Search results for: pilot contamination attacks
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 2290

Search results for: pilot contamination attacks

2110 Design of a Professional Development Framework in Teaching and Learning for Engineering Educators

Authors: Orla McConnell, Cormac MacMahon, Jen Harvey

Abstract:

Ireland’s national professional development framework for those who teach in higher education, aims to provide guidance and leadership in the planning, developing and engaging in professional development practices. A series of pilot projects have been initiated to help explore the framework’s likely utility and acceptance by educators and their institutions. These projects require engagement with staff in the interpretation and adaption of the framework within their working contexts. The purpose of this paper is to outline the development of one such project with engineering educators at three Institutes of Technology seeking designation as a technological university. The initiative aims to gain traction in the acceptance of the framework with the engineering education community by linking core and discipline-specific teaching and learning competencies with professional development activities most valued by engineering educators. Informed by three strands of literature: professional development in higher education; engineering education; and teaching and learning training provisions, the project begins with a survey of all those involved in teaching and learning in engineering across the three institutes. Based on engagement with key stakeholders, subsequent qualitative research informs the contextualization of the national framework for discipline-specific and institutional piloting. The paper concludes by exploring engineering educator perceptions of the national framework’s utility based on their engagement with the pilot process. Feedback from the pilot indicates that there is a significant gap between the professional development needs of engineering educators and the current professional development provision in teaching and learning.

Keywords: engineering education, pilot, professional development, teaching and learning

Procedia PDF Downloads 310
2109 Pilot-Assisted Direct-Current Biased Optical Orthogonal Frequency Division Multiplexing Visible Light Communication System

Authors: Ayad A. Abdulkafi, Shahir F. Nawaf, Mohammed K. Hussein, Ibrahim K. Sileh, Fouad A. Abdulkafi

Abstract:

Visible light communication (VLC) is a new approach of optical wireless communication proposed to support the congested radio frequency (RF) spectrum. VLC systems are combined with orthogonal frequency division multiplexing (OFDM) to achieve high rate transmission and high spectral efficiency. In this paper, we investigate the Pilot-Assisted Channel Estimation for DC biased Optical OFDM (PACE-DCO-OFDM) systems to reduce the effects of the distortion on the transmitted signal. Least-square (LS) and linear minimum mean-squared error (LMMSE) estimators are implemented in MATLAB/Simulink to enhance the bit-error-rate (BER) of PACE-DCO-OFDM. Results show that DCO-OFDM system based on PACE scheme has achieved better BER performance compared to conventional system without pilot assisted channel estimation. Simulation results show that the proposed PACE-DCO-OFDM based on LMMSE algorithm can more accurately estimate the channel and achieves better BER performance when compared to the LS based PACE-DCO-OFDM and the traditional system without PACE. For the same signal to noise ratio (SNR) of 25 dB, the achieved BER is about 5×10-4 for LMMSE-PACE and 4.2×10-3 with LS-PACE while it is about 2×10-1 for system without PACE scheme.

Keywords: channel estimation, OFDM, pilot-assist, VLC

Procedia PDF Downloads 160
2108 A Review of Security Attacks and Intrusion Detection Schemes in Wireless Sensor Networks: A Survey

Authors: Maleh Yassine, Ezzati Abdellah

Abstract:

Wireless Sensor Networks (WSNs) are currently used in different industrial and consumer applications, such as earth monitoring, health related applications, natural disaster prevention, and many other areas. Security is one of the major aspects of wireless sensor networks due to the resource limitations of sensor nodes. However, these networks are facing several threats that affect their functioning and their life. In this paper we present security attacks in wireless sensor networks, and we focus on a review and analysis of the recent Intrusion Detection schemes in WSNs.

Keywords: wireless sensor networks, security attack, denial of service, IDS, cluster-based model, signature based IDS, hybrid IDS

Procedia PDF Downloads 357
2107 Hydrochemical Contamination Profiling and Spatial-Temporal Mapping with the Support of Multivariate and Cluster Statistical Analysis

Authors: Sofia Barbosa, Mariana Pinto, José António Almeida, Edgar Carvalho, Catarina Diamantino

Abstract:

The aim of this work was to test a methodology able to generate spatial-temporal maps that can synthesize simultaneously the trends of distinct hydrochemical indicators in an old radium-uranium tailings dam deposit. Multidimensionality reduction derived from principal component analysis and subsequent data aggregation derived from clustering analysis allow to identify distinct hydrochemical behavioural profiles and to generate synthetic evolutionary hydrochemical maps.

