mean age, 57.3 ± 6.5 years; mean serum uric acid level, 4.6 ± 1.0 mg/dL). Patients were divided into three groups by tertile of serum uric acid level. Patients who used hormone treatment (HT), bisphosphonates, or lipid-lowering agents were included. Results: Blood urea nitrogen, serum creatinine, and serum triglyceride levels were significantly higher in the upper uric acid tertiles. No significant difference was found in the mean uric acid levels between medication users and non-users. Distinct HT regimens showed different mean serum uric acid levels. In a cross-sectional analysis, higher serum uric acid levels showed a tendency toward increased BMD in the spine and femoral neck. Longitudinal analysis of 186 women who underwent follow-up examination at a mean interval of 14.6 months revealed a trend toward a smaller reduction in femoral neck BMD in women in the upper serum uric acid tertiles. Conclusion: A positive correlation exists between serum uric acid levels and BMD in menopausal women.

Keywords: menopause, antioxidant, uric acid, bone mineral density

Procedia PDF Downloads 129
6757 Study on the Influence of Different Lengths of Tunnel High Temperature Zones on Train Aerodynamic Resistance

Authors: Chong Hu, Tiantian Wang, Zhe Li, Ourui Huang, Yichen Pan

Abstract:

When the train is running in a high geothermal tunnel, changes in the temperature field will cause disturbances in the propagation and superposition of pressure waves in the tunnel, which in turn have an effect on the aerodynamic resistance of the train. The aim of this paper is to investigate the effect of the changes in the lengths of the high-temperature zone of the tunnel on the aerodynamic resistance of the train, clarifying the evolution mechanism of aerodynamic resistance of trains in tunnels with high ground temperatures. Firstly, moving model tests of trains passing through wall-heated tunnels were conducted to verify the reliability of the numerical method in this paper. Subsequently, based on the three-dimensional unsteady compressible RANS method and the standard k-ε two-equation turbulence model, the change laws of the average aerodynamic resistance under different high-temperature zone lengths were analyzed, and the influence of frictional resistance and pressure difference resistance on total resistance at different times was discussed. The results show that as the length of the high-temperature zone LH increases, the average aerodynamic resistance of a train running in a tunnel gradually decreases; when LH = 330 m, the aerodynamic resistance can be reduced by 5.7%. At the moment of maximum resistance, the total resistance, differential pressure resistance, and friction resistance all decrease gradually with the increase of LH and then remain basically unchanged. At the moment of the minimum value of resistance, with the increase of LH, the total resistance first increases and then slowly decreases; the differential pressure resistance first increases and then remains unchanged, while the friction resistance first remains unchanged and then gradually decreases, and the ratio of the differential pressure resistance to the total resistance gradually increases with the increase of LH. The results of this paper can provide guidance for scholars who need to investigate the mechanism of aerodynamic resistance change of trains in high geothermal environments, as well as provide a new way of thinking for resistance reduction in non-high geothermal tunnels.

Keywords: high-speed trains, aerodynamic resistance, high-ground temperature, tunnel

Procedia PDF Downloads 67
6756 Effect of Heat Treatment on the Corrosion Behavior of Stainless Steel

Authors: Altoumi Alndalusi

Abstract:

The work examines the aqueous corrosion behavior of grades of stain less steel which are used as corrosion resistant castings for applications such as valve and pump bodies. The corrosion behavior of steels in the as-cast condition has been examined using potentiostatic studies to illustrate the need for correct thermal treatment. A metallurgical examination and chemical analysis were carried out to establish the morphology of the steel structure. Heat treatment was carried out in order to compare damage in relation to microstructure. Optical and scanning electron microscopy examinations confirmed that the austenitic steels suffers from severe localized inter-dendritic pitting attack, while non homogenized castings highly alloyed duplex steels gave inferior corrosion resistance. Through the heat treatment conditions a significant of phase transformation of the duplex steel C were occurred (from ferrite to austenite and sigma plus carbides) and were gave reduction resistance.

Keywords: cast, corrosion, duplex stainless, heat treatment, material, steel

Procedia PDF Downloads 175
6755 Simultaneous Detection of Dopamine and Uric Acid in the Presence of Ascorbic Acid at Physiological Level Using Anodized Multiwalled Carbon Nanotube–Poldimethylsiloxane Paste Electrode

Authors: Angelo Gabriel Buenaventura, Allan Christopher Yago

Abstract:

A carbon paste electrode (CPE) composed of Multiwalled Carbon Nanotube (MWCNT) conducting particle and Polydimethylsiloxane (PDMS) binder was used for simultaneous detection of Dopamine (DA) and Uric Acid (UA) in the presence of Ascorbic Acid (AA) at physiological level. The MWCNT-PDMS CPE was initially activated via potentiodynamic cycling in a basic (NaOH) solution, which resulted in enhanced electrochemical properties. Electrochemical Impedance Spectroscopy measurements revealed a significantly lower charge transfer resistance (Rct) for the OH--activated MWCNT-PDMS CPE (Rct = 5.08kΩ) as compared to buffer (pH 7)-activated MWCNT-PDMS CPE (Rct = 25.9kΩ). Reversibility analysis of Fe(CN)63-/4- redox couple of both Buffer-Activated CPE and OH--Activated CPE showed that the OH—Activated CPE have peak current ratio (Ia/Ic) of 1.11 at 100mV/s while 2.12 for the Buffer-Activated CPE; this showed an electrochemically reversible behavior for Fe(CN)63-/4- redox couple even at relatively fast scan rate using the OH--activated CPE. Enhanced voltammetric signal for DA and significant peak separation between DA and UA was obtained using the OH--activated MWCNT-PDMS CPE in the presence of 50 μM AA via Differential Pulse Voltammetry technique. The anodic peak currents which appeared at 0.263V and 0.414 V were linearly increasing with increasing concentrations of DA and UA, respectively. The linear ranges were obtained at 25 μM – 100 μM for both DA and UA. The detection limit was determined to be 3.86 μM for DA and 5.61 μM for UA. These results indicate a practical approach in the simultaneous detection of important bio-organic molecules using a simple CPE composed of MWCNT and PDMS with base anodization as activation technique.

