Search results for: salt and peppers attacks
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 1302

Search results for: salt and peppers attacks

1122 Machine Learning-Based Techniques for Detecting and Mitigating Cyber-attacks on Automatic Generation Control in Smart Grids

Authors: Sami M. Alshareef

Abstract:

The rapid growth of smart grid technology has brought significant advancements to the power industry. However, with the increasing interconnectivity and reliance on information and communication technologies, smart grids have become vulnerable to cyber-attacks, posing significant threats to the reliable operation of power systems. Among the critical components of smart grids, the Automatic Generation Control (AGC) system plays a vital role in maintaining the balance between generation and load demand. Therefore, protecting the AGC system from cyber threats is of paramount importance to maintain grid stability and prevent disruptions. Traditional security measures often fall short in addressing sophisticated and evolving cyber threats, necessitating the exploration of innovative approaches. Machine learning, with its ability to analyze vast amounts of data and learn patterns, has emerged as a promising solution to enhance AGC system security. Therefore, this research proposal aims to address the challenges associated with detecting and mitigating cyber-attacks on AGC in smart grids by leveraging machine learning techniques on automatic generation control of two-area power systems. By utilizing historical data, the proposed system will learn the normal behavior patterns of AGC and identify deviations caused by cyber-attacks. Once an attack is detected, appropriate mitigation strategies will be employed to safeguard the AGC system. The outcomes of this research will provide power system operators and administrators with valuable insights into the vulnerabilities of AGC systems in smart grids and offer practical solutions to enhance their cyber resilience.

Keywords: machine learning, cyber-attacks, automatic generation control, smart grid

Procedia PDF Downloads 85
1121 Detecting Black Hole Attacks in Body Sensor Networks

Authors: Sara Alshehri, Bayan Alenzi, Atheer Alshehri, Samia Chelloug, Zainab Almry, Hussah Albugmai

Abstract:

This paper concerns body area networks sensor that collect signals around a human body. The black hole attacks are the main security challenging problem because the data traffic can be dropped at any node. The focus of our proposed solution is to efficiently route data packets while detecting black hole nodes.

Keywords: body sensor networks, security, black hole, routing, broadcasting, OMNeT++

Procedia PDF Downloads 645
1120 Determination of Iodine and Heavy Metals in Two Brands of Iodised Salt

Authors: Z. O. Apotiola, J. F. Fashakin

Abstract:

A study was conducted to investigate the storage stability of Mr Chef and Annapurna salts. The salts were bought from Mile 12 market in Lagos State and were stored for a period of six months. The stability of the iodine content was then investigated by storing some at ambient temperature (24-30oC) and some at atmospheric temperature (21-35 oC), and from each storage condition, a sample each was taken every month to analyze for the iodine and moisture contents. The result shows that there was a significant difference between Mr Chef and the standard and Annapurna and the standard. The iodine content of Mr Chef stored at ambient and atmospheric temperature decreases progressively from 48.70±0.00-37.00±0.00 and 47.60±0.00-11.60±0.00 respectively. And that of Annapurna at both ambient and atmospheric temperature also decreases progressively from 47.60±0.00-36.60±0.00 and 47.60±0.00-10.60±0.00 respectively. Also, the moisture content of both salts at the zero month to the sixth month both at room temperature and atmospheric temperature increases from 1.11±0.00-1.70±0.00 and 1.11±0.00-2.40±0.00 respectively. The results of the heavy metals shows that only Copper, Zinc and Cobalt were detected at the first and the sixth month in both Mr Chef and Annapurna which ranges from 0.15±0.00-0.38±0.00 and 0.18±0.00 - 3.50±0.00 respectively. Hence, the stability of iodine in salt is influenced by the storage conditions it is subjected to and the length of time it is been stored.

Keywords: salt, iodine, stability, ambient, atmospheric temperature

Procedia PDF Downloads 578
1119 Protection of the Object of the Critical Infrastructure in the Czech Republic

Authors: Michaela Vašková

Abstract:

With the increasing dependence of countries on the critical infrastructure, it increases their vulnerability. Big threat is primarily in the human factor (personnel of the critical infrastructure) and in terrorist attacks. It emphasizes the development of methodology for searching of weak points and their subsequent elimination. This article discusses methods for the analysis of safety in the objects of critical infrastructure. It also contains proposal for methodology for training employees of security services in the objects of the critical infrastructure and developing scenarios of attacks on selected objects of the critical infrastructure.