Keywords: Contamination plume migration, K-means of PCA scores, groundwater and mine water monitoring, spatial-temporal hydrochemical trends

Procedia PDF Downloads 201
2106 Infection Risk of Fecal Coliform Contamination in Drinking Water Sources of Urban Slum Dwellers: Application of Quantitative Microbiological Risk Assessment

Authors: Sri Yusnita Irda Sari, Deni Kurniadi Sunjaya, Ardini Saptaningsih Raksanagara

Abstract:

Water is one of the fundamental basic needs for human life, particularly drinking water sources. Although water quality is getting better, fecal-contamination of water is still found around the world, especially in the slum area of mid-low income countries. Drinking water source contamination in urban slum dwellers increases the risk of water borne diseases. Low level of sanitation and poor drinking water supply known as risk factors for diarrhea, moreover bacteria-contaminated drinking water source is the main cause of diarrhea in developing countries. This study aimed to assess risk infection due to Fecal Coliform contamination in various drinking water sources in urban area by applying Quantitative Microbiological Risk Assessment (QMRA). A Cross-sectional survey was conducted in a period of August to October 2015. Water samples were taken by simple random sampling from households in Cikapundung river basin which was one of urban slum area in the center of Bandung city, Indonesia. About 379 water samples from 199 households and 15 common wells were tested. Half of the households used treated drinking water from water gallon mostly refill water gallon which was produced in drinking water refill station. Others used raw water sources which need treatment before consume as drinking water such as tap water, borehole, dug well and spring water source. Annual risk to get infection due to Fecal Coliform contamination from highest to lowest risk was dug well (1127.9 x 10-5), spring water (49.7 x 10-5), borehole (1.383 x 10-5) and tap water (1.121 x 10-5). Annual risk infection of refill drinking water was 1.577 x 10-5 which is comparable to borehole and tap water. Household water treatment and storage to make raw water sources drinkable is essential to prevent risk of water borne diseases. Strong regulation and intense monitoring of refill water gallon quality should be prioritized by the government; moreover, distribution of tap water should be more accessible and affordable especially in urban slum area.

Keywords: drinking water, quantitative microbiological risk assessment, slum, urban

Procedia PDF Downloads 258
2105 A Novel Approach for Energy Utilisation in a Pyrolysis Plant

Authors: S. Murugan, Bohumil Horak

Abstract:

Pyrolysis is one of the possible technologies to derive energy from waste organic substances. In recent years, pilot level and demonstrated plants have been installed in few countries. The heat energy lost during the process is not effectively utilized resulting in less savings of energy and money. This paper proposes a novel approach to integrate a combined heat and power unit(CHP) and reduce the primary energy consumption in a tyre pyrolysis pilot plant. The proposal primarily uses the micro combined heat and power concept that will help to produce both heat and power in the process.

Keywords: pyrolysis, waste tyres, waste plastics, biomass, waste heat

Procedia PDF Downloads 311
2104 A Review of Toxic and Non-Toxic Cyanobacteria Species Occurrence in Water Supplies Destined for Maize Meal Production Process: A Case Study of Vhembe District

Authors: M. Mutoti, J. Gumbo, A. Jideani

Abstract:

Cyanobacteria or blue green algae have been part of the human diet for thousands of years. Cyanobacteria can multiply quickly in surface waters and form blooms when favorable conditions prevail, such as high temperature, intense light, high pH, and increased availability of nutrients, especially phosphorous and nitrogen, artificially released by anthropogenic activities. Consumption of edible cyanotoxins such as Spirulina may reduce risks of cataracts and age related macular degeneration. Sulfate polysaccharides exhibit antitumor, anticoagulant, anti-mutagenic, anti-inflammatory, antimicrobial, and even antiviral activity against HIV, herpes, and hepatitis. In humans, exposure to cyanotoxins can occur in various ways; however, the oral route is the most important. This is mainly through drinking water, or by eating contaminated foods; it may even involve ingesting water during recreational activities. This paper seeks to present a review on cyanobacteria/cyanotoxin contamination of water and food and implications for human health. In particular, examining the water quality used during maize seed that passes through mill grinding processes. In order to fulfil the objective, this paper starts with the theoretical framework on cyanobacteria contamination of food that will guide review of the present paper. A number of methods for decontaminating cyanotoxins in food is currently available. Therefore, physical, chemical, and biological methods for treating cyanotoxins are reviewed and compared. Furthermore, methods that are utilized for detecting and identifying cyanobacteria present in water and food were also informed in this review. This review has indicated various routes through which humans can be exposed to cyanotoxins. Accumulation of cyanotoxins, mainly microcystins, in food has raised an awareness of the importance of food as microcystins exposure route to human body. Therefore, this review demonstrates the importance of expanding research on cyanobacteria/cyanotoxin contamination of water and food for water treatment and water supply management, with focus on examining water for domestic use. This will help providing information regarding the prevention or minimization of contamination of water and food, and also reduction or removal of contamination through treatment processes and prevention of recontamination in the distribution system.

Keywords: biofilm, cyanobacteria, cyanotoxin, food contamination

Procedia PDF Downloads 136
2103 Proposed Anticipating Learning Classifier System for Cloud Intrusion Detection (ALCS-CID)

Authors: Wafa' Slaibi Alsharafat

Abstract:

Cloud computing is a modern approach in network environment. According to increased number of network users and online systems, there is a need to help these systems to be away from unauthorized resource access and detect any attempts for privacy contravention. For that purpose, Intrusion Detection System is an effective security mechanism to detect any attempts of attacks for cloud resources and their information. In this paper, Cloud Intrusion Detection System has been proposed in term of reducing or eliminating any attacks. This model concerns about achieving high detection rate after conducting a set of experiments using benchmarks dataset called KDD'99.