Keywords: anodization, ascorbic acid, carbon paste electrodes, dopamine, uric acid

Procedia PDF Downloads 284
6754 A Secure Survey against Black Hole Attack in MANET

Authors: G. Usha, S. Kannimuthu, K. Mahalakshmi

Abstract:

Mobile Adhoc Network (MANET) is one of the most promising technologies that have applications ranging from various portable devices to military networks. MANET has no fixed infrastructure and the security of such network is a big concern. Therefore, in order to operate MANET’s securely, the misbehavior and intrusions should be detected before the attackers affect the network communication. In this article, we make a comprehensive survey against black hole attack that is a serious threat against MANET that exploits the routing behavior of the MANET. We have given broad survey solutions that detect black hole attacks in MANET. This is achieved by analyzing the techniques involved in detecting the attacks in each scheme. Furthermore, we examine about the challenges to the researchers for constructing an in-depth solution against black hole attack.

Keywords: AODV, cross layer security, mobile Adhoc network (MANET), packet delivery ratio, single layer security

Procedia PDF Downloads 406
6753 A Qualitative Exploration of the Strategic Management of Employee Resistance to Organisational Change

Authors: Muneeb Banday, Anukriti Dixit

Abstract:

Change in organizations is viewed as a conversion process of the organizational functioning. One of the crucial elements of this conversion process is the employee resistance to organizational change. The existing literature on change resistance has generally treated resistance as a barrier or an opportunity for successful implementation of change. However, there is little empirical research exploring how resistance to change is managed. This may be partially due to difficulty in getting information on resistance to change. The top management does not divulge such information to avoid negative evaluation whereas employees face huge risk in sharing information related to resistance. The focus of the study is to understand how the organization under study dealt with the employee resistance to change. The conversion process is a story of how the organization went from one stage to another. We used narrative approach to change. Data was collected data through company visits and interviews. The interviews were transcribed, coded, and themes were identified. We focused on the strands that left huge scope for alternative interpretations than the dominant narrative of change prevalent in the organization. The study reveals that the top management strategically uses the legitimacy of leadership, roles of key employees, and rationality of change to manage resistance.

Keywords: employee resistance, legitimacy of leadership, narrative analysis, organisational change

Procedia PDF Downloads 273
6752 Reducing Phytic Acid in Rice Grain by Targeted Mutagenesis of a Phospholipase D Gene

Authors: Muhammad Saad Shoaib Khan, Rasbin Basnet, Qingyao Shu

Abstract:

Phospholipids are one of the major classes of lipid comprising 10% of total grain lipid in rice. Phospholipids are the main phosphorus containing lipid in the rice endosperm, contributing to rice palatability and seed storage property. However, in the rice grain, the majority of phosphorus occur in the form of phytic acid and are highly abundant in the bran. Phytic acid, also known as hexaphosphorylated inositol (IP6), are strong chelating agents which reduces the bioavailability of essential dietary nutrients and are therefore less desirable by rice breeders. We used the CRISPR/Cas9 system to generate mutants of a phospholipase D gene (PLDα1), which is responsible for the degradation of phospholipids into phosphatidic acid (PA). In the mutants, we found a significant reduction in the concentration of phytic acid in the grain as compared to the wild-type. The biochemical analysis of the PLDα1 mutants showed that the decrease in production of phosphatidic acid is due to reduced accumulation of CDP-diacylglycerolderived phosphatidylinositol (PI), ultimately leading to lower accumulation of phytic acid in mutants. These results showed that loss of function of PLD in rice leads to lower production of phytic acid, suggesting the potential application of Ospldα1 in breeding rice with less phytic acid.

Keywords: CRISPR/Cas9, phospholipase D, phytic acid, rice

Procedia PDF Downloads 157
6751 Aerodynamic Modeling Using Flight Data at High Angle of Attack

Authors: Rakesh Kumar, A. K. Ghosh

Abstract:

The paper presents the modeling of linear and nonlinear longitudinal aerodynamics using real flight data of Hansa-3 aircraft gathered at low and high angles of attack. The Neural-Gauss-Newton (NGN) method has been applied to model the linear and nonlinear longitudinal dynamics and estimate parameters from flight data. Unsteady aerodynamics due to flow separation at high angles of attack near stall has been included in the aerodynamic model using Kirchhoff’s quasi-steady stall model. NGN method is an algorithm that utilizes Feed Forward Neural Network (FFNN) and Gauss-Newton optimization to estimate the parameters and it does not require any a priori postulation of mathematical model or solving of equations of motion. NGN method was validated on real flight data generated at moderate angles of attack before application to the data at high angles of attack. The estimates obtained from compatible flight data using NGN method were validated by comparing with wind tunnel values and the maximum likelihood estimates. Validation was also carried out by comparing the response of measured motion variables with the response generated by using estimates a different control input. Next, NGN method was applied to real flight data generated by executing a well-designed quasi-steady stall maneuver. The results obtained in terms of stall characteristics and aerodynamic parameters were encouraging and reasonably accurate to establish NGN as a method for modeling nonlinear aerodynamics from real flight data at high angles of attack.

Keywords: parameter estimation, NGN method, linear and nonlinear, aerodynamic modeling

Procedia PDF Downloads 445