Search results for: salt and peppers attacks
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 1260

Search results for: salt and peppers attacks

1080 An Evaluation of People’s Susceptibility to Phishing Attacks in Nepal and Effectiveness of the Applied Countermeasures

Authors: Sunil Chaudhary, Rajendra Bahadur Thapa, Eleni Berki, Marko Helenius

Abstract:

The increasing number of Internet and mobile phone users, and essentially those, who use these electronic media to perform online transactions makes Nepal lucrative for phishing attacks. It is one of the reasons behind escalating phishing attacks in the country. Therefore, in this paper we examine various phishing attempts and real scenarios in Nepal to determine the seriousness of the problem. We also want to find out how prepared are the Internet and mobile phone users and how well-equipped are the private sector and government authorities responsible to handle cybercrime in the country. We considered five areas of research study, i.e., legal measures, technical and procedural measures, organizational structure, capacity building and international cooperation. These constitute important factors in cyber security and are recommended by the Global Cyber security Agenda (GCA). On the basis of our findings, we provide essential suggestions to make anti-phishing measures more appropriate to Nepalese State and society.

Keywords: internet banking, mobile banking, e-commerce, phishing, anti-phishing, Nepal

Procedia PDF Downloads 457
1079 Alleviation of Salt Stress Effects on Solanum lycopersicum (L.) Plants Grown in a Saline Soil by Foliar Spray with Salicylic Acid

Authors: Saad Howladar

Abstract:

Salinity stress is one of the major abiotic stresses, restricting plant growth and crop productivity in different world regions, especially in arid and semi-arid regions, including Saudi Arabia. The tomato plant is proven to be moderately sensitive to salt stress. Therefore, two field experiments were conducted using tomato plants (Hybrid 6130) to evaluate the effect of four concentrations of salicylic acid (SA; 0, 20, 40, and 60 µM) applied as foliar spraying in improving plant tolerance to saline soil conditions. Tomato plant growth, yield, osmoprotectants, chloeophyll fluorescence, and ionic contents were determined. The results of this study displayed that growth and yield components and physiological attributes of water-sprayed plants (the control) grown under saline soil conditions were negatively impacted. However, under the adverse conditions of salinity, SA-treated plants had enhanced growth and yield components of tomato plants compared to the control. Free proline, soluble sugars, chlorophyll fluorescence, relative water content, membrane stability index, and nutrients contents (e.g., N, P, K⁺, and Ca²⁺) were also improved significantly, while Na⁺ content was significantly reduced in SA-applied tomato plants. SA at 40 µM was the best treatment, which could be recommended to use for salt-stressed tomato plants to enable them to tolerate the adverse conditions of saline soils.

Keywords: tomatoes, salt stress, chlorophyll fluorescence, dehydration tolerance, osmoprotectants

Procedia PDF Downloads 80
1078 Pattern of External Injuries Sustained during Bomb Blast Attacks in Karachi, Pakistan from 2000 to 2007

Authors: Arif Anwar Surani, Salman Ali, Asif Surani, Sohaib Zahid, Akbar Shoukat Ali, Zeeshan-Ul-Hassan Usmani, Joseph Varon, Salim Surani

Abstract:

Objective: Terrorism and suicidal bomb blast attacks are commonplace in Karachi, Pakistan. During the years 2000 to 2007, there were over 60 bomb explosions resulting in more than 1500 casualties. These explosions produce a wide variety of external injuries. We undertook this study to evaluate pattern of external injury produced after bomb blast attacks and to compare injury profile resulting from explosions in open versus semi-confined blast environments. Method: A retrospective, cross-sectional, study was conducted to review injuries sustained after bomb blast attacks in Karachi, Pakistan, from January 2000 to October 2007. Emergency medical records and medico legal certificates of patients presented to three major public sector hospitals of Karachi were evaluated using self-design proforma. Results: Data of 481 victims meet inclusion criteria and were incorporated for final analysis. Of these, 63.6% were injured in open spaces and 36.4% were injured in semi-confined blast environments. Lacerations were commonly encountered as external injury (47.7%) followed by penetrating wounds (15.3%). Lower and upper extremities were most commonly affected (38.6% and 19% respectively). Open and semi-confined blast environments produced a specific injury pattern and profile (p=<0.001). Conclusions: Bomb blast attacks in Karachi produce an external injury pattern consistent with other studies, with exception of an increased frequency in penetrating wounds. Semi-confined blast environments were associated with severe injuries. Further studies are required to better classify injuries and their severity based on standardized scoring systems. Effective emergency response systems must be designed to cope with mass causalities following bomb explosions.

Keywords: bomb blast attacks, injury pattern, external injury, open space, semi-confined space, blast environment

Procedia PDF Downloads 376
1077 Analysis of Threats in Interoperability of Medical Devices

Authors: M. Sandhya, R. M. Madhumitha, Sharmila Sankar

Abstract:

Interoperable medical devices (IMDs) face threats due to the increased attack surface accessible by interoperability and the corresponding infrastructure. Initiating networking and coordination functionalities primarily modify medical systems' security properties. Understanding the threats is a vital first step in ultimately crafting security solutions for such systems. The key to this problem is coming up with some common types of threats or attacks with those of security and privacy, and providing this information as a roadmap. This paper analyses the security issues in interoperability of devices and presents the main types of threats that have to be considered to build a secured system.