Keywords: IDS, cloud computing, anticipating classifier system, intrusion detection

Procedia PDF Downloads 450
2102 Clustering of Association Rules of ISIS & Al-Qaeda Based on Similarity Measures

Authors: Tamanna Goyal, Divya Bansal, Sanjeev Sofat

Abstract:

In world-threatening terrorist attacks, where early detection, distinction, and prediction are effective diagnosis techniques and for functionally accurate and precise analysis of terrorism data, there are so many data mining & statistical approaches to assure accuracy. The computational extraction of derived patterns is a non-trivial task which comprises specific domain discovery by means of sophisticated algorithm design and analysis. This paper proposes an approach for similarity extraction by obtaining the useful attributes from the available datasets of terrorist attacks and then applying feature selection technique based on the statistical impurity measures followed by clustering techniques on the basis of similarity measures. On the basis of degree of participation of attributes in the rules, the associative dependencies between the attacks are analyzed. Consequently, to compute the similarity among the discovered rules, we applied a weighted similarity measure. Finally, the rules are grouped by applying using hierarchical clustering. We have applied it to an open source dataset to determine the usability and efficiency of our technique, and a literature search is also accomplished to support the efficiency and accuracy of our results.

Keywords: association rules, clustering, similarity measure, statistical approaches

Procedia PDF Downloads 297
2101 A Robust Hybrid Blind Digital Image Watermarking System Using Discrete Wavelet Transform and Contourlet Transform

Authors: Nidal F. Shilbayeh, Belal AbuHaija, Zainab N. Al-Qudsy

Abstract:

In this paper, a hybrid blind digital watermarking system using Discrete Wavelet Transform (DWT) and Contourlet Transform (CT) has been implemented and tested. The implemented combined digital watermarking system has been tested against five common types of image attacks. The performance evaluation shows improved results in terms of imperceptibility, robustness, and high tolerance against these attacks; accordingly, the system is very effective and applicable.

Keywords: discrete wavelet transform (DWT), contourlet transform (CT), digital image watermarking, copyright protection, geometric attack

Procedia PDF Downloads 371
2100 Illumina MiSeq Sequencing for Bacteria Identification on Audio-Visual Materials

Authors: Tereza Branyšová, Martina Kračmarová, Kateřina Demnerová, Michal Ďurovič, Hana Stiborová

Abstract:

Microbial deterioration threatens all objects of cultural heritage, including audio-visual materials. Fungi are commonly known to be the main factor in audio-visual material deterioration. However, although being neglected, bacteria also play a significant role. In addition to microbial contamination of materials, it is also essential to analyse air as a possible contamination source. This work aims to identify bacterial species in the archives of the Czech Republic that occur on audio-visual materials as well as in the air in the archives. For sampling purposes, the smears from the materials were taken by sterile polyurethane sponges, and the air was collected using a MAS-100 aeroscope. Metagenomic DNA from all collected samples was immediately isolated and stored at -20 °C. DNA library for the 16S rRNA gene was prepared using two-step PCR and specific primers and the concentration step was included due to meagre yields of the DNA. After that, the samples were sent to the University of Fairbanks, Alaska, for Illumina MiSeq sequencing. Subsequently, the analysis of the sequences was conducted in R software. The obtained sequences were assigned to the corresponding bacterial species using the DADA2 package. The impact of air contamination and the impact of different photosensitive layers that audio-visual materials were made of, such as gelatine, albumen, and collodion, were evaluated. As a next step, we will take a deeper focus on air contamination. We will select an appropriate culture-dependent approach along with a culture-independent approach to observe a metabolically active species in the air. Acknowledgment: This project is supported by grant no. DG18P02OVV062 of the Ministry of Culture of the Czech Republic.

Keywords: cultural heritage, Illumina MiSeq, metagenomics, microbial identification

Procedia PDF Downloads 133
2099 Analysis of Spamming Threats and Some Possible Solutions for Online Social Networking Sites (OSNS)

Authors: Dilip Singh Sisodia, Shrish Verma

Abstract:

Spamming is the most common issue seen nowadays in the Internet especially in Online Social Networking Sites (like Facebook, Twitter, and Google+ etc.). Spam messages keep wasting Internet bandwidth and the storage space of servers. On social network sites; spammers often disguise themselves by creating fake accounts and hijacking user’s accounts for personal gains. They behave like normal user and they continue to change their spamming strategy. To prevent this, most modern spam-filtering solutions are deployed on the receiver side; they are good at filtering spam for end users. In this paper we are presenting some spamming techniques their behaviour and possible solutions. We have analyzed how Spammers enters into online social networking sites (OSNSs) and how they target it and the techniques they use for it. The five discussed techniques of spamming techniques which are clickjacking, social engineered attacks, cross site scripting, URL shortening, and drive by download. We have used elgg framework for demonstration of some of spamming threats and respective implementation of solutions.

Keywords: online social networking sites, spam, attacks, internet, clickjacking / likejacking, drive-by-download, URL shortening, networking, socially engineered attacks, elgg framework

Procedia PDF Downloads 323
2098 Secure Image Encryption via Enhanced Fractional Order Chaotic Map

Authors: Ismail Haddad, Djamel Herbadji, Aissa Belmeguenai, Selma Boumerdassi

Abstract:

in this paper, we provide a novel approach for image encryption that employs the Fibonacci matrix and an enhanced fractional order chaotic map. The enhanced map overcomes the drawbacks of the classical map, especially the limited chaotic range and non-uniform distribution of chaotic sequences, resulting in a larger encryption key space. As a result, this strategy improves the encryption system's security. Our experimental results demonstrate that our proposed algorithm effectively encrypts grayscale images with exceptional efficiency. Furthermore, our technique is resistant to a wide range of potential attacks, including statistical and entropy attacks.

Keywords: image encryption, logistic map, fibonacci matrix, grayscale images

Procedia PDF Downloads 291
2097 The Determination of Contamination Rate of Traditional White Cheese in Behbahan Markets to Coliforms and Pathogenic Escherichia Coli

Authors: Sana Mohammad Jafar, Hossaini Seyahi Zohreh

Abstract:

Infections and food intoxication caused by microbial contamination of food is of major issues in different countries, and diseases caused by the consumption of contaminated food included a large percentage of the country's health problems. Since traditional cheese for cultural reasons, good taste and smell in many parts of the area still has the important place in people's food basket, transmission of pathogenic bacteria could be at risk human health through the consumption of this food. In this study selected randomly 100 samples of 250 grams of traditional cheeses supplied in the city Behbahan market and adjacent to the ice was transferred to the laboratory and microbiological tests were performed immediately. According to the results, from 100 samples tested traditional cheese, 94 samples (94% of samples) were contaminated with coliforms, which of this number 75 samples (75% of samples) the contamination rate was higher than the limit (more than 100 cfu/g). Of the total samples, 36 samples (36% of samples) were contaminated with fecal coliform which of this number 30 samples (30% of samples) were contaminated with Escherichia.coli bacteria. Based on the results of agglutination test,no samples was found positive as pathogenic Escherichia.coli.

Keywords: determination, traditional cheese, Behbahan, Escherichia coli

Procedia PDF Downloads 483
2096 Ecological Risk Aspects of Essential Trace Metals in Soil Derived From Gold Mining Region, South Africa

Authors: Lowanika Victor Tibane, David Mamba

Abstract:

Human body, animals, and plants depend on certain essential metals in permissible quantities for their survival. Excessive metal concentration may cause severe malfunctioning of the organisms and even fatal in extreme cases. Because of gold mining in the Witwatersrand basin in South Africa, enormous untreated mine dumps comprise elevated concentration of essential trace elements. Elevated quantities of trace metal have direct negative impact on the quality of soil for different land use types, reduce soil efficiency for plant growth, and affect the health human and animals. A total of 21 subsoil samples were examined using inductively coupled plasma optical emission spectrometry and X-ray fluorescence methods and the results elevated men concentration of Fe (36,433.39) > S (5,071.83) > Cu (1,717,28) > Mn (612.81) > Cr (74.52) > Zn (68.67) > Ni (40.44) > Co (9.63) > P (3.49) > Mo > (2.74), reported in mg/kg. Using various contamination indices, it was discovered that the sites surveyed are on average moderately contaminated with Co, Cr, Cu, Mn, Ni, S, and Zn. The ecological risk assessment revealed a low ecological risk for Cr, Ni and Zn, whereas Cu poses a very high ecological risk.

Keywords: essential trace elements, soil contamination, contamination indices, toxicity, descriptive statistics, ecological risk evaluation

Procedia PDF Downloads 71
2095 Risk Assessment of Contamination by Heavy Metals in Sarcheshmeh Copper Complex of Iran Using Topsis Method

Authors: Hossein Hassani, Ali Rezaei

Abstract:

In recent years, the study of soil contamination problems surrounding mines and smelting plants has attracted some serious attention of the environmental experts. These elements due to the non- chemical disintegration and nature are counted as environmental stable and durable contaminants. Variability of these contaminants in the soil and the time and financial limitation for the favorable environmental application, in order to reduce the risk of their irreparable negative consequences on environment, caused to apply the favorable grading of these contaminant for the further success of the risk management processes. In this study, we use the contaminants factor risk indices, average concentration, enrichment factor and geoaccumulation indices for evaluating the metal contaminant of including Pb, Ni, Se, Mo and Zn in the soil of Sarcheshmeh copper mine area. For this purpose, 120 surface soil samples up to the depth of 30 cm have been provided from the study area. And the metals have been analyzed using ICP-MS method. Comparison of the heavy and potentially toxic elements concentration in the soil samples with the world average value of the uncontaminated soil and shale average indicates that the value of Zn, Pb, Ni, Se and Mo is higher than the world average value and only the Ni element shows the lower value than the shale average. Expert opinions on the relative importance of each indicators were used to assign a final weighting of the metals and the heavy metals were ranked using the TOPSIS approach. This allows us to carry out efficient environmental proceedings, leading to the reduction of environmental ricks form the contaminants. According to the results, Ni, Pb, Mo, Zn, and Se have the highest rate of risk contamination in the soil samples of the study area.

Keywords: contamination coefficient, geoaccumulation factor, TOPSIS techniques, Sarcheshmeh copper complex

Procedia PDF Downloads 254
2094 Navigating Cyber Attacks with Quantum Computing: Leveraging Vulnerabilities and Forensics for Advanced Penetration Testing in Cybersecurity

Authors: Sayor Ajfar Aaron, Ashif Newaz, Sajjat Hossain Abir, Mushfiqur Rahman

Abstract:

This paper examines the transformative potential of quantum computing in the field of cybersecurity, with a focus on advanced penetration testing and forensics. It explores how quantum technologies can be leveraged to identify and exploit vulnerabilities more efficiently than traditional methods and how they can enhance the forensic analysis of cyber-attacks. Through theoretical analysis and practical simulations, this study highlights the enhanced capabilities of quantum algorithms in detecting and responding to sophisticated cyber threats, providing a pathway for developing more resilient cybersecurity infrastructures.

Keywords: cybersecurity, cyber forensics, penetration testing, quantum computing

Procedia PDF Downloads 22
2093 Survey Based Data Security Evaluation in Pakistan Financial Institutions against Malicious Attacks

Authors: Naveed Ghani, Samreen Javed

Abstract:

In today’s heterogeneous network environment, there is a growing demand for distrust clients to jointly execute secure network to prevent from malicious attacks as the defining task of propagating malicious code is to locate new targets to attack. Residual risk is always there no matter what solutions are implemented or whet so ever security methodology or standards being adapted. Security is the first and crucial phase in the field of Computer Science. The main aim of the Computer Security is gathering of information with secure network. No one need wonder what all that malware is trying to do: It's trying to steal money through data theft, bank transfers, stolen passwords, or swiped identities. From there, with the help of our survey we learn about the importance of white listing, antimalware programs, security patches, log files, honey pots, and more used in banks for financial data protection but there’s also a need of implementing the IPV6 tunneling with Crypto data transformation according to the requirements of new technology to prevent the organization from new Malware attacks and crafting of its own messages and sending them to the target. In this paper the writer has given the idea of implementing IPV6 Tunneling Secessions on private data transmission from financial organizations whose secrecy needed to be safeguarded.

Keywords: network worms, malware infection propagating malicious code, virus, security, VPN

Procedia PDF Downloads 336
2092 Investigation of Tourism and Development in Santo Domingo City

Authors: Mary Cruz

Abstract:

Founded from 1496 to 1502, Santo Domingo is the oldest European settlement in the Americas, inhabited without any discontinuity and was the first seat of Spanish power in the new world. Capital of the country since 1932.In this text, we discover Santo Domingo as an international tourist center, Urban Structure, Eco-tourism, Contamination and other issues related to tourism and development of this city. Founded from 1496 to 1502, Santo Domingo is the oldest European settlement in the Americas, inhabited without any discontinuity and was the first seat of Spanish power in the new world. Capital of the country since 1932. Encouraged by the United Nations and the World Bank, many Caribbean governments have encouraged tourism from the 1950s to boost their Third World economies. In this text, we discover Santo Domingo as an international tourist center, Urban Structure, Eco-tourism, Contamination and challenges of the first tourist destination in the Caribbean.

Keywords: eco-tourism, urban structure, contamination, development

Procedia PDF Downloads 297
2091 Strategic Innovation of Nanotechnology: Novel Applications of Biomimetics and Microfluidics in Food Safety

Authors: Boce Zhang

Abstract:

Strategic innovation of nanotechnology to promote food safety has drawn tremendous attentions among research groups, which includes the need for research support during the implementation of the Food Safety Modernization Act (FSMA) in the United States. There are urgent demands and knowledge gaps to the understanding of a) food-water-bacteria interface as for how pathogens persist and transmit during food processing and storage; b) minimum processing requirement needed to prevent pathogen cross-contamination in the food system. These knowledge gaps are of critical importance to the food industry. However, the lack of knowledge is largely hindered by the limitations of research tools. Our groups recently endeavored two novel engineering systems with biomimetics and microfluidics as a holistic approach to hazard analysis and risk mitigation, which provided unprecedented research opportunities to study pathogen behavior, in particular, contamination, and cross-contamination, at the critical food-water-pathogen interface. First, biomimetically-patterned surfaces (BPS) were developed to replicate the identical surface topography and chemistry of a natural food surface. We demonstrated that BPS is a superior research tool that empowers the study of a) how pathogens persist through sanitizer treatment, b) how to apply fluidic shear-force and surface tension to increase the vulnerability of the bacterial cells, by detaching them from a protected area, etc. Secondly, microfluidic devices were designed and fabricated to study the bactericidal kinetics in the sub-second time frame (0.1~1 second). The sub-second kinetics is critical because the cross-contamination process, which includes detachment, migration, and reattachment, can occur in a very short timeframe. With this microfluidic device, we were able to simulate and study these sub-second cross-contamination scenarios, and to further investigate the minimum sanitizer concentration needed to sufficiently prevent pathogen cross-contamination during the food processing. We anticipate that the findings from these studies will provide critical insight on bacterial behavior at the food-water-cell interface, and the kinetics of bacterial inactivation from a broad range of sanitizers and processing conditions, thus facilitating the development and implementation of science-based food safety regulations and practices to mitigate the food safety risks.

Keywords: biomimetic materials, microbial food safety, microfluidic device, nanotechnology

Procedia PDF Downloads 343
2090 Simultaneous Nitrification and Denitrification in Suspended Activated Sludge Process Augmented with Immobilized Biomass: A Pilot Study

Authors: Haon-Yao Chen, Cheng-Fang Lin, Pui-Kwan Andy Hong, Ping-Yi Yang, Kok Kwang Ng, Sheng-Fu Yang

Abstract:

Simultaneous nitrification and denitrification (SND) are a natural phenomenon in the soil environment that can be applied in wastewater treatment. At a domestic wastewater treatment plant, we performed a pilot test of installing bioplates with entrapped biomass into a conventional aeration basin for SND, and investigated the effects of bioplate packing ratio, hydraulic retention time, dissolved oxygen level, on/off aeration mode, and supplemental carbon and alkalinity on nitrogen removal. With the pilot aeration basin of 1.3 m3 loaded with mixed liquor suspended solids of 1500-2500 mg/L and bioplates at PR of 3.2% (3.2% basin volume) operated at HRT of 6 h and DO of 4-6 mg/L without supplemental carbon or alkalinity, nitrogen in the wastewater was removed to an effluent total nitrogen (TN) of 7.3 mg/L from an influent TN of 28 mg/L. The bioplate robust cellulose triacetate structure carrying the biomass shows promise in retrofitting conventional aeration basins for enhanced nutrient removal.

Keywords: immobilization, nitrification/denitrification, nutrient removal, total nitrogen

Procedia PDF Downloads 624
2089 Prediction of Metals Available to Maize Seedlings in Crude Oil Contaminated Soil

Authors: Stella O. Olubodun, George E. Eriyamremu

Abstract:

The study assessed the effect of crude oil applied at rates, 0, 2, 5, and 10% on the fractional chemical forms and availability of some metals in soils from Usen, Edo State, with no known crude oil contamination and soil from a crude oil spill site in Ubeji, Delta State, Nigeria. Three methods were used to determine the bioavailability of metals in the soils: maize (Zea mays) plant, EDTA and BCR sequential extraction. The sequential extract acid soluble fraction of the BCR extraction (most labile fraction of the soils, normally associated with bioavailability) were compared with total metal concentration in maize seedlings as a means to compare the chemical and biological measures of bioavailability. Total Fe was higher in comparison to other metals for the crude oil contaminated soils. The metal concentrations were below the limits of 4.7% Fe, 190mg/kg Cu and 720mg/kg Zn intervention values and 36mg/kg Cu and 140mg/kg Zn target values for soils provided by the Department of Petroleum Resources (DPR) guidelines. The concentration of the metals in maize seedlings increased with increasing rates of crude oil contamination. Comparison of the metal concentrations in maize seedlings with EDTA extractable concentrations showed that EDTA extracted more metals than maize plant.

Keywords: availability, crude oil contamination, EDTA, maize, metals

Procedia PDF Downloads 197
2088 Assessing Socio-economic Impacts of Arsenic and Iron Contamination in Groundwater: Feasibility of Rainwater Harvesting in Amdanga Block, North 24 Parganas, West Bengal, India

Authors: Rajkumar Ghosh

Abstract:

The present study focuses on conducting a socio-economic assessment of groundwater contamination by arsenic and iron and explores the feasibility of rainwater harvesting (RWH) as an alternative water source in the Amdanga Block of North 24 Parganas, West Bengal, India. The region is plagued by severe groundwater contamination, primarily due to excessive concentrations of arsenic and iron, which pose significant health risks to the local population. The study utilizes a mixed-methods approach, combining quantitative analysis of water samples collected from different locations within the Amdanga Block and socio-economic surveys conducted among the affected communities. The results reveal alarmingly high levels of arsenic and iron contamination in the groundwater, surpassing the World Health Organization (WHO) and Indian government's permissible limits. This contamination significantly impacts the health and well-being of the local population, leading to a range of health issues such as skin The water samples are analyzed for arsenic and iron levels, while the surveys gather data on water usage patterns, health conditions, and socio-economic factors. lesions, respiratory disorders, and gastrointestinal problems. Furthermore, the socio-economic assessment highlights the vulnerability of the affected communities due to limited access to safe drinking water. The findings reveal the adverse socio-economic implications, including increased medical expenditures, reduced productivity, and compromised educational opportunities. To address these challenges, the study explores the feasibility of rainwater harvesting as an alternative source of clean water. RWH systems have the potential to mitigate groundwater contamination by providing a sustainable and independent water supply. The assessment includes evaluating the rainwater availability, analyzing the infrastructure requirements, and estimating the potential benefits and challenges associated with RWH implementation in the study area. The findings of this study contribute to a comprehensive understanding of the socio-economic impact of groundwater contamination by arsenic and iron, emphasizing the urgency to address this critical issue in the Amdanga Block. The feasibility assessment of rainwater harvesting serves as a practical solution to ensure a safe and sustainable water supply, reducing the dependency on contaminated groundwater sources. The study's results can inform policymakers, researchers, and local stakeholders in implementing effective mitigation measures and promoting the adoption of rainwater harvesting as a viable alternative in similar arsenic and iron-contaminated regions.

Keywords: contamination, rainwater harvesting, groundwater, sustainable water supply

Procedia PDF Downloads 78
2087 Study on Security and Privacy Issues of Mobile Operating Systems Based on Malware Attacks

Authors: Huang Dennis, Aurelio Aziel, Burra Venkata Durga Kumar

Abstract:

Nowadays, smartphones and mobile operating systems have been popularly widespread in our daily lives. As people use smartphones, they tend to store more private and essential data on their devices, because of this it is very important to develop more secure mobile operating systems and cloud storage to secure the data. However, several factors can cause security risks in mobile operating systems such as malware, malicious app, phishing attacks, ransomware, and more, all of which can cause a big problem for users as they can access the user's private data. Those problems can cause data loss, financial loss, identity theft, and other serious consequences. Other than that, during the pandemic, people will use their mobile devices more and do all sorts of transactions online, which may lead to more victims of online scams and inexperienced users being the target. With the increase in attacks, researchers have been actively working to develop several countermeasures to enhance the security of operating systems. This study aims to provide an overview of the security and privacy issues in mobile operating systems, identifying the potential risk of operating systems, and the possible solutions. By examining these issues, we want to provide an easy understanding to users and researchers to improve knowledge and develop more secure mobile operating systems.

Keywords: mobile operating system, security, privacy, Malware

Procedia PDF Downloads 69
2086 Enhancing Internet of Things Security: A Blockchain-Based Approach for Preventing Spoofing Attacks

Authors: Salha Abdullah Ali Al-Shamrani, Maha Muhammad Dhaher Aljuhani, Eman Ali Ahmed Aldhaheri

Abstract:

With the proliferation of Internet of Things (IoT) devices in various industries, there has been a concurrent rise in security vulnerabilities, particularly spoofing attacks. This study explores the potential of blockchain technology in enhancing the security of IoT systems and mitigating these attacks. Blockchain's decentralized and immutable ledger offers significant promise for improving data integrity, transaction transparency, and tamper-proofing. This research develops and implements a blockchain-based IoT architecture and a reference network to simulate real-world scenarios and evaluate a blockchain-integrated intrusion detection system. Performance measures including time delay, security, and resource utilization are used to assess the system's effectiveness, comparing it to conventional IoT networks without blockchain. The results provide valuable insights into the practicality and efficacy of employing blockchain as a security mechanism, shedding light on the trade-offs between speed and security in blockchain deployment for IoT. The study concludes that despite minor increases in time consumption, the security benefits of incorporating blockchain technology into IoT systems outweigh potential drawbacks, demonstrating a significant potential for blockchain in bolstering IoT security.

Keywords: internet of things, spoofing, IoT, access control, blockchain, raspberry pi

Procedia PDF Downloads 42
2085 The Effects of Leadership on the Claim of Responsibility

Authors: Katalin Kovacs

Abstract:

In most forms of violence the perpetrators intend to hide their identities. Terrorism is different. Terrorist groups often take responsibility for their attacks, and consequently they reveal their identities. This unique characteristic of terrorism has been largely overlooked, and scholars are still puzzled as to why terrorist groups claim responsibility for their attacks. Certainly, the claim of responsibility is worth analysing. It would help to have a clearer picture of what terrorist groups try to achieve and how, but also to develop an understanding of the strategic planning of terrorist attacks and the message the terrorists intend to deliver. The research aims to answer the question why terrorist groups choose to claim responsibility for some of their attacks and not for others. In order to do so the claim of responsibility is considered to be a tactical choice, based on the assumption that terrorists weigh the costs and benefits of claiming responsibility. The main argument is that terrorist groups do not claim responsibility in cases when there is no tactical advantage gained from claiming responsibility. The idea that the claim of responsibility has tactical value offers the opportunity to test these assertions using a large scale empirical analysis. The claim of responsibility as a tactical choice depends on other tactical choices, such as the choice of target, the internationality of the attack, the number of victims and whether the group occupies territory or operates as an underground group. The structure of the terrorist groups and the level of decision making also affects the claim of responsibility. Terrorists on the lower level are less disciplined than the leaders. This means that the terrorists on lower levels pay less attention to the strategic objectives and engage easier in indiscriminate violence, and consequently they would less like to claim responsibility. Therefore, the research argues that terrorists, who are on a highest level of decision making would claim responsibility for the attacks as those are who takes into account the strategic objectives. As most studies on terrorism fail to provide definitions; therefore the researches are fragmented and incomparable. Separate, isolated researches do not support comprehensive thinking. It is also very important to note that there are only a few researches using quantitative methods. The aim of the research is to develop a new and comprehensive overview of the claim of responsibility based on strong quantitative evidence. By using well-established definitions and operationalisation the current research focuses on a broad range of attributes that can have tactical values in order to determine circumstances when terrorists are more likely to claim responsibility.

Keywords: claim of responsibility, leadership, tactical choice, terrorist group

Procedia PDF Downloads 294
2084 Pilot-free Image Transmission System of Joint Source Channel Based on Multi-Level Semantic Information

Authors: Linyu Wang, Liguo Qiao, Jianhong Xiang, Hao Xu

Abstract:

In semantic communication, the existing joint Source Channel coding (JSCC) wireless communication system without pilot has unstable transmission performance and can not effectively capture the global information and location information of images. In this paper, a pilot-free image transmission system of joint source channel based on multi-level semantic information (Multi-level JSCC) is proposed. The transmitter of the system is composed of two networks. The feature extraction network is used to extract the high-level semantic features of the image, compress the information transmitted by the image, and improve the bandwidth utilization. Feature retention network is used to preserve low-level semantic features and image details to improve communication quality. The receiver also is composed of two networks. The received high-level semantic features are fused with the low-level semantic features after feature enhancement network in the same dimension, and then the image dimension is restored through feature recovery network, and the image location information is effectively used for image reconstruction. This paper verifies that the proposed multi-level JSCC algorithm can effectively transmit and recover image information in both AWGN channel and Rayleigh fading channel, and the peak signal-to-noise ratio (PSNR) is improved by 1~2dB compared with other algorithms under the same simulation conditions.

Keywords: deep learning, JSCC, pilot-free picture transmission, multilevel semantic information, robustness

Procedia PDF Downloads 96
2083 Identifying Common Behavioural Traits of Lone-Wolves in Recent Terrorist Attacks in Europe

Authors: Khaled M. Khan, Armstrong Nhlabatsi

Abstract:

This article attempts to analyse behavioural traits of lone-wolves who struck and killed innocents in six different attacks in Europe in last nine months. The main objective of this study is to develop a profiling template in order to capture commonality of characteristics of these attackers. This study tries to understand the homogeneity of lone-wolves in terms of their social background and state of mind. The commonality among them can possibly be used to build a profiling template that could help detecting vulnerable persons who are prone to be self-radicalised or radicalised by someone else. The result of this study provides us an understanding of their commonality in terms of their state of mind and social characteristics.

Keywords: behavioral pattern, terrorism, profiling, commonality

Procedia PDF Downloads 382
2082 Studying the Simultaneous Effect of Petroleum and DDT Pollution on the Geotechnical Characteristics of Sands

Authors: Sara Seyfi

Abstract:

DDT and petroleum contamination in coastal sand alters the physical and mechanical properties of contaminated soils. This article aims to understand the effects of DDT pollution on the geotechnical characteristics of sand groups, including sand, silty sand, and clay sand. First, the studies conducted on the topic of the article will be reviewed. In the initial stage of the tests, this article deals with the identification of the used sands (sand, silty sand, clay sand) by FTIR, µ-XRF and SEM methods. Then, the geotechnical characteristics of these sand groups, including density, permeability, shear strength, compaction, and plasticity, are investigated using a sand cone, head permeability test, Vane shear test, strain gauge penetrometer, and plastic limit test. Sand groups are artificially contaminated with petroleum substances with 1, 2, 4, 8, 10, 12% by weight. In a separate experiment, amounts of 2, 4, 8, 12, 16, 20 mg/liter of DDT were added to the sand groups. Geotechnical characteristics and identification analysis are performed on the contaminated samples. In the final tests, the mentioned amounts of oil pollution and DDT are simultaneously added to the sand groups, and identification and measurement processes are carried out. The results of the tests showed that petroleum contamination had reduced the optimal moisture content, permeability, and plasticity of all samples. Except silty sand’s plasticity, which petroleum increased it by 1-4% and decreased it by 8-12%. The dry density of sand and clay sand increased, but that of silty sand decreased. Also, the shear strength of sand and silty sand increased, but that of clay sand decreased. DDT contamination increased the maximum dry density and decreased the permeability of all samples. It also reduced the optimum moisture content of the sand. The shear resistance of silty sand and clayey sand decreased, and plasticity of clayey sand increased, and silty sand decreased. The simultaneous effect of petroleum and DDT pollution on the maximum dry density of sand and clayey sand has been synergistic, on the plasticity of clayey sand and silty sand, there has been antagonism. This process has caused antagonism of optimal sand content, shear strength of silty sand and clay sand. In other cases, the effect of synergy or antagonism is not observed.

Keywords: DDT contamination, geotechnical characteristics, petroleum contamination, sand

Procedia PDF Downloads 20
2081 Associations Between Psychological Distress and COVID-19 Disease Course: A Retrospective Cohort Study of 3084 Cases in Belgium

Authors: Gwendy Darras, Mattias Desmet

Abstract:

Previous research showed that psychological distress has a negative impact on the disease course of viral infections. For COVID-19, the same association was observed in small samples of specific segments of the population (e.g. health care workers). The present study presents a more refined analysis of this association, measuring a broader spectrum of psychological distress in a large sample (n=3084) of the general Flemish population. Several types of psychological distress (state, trait and health anxiety, depression, intra-, and interpersonal stress) are registered throughout three periods: one year before the contamination, one week before the contamination, and during the contamination. In doing so, validated scales such as DASS-21, IIP-32, and FCV-19S are used. Furthermore, the course of COVID-19 is registered in several ways: number of symptoms, number of days sick leave due to COVID-19, and number of days the symptoms have lasted. Also, different control variables such as vaccination status, medical and psychological history are taken into account. Statistical analysis shows that all types of psychological distress are positively correlated with the severity of the COVID-19 disease course. Anxiety during the contamination shows the strongest correlation, but psychological distress one year before the onset of COVID-19 was still significantly associated with the worsening of the disease course. As the assessment of the latter type of distress happened before the onset of the COVID-19 disease course, retrospective bias resulting in artificial associations between self-reported stress and COVID-19 severity is unlikely to have impacted the observations. In view of possible future pandemics, it is important to focus on general stress and anxiety reduction in the general population as soon as possible. It is also advisable to minimize the use of stress-inducing messages to encourage the population to adhere to the measures issued during a pandemic.

Keywords: anxiety, COVID-19, depression, psychoneuroimmunology, psychological distress, stress

Procedia PDF Downloads 61