Keywords: critical infrastructure, object of critical infrastructure, protection, safety, security, security audit

Procedia PDF Downloads 344
1118 Exploring Cybercrimes and Major Security Breaches: Assessing the Broader Fiscal Impact on Nigeria

Authors: Washima Tuleun

Abstract:

Cybercrime is a global concern, and Nigeria is not immune to its effects. This paper investigates the cybercrimes and significant cyber-attacks that have targeted businesses and institutions in Nigeria, examining their various forms and the financial and economic impacts they have on individuals, businesses, and the nation as a whole. As technological advancements rapidly evolve and online services gain widespread adoption, there has been a corresponding rise in cyber-related attacks. These attacks often target personal data, exploit system vulnerabilities, and result in the theft of sensitive information, leading to financial losses, reputational damage, and broader impacts on organizations. The study conducts a thorough review of existing literature, case studies, and statistical data to provide a comprehensive understanding of Nigeria’s cybercrime landscape. Additionally, it assesses the efforts by both the government and the private sector to address these challenges and offers recommendations for more effective strategies to mitigate and reduce their impact.

Keywords: cybersecurity, telecommunications engineering, information technology, threat intelligence, vulnerability management, computing

Procedia PDF Downloads 29
1117 A Game of Information in Defense/Attack Strategies: Case of Poisson Attacks

Authors: Asma Ben Yaghlane, Mohamed Naceur Azaiez

Abstract:

In this paper, we briefly introduce the concept of Poisson attacks in the case of defense/attack strategies where attacks are assumed to be continuous. We suggest a game model in which the attacker will combine both criteria of a sufficient confidence level of a successful attack and a reasonably small size of the estimation error in order to launch an attack. Here, estimation error arises from assessing the system failure upon attack using aggregate data at the system level. The corresponding error is referred to as aggregation error. On the other hand, the defender will attempt to deter attack by making one or both criteria inapplicable. The defender will build his/her strategy by both strengthening the targeted system and increasing the size of error. We will formulate the defender problem based on appropriate optimization models. The attacker will opt for a Bayesian updating in assessing the impact on the improvement made by the defender. Then, the attacker will evaluate the feasibility of the attack before making the decision of whether or not to launch it. We will provide illustrations to better explain the process.

Keywords: attacker, defender, game theory, information

Procedia PDF Downloads 468
1116 A Game Theory Analysis of the Effectiveness of Passenger Profiling for Transportation Security

Authors: Yael Deutsch, Arieh Gavious

Abstract:

The threat of aviation terrorism and its potential damage became significant after the 9/11 terror attacks. These attacks have led authorities and leaders to suggest that security personnel should overcome politically correct scruples about profiling and use it openly. However, there is a lack of knowledge about the smart usage of profiling and its advantages. We analyze game models that are suitable to specific real-world scenarios, focusing on profiling as a tool to detect potential violators, such as terrorists and smugglers. We provide analytical and clear answers to difficult questions, and by that help fighting against harmful violation acts.

Keywords: game theory, profiling, security, nash equilibrium

Procedia PDF Downloads 109
1115 An Evaluation of People’s Susceptibility to Phishing Attacks in Nepal and Effectiveness of the Applied Countermeasures

Authors: Sunil Chaudhary, Rajendra Bahadur Thapa, Eleni Berki, Marko Helenius

Abstract:

The increasing number of Internet and mobile phone users, and essentially those, who use these electronic media to perform online transactions makes Nepal lucrative for phishing attacks. It is one of the reasons behind escalating phishing attacks in the country. Therefore, in this paper we examine various phishing attempts and real scenarios in Nepal to determine the seriousness of the problem. We also want to find out how prepared are the Internet and mobile phone users and how well-equipped are the private sector and government authorities responsible to handle cybercrime in the country. We considered five areas of research study, i.e., legal measures, technical and procedural measures, organizational structure, capacity building and international cooperation. These constitute important factors in cyber security and are recommended by the Global Cyber security Agenda (GCA). On the basis of our findings, we provide essential suggestions to make anti-phishing measures more appropriate to Nepalese State and society.

Keywords: internet banking, mobile banking, e-commerce, phishing, anti-phishing, Nepal

Procedia PDF Downloads 487
1114 Alleviation of Salt Stress Effects on Solanum lycopersicum (L.) Plants Grown in a Saline Soil by Foliar Spray with Salicylic Acid

Authors: Saad Howladar

Abstract:

Salinity stress is one of the major abiotic stresses, restricting plant growth and crop productivity in different world regions, especially in arid and semi-arid regions, including Saudi Arabia. The tomato plant is proven to be moderately sensitive to salt stress. Therefore, two field experiments were conducted using tomato plants (Hybrid 6130) to evaluate the effect of four concentrations of salicylic acid (SA; 0, 20, 40, and 60 µM) applied as foliar spraying in improving plant tolerance to saline soil conditions. Tomato plant growth, yield, osmoprotectants, chloeophyll fluorescence, and ionic contents were determined. The results of this study displayed that growth and yield components and physiological attributes of water-sprayed plants (the control) grown under saline soil conditions were negatively impacted. However, under the adverse conditions of salinity, SA-treated plants had enhanced growth and yield components of tomato plants compared to the control. Free proline, soluble sugars, chlorophyll fluorescence, relative water content, membrane stability index, and nutrients contents (e.g., N, P, K⁺, and Ca²⁺) were also improved significantly, while Na⁺ content was significantly reduced in SA-applied tomato plants. SA at 40 µM was the best treatment, which could be recommended to use for salt-stressed tomato plants to enable them to tolerate the adverse conditions of saline soils.

Keywords: tomatoes, salt stress, chlorophyll fluorescence, dehydration tolerance, osmoprotectants

Procedia PDF Downloads 110
1113 Pattern of External Injuries Sustained during Bomb Blast Attacks in Karachi, Pakistan from 2000 to 2007

Authors: Arif Anwar Surani, Salman Ali, Asif Surani, Sohaib Zahid, Akbar Shoukat Ali, Zeeshan-Ul-Hassan Usmani, Joseph Varon, Salim Surani

Abstract:

Objective: Terrorism and suicidal bomb blast attacks are commonplace in Karachi, Pakistan. During the years 2000 to 2007, there were over 60 bomb explosions resulting in more than 1500 casualties. These explosions produce a wide variety of external injuries. We undertook this study to evaluate pattern of external injury produced after bomb blast attacks and to compare injury profile resulting from explosions in open versus semi-confined blast environments. Method: A retrospective, cross-sectional, study was conducted to review injuries sustained after bomb blast attacks in Karachi, Pakistan, from January 2000 to October 2007. Emergency medical records and medico legal certificates of patients presented to three major public sector hospitals of Karachi were evaluated using self-design proforma. Results: Data of 481 victims meet inclusion criteria and were incorporated for final analysis. Of these, 63.6% were injured in open spaces and 36.4% were injured in semi-confined blast environments. Lacerations were commonly encountered as external injury (47.7%) followed by penetrating wounds (15.3%). Lower and upper extremities were most commonly affected (38.6% and 19% respectively). Open and semi-confined blast environments produced a specific injury pattern and profile (p=<0.001). Conclusions: Bomb blast attacks in Karachi produce an external injury pattern consistent with other studies, with exception of an increased frequency in penetrating wounds. Semi-confined blast environments were associated with severe injuries. Further studies are required to better classify injuries and their severity based on standardized scoring systems. Effective emergency response systems must be designed to cope with mass causalities following bomb explosions.

Keywords: bomb blast attacks, injury pattern, external injury, open space, semi-confined space, blast environment

Procedia PDF Downloads 396
1112 Geomechanics Properties of Tuzluca (Eastern. Turkey) Bedded Rock Salt and Geotechnical Safety

Authors: Mehmet Salih Bayraktutan

Abstract:

Geomechanical properties of Rock Salt Deposits in Tuzluca Salt Mine Area (Eastern Turkey) are studied for modeling the operation- excavation strategy. The purpose of this research focused on calculating the critical value of span height- which will meet the safety requirements. The Mine Site Tuzluca Hills consist of alternating parallel bedding of Salt ( NaCl ) and Gypsum ( CaS04 + 2 H20) rocks. Rock Salt beds are more resistant than narrow Gypsum interlayers. Rock Salt beds formed almost 97 percent of the total height of the Hill. Therefore, the geotechnical safety of Galleries depends on the mechanical criteria of Rock Salt Cores. General deposition of Tuzluca Basin was finally completed by Tuzluca Evaporites, as for the uppermost stratigraphic unit. They are currently running mining operations performed by classic mechanical excavation, room and pillar method. Rooms and Pillars are currently experiencing an initial stage of fracturing in places. Geotechnical safety of the whole mining area evaluated by Rock Mass Rating (RMR), Rock Quality Designation (RQD) spacing of joints, and the interaction of groundwater and fracture system. In general, bedded rock salt Show large lateral deformation capacity (while deformation modulus stays in relative small values, here E= 9.86 GPa). In such litho-stratigraphic environments, creep is a critical mechanism in failure. Rock Salt creep rate in steady-state is greater than interbedding layers. Under long-lasted compressive stresses, creep may cause shear displacements, partly using bedding planes. Eventually, steady-state creep in time returns to accelerated stages. Uniaxial compression creep tests on specimens were performed to have an idea of rock salt strength. To give an idea, on Rock Salt cores, average axial strength and strain are found as 18 - 24 MPa and 0.43-0.45 %, respectively. Uniaxial Compressive strength of 26- 32 MPa, from bedded rock salt cores. Elastic modulus is comparatively low, but lateral deformation of the rock salt is high under the uniaxial compression stress state. Poisson ratio = 0.44, break load = 156 kN, cohesion c= 12.8 kg/cm2, specific gravity SG=2.17 gr/cm3. Fracture System; spacing of fractures, joints, faults, offsets are evaluated under acting geodynamic mechanism. Two sand beds, each 4-6 m thick, exist near to upper level and at the top of the evaporating sequence. They act as aquifers and keep infiltrated water on top for a long duration, which may result in the failure of roofs or pillars. Two major active seismic ( N30W and N70E ) striking Fault Planes and parallel fracture strands have seismically triggered moderate risk of structural deformation of rock salt bedding sequence. Earthquakes and Floods are two prevailing sources of geohazards in this region—the seismotectonic activity of the Mine Site based on the crossing framework of Kagizman Faults and Igdir Faults. Dominant Hazard Risk sources include; a) Weak mechanical properties of rock salt, gypsum, anhydrite beds-creep. b) Physical discontinuities cutting across the thick parallel layers of Evaporite Mass, c) Intercalated beds of weak cemented or loose sand, clayey sandy sediments. On the other hand, absorbing the effects of salt-gyps parallel bedded deposits on seismic wave amplitudes has a reducing effect on the Rock Mass.

Keywords: bedded rock salt, creep, failure mechanism, geotechnical safety

Procedia PDF Downloads 190
1111 Analysis of Threats in Interoperability of Medical Devices

Authors: M. Sandhya, R. M. Madhumitha, Sharmila Sankar

Abstract:

Interoperable medical devices (IMDs) face threats due to the increased attack surface accessible by interoperability and the corresponding infrastructure. Initiating networking and coordination functionalities primarily modify medical systems' security properties. Understanding the threats is a vital first step in ultimately crafting security solutions for such systems. The key to this problem is coming up with some common types of threats or attacks with those of security and privacy, and providing this information as a roadmap. This paper analyses the security issues in interoperability of devices and presents the main types of threats that have to be considered to build a secured system.

Keywords: interoperability, threats, attacks, medical devices

Procedia PDF Downloads 333
1110 An Efficient and Provably Secure Three-Factor Authentication Scheme with Key Agreement

Authors: Mohan Ramasundaram, Amutha Prabakar Muniyandi

Abstract:

Remote user authentication is one of the important tasks for any kind of remote server applications. Several remote authentication schemes are proposed by the researcher for Telecare Medicine Information System (TMIS). Most of the existing techniques have limitations, vulnerable to various kind attacks, lack of functionalities, information leakage, no perfect forward security and ineffectiveness. Authentication is a process of user verification mechanism for allows him to access the resources of a server. Nowadays, most of the remote authentication protocols are using two-factor authentications. We have made a survey of several remote authentication schemes using three factors and this survey shows that the most of the schemes are inefficient and subject to several attacks. We observed from the experimental evaluation; the proposed scheme is very secure against various known attacks that include replay attack, man-in-the-middle attack. Furthermore, the analysis based on the communication cost and computational cost estimation of the proposed scheme with related schemes shows that our proposed scheme is efficient.

Keywords: Telecare Medicine Information System, elliptic curve cryptography, three-factor, biometric, random oracle

Procedia PDF Downloads 219
1109 A Retrospective Study of the Effects of Xenophobia on South Africa-Nigeria Relations

Authors: O. Fayomi, F. Chidozie, C. Ayo

Abstract:

The underlying causes of xenophobia are complex and varied. Xenophobia has to do with being contemptuous of that which is foreign, especially of strangers or of people from different countries or cultures. Unemployment and mounting poverty among South Africans at the bottom of the economic ladder have provoked fears of the competition that better educated and experienced migrants can represent. South Africa’s long track-record of violence as a means of protest and the targeting of foreigners in particular, and, the documented tensions over migration policy and the scale of repatriation serve a very good explanation for its xenophobia. It was clear that while most of the attacks were directed against foreign, primarily African, migrants, this was not the rule. Attacks were also noted against Chinese-speakers, Pakistani migrants as well as against South Africans from minority language groups (in the conflict areas). Settlements that have recently experienced the expression of ‘xenophobic’ violence have also been the site of violent and other forms of protest around other issues, most notably service delivery. The failure of government in service delivery was vexed on this form of xenophobia. Due to the increase in migration, this conflict is certainly not temporary in nature. Xenophobia manifests in different regions and communities with devastating effects on the affected nationals. Nigerians living in South Africa have been objects of severe attacks and assault as a result of this xenophobic attitude. It is against this background that this study seeks to investigate the xenophobic attacks against Nigerians in South Africa. The methodology is basically qualitative with the use of secondary sources such as books, journals, newspapers and internet sources.

Keywords: xenophobia, unemployment, poverty, Nigeria, South Africa

Procedia PDF Downloads 472
1108 Application of Hyperspectral Remote Sensing in Sambhar Salt Lake, A Ramsar Site of Rajasthan, India

Authors: Rajashree Naik, Laxmi Kant Sharma

Abstract:

Sambhar lake is the largest inland Salt Lake of India, declared as a Ramsar site on 23 March 1990. Due to high salinity and alkalinity condition its biodiversity richness is contributed by haloalkaliphilic flora and fauna along with the diverse land cover including waterbody, wetland, salt crust, saline soil, vegetation, scrub land and barren land which welcome large number of flamingos and other migratory birds for winter harboring. But with the gradual increase in the irrational salt extraction activities, the ecological diversity is at stake. There is an urgent need to assess the ecosystem. Advanced technology like remote sensing and GIS has enabled to look into the past, compare with the present for the future planning and management of the natural resources in a judicious way. This paper is a research work intended to present a vegetation in typical inland lake environment of Sambhar wetland using satellite data of NASA’s EO-1 Hyperion sensor launched in November 2000. With the spectral range of 0.4 to 2.5 micrometer at approximately 10nm spectral resolution with 242 bands 30m spatial resolution and 705km orbit was used to produce a vegetation map for a portion of the wetland. The vegetation map was tested for classification accuracy with a pre-existing detailed GIS wetland vegetation database. Though the accuracy varied greatly for different classes the algal communities were successfully identified which are the major sources of food for flamingo. The results from this study have practical implications for uses