Keywords: interoperability, threats, attacks, medical devices

Procedia PDF Downloads 306
1076 Geomechanics Properties of Tuzluca (Eastern. Turkey) Bedded Rock Salt and Geotechnical Safety

Authors: Mehmet Salih Bayraktutan

Abstract:

Geomechanical properties of Rock Salt Deposits in Tuzluca Salt Mine Area (Eastern Turkey) are studied for modeling the operation- excavation strategy. The purpose of this research focused on calculating the critical value of span height- which will meet the safety requirements. The Mine Site Tuzluca Hills consist of alternating parallel bedding of Salt ( NaCl ) and Gypsum ( CaS04 + 2 H20) rocks. Rock Salt beds are more resistant than narrow Gypsum interlayers. Rock Salt beds formed almost 97 percent of the total height of the Hill. Therefore, the geotechnical safety of Galleries depends on the mechanical criteria of Rock Salt Cores. General deposition of Tuzluca Basin was finally completed by Tuzluca Evaporites, as for the uppermost stratigraphic unit. They are currently running mining operations performed by classic mechanical excavation, room and pillar method. Rooms and Pillars are currently experiencing an initial stage of fracturing in places. Geotechnical safety of the whole mining area evaluated by Rock Mass Rating (RMR), Rock Quality Designation (RQD) spacing of joints, and the interaction of groundwater and fracture system. In general, bedded rock salt Show large lateral deformation capacity (while deformation modulus stays in relative small values, here E= 9.86 GPa). In such litho-stratigraphic environments, creep is a critical mechanism in failure. Rock Salt creep rate in steady-state is greater than interbedding layers. Under long-lasted compressive stresses, creep may cause shear displacements, partly using bedding planes. Eventually, steady-state creep in time returns to accelerated stages. Uniaxial compression creep tests on specimens were performed to have an idea of rock salt strength. To give an idea, on Rock Salt cores, average axial strength and strain are found as 18 - 24 MPa and 0.43-0.45 %, respectively. Uniaxial Compressive strength of 26- 32 MPa, from bedded rock salt cores. Elastic modulus is comparatively low, but lateral deformation of the rock salt is high under the uniaxial compression stress state. Poisson ratio = 0.44, break load = 156 kN, cohesion c= 12.8 kg/cm2, specific gravity SG=2.17 gr/cm3. Fracture System; spacing of fractures, joints, faults, offsets are evaluated under acting geodynamic mechanism. Two sand beds, each 4-6 m thick, exist near to upper level and at the top of the evaporating sequence. They act as aquifers and keep infiltrated water on top for a long duration, which may result in the failure of roofs or pillars. Two major active seismic ( N30W and N70E ) striking Fault Planes and parallel fracture strands have seismically triggered moderate risk of structural deformation of rock salt bedding sequence. Earthquakes and Floods are two prevailing sources of geohazards in this region—the seismotectonic activity of the Mine Site based on the crossing framework of Kagizman Faults and Igdir Faults. Dominant Hazard Risk sources include; a) Weak mechanical properties of rock salt, gypsum, anhydrite beds-creep. b) Physical discontinuities cutting across the thick parallel layers of Evaporite Mass, c) Intercalated beds of weak cemented or loose sand, clayey sandy sediments. On the other hand, absorbing the effects of salt-gyps parallel bedded deposits on seismic wave amplitudes has a reducing effect on the Rock Mass.

Keywords: bedded rock salt, creep, failure mechanism, geotechnical safety

Procedia PDF Downloads 171
1075 An Efficient and Provably Secure Three-Factor Authentication Scheme with Key Agreement

Authors: Mohan Ramasundaram, Amutha Prabakar Muniyandi

Abstract:

Remote user authentication is one of the important tasks for any kind of remote server applications. Several remote authentication schemes are proposed by the researcher for Telecare Medicine Information System (TMIS). Most of the existing techniques have limitations, vulnerable to various kind attacks, lack of functionalities, information leakage, no perfect forward security and ineffectiveness. Authentication is a process of user verification mechanism for allows him to access the resources of a server. Nowadays, most of the remote authentication protocols are using two-factor authentications. We have made a survey of several remote authentication schemes using three factors and this survey shows that the most of the schemes are inefficient and subject to several attacks. We observed from the experimental evaluation; the proposed scheme is very secure against various known attacks that include replay attack, man-in-the-middle attack. Furthermore, the analysis based on the communication cost and computational cost estimation of the proposed scheme with related schemes shows that our proposed scheme is efficient.

Keywords: Telecare Medicine Information System, elliptic curve cryptography, three-factor, biometric, random oracle

Procedia PDF Downloads 198
1074 A Retrospective Study of the Effects of Xenophobia on South Africa-Nigeria Relations

Authors: O. Fayomi, F. Chidozie, C. Ayo

Abstract:

The underlying causes of xenophobia are complex and varied. Xenophobia has to do with being contemptuous of that which is foreign, especially of strangers or of people from different countries or cultures. Unemployment and mounting poverty among South Africans at the bottom of the economic ladder have provoked fears of the competition that better educated and experienced migrants can represent. South Africa’s long track-record of violence as a means of protest and the targeting of foreigners in particular, and, the documented tensions over migration policy and the scale of repatriation serve a very good explanation for its xenophobia. It was clear that while most of the attacks were directed against foreign, primarily African, migrants, this was not the rule. Attacks were also noted against Chinese-speakers, Pakistani migrants as well as against South Africans from minority language groups (in the conflict areas). Settlements that have recently experienced the expression of ‘xenophobic’ violence have also been the site of violent and other forms of protest around other issues, most notably service delivery. The failure of government in service delivery was vexed on this form of xenophobia. Due to the increase in migration, this conflict is certainly not temporary in nature. Xenophobia manifests in different regions and communities with devastating effects on the affected nationals. Nigerians living in South Africa have been objects of severe attacks and assault as a result of this xenophobic attitude. It is against this background that this study seeks to investigate the xenophobic attacks against Nigerians in South Africa. The methodology is basically qualitative with the use of secondary sources such as books, journals, newspapers and internet sources.

Keywords: xenophobia, unemployment, poverty, Nigeria, South Africa

Procedia PDF Downloads 451
1073 A Phishing Email Detection Approach Using Machine Learning Techniques

Authors: Kenneth Fon Mbah, Arash Habibi Lashkari, Ali A. Ghorbani

Abstract:

Phishing e-mails are a security issue that not only annoys online users, but has also resulted in significant financial losses for businesses. Phishing advertisements and pornographic e-mails are difficult to detect as attackers have been becoming increasingly intelligent and professional. Attackers track users and adjust their attacks based on users’ attractions and hot topics that can be extracted from community news and journals. This research focuses on deceptive Phishing attacks and their variants such as attacks through advertisements and pornographic e-mails. We propose a framework called Phishing Alerting System (PHAS) to accurately classify e-mails as Phishing, advertisements or as pornographic. PHAS has the ability to detect and alert users for all types of deceptive e-mails to help users in decision making. A well-known email dataset has been used for these experiments and based on previously extracted features, 93.11% detection accuracy is obtainable by using J48 and KNN machine learning techniques. Our proposed framework achieved approximately the same accuracy as the benchmark while using this dataset.

Keywords: phishing e-mail, phishing detection, anti phishing, alarm system, machine learning

Procedia PDF Downloads 311
1072 Application of Hyperspectral Remote Sensing in Sambhar Salt Lake, A Ramsar Site of Rajasthan, India

Authors: Rajashree Naik, Laxmi Kant Sharma

Abstract:

Sambhar lake is the largest inland Salt Lake of India, declared as a Ramsar site on 23 March 1990. Due to high salinity and alkalinity condition its biodiversity richness is contributed by haloalkaliphilic flora and fauna along with the diverse land cover including waterbody, wetland, salt crust, saline soil, vegetation, scrub land and barren land which welcome large number of flamingos and other migratory birds for winter harboring. But with the gradual increase in the irrational salt extraction activities, the ecological diversity is at stake. There is an urgent need to assess the ecosystem. Advanced technology like remote sensing and GIS has enabled to look into the past, compare with the present for the future planning and management of the natural resources in a judicious way. This paper is a research work intended to present a vegetation in typical inland lake environment of Sambhar wetland using satellite data of NASA’s EO-1 Hyperion sensor launched in November 2000. With the spectral range of 0.4 to 2.5 micrometer at approximately 10nm spectral resolution with 242 bands 30m spatial resolution and 705km orbit was used to produce a vegetation map for a portion of the wetland. The vegetation map was tested for classification accuracy with a pre-existing detailed GIS wetland vegetation database. Though the accuracy varied greatly for different classes the algal communities were successfully identified which are the major sources of food for flamingo. The results from this study have practical implications for uses of spaceborne hyperspectral image data that are now becoming available. Practical limitations of using these satellite data for wetland vegetation mapping include inadequate spatial resolution, complexity of image processing procedures, and lack of stereo viewing.

Keywords: Algal community, NASA’s EO-1 Hyperion, salt-tolerant species, wetland vegetation mapping

Procedia PDF Downloads 104
1071 Isolation and Identification of Probiotic Lactic Acid Bacteria with Cholesterol Lowering Potential and Their Use in Fermented Milk Product

Authors: Preeyarach Whisetkhan, Malai Taweechotipatr, Ulisa Pachekrepapol

Abstract:

Elevated level of blood cholesterol or hypercholesterolemia may lead to atherosclerosis and poses a major risk for cardiovascular diseases. Probiotics play a crucial role in human health, and probiotic bacteria that possesses bile salt hydrolase (BSH) activity can be used to lower cholesterol level of the host. The aim of this study was to investigate whether lactic acid bacteria (LAB) isolated from traditional Thai fermented foods were able to exhibit bile salt hydrolase activity and their use in fermented milk. A total of 28 isolates were tested for BSH activity by plate method on MRS agar supplemented with 0.5% sodium salt of taurodeoxycholic acid and incubated at 37°C for 48 h under anaerobic condition. The results showed that FN1-1 and FN23-3 isolates possessed strong BSH activity. FN1-1 and FN23-3 isolates were then identified for phenotype, biochemical characteristics, and genotype (16S rRNA sequencing). FN1-1 isolate showed 99.92% similarity to Lactobacillus pentosus DSM 20314(T), while FN23-3 isolate showed 99.94% similarity to Enterococcus faecium CGMCC1.2136 (T). Lactobacillus pentosus FN1-1 and Enterococcus faecium FN23-3 were tolerant of pH 3-4 and 0.3 and 0.8% bile. Bacterial count and pH of milk fermented with Lactobacillus pentosus FN1-1 at 37°C and 43°C were investigated. The results revealed that Lactobacillus pentosus FN1-1 was able to grow in milk, which led to decrease in pH level. Fermentation at 37°C resulted in faster growth rate than at 43 °C. Lactobacillus pentosus FN1-1 was a candidate probiotic to be used in fermented milk products to reduce the risk of high-cholesterol diseases.

Keywords: probiotics, lactic acid bacteria, bile salt hydrolase, cholesterol

Procedia PDF Downloads 130
1070 Application of Chinese Remainder Theorem to Find The Messages Sent in Broadcast

Authors: Ayubi Wirara, Ardya Suryadinata

Abstract:

Improper application of the RSA algorithm scheme can cause vulnerability to attacks. The attack utilizes the relationship between broadcast messages sent to the user with some fixed polynomial functions that belong to each user. Scheme attacks carried out by applying the Chinese Remainder Theorem to obtain a general polynomial equation with the same modulus. The formation of the general polynomial becomes a first step to get back the original message. Furthermore, to solve these equations can use Coppersmith's theorem.

Keywords: RSA algorithm, broadcast message, Chinese Remainder Theorem, Coppersmith’s theorem

Procedia PDF Downloads 309
1069 Detoxification and Recycling of the Harvested Microalgae using Eco-friendly Food Waste Recycling Technology with Salt-tolerant Mushroom Strains

Authors: J. M. Kim, Y. W. Jung, E. Lee, Y. K. Kwack, , S. K. Sim*

Abstract:

Cyanobacterial blooms in lakes, reservoirs, and rivers have been environmental and social issues due to its toxicity, odor, etc. Among the cyanotoxins, microcystins exist mostly within the cyanobacterial cells, and they are released from the cells. Therefore, an innovative technology is needed to detoxify the harvested microalgae for environment-friendly utilization of the harvested microalgae. This study develops detoxification method of microcystins in the harvested microalgae and recycling harvested microalgae with food waste using salt-tolerant mushroom strains and natural ecosystem decomposer. During this eco-friendly organic waste recycling process, diverse bacteria or various enzymes of the salt-tolerant mushroom strains decompose the microystins and cyclic peptides. Using PHLC/Mass analysis, it was verified that 99.8% of the microcystins of the harvested microalgae was detoxified in the harvested mushroom as well as in the recycled organic biomass. Further study is planned to verify the decomposition mechanisms of the microcystins by the bacteria or enzymes. In this study, the harvested microalgae is mixed with the food waste, and then the mixed toxic organic waste is used as mushroom compost by adjusting the water content of about 70% using cellulose such as sawdust cocopeats and cottonseeds. The mushroom compost is bottled, sterilized, and salt-tolerant mushroom spawn is inoculated. The mushroom is then cultured and growing in the temperature, humidity, and CO2 controlled environment. During the cultivation and growing process of the mushroom, microcystins are decomposed into non-toxic organic or inorganic compounds by diverse bacteria or various enzymes of the mushroom strains. Various enzymes of the mushroom strains decompose organics of the mixed organic waste and produce nutritious and antibiotic mushrooms. Cultured biomass compost after mushroom harvest can be used for organic fertilizer, functional bio-feed, and RE-100 biomass renewable energy source. In this eco-friendly organic waste recycling process, no toxic material, wastewater, nor sludge is generated; thus, sustainable with the circular economy.

Keywords: microalgae, microcystin, food waste, salt-tolerant mushroom strains, sustainability, circular economy

Procedia PDF Downloads 112
1068 Clathrate Hydrate Measurements and Thermodynamic Modelling for Refrigerants with Electrolytes Solution in the Presence of Cyclopentane

Authors: Peterson Thokozani Ngema, Paramespri Naidoo, Amir H. Mohammadi, Deresh Ramjugernath

Abstract:

Phase equilibrium data (dissociation data) for clathrate hydrate (gas hydrate) were undertaken for systems involving fluorinated refrigerants with a single and mixed electrolytes (NaCl, CaCl₂, MgCl₂, and Na₂SO₄) aqueous solution at various salt concentrations in the absence and presence of cyclopentane (CP). The ternary systems for (R410a or R507) with the water system in the presence of CP were performed in the temperature and pressures ranges of (279.8 to 294.4) K and (0.158 to 1.385) MPa, respectively. Measurements for R410a with single electrolyte {NaCl or CaCl₂} solution in the presence of CP were undertaken at salt concentrations of (0.10, 0.15 and 0.20) mass fractions in the temperature and pressure ranges of (278.4 to 293.7) K and (0.214 to1.179) MPa, respectively. The temperature and pressure conditions for R410a with Na₂SO₄ aqueous solution system were investigated at a salt concentration of 0.10 mass fraction in the range of (283.3 to 291.6) K and (0.483 to 1.373) MPa respectively. Measurements for {R410a or R507} with mixed electrolytes {NaCl, CaCl₂, MgCl₂} aqueous solution was undertaken at various salt concentrations of (0.002 to 0.15) mass fractions in the temperature and pressure ranges of (274.5 to 292.9) K and (0.149 to1.119) MPa in the absence and presence of CP, in which there is no published data related to mixed salt and a promoter. The phase equilibrium measurements were performed using a non-visual isochoric equilibrium cell that co-operates the pressure-search technique. This study is focused on obtaining equilibrium data that can be utilized to design and optimize industrial wastewater, desalination process and the development of Hydrate Electrolyte–Cubic Plus Association (HE–CPA) Equation of State. The results show an impressive improvement in the presence of promoter (CP) on hydrate formation because it increases the dissociation temperatures near ambient conditions. The results obtained were modeled using a developed HE–CPA equation of state. The model results strongly agree with the measured hydrate dissociation data.

Keywords: association, desalination, electrolytes, promoter

Procedia PDF Downloads 216
1067 Bond Strength of Different Strengthening Systems: Concrete Elements under Freeze–Thaw Cycles and Salt Water Immersion Exposure

Authors: Firas Al-Mahmoud, Jean-Michel Mechling, Mohamed Shaban

Abstract:

The long-term durability of fibre reinforced polymer (FRP) composites is often stated as being the main reason for the use of these materials. Indeed, structures externally or Near Surface Mounted (NSM) reinforced with Carbon Fibre Reinforcement Polymer CFRP are often in contact with temperature cycles and salt water immersion and other environmental conditions that reduce the expected durability of the system. Bond degradation is a frequent cause of premature failure of structural elements and environmental conditions are known to relate to such failures. The purpose of this study is to investigate the effect of environmental exposure on the bond for different CFRP strengthening systems. Bending tests were conducted to evaluate the bond with and without environmental exposure. The specimens were strengthened with CFRP sheets, CFRP plates and NSM CFRP rods embedded in two filling materials: epoxy resin and mortar. Then, they were exposed to up to 300 freeze–thaw cycles. One freeze–thaw cycle consisted of four stages according to ASTM or immersed in 3.5% salted tap water. A total of thirty-six specimens were prepared for this purpose. Results showed a decrease in ultimate bond strength for specimens strengthened by CFRP sheets that were immersed in salt water for 120 days, while a reduction was shown for CFRP sheet and plate bonded specimens that were subjected to 300 freeze–thaw cycles. Exposing NSM CFRP rod strengthened specimens, embedded in resin or mortar, to freeze–thaw cycles or to immersion in salt water does not affect the bond strength.

Keywords: durability, strengthening, FRP, bond, freeze–thaw

Procedia PDF Downloads 323
1066 Using GIS and Map Data for the Analysis of the Relationship between Soil and Groundwater Quality at Saline Soil Area of Kham Sakaesaeng District, Nakhon Ratchasima, Thailand

Authors: W. Thongwat, B. Terakulsatit

Abstract:

The study area is Kham Sakaesaeng District in Nakhon Ratchasima Province, the south section of Northeastern Thailand, located in the Lower Khorat-Ubol Basin. This region is the one of saline soil area, located in a dry plateau and regularly experience standing with periods of floods and alternating with periods of drought. Especially, the drought in the summer season causes the major saline soil and saline water problems of this region. The general cause of dry land salting resulted from salting on irrigated land, and an excess of water leading to the rising water table in the aquifer. The purpose of this study is to determine the relationship of physical and chemical properties between the soil and groundwater. The soil and groundwater samples were collected in both rainy and summer seasons. The content of pH, electrical conductivity (EC), total dissolved solids (TDS), chloride and salinity were investigated. The experimental result of soil and groundwater samples show the slightly pH less than 7, EC (186 to 8,156 us/cm and 960 to 10,712 us/cm), TDS (93 to 3,940 ppm and 480 to 5,356 ppm), chloride content (45.58 to 4,177,015 mg/l and 227.90 to 9,216,736 mg/l), and salinity (0.07 to 4.82 ppt and 0.24 to 14.46 ppt) in the rainy and summer seasons, respectively. The distribution of chloride content and salinity content were interpolated and displayed as a map by using ArcMap 10.3 program, according to the season. The result of saline soil and brined groundwater in the study area were related to the low-lying topography, drought area, and salt-source exposure. Especially, the Rock Salt Member of Maha Sarakham Formation was exposed or lies near the ground surface in this study area. During the rainy season, salt was eroded or weathered from the salt-source rock formation and transported by surface flow or leached into the groundwater. In the dry season, the ground surface is dry enough resulting salt precipitates from the brined surface water or rises from the brined groundwater influencing the increasing content of chloride and salinity in the ground surface and groundwater.

Keywords: environmental geology, soil salinity, geochemistry, groundwater hydrology

Procedia PDF Downloads 99
1065 Cooperative Agents to Prevent and Mitigate Distributed Denial of Service Attacks of Internet of Things Devices in Transportation Systems

Authors: Borhan Marzougui

Abstract:

Road and Transport Authority (RTA) is moving ahead with the implementation of the leader’s vision in exploring all avenues that may bring better security and safety services to the community. Smart transport means using smart technologies such as IoT (Internet of Things). This technology continues to affirm its important role in the context of Information and Transportation Systems. In fact, IoT is a network of Internet-connected objects able to collect and exchange different data using embedded sensors. With the growth of IoT, Distributed Denial of Service (DDoS) attacks is also growing exponentially. DDoS attacks are the major and a real threat to various transportation services. Currently, the defense mechanisms are mainly passive in nature, and there is a need to develop a smart technique to handle them. In fact, new IoT devices are being used into a botnet for DDoS attackers to accumulate for attacker purposes. The aim of this paper is to provide a relevant understanding of dangerous types of DDoS attack related to IoT and to provide valuable guidance for the future IoT security method. Our methodology is based on development of the distributed algorithm. This algorithm manipulates dedicated intelligent and cooperative agents to prevent and to mitigate DDOS attacks. The proposed technique ensure a preventive action when a malicious packets start to be distributed through the connected node (Network of IoT devices). In addition, the devices such as camera and radio frequency identification (RFID) are connected within the secured network, and the data generated by it are analyzed in real time by intelligent and cooperative agents. The proposed security system is based on a multi-agent system. The obtained result has shown a significant reduction of a number of infected devices and enhanced the capabilities of different security dispositives.

Keywords: IoT, DDoS, attacks, botnet, security, agents

Procedia PDF Downloads 118
1064 Evaluation and Possibilities of Valorization of Ecotourism Potentials in the Mbam and Djerem National Park

Authors: Rinyu Shei Mercy

Abstract:

Protected areas are the potential areas for the development of ecotourism because of their biodiversity, landscapes, waterfalls, lakes, caves, salt lick and cultural heritage of local or indigenous people. These potentials have not yet been valorized, so this study will enable to investigate the evaluation and possibilities of valorization of ecotourism potentials in the Mbam and Djerem National Park. Hence, this was done by employing a combination of field observations, examination, data collection and evaluation, using a SWOT analysis. The SWOT provides an analysis to determine the strengths, weaknesses, opportunities and threats, and strategic suggestions for ecological planning. The study helps to determine an ecotouristic inventory and mapping of ecotourism potentials of the park, evaluate the degree of valorization of these potentials and the possibilities of valorization. Finally, the study has proven that the park has much natural potentials such as rivers, salt licks, waterfall and rapids, lakes, caves and rocks, etc. Also, from the study, it was realized that as concerns the degree of valorization of these ecotourism potentials, 50% of the population visit the salt lick of Pkayere because it’s a biodiversity hotspot and rich in mineral salt attracting a lot of animals and the least is the lake Miyere with 1% due to the fact that it is sacred. Moreover, from the results, there are possibilities that these potentials can be valorized and put into use because of their attractive nature such as creating good roads and bridges, good infrastructural facilities, good communication network etc. So, the study recommends that, in this process, MINTOUR, WCS, tour operators must interact sufficiently in order to develop the potential interest to ecotourism, ecocultural tourism and scientific tourism.

Keywords: ecotourism, national park Mbam and Djerem, valorization of biodiversity, protected areas of Cameroon

Procedia PDF Downloads 110
1063 Influence of Chemical Pollution on Thermal Habitats of the Ciliate Tetrahymena thermophila

Authors: Doufoungognon C. Kone

Abstract:

Global change, in particular pollution and global warming, threatens ecosystems and the biodiversity they harbor. Due to pollutants exposure, organisms might modify their thermal niches in order to track the thermal conditions limiting the negative impacts of chemical stressors depending on their mode of action. This study tests the influence of different pollutants, copper, salt, and chloramphenicol, on the thermal preferences of the ciliate Tetrahymena thermophila. Six genotypes were exposed to a gradient of concentrations ranging from 0 to 500mg/L for copper, 0 to 300 mg/l for chloramphenicol, and 0 to 12g/l for salt in synthetic media at eight temperatures ranging from 11 to 39° C. The measured fitness proxies are the maximum growth rate and the 50% growth inhibitory concentration (IC50). The results show that the majority of genotypes are more resistant to chloramphenicol in temperatures below their thermal optimum without pollutants, while they better tolerate other salt and copper in temperatures above their thermal optimum. In addition, generalists reduce their niche width while specialists widen it in chloramphenicol. Overall, results suggest that global warming would have a particularly deleterious effect in the case of chemical pollution. This pollution would induce the full disruption of the thermal habitats.

Keywords: ciliate, thermal niche, growth rate, toxicity, multiple stressors

Procedia PDF Downloads 63
1062 Cyber-Med: Practical Detection Methodology of Cyber-Attacks Aimed at Medical Devices Eco-Systems

Authors: Nir Nissim, Erez Shalom, Tomer Lancewiki, Yuval Elovici, Yuval Shahar

Abstract:

Background: A Medical Device (MD) is an instrument, machine, implant, or similar device that includes a component intended for the purpose of the diagnosis, cure, treatment, or prevention of disease in humans or animals. Medical devices play increasingly important roles in health services eco-systems, including: (1) Patient Diagnostics and Monitoring; Medical Treatment and Surgery; and Patient Life Support Devices and Stabilizers. MDs are part of the medical device eco-system and are connected to the network, sending vital information to the internal medical information systems of medical centers that manage this data. Wireless components (e.g. Wi-Fi) are often embedded within medical devices, enabling doctors and technicians to control and configure them remotely. All these functionalities, roles, and uses of MDs make them attractive targets of cyber-attacks launched for many malicious goals; this trend is likely to significantly increase over the next several years, with increased awareness regarding MD vulnerabilities, the enhancement of potential attackers’ skills, and expanded use of medical devices. Significance: We propose to develop and implement Cyber-Med, a unique collaborative project of Ben-Gurion University of the Negev and the Clalit Health Services Health Maintenance Organization. Cyber-Med focuses on the development of a comprehensive detection framework that relies on a critical attack repository that we aim to create. Cyber-Med will allow researchers and companies to better understand the vulnerabilities and attacks associated with medical devices as well as providing a comprehensive platform for developing detection solutions. Methodology: The Cyber-Med detection framework will consist of two independent, but complementary detection approaches: one for known attacks, and the other for unknown attacks. These modules incorporate novel ideas and algorithms inspired by our team's domains of expertise, including cyber security, biomedical informatics, and advanced machine learning, and temporal data mining techniques. The establishment and maintenance of Cyber-Med’s up-to-date attack repository will strengthen the capabilities of Cyber-Med’s detection framework. Major Findings: Based on our initial survey, we have already found more than 15 types of vulnerabilities and possible attacks aimed at MDs and their eco-system. Many of these attacks target individual patients who use devices such pacemakers and insulin pumps. In addition, such attacks are also aimed at MDs that are widely used by medical centers such as MRIs, CTs, and dialysis engines; the information systems that store patient information; protocols such as DICOM; standards such as HL7; and medical information systems such as PACS. However, current detection tools, techniques, and solutions generally fail to detect both the known and unknown attacks launched against MDs. Very little research has been conducted in order to protect these devices from cyber-attacks, since most of the development and engineering efforts are aimed at the devices’ core medical functionality, the contribution to patients’ healthcare, and the business aspects associated with the medical device.

Keywords: medical device, cyber security, attack, detection, machine learning

Procedia PDF Downloads 331
1061 A Survey of Attacks and Security Requirements in Wireless Sensor Networks

Authors: Vishnu Pratap Singh Kirar

Abstract:

Wireless sensor network (WSN) is a network of many interconnected networked systems, they equipped with energy resources and they are used to detect other physical characteristics. On WSN, there are many researches are performed in past decades. WSN applicable in many security systems govern by military and in many civilian related applications. Thus, the security of WSN gets attention of researchers and gives an opportunity for many future aspects. Still, there are many other issues are related to deployment and overall coverage, scalability, size, energy efficiency, quality of service (QoS), computational power and many more. In this paper we discus about various applications and security related issue and requirements of WSN.

Keywords: wireless sensor network (WSN), wireless network attacks, wireless network security, security requirements

Procedia PDF Downloads 457
1060 Role of Foreign Direct Investment in Economic Growth of Pakistan

Authors: Nayyra Zeb, Fu Qiang, Sundas Rauf

Abstract:

Foreign Direct Investment (FDI) is often seen as a significant factor of economic development in developing countries like Pakistan. The aim of this article is to investigate the effect of FDI on Pakistan’s economic growth during 1972–2012. Besides FDI, three other variables such as trade openness, political instability and terrorist attacks are also used in this study. The least square method has been applied to check the effect of these variables on GDP of Pakistan. The results show that FDI has a positive significant effect on economic growth of Pakistan.

Keywords: FDI inflows, trade openness, political instability, terrorist attacks

Procedia PDF Downloads 433
1059 Applying the Regression Technique for ‎Prediction of the Acute Heart Attack ‎

Authors: Paria Soleimani, Arezoo Neshati

Abstract:

Myocardial infarction is one of the leading causes of ‎death in the world. Some of these deaths occur even before the patient ‎reaches the hospital. Myocardial infarction occurs as a result of ‎impaired blood supply. Because the most of these deaths are due to ‎coronary artery disease, hence the awareness of the warning signs of a ‎heart attack is essential. Some heart attacks are sudden and intense, but ‎most of them start slowly, with mild pain or discomfort, then early ‎detection and successful treatment of these symptoms is vital to save ‎them. Therefore, importance and usefulness of a system designing to ‎assist physicians in the early diagnosis of the acute heart attacks is ‎obvious.‎ The purpose of this study is to determine how well a predictive ‎model would perform based on the only patient-reportable clinical ‎history factors, without using diagnostic tests or physical exams. This ‎type of the prediction model might have application outside of the ‎hospital setting to give accurate advice to patients to influence them to ‎seek care in appropriate situations. For this purpose, the data were ‎collected on 711 heart patients in Iran hospitals. 28 attributes of clinical ‎factors can be reported by patients; were studied. Three logistic ‎regression models were made on the basis of the 28 features to predict ‎the risk of heart attacks. The best logistic regression model in terms of ‎performance had a C-index of 0.955 and with an accuracy of 94.9%. ‎The variables, severe chest pain, back pain, cold sweats, shortness of ‎breath, nausea, and vomiting were selected as the main features.‎

Keywords: Coronary heart disease, Acute heart attacks, Prediction, Logistic ‎regression‎

Procedia PDF Downloads 428
1058 Focalization Used as a Narrative Strategy Mirroring Fadia Faqir’s Ideology in Pillars of Salt 1996

Authors: Malika Hammouche

Abstract:

The novel Pillars of Salt, written by Fadia Faqir in 1996, is a good example where storytelling is utilized as a traditional material to underline the author’s womanist ideology. A study of narrative could be fruitfully combined with that of ideology in this case. This combination could be demonstrated through the narrative technique used by Fadia Faqir in Pillars of Salt (1996), reflecting her anti-colonial ideology. The first step of this work will highlight the storyteller’s narrative in the novel representing, on the one hand, the imperial voice, and on the other exoticism and orientalism. The second step will demonstrate how Faqir’s narrative technique uses focalization as a narratological tool to negotiate her space. Faqir gives a voice to the female protagonist of the novel within the androcentric bias of Arab narrative theory to point to and amend the orientalist discourse typical to colonial literature. The orientalist discourse is represented through the voice of the storyteller in the novel. The juxtaposition of the storyteller’s and the female protagonist narratives is borrowed from the Arab literary background. It is a postcolonial counter-discursive strategy used by the author as a traditional material to underline her Arabo Islamic Womanist ideology in this novel.

Keywords: Arabo Islamic womanism, focalization, ideology, narrative technique, orientalist

Procedia PDF Downloads 205
1057 Synthesis of an Organic-Inorganic Salt of (C2H5NO2) 2H4SiW12O40 and Investigation of Its Anti-Viral Effect on the Tobacco Mosaic Virus (TMV)

Authors: Mahboobeh Mohadeszadeh, Majid Saghi

Abstract:

Polyoxometalates (POMs) are important inorganic compounds that have been considered specifically in recent years due to abundant attributes and applications. Those POMs that have one central tetrahedral atom called keggin. The binding Amino-acid groups to keggin structure give the antivirus effect to these compounds. A new organic-inorganic hybrid structure, with formula (Gly)2H4SiW12O40 was synthesized. Investigation on Anti-viral effect of this compound showed the (Gly)2H4SiW12O40 prevents infection of Tobacco Mosaic Virus (TMV) on the Nicotianatabacum plants.

Keywords: Polyoxometalate, Keggin, Organic-inorganic salt, TMV

Procedia PDF Downloads 267
1056 Synthesis of an Organic- Inorganic Salt of (C2H5NO2)2H4SiW12O40 and Investigation of Its Anti-Viral Effect on the Tobacco Mosaic Virus (TMV)

Authors: Mahboobeh Mohadeszadeh, Majid Saghi

Abstract:

Polyoxometalates (POMs) are important inorganic compounds that have been considered specifically in recent years due to abundant attributes and applications. Those POMs that have one central tetrahedral atom called keggin. The binding Amino-acid groups to keggin structure give the antivirus effect to these compounds. A new organic-inorganic hybrid structure, with formula (Gly)2H4SiW12O40 was synthesized. Investigation on Anti-viral effect of this compound showed the (Gly)2H4SiW12O40 prevents infection of Tobacco Mosaic Virus (TMV) on the Nicotianatabacum plants.

Keywords: polyoxometalate, keggin, organic-inorganic salt, TMV

Procedia PDF Downloads 396
1055 Parallel Hybrid Honeypot and IDS Architecture to Detect Network Attacks

Authors: Hafiz Gulfam Ahmad, Chuangdong Li, Zeeshan Ahmad

Abstract:

In this paper, we proposed a parallel IDS and honeypot based approach to detect and analyze the unknown and known attack taxonomy for improving the IDS performance and protecting the network from intruders. The main theme of our approach is to record and analyze the intruder activities by using both the low and high interaction honeypots. Our architecture aims to achieve the required goals by combing signature based IDS, honeypots and generate the new signatures. The paper describes the basic component, design and implementation of this approach and also demonstrates the effectiveness of this approach reducing the probability of network attacks.

Keywords: network security, intrusion detection, honeypot, snort, nmap

Procedia PDF Downloads 530
1054 Uranium Adsorption Using a Composite Material Based on Platelet SBA-15 Supported Tin Salt Tungstomolybdophosphoric Acid

Authors: H. Aghayan, F. A. Hashemi, R. Yavari, S. Zolghadri

Abstract:

In this work, a new composite adsorbent based on a mesoporous silica SBA-15 with platelet morphology and tin salt of tungstomolybdophosphoric (TWMP) acid was synthesized and applied for uranium adsorption from aqueous solution. The sample was characterized by X-ray diffraction, Fourier transfer infra-red, and N2 adsorption-desorption analysis, and then, effect of various parameters such as concentration of metal ions and contact time on adsorption behavior was examined. The experimental result showed that the adsorption process was explained by the Langmuir isotherm model very well, and predominant reaction mechanism is physisorption. Kinetic data of adsorption suggest that the adsorption process can be described by the pseudo second-order reaction rate model.

Keywords: platelet SBA-15, tungstomolybdophosphoric acid, adsorption, uranium ion

Procedia PDF Downloads 158
1053 Potential Growth of Tomato Plants in Induced Saline Soil with Rhizobacteria (PGPR)

Authors: Arfan Ali, Idrees Ahmad Nasir

Abstract:

The critical evaluation of tolerance in tomato plants against the induced saline soil were assessed by transcript analysis of genes coding for products potentially involved in stress tolerance. A reverse transcriptase PCR experiment was performed with Hsp90-1, MT2, and GR1like protein genes using RNA isolated from different tissues of tomato plants. Four strains of Bacillus magisterium were inoculated with 100 Mm & 200 Mm concentrations of salt. Eleven treatments each ten replica pots were installed in green house experiment and the parameters taken into account were morphological (length, weight, number of leaves, leaf surface area), chemical (anthocyanin, chlorophyll-a, chlorophyll-b, carotenoids) and biological (gene expression). Results bare a response i.e. highest response of MT2 like gene was at 24 hpi and the highest levels of GR1 like protein transcript accumulation were detected at 36 hpi. The chemical and morphological parameters at diverse salt concentrations bequeath superlative response amongst strains which candidly flank on Zm7 and Zm4. Therefore, Bacillus magisterium Zm7 strains and somehow Zm4 strain can be used in saline condition to make plants tolerant. The overall performance of strains Zm7, Zm6, and Zm4 was found better for all studied traits under salt stress conditions. Significant correlations among traits root length, shoot length, number of leaves, leaf surface area, carotenoids, anthocyanin, chlorophyll-a and chlorophyll-b were found and suggested that the salt tolerance in tomato may be improved through the use of PGPR strains.

Keywords: Bacillus magisterium, gene expression glutathione reductase, metallothionein, PGPR, Rhizobacteria, saline

Procedia PDF Downloads 410
1052 Synthesis of an Organic-Inorganic Salt of 12-Silicotungstate, (C2H5NO2)2H4SiW12O40 and Investigation of Its Anti-Viral Effect on the Tobacco Mosaic Virus

Authors: Mahboobeh Mohadeszadeh, Majid Saghi

Abstract:

Polyoxometalates (POMs) are important inorganic compounds that have been considered specifically in recent years due to abundant attributes and applications. Those POMs that have one central tetrahedral atom called keggin. The binding Amino-acid groups to keggin structure give the antivirus effect to these compounds. A new organic-inorganic hybrid structure, with formula (Gly)2H4SiW12O40, was synthesized. Investigation on the anti-viral effect of this compound showed the (Gly)2H4SiW12O40 prevents infection of Tobacco Mosaic Virus (TMV) on the Nicotianatabacum plants.

Keywords: polyoxometalate, keggin, organic-inorganic salt, TMV

Procedia PDF Downloads 261
1051 Potential Application of Selected Halotolerant PSB Isolated from Rhizospheric Soil of Chenopodium quinoa in Plant Growth Promotion

Authors: Ismail Mahdi, Nidal Fahsi, Mohamed Hafidi, Abdelmounaim Allaoui, Latefa Biskri

Abstract:

To meet the worldwide demand for food, smart management of arable lands is needed. This could be achieved through sustainable approaches such as the use of plant growth-promoting microorganisms including bacteria. Phosphate (P) solubilization is one of the major mechanisms of plant growth promotion by associated bacteria. In the present study, we isolated and screened 14 strains from the rhizosphere of Chenopodium quinoa wild grown in the experimental farm of UM6P and assessed their plant growth promoting properties. Next, they were identified by using 16S rRNA and Cpn60 genes sequencing as Bacillus, Pseudomonas and Enterobacter. These strains showed dispersed capacities to solubilize P (up to 346 mg L−1) following five days of incubation in NBRIP broth. We also assessed their abilities for indole acetic acid (IAA) production (up to 795,3 µg ml−1) and in vitro salt tolerance. Three Bacillus strains QA1, QA2, and S8 tolerated high salt stress induced by NaCl with a maximum tolerable concentration of 8%. Three performant isolates, QA1, S6 and QF11, were further selected for seed germination assay because of their pronounced abilities in terms of P solubilization, IAA production and salt tolerance. The early plant growth potential of tested strains showed that inoculated quinoa seeds displayed greater germination rate and higher seedlings growth under bacterial treatments. The positive effect on seed germination traits strongly suggests that the tested strains are growth promoting, halotolerant and P solubilizing bacteria which could be exploited as biofertilizers.

Keywords: phosphate solubilizing bacteria, IAA, Seed germination, salt tolerance, quinoa

Procedia PDF Downloads 105