Search results for: salt and peppers attacks
1152 An Investigation of Passivation Technology in Stainless Steel Alloy
Authors: Feng-Tsai Weng, Rick Wang, Yan-Cong Liao
Abstract:
Passivation is a kind of surface treatment for material to reinforce the corrosion resistance specially the stainless alloy. Passive film, is to getting more potential compared to their status before passivation. An oxidation film can be formed on the surface of stainless steel, which has a strong corrosion resistance ability after passivation treatment. In this research, a new passivation technology is proposed for a special stainless alloy which contains a 12-14% Chromium. This method includes the A-A-A (alkaline-acid-alkaline) process basically, which was developed by Carpenter that can neutralize trapped acid. Besides, a corrosion resistant coating layer was obtained by immersing the parts in a water bath of mineral oil at high temperature. Salt spray test ASTM B368 was conducted to investigated performance of corrosion resistant of the passivated stainless steel alloy parts. Results show much better corrosion resistant that followed a coating process after A-A-A Passivation process, than only using A-A-A process. The passivation time is with more than 380 hours of salt spray test ASTM B368, which is equal to 3000 hours of Salt spray test ASTM B117. Proposed passivation method of stainless steel can be completed in about 3 hours.Keywords: passivation, alkaline-acid-alkaline, stainless steel, salt spray test
Procedia PDF Downloads 3611151 Corrosion Behavior of Steels in Molten Salt Reactors
Authors: Jana Rejková, Marie Kudrnová
Abstract:
This paper deals with the research of materials for one of the types of reactors IV. generation - reactor with molten salts. One of the advantages of molten salts applied as a coolant in reactors is the ability to operate at relatively low pressures, as opposed to cooling with water or gases. Compared to liquid metal cooling, which also allows lower operating pressures, salt melts are less prone to chemical reactions. The service life of the construction materials used is limited by the operating temperatures of the reactor and the content of impurities in the salts. For the research of corrosion resistance, an experimental device was designed and assembled, enabling exposure at high temperatures without access to oxygen in a flowing atmosphere of inert gas. Nickel alloys Inconel 601, 617, and 625 were tested in a mixture of chloride salts LiCl – KCl (58,2 - 41,8 wt. %). The experiment showed high resistance of the materials used and based on the results and XPS analysis, other construction materials were proposed for the experiments.Keywords: molten salt, corrosion, nuclear reactor, nickel alloy
Procedia PDF Downloads 1641150 Real Time Detection of Application Layer DDos Attack Using Log Based Collaborative Intrusion Detection System
Authors: Farheen Tabassum, Shoab Ahmed Khan
Abstract:
The brutality of attacks on networks and decisive infrastructures are on the climb over recent years and appears to continue to do so. Distributed Denial of service attack is the most prevalent and easy attack on the availability of a service due to the easy availability of large botnet computers at cheap price and the general lack of protection against these attacks. Application layer DDoS attack is DDoS attack that is targeted on wed server, application server or database server. These types of attacks are much more sophisticated and challenging as they get around most conventional network security devices because attack traffic often impersonate normal traffic and cannot be recognized by network layer anomalies. Conventional techniques of single-hosted security systems are becoming gradually less effective in the face of such complicated and synchronized multi-front attacks. In order to protect from such attacks and intrusion, corporation among all network devices is essential. To overcome this issue, a collaborative intrusion detection system (CIDS) is proposed in which multiple network devices share valuable information to identify attacks, as a single device might not be capable to sense any malevolent action on its own. So it helps us to take decision after analyzing the information collected from different sources. This novel attack detection technique helps to detect seemingly benign packets that target the availability of the critical infrastructure, and the proposed solution methodology shall enable the incident response teams to detect and react to DDoS attacks at the earliest stage to ensure that the uptime of the service remain unaffected. Experimental evaluation shows that the proposed collaborative detection approach is much more effective and efficient than the previous approaches.Keywords: Distributed Denial-of-Service (DDoS), Collaborative Intrusion Detection System (CIDS), Slowloris, OSSIM (Open Source Security Information Management tool), OSSEC HIDS
Procedia PDF Downloads 3541149 Improving the Performance of Road Salt on Anti-Icing
Authors: Mohsen Abotalebi Esfahani, Amin Rahimi
Abstract:
Maintenance and management of route and roads infrastructure is one of the most important and the most fundamental principles of the countries. Several methods have been under investigation as preventive proceedings for the maintenance of asphalt pavements for many years. Using a mixture of salt, sand and gravel is the most common method of deicing, which could have numerous harmful consequences. Icy or snow-covered road is one of the major reasons of accidents in rainy seasons, which causes substantial damages such as loss of time and energy, environmental pollution, destruction of buildings, traffic congestion and rising possibility of accidents. Regarding this, every year the government incurred enormous costs to secure traverses. In this study, asphalt pavements have been cured, in terms of compressive strength, tensile strength and resilient modulus of asphalt samples, under the influence of Magnesium Chloride, Calcium Chloride, Sodium Chloride, Urea and pure water; and showed that de-icing with the calcium chloride solution and urea have the minimum negative effect and de-icing with pure water has most negative effect on laboratory specimens. Hence some simple techniques and new equipment and less use of sand and salt, can reduce significantly the risks and harmful effects of excessive use of salt, sand and gravel and at the same time use the safer roads.Keywords: maintenance, sodium chloride, icyroad, calcium chloride
Procedia PDF Downloads 2831148 A Deep Reinforcement Learning-Based Secure Framework against Adversarial Attacks in Power System
Authors: Arshia Aflaki, Hadis Karimipour, Anik Islam
Abstract:
Generative Adversarial Attacks (GAAs) threaten critical sectors, ranging from fingerprint recognition to industrial control systems. Existing Deep Learning (DL) algorithms are not robust enough against this kind of cyber-attack. As one of the most critical industries in the world, the power grid is not an exception. In this study, a Deep Reinforcement Learning-based (DRL) framework assisting the DL model to improve the robustness of the model against generative adversarial attacks is proposed. Real-world smart grid stability data, as an IIoT dataset, test our method and improves the classification accuracy of a deep learning model from around 57 percent to 96 percent.Keywords: generative adversarial attack, deep reinforcement learning, deep learning, IIoT, generative adversarial networks, power system
Procedia PDF Downloads 361147 Influence Study of the Molar Ratio between Solvent and Initiator on the Reaction Rate of Polyether Polyols Synthesis
Authors: María José Carrero, Ana M. Borreguero, Juan F. Rodríguez, María M. Velencoso, Ángel Serrano, María Jesús Ramos
Abstract:
Flame-retardants are incorporated in different materials in order to reduce the risk of fire, either by providing increased resistance to ignition, or by acting to slow down combustion and thereby delay the spread of flames. In this work, polyether polyols with fire retardant properties were synthesized due to their wide application in the polyurethanes formulation. The combustion of polyurethanes is primarily dependent on the thermal properties of the polymer, the presence of impurities and formulation residue in the polymer as well as the supply of oxygen. There are many types of flame retardants, most of them are phosphorous compounds of different nature and functionality. The addition of these compounds is the most common method for the incorporation of flame retardant properties. The employment of glycerol phosphate sodium salt as initiator for the polyol synthesis allows obtaining polyols with phosphate groups in their structure. However, some of the critical points of the use of glycerol phosphate salt are: the lower reactivity of the salt and the necessity of a solvent (dimethyl sulfoxide, DMSO). Thus, the main aim in the present work was to determine the amount of the solvent needed to get a good solubility of the initiator salt. Although the anionic polymerization mechanism of polyether formation is well known, it seems convenient to clarify the role that DMSO plays at the starting point of the polymerization process. Regarding the fact that the catalyst deprotonizes the hydroxyl groups of the initiator and as a result of this, two water molecules and glycerol phosphate alkoxide are formed. This alkoxide, together with DMSO, has to form a homogeneous mixture where the initiator (solid) and the propylene oxide (PO) are soluble enough to mutually interact. The addition rate of PO increased when the solvent/initiator ratios studied were increased, observing that it also made the initiation step shorter. Furthermore, the molecular weight of the polyol decreased when higher solvent/initiator ratios were used, what revealed that more amount of salt was activated, initiating more chains of lower length but allowing to react more phosphate molecules and to increase the percentage of phosphorous in the final polyol. However, the final phosphorous content was lower than the theoretical one because only a percentage of salt was activated. On the other hand, glycerol phosphate disodium salt was still partially insoluble in DMSO studied proportions, thus, the recovery and reuse of this part of the salt for the synthesis of new flame retardant polyols was evaluated. In the recovered salt case, the rate of addition of PO remained the same than in the commercial salt but a shorter induction period was observed, this is because the recovered salt presents a higher amount of deprotonated hydroxyl groups. Besides, according to molecular weight, polydispersity index, FT-IR spectrum and thermal stability, there were no differences between both synthesized polyols. Thus, it is possible to use the recovered glycerol phosphate disodium salt in the same way that the commercial one.Keywords: DMSO, fire retardants, glycerol phosphate disodium salt, recovered initiator, solvent
Procedia PDF Downloads 2781146 Bread-Making Properties of Rice Flour Dough Using Fatty Acid Salt
Authors: T. Hamaishi, Y. Morinaga, H. Morita
Abstract:
Introduction: Rice consumption in Japan has decreased, and Japanese government has recommended use of rice flour in order to expand the consumption of rice. There are two major protein components present in flour, called gliadin and glutenin. Gluten forms when water is added to flour and is mixed. As mixing continues, glutenin interacts with gliadin to form viscoelastic matrix of gluten. Rice flour bread does not expand as much as wheat flour bread. Because rice flour is not included gluten, it cannot construct gluten network in the dough. In recent years, some food additives have been used for dough-improving agent in bread making, especially surfactants has effect in order to improve dough extensibility. Therefore, we focused to fatty acid salt which is one of anionic surfactants. Fatty acid salt is a salt consist of fatty acid and alkali, it is main components of soap. According to JECFA(FAO/WHO Joint Expert Committee on Food Additives), salts of Myristic(C14), Palmitic(C16) and Stearic(C18) could be used as food additive. They have been evaluated ADI was not specified. In this study, we investigated to improving bread-making properties of rice flour dough adding fatty acid salt. Materials and methods: The sample of fatty acid salt is myristic (C14) dissolved in KOH solution to a concentration of 350 mM and pH 10.5. Rice dough was consisted of 100 g of flour using rice flour and wheat gluten, 5 g of sugar, 1.7 g of salt, 1.7g of dry yeast, 80 mL of water and fatty acid salt. Mixing was performed for 500 times by using hand. The concentration of C14K in the dough was 10 % relative to flour weight. Amount of gluten in the dough was 20 %, 30 % relative to flour weight. Dough expansion ability test was performed to measure physical property of bread dough according to the methods of Baker’s Yeast by Japan Yeast Industry Association. In this test, 150 g of dough was filled from bottom of the cylinder and fermented at 30 °C,85 % humidity for 120 min on an incubator. The height of the expansion in the dough was measured and determined its expansion ability. Results and Conclusion: Expansion ability of rice dough with gluten content of 20 %, 30% showed 316 mL, 341 mL for 120 min. When C14K adding to the rice dough, dough expansion abilities were 314 mL, 368 mL for 120 min, there was no significant difference. Conventionally it has been known that the rice flour dough contain gluten of 20 %. The considerable improvement of dough expansion ability was achieved when added C14K to wheat flour. The experimental result shows that c14k adding to the rice dough with gluten content more than 20 % was not improving bread-making properties. In conclusion, rice bread made with gluten content more than 20 % without C14K has been suggested to contribute to the formation of the sufficient gluten network.Keywords: expansion ability, fatty acid salt, gluten, rice flour dough
Procedia PDF Downloads 2441145 The Failed Criminalization of Homelessness: The Need for New Interventions and the Implementation of Salt Lake City’s Kayak Court
Authors: Stephen Fanale
Abstract:
Criminalization creates sizable barriers to housing and perpetuates the cycle of homelessness. Not only does criminalization leave people on the streets and in shelters indefinitely, but it also unnecessarily costs the taxpayers. Homelessness is a growing issue throughout the world, and criminalizing these human beings is a violation of basic human rights. While this may seem like an insurmountable obstacle, there is something that can be done while fighting that battle. While they are under-researched as a whole, specialty courts, specifically homeless courts, are a growing vessel that can address some of the barriers associated with the criminalization of homelessness. They divert individuals away from jail while connecting them to services that will help their situation instead of hindering it. The model being used in Salt Lake City, while similar to others throughout the United States, stands alone in its outreach efforts and should be paving the way for the rest of the world. The following will look at criminalization and different ways of addressing it, and, finally, Salt Lake City’s current operations, including the unique outreach court: Kayak Court.Keywords: barriers to housing, criminalization, cycle of homelessness, homeless court, diversion, kayak court
Procedia PDF Downloads 711144 Multi-Dimension Threat Situation Assessment Based on Network Security Attributes
Authors: Yang Yu, Jian Wang, Jiqiang Liu, Lei Han, Xudong He, Shaohua Lv
Abstract:
As the increasing network attacks become more and more complex, network situation assessment based on log analysis cannot meet the requirements to ensure network security because of the low quality of logs and alerts. This paper addresses the lack of consideration of security attributes of hosts and attacks in the network. Identity and effectiveness of Distributed Denial of Service (DDoS) are hard to be proved in risk assessment based on alerts and flow matching. This paper proposes a multi-dimension threat situation assessment method based on network security attributes. First, the paper offers an improved Common Vulnerability Scoring System (CVSS) calculation, which includes confident risk, integrity risk, availability risk and a weighted risk. Second, the paper introduces deterioration rate of properties collected by sensors in hosts and network, which aimed at assessing the time and level of DDoS attacks. Third, the paper introduces distribution of asset value in security attributes considering features of attacks and network, which aimed at assessing and show the whole situation. Experiments demonstrate that the approach reflects effectiveness and level of DDoS attacks, and the result can show the primary threat in network and security requirement of network. Through comparison and analysis, the method reflects more in security requirement and security risk situation than traditional methods based on alert and flow analyzing.Keywords: DDoS evaluation, improved CVSS, network security attribute, threat situation assessment
Procedia PDF Downloads 2091143 Remote Sensing and GIS Based Methodology for Identification of Low Crop Productivity in Gautam Buddha Nagar District
Authors: Shivangi Somvanshi
Abstract:
Poor crop productivity in salt-affected environment in the country is due to insufficient and untimely canal supply to agricultural land and inefficient field water management practices. This could further degrade due to inadequate maintenance of canal network, ongoing secondary soil salinization and waterlogging, worsening of groundwater quality. Large patches of low productivity in irrigation commands are occurring due to waterlogging and salt-affected soil, particularly in the scarcity rainfall year. Satellite remote sensing has been used for mapping of areas of low crop productivity, waterlogging and salt in irrigation commands. The spatial results obtained for these problems so far are less reliable for further use due to rapid change in soil quality parameters over the years. The existing spatial databases of canal network and flow data, groundwater quality and salt-affected soil were obtained from the central and state line departments/agencies and were integrated with GIS. Therefore, an integrated methodology based on remote sensing and GIS has been developed in ArcGIS environment on the basis of canal supply status, groundwater quality, salt-affected soils, and satellite-derived vegetation index (NDVI), salinity index (NDSI) and waterlogging index (NSWI). This methodology was tested for identification and delineation of area of low productivity in the Gautam Buddha Nagar district (Uttar Pradesh). It was found that the area affected by this problem lies mainly in Dankaur and Jewar blocks of the district. The problem area was verified with ground data and was found to be approximately 78% accurate. The methodology has potential to be used in other irrigation commands in the country to obtain reliable spatial data on low crop productivity.Keywords: remote sensing, GIS, salt affected soil, crop productivity, Gautam Buddha Nagar
Procedia PDF Downloads 2861142 Evaluation of Living Mulches Effectiveness in Weed Suppression, and Seed Yield of Black cumin (Nigella sativa L.) Under Salt Stress
Authors: Fatemeh Benakashani, Hossein Tavakoli, Elias Soltani
Abstract:
To ensure the sustainability of crop cultivation and rural economies, it is imperative that we focus on cultivating resilient crops capable of withstanding salt stress. However, the effective management of weeds in salt-affected soils remains a significant challenge. This study investigates the impact of living mulches, specifically Berseem clover (Trifolium alexandrinum) and Barley (Hordeum vulgare), on weed control, as well as the quality and yield of Black cumin (Nigella sativa) in salt-affected soil. In our research, we employed a two-fold mowing strategy for the living mulches: once following crop establishment and once before the flowering stage. Notably, the weed-free plots demonstrated Black cumin's seed yield, and oil content (31.1% to 34.3%), consistent with previous studies, highlighting its potential for the reclamation and utilization of salt-affected lands. However, Black cumin exhibited limited competitiveness against prevalent weeds in the field, such as Amaranthus retroflexus, Chenopodium album, and Portulaca oleracea, which significantly diminished both the 1000 grain mass in plots where weeds were present. Interestingly, the introduction of living mulches led to improvements in seed yield and seed oil content when compared to both weed-free and weed-infested plots. Notably, Berseem clover exhibited greater biomass than Barley, indicating its heightened competitiveness against weeds. Nevertheless, it's worth noting that in the long term, Berseem clover also competed with the main crop, thereby limiting overall productivity. Consequently, we recommend relocating the Berseem clover living mulch following the establishment of Black cumin as a strategy for weed management in Black cumin fields situated in salt-affected soils.Keywords: weed management, competition, clover, barley, medicinal plant
Procedia PDF Downloads 651141 Analysis of Brain Signals Using Neural Networks Optimized by Co-Evolution Algorithms
Authors: Zahra Abdolkarimi, Naser Zourikalatehsamad,
Abstract:
Up to 40 years ago, after recognition of epilepsy, it was generally believed that these attacks occurred randomly and suddenly. However, thanks to the advance of mathematics and engineering, such attacks can be predicted within a few minutes or hours. In this way, various algorithms for long-term prediction of the time and frequency of the first attack are presented. In this paper, by considering the nonlinear nature of brain signals and dynamic recorded brain signals, ANFIS model is presented to predict the brain signals, since according to physiologic structure of the onset of attacks, more complex neural structures can better model the signal during attacks. Contribution of this work is the co-evolution algorithm for optimization of ANFIS network parameters. Our objective is to predict brain signals based on time series obtained from brain signals of the people suffering from epilepsy using ANFIS. Results reveal that compared to other methods, this method has less sensitivity to uncertainties such as presence of noise and interruption in recorded signals of the brain as well as more accuracy. Long-term prediction capacity of the model illustrates the usage of planted systems for warning medication and preventing brain signals.Keywords: co-evolution algorithms, brain signals, time series, neural networks, ANFIS model, physiologic structure, time prediction, epilepsy suffering, illustrates model
Procedia PDF Downloads 2821140 The Effect of Internal Electrical Ion Mobility on Molten Salts through Atomistic Simulations
Authors: Carlos F. Sanz-Navarro, Sonia Fereres
Abstract:
Binary and ternary mixtures of molten salts are excellent thermal energy storage systems and have been widely used in commercial tanks both in nuclear and solar thermal applications. However, the energy density of the commercially used mixtures is still insufficient, and therefore, new systems based on latent heat storage (or phase change materials, PCM) are currently being investigated. In order to shed some light on the macroscopic physical properties of the molten salt phases, knowledge of the microscopic structure and dynamics is required. Several molecular dynamics (MD) simulations have been performed to model the thermal behavior of (Li,K)2CO3 mixtures. Up to this date, this particular molten salt mixture has not been extensively studied but it is of fundamental interest for understanding the behavior of other commercial salts. Molten salt diffusivities, the internal electrical ion mobility, and the physical properties of the solid-liquid phase transition have been calculated and compared to available data from literature. The effect of anion polarization and the application of a strong external electric field have also been investigated. The influence of electrical ion mobility on local composition is explained through the Chemla effect, well known in electrochemistry. These results open a new way to design optimal high temperature energy storage materials.Keywords: atomistic simulations, thermal storage, latent heat, molten salt, ion mobility
Procedia PDF Downloads 3261139 Numerical Modeling of a Molten Salt Power Tower Configuration Adaptable for Harsh Winter Climate
Authors: Huiqiang Yang, Domingo Santana
Abstract:
This paper proposes a novel configuration which introduces a natural draft dry cooling tower system in a molten salt power tower. A three-dimensional numerical modeling was developed based on the novel configuration. A plan of building 20 new concentrating solar power plants has been announced by Chinese government in September 2016, and among these 20 new plants, most of them are located in regions with long winter and harsh winter climate. The innovative configuration proposed includes an external receiver concrete tower at the center, a natural draft dry cooling tower which is surrounding the external receiver concrete tower and whose shell is fixed on the external receiver concrete tower, and a power block (including a steam generation system, a steam turbine system and hot/cold molten salt tanks, and water treatment systems) is covered by the roof of the natural draft dry cooling tower. Heat exchanger bundles are vertically installed at the furthest edge of the power block. In such a way, all power block equipment operates under suitable environmental conditions through whole year operation. The monthly performance of the novel configuration is simulated as compared to a standard one. The results show that the novel configuration is much more efficient in each separate month in a typical meteorological year. Moreover, all systems inside the power block have less thermal losses at low ambient temperatures, especially in harsh winter climate. It is also worthwhile mentioning that a photovoltaic power plant can be installed on the roof of the cooling tower to reduce the parasites of the molten salt power tower.Keywords: molten salt power tower, natural draft dry cooling, commercial scale, power block, harsh winter climate
Procedia PDF Downloads 3411138 Experimental Device to Test Corrosion Behavior of Materials in the Molten Salt Reactor Environment
Authors: Jana Petru, Marie Kudrnova
Abstract:
The use of technologies working with molten salts is conditioned by finding suitable construction materials that must meet several demanding criteria. In addition to temperature resistance, materials must also show corrosion resistance to salts; they must meet mechanical requirements and other requirements according to the area of use – for example, radiation resistance in Molten Salt Reactors. The present text describes an experimental device for studying the corrosion resistance of candidate materials in molten mixtures of salts and is a partial task of the international project ADAR, dealing with the evaluation of advanced nuclear reactors based on molten salts. The design of the device is based on a test exposure of Inconel 625 in the mixture of salts Hitec in a high temperature tube furnace. The result of the pre-exposure is, in addition to the metallographic evaluation of the behavior of material 625 in the mixture of nitrate salts, mainly a list of operational and construction problems that were essential for the construction of the new experimental equipment. The main output is a scheme of a newly designed gas-tight experimental apparatus capable of operating in an inert argon atmosphere, temperature up to 600 °C, pressure 3 bar, in the presence of a corrosive salt environment, with an exposure time of hundreds of hours. This device will enable the study of promising construction materials for nuclear energy.Keywords: corrosion, experimental device, molten salt, steel
Procedia PDF Downloads 1191137 Towards a Security Model against Denial of Service Attacks for SIP Traffic
Authors: Arellano Karina, Diego Avila-Pesántez, Leticia Vaca-Cárdenas, Alberto Arellano, Carmen Mantilla
Abstract:
Nowadays, security threats in Voice over IP (VoIP) systems are an essential and latent concern for people in charge of security in a corporate network, because, every day, new Denial-of-Service (DoS) attacks are developed. These affect the business continuity of an organization, regarding confidentiality, availability, and integrity of services, causing frequent losses of both information and money. The purpose of this study is to establish the necessary measures to mitigate DoS threats, which affect the availability of VoIP systems, based on the Session Initiation Protocol (SIP). A Security Model called MS-DoS-SIP is proposed, which is based on two approaches. The first one analyzes the recommendations of international security standards. The second approach takes into account weaknesses and threats. The implementation of this model in a VoIP simulated system allowed to minimize the present vulnerabilities in 92% and increase the availability time of the VoIP service into an organization.Keywords: Denial-of-Service SIP attacks, MS-DoS-SIP, security model, VoIP-SIP vulnerabilities
Procedia PDF Downloads 2031136 Prevalence of Endemic Goiter in School Children and Women of Reproductive Age Group during Post Salt Iodization Period in Andro Constituency, Imphal-East District, Manipur, India
Authors: Y. Suchitra Devi, L. Hemchandra Singh
Abstract:
Background: Because of its geographical location, Manipur lies in the conventional goiter endemic belt. During the post salt iodization period, endemic goiter was prevalent in the valley districts of Manipur without iodine deficiency. Objectives: The present study aim at the prevalence of goiter among school children (6-12 years) and women of reproductive age group (above 20 years) of Andro Assembly Constituency, Imphal- East, Manipur, India. Method: A total of 3992 individuals were clinically examined for thyroid enlargement. Hormones like TSH, FT₄, FT₃, and Anti-TPO, Anti-Tg were tested, UIC, USCN, testing of iodine in water and salt. Result: Total goiter prevalence was found to be 13.98%, median urinary iodine level was 166.0 µg/l, mean urinary thiocyanate concentration was 0.726 ± 0.408, mean water iodine concentration was 3.843 ± 2.291, and all the salt samples were above 15ppm. 6 out of 41 children and 93 out of 176 women were auto antibody positive. 41 children and 176 women were tested for TSH, FT₄, and FT₃, which shows disturbance in hormone level. Conclusion: The present study showed that the region is mildly goiter endemic without biochemical iodine deficiency.Keywords: goiter, TSH, FT₄, FT₃, anti-TPO, anti-Tg, UIC, USCN, school children and women of reproductive age
Procedia PDF Downloads 1101135 Survey on Malware Detection
Authors: Doaa Wael, Naswa Abdelbaky
Abstract:
Malware is malicious software that is built to cause destructive actions and damage information systems and networks. Malware infections increase rapidly, and types of malware have become more sophisticated, which makes the malware detection process more difficult. On the other side, the Internet of Things IoT technology is vulnerable to malware attacks. These IoT devices are always connected to the internet and lack security. This makes them easy for hackers to access. These malware attacks are becoming the go-to attack for hackers. Thus, in order to deal with this challenge, new malware detection techniques are needed. Currently, building a blockchain solution that allows IoT devices to download any file from the internet and to verify/approve whether it is malicious or not is the need of the hour. In recent years, blockchain technology has stood as a solution to everything due to its features like decentralization, persistence, and anonymity. Moreover, using blockchain technology overcomes some difficulties in malware detection and improves the malware detection ratio over-than the techniques that do not utilize blockchain technology. In this paper, we study malware detection models which are based on blockchain technology. Furthermore, we elaborate on the effect of blockchain technology in malware detection, especially in the android environment.Keywords: malware analysis, blockchain, malware attacks, malware detection approaches
Procedia PDF Downloads 871134 Comprehensive Review of Adversarial Machine Learning in PDF Malware
Authors: Preston Nabors, Nasseh Tabrizi
Abstract:
Portable Document Format (PDF) files have gained significant popularity for sharing and distributing documents due to their universal compatibility. However, the widespread use of PDF files has made them attractive targets for cybercriminals, who exploit vulnerabilities to deliver malware and compromise the security of end-user systems. This paper reviews notable contributions in PDF malware detection, including static, dynamic, signature-based, and hybrid analysis. It presents a comprehensive examination of PDF malware detection techniques, focusing on the emerging threat of adversarial sampling and the need for robust defense mechanisms. The paper highlights the vulnerability of machine learning classifiers to evasion attacks. It explores adversarial sampling techniques in PDF malware detection to produce mimicry and reverse mimicry evasion attacks, which aim to bypass detection systems. Improvements for future research are identified, including accessible methods, applying adversarial sampling techniques to malicious payloads, evaluating other models, evaluating the importance of features to malware, implementing adversarial defense techniques, and conducting comprehensive examination across various scenarios. By addressing these opportunities, researchers can enhance PDF malware detection and develop more resilient defense mechanisms against adversarial attacks.Keywords: adversarial attacks, adversarial defense, adversarial machine learning, intrusion detection, PDF malware, malware detection, malware detection evasion
Procedia PDF Downloads 391133 'Propaganda by the Deed', 'Armed Propaganda' and Mass Mobilization: The Missing Link in the Left-Wing Terrorist Thinking
Authors: Ersun N. Kurtulus
Abstract:
One of the strategic goals of left-wing terrorism, both in its Anarchist and Marxist-Leninist forms, was mobilization of masses as a first step in launching a revolution. However, in the canonical texts of left-wing terrorist literature (such as the works of Brousse, Nachaev, Bakunin, Kropotkin, Most, Heinzen, Guevara and Marighella) it is not clear how resort to terrorist tactics such as assassinations or bomb attacks will lead to mobilization of masses. This link is usually presumed and taken for granted. However, in other, less known terrorist texts, where there is some elaboration upon this link, two conflicting views emerge: (i) terrorist attacks are supposed to cause state repression which in turn radicalizes masses and opens up the way for recruitment and mobilization versus (ii) terrorist attacks are supposed to demonstrate the hollowness of the already existent state repression and thereby encourage mobilization of masses that are already radicalized but inactive due fear caused by state repression. The paper argues that terrorism studies have largely overemphasized the former while the latter has remained more or less unnoticed.Keywords: terrorism, repression, radical left, mobilization of masses
Procedia PDF Downloads 2251132 Screening of Minimal Salt Media for Biosurfactant Production by Bacillus spp.
Authors: Y. M. Al-Wahaibi, S. N. Al-Bahry, A. E. Elshafie, A. S. Al-Bemani, S. J. Joshi, A. K. Al-Bahri
Abstract:
Crude oil is a major source of global energy. The major problem is its widespread use and demand resulted is in increasing environmental pollution. One associated pollution problem is ‘oil spills’. Oil spills can be remediated with the use of chemical dispersants, microbial biodegradation and microbial metabolites such as biosurfactants. Four different minimal salt media for biosurfactant production by Bacillus isolated from oil contaminated sites from Oman were screened. These minimal salt media were supplemented with either glucose or sucrose as a carbon source. Among the isolates, W16 and B30 produced the most active biosurfactants. Isolate W16 produced better biosurfactant than the rest, and reduced surface tension (ST) and interfacial tension (IFT) to 25.26mN/m and 2.29mN/m respectively within 48h which are characteristics for removal of oil in contaminated sites. Biosurfactant was produced in bulk and extracted using acid precipitation method. Thin Layer Chromatography (TLC) of acid precipitate biosurfactant revealed two concentrated bands. Further studies of W16 biosurfactant in bioremediation of oil spills are recommended.Keywords: oil contamination, remediation, Bacillus spp, biosurfactant, surface tension, interfacial tension
Procedia PDF Downloads 2771131 Classification of IoT Traffic Security Attacks Using Deep Learning
Authors: Anum Ali, Kashaf ad Dooja, Asif Saleem
Abstract:
The future smart cities trend will be towards Internet of Things (IoT); IoT creates dynamic connections in a ubiquitous manner. Smart cities offer ease and flexibility for daily life matters. By using small devices that are connected to cloud servers based on IoT, network traffic between these devices is growing exponentially, whose security is a concerned issue, since ratio of cyber attack may make the network traffic vulnerable. This paper discusses the latest machine learning approaches in related work further to tackle the increasing rate of cyber attacks, machine learning algorithm is applied to IoT-based network traffic data. The proposed algorithm train itself on data and identify different sections of devices interaction by using supervised learning which is considered as a classifier related to a specific IoT device class. The simulation results clearly identify the attacks and produce fewer false detections.Keywords: IoT, traffic security, deep learning, classification
Procedia PDF Downloads 1521130 Intrusion Detection In MANET Using Game Theory
Authors: S. B. Kumbalavati, J. D. Mallapur, K. Y. Bendigeri
Abstract:
A mobile Ad-hoc network (MANET) is a multihop wireless network where nodes communicate each other without any pre-deployed infrastructure. There is no central administrating unit. Hence, MANET is generally prone to many of the attacks. These attacks may alter, release or deny data. These attacks are nothing but intrusions. Intrusion is a set of actions that attempts to compromise integrity, confidentiality and availability of resources. A major issue in the design and operation of ad-hoc network is sharing the common spectrum or common channel bandwidth among all the nodes. We are performing intrusion detection using game theory approach. Game theory is a mathematical tool for analysing problems of competition and negotiation among the players in any field like marketing, e-commerce and networking. In this paper mathematical model is developed using game theory approach and intruders are detected and removed. Bandwidth utilization is estimated and comparison is made between bandwidth utilization with intrusion detection technique and without intrusion detection technique. Percentage of intruders and efficiency of the network is analysed.Keywords: ad-hoc network, IDS, game theory, sensor networks
Procedia PDF Downloads 3871129 The Biofertilizer Effect of Pseudomonas of Salt Soils of the North-West Algerian, Study of Comportment of Bean (Vicia Faba)
Authors: Djoudi Abdelhak, Djibaoui Rachid, Reguieg Yassaad Houcine
Abstract:
Our study focuses on the identification of some species of Pseudomonas (P4, P5, P7 and P8) isolated from saline soils in northwestern Algeria and the effect of their metabolites on the growth of Alternaria alternata the causative agent of the blight of the bean disease (Vicia faba). We are also interested in stimulating the growth of this plant species in saline conditions (60 mM/l NaCl) and the absence of salts. The analysis focuses on rates of inhibition of mycelial growth of Alternaria alternata strain and the rate of growth of plants inoculated with strains of Pseudomonas expressed by biometrics. According to the results of the in-vitro test, P5 and P8 species and their metabolites showed a significant effect on mycelia growth and production of spores of Alternaria alternata. The in-vivo test shows that the species P8 and P5 were significantly and positively influencing the growth in biometric parameters of the bean in saline and salt-free condition. Inoculation with strain P5 has promoted the growth of the bean in stem height, stem fresh weight and dry weight of stems of 108.59%, 115.28%, 104.33%, respectively, in the presence of salt Inoculation with strain P5 has fostered the growth of the bean stem fresh weight of 112.47% in the presence of salt The effect of Pseudomonas species on the development of Vicia faba and the growth of Alternaria alternata is considering new techniques and methods of biological production and crop protection.Keywords: pseudomonas, vicia faba, alternaria alternata, promoting of plant growth
Procedia PDF Downloads 3921128 Sustainable Separation of Nicotine from Its Aqueous Solutions
Authors: Zoran Visak, Joana Lopes, Vesna Najdanovic-Visak
Abstract:
Within this study, the separation of nicotine from its aqueous solutions, using inorganic salt sodium chloride or ionic liquid (molten salt) ECOENG212® as salting-out media, was carried out. Thus, liquid-liquid equilibria of the ternary solutions (nicotine+water+NaCl) and (nicotine+water+ECOENG212®) were determined at ambient pressure, 0.1 MPa, at three temperatures. The related phase diagrams were constructed in two manners: by adding the determined cloud-points and by the chemical analysis of phases in equilibrium (tie-line data). The latter were used to calculate two important separation parameters - partition coefficients of nicotine and separation factors. The impacts of the initial compositions of the mother solutions and of temperature on the liquid-liquid phase separation and partition coefficients were analyzed and discussed. The results obtained clearly showed that both investigated salts are good salting-out media for the efficient and sustainable separation of nicotine from its solutions with water. However, when compared, sodium chloride exhibited much better separation performance than the ionic liquid.Keywords: nicotine, liquid-liquid separation, inorganic salt, ionic liquid
Procedia PDF Downloads 3111127 Tectono-Stratigraphic Architecture, Depositional Systems and Salt Tectonics to Strike-Slip Faulting in Kribi-Campo-Cameroon Atlantic Margin with an Unsupervised Machine Learning Approach (West African Margin)
Authors: Joseph Bertrand Iboum Kissaaka, Charles Fonyuy Ngum Tchioben, Paul Gustave Fowe Kwetche, Jeannette Ngo Elogan Ntem, Joseph Binyet Njebakal, Ribert Yvan Makosso-Tchapi, François Mvondo Owono, Marie Joseph Ntamak-Nida
Abstract:
Located in the Gulf of Guinea, the Kribi-Campo sub-basin belongs to the Aptian salt basins along the West African Margin. In this paper, we investigated the tectono-stratigraphic architecture of the basin, focusing on the role of salt tectonics and strike-slip faults along the Kribi Fracture Zone with implications for reservoir prediction. Using 2D seismic data and well data interpreted through sequence stratigraphy with integrated seismic attributes analysis with Python Programming and unsupervised Machine Learning, at least six second-order sequences, indicating three main stages of tectono-stratigraphic evolution, were determined: pre-salt syn-rift, post-salt rift climax and post-rift stages. The pre-salt syn-rift stage with KTS1 tectonosequence (Barremian-Aptian) reveals a transform rifting along NE-SW transfer faults associated with N-S to NNE-SSW syn-rift longitudinal faults bounding a NW-SE half-graben filled with alluvial to lacustrine-fan delta deposits. The post-salt rift-climax stage (Lower to Upper Cretaceous) includes two second-order tectonosequences (KTS2 and KTS3) associated with the salt tectonics and Campo High uplift. During the rift-climax stage, the growth of salt diapirs developed syncline withdrawal basins filled by early forced regression, mid transgressive and late normal regressive systems tracts. The early rift climax underlines some fine-grained hangingwall fans or delta deposits and coarse-grained fans from the footwall of fault scarps. The post-rift stage (Paleogene to Neogene) contains at least three main tectonosequences KTS4, KTS5 and KTS6-7. The first one developed some turbiditic lobe complexes considered as mass transport complexes and feeder channel-lobe complexes cutting the unstable shelf edge of the Campo High. The last two developed submarine Channel Complexes associated with lobes towards the southern part and braided delta to tidal channels towards the northern part of the Kribi-Campo sub-basin. The reservoir distribution in the Kribi-Campo sub-basin reveals some channels, fan lobes reservoirs and stacked channels reaching up to the polygonal fault systems.Keywords: tectono-stratigraphic architecture, Kribi-Campo sub-basin, machine learning, pre-salt sequences, post-salt sequences
Procedia PDF Downloads 561126 Cyber Security and Risk Assessment of the e-Banking Services
Authors: Aisha F. Bushager
Abstract:
Today we are more exposed than ever to cyber threats and attacks at personal, community, organizational, national, and international levels. More aspects of our lives are operating on computer networks simply because we are living in the fifth domain, which is called the Cyberspace. One of the most sensitive areas that are vulnerable to cyber threats and attacks is the Electronic Banking (e-Banking) area, where the banking sector is providing online banking services to its clients. To be able to obtain the clients trust and encourage them to practice e-Banking, also, to maintain the services provided by the banks and ensure safety, cyber security and risks control should be given a high priority in the e-banking area. The aim of the study is to carry out risk assessment on the e-banking services and determine the cyber threats, cyber attacks, and vulnerabilities that are facing the e-banking area specifically in the Kingdom of Bahrain. To collect relevant data, structured interviews were taken place with e-banking experts in different banks. Then, collected data where used as in input to the risk management framework provided by the National Institute of Standards and Technology (NIST), which was the model used in the study to assess the risks associated with e-banking services. The findings of the study showed that the cyber threats are commonly human errors, technical software or hardware failure, and hackers, on the other hand, the most common attacks facing the e-banking sector were phishing, malware attacks, and denial-of-service. The risks associated with the e-banking services were around the moderate level, however, more controls and countermeasures must be applied to maintain the moderate level of risks. The results of the study will help banks discover their vulnerabilities and maintain their online services, in addition, it will enhance the cyber security and contribute to the management and control of risks that are facing the e-banking sector.Keywords: cyber security, e-banking, risk assessment, threats identification
Procedia PDF Downloads 3501125 The Journey of a Malicious HTTP Request
Authors: M. Mansouri, P. Jaklitsch, E. Teiniker
Abstract:
SQL injection on web applications is a very popular kind of attack. There are mechanisms such as intrusion detection systems in order to detect this attack. These strategies often rely on techniques implemented at high layers of the application but do not consider the low level of system calls. The problem of only considering the high level perspective is that an attacker can circumvent the detection tools using certain techniques such as URL encoding. One technique currently used for detecting low-level attacks on privileged processes is the tracing of system calls. System calls act as a single gate to the Operating System (OS) kernel; they allow catching the critical data at an appropriate level of detail. Our basic assumption is that any type of application, be it a system service, utility program or Web application, “speaks” the language of system calls when having a conversation with the OS kernel. At this level we can see the actual attack while it is happening. We conduct an experiment in order to demonstrate the suitability of system call analysis for detecting SQL injection. We are able to detect the attack. Therefore we conclude that system calls are not only powerful in detecting low-level attacks but that they also enable us to detect high-level attacks such as SQL injection.Keywords: Linux system calls, web attack detection, interception, SQL
Procedia PDF Downloads 3581124 BFDD-S: Big Data Framework to Detect and Mitigate DDoS Attack in SDN Network
Authors: Amirreza Fazely Hamedani, Muzzamil Aziz, Philipp Wieder, Ramin Yahyapour
Abstract:
Software-defined networking in recent years came into the sight of so many network designers as a successor to the traditional networking. Unlike traditional networks where control and data planes engage together within a single device in the network infrastructure such as switches and routers, the two planes are kept separated in software-defined networks (SDNs). All critical decisions about packet routing are made on the network controller, and the data level devices forward the packets based on these decisions. This type of network is vulnerable to DDoS attacks, degrading the overall functioning and performance of the network by continuously injecting the fake flows into it. This increases substantial burden on the controller side, and the result ultimately leads to the inaccessibility of the controller and the lack of network service to the legitimate users. Thus, the protection of this novel network architecture against denial of service attacks is essential. In the world of cybersecurity, attacks and new threats emerge every day. It is essential to have tools capable of managing and analyzing all this new information to detect possible attacks in real-time. These tools should provide a comprehensive solution to automatically detect, predict and prevent abnormalities in the network. Big data encompasses a wide range of studies, but it mainly refers to the massive amounts of structured and unstructured data that organizations deal with on a regular basis. On the other hand, it regards not only the volume of the data; but also that how data-driven information can be used to enhance decision-making processes, security, and the overall efficiency of a business. This paper presents an intelligent big data framework as a solution to handle illegitimate traffic burden on the SDN network created by the numerous DDoS attacks. The framework entails an efficient defence and monitoring mechanism against DDoS attacks by employing the state of the art machine learning techniques.Keywords: apache spark, apache kafka, big data, DDoS attack, machine learning, SDN network
Procedia PDF Downloads 1691123 Structural and Electronic Properties of the Rock-salt BaxSr1−xS Alloys
Authors: B. Bahloul, K. Babesse, A. Dkhira, Y. Bahloul, L. Amirouche
Abstract:
Structural and electronic properties of the rock-salt BaxSr1−xS are calculated using the first-principles calculations based on the density functional theory (DFT) within the generalized gradient approximation (GGA), the local density approximation (LDA) and the virtual-crystal approximation (VCA). The calculated lattice parameters at equilibrium volume for x=0 and x=1 are in good agreement with the literature data. The BaxSr1−xS alloys are found to be an indirect band gap semiconductor. Moreoever, for the composition (x) ranging between [0-1], we think that our results are well discussed and well predicted.Keywords: semiconductor, Ab initio calculations, rocksalt, band structure, BaxSr1−xS
Procedia PDF Downloads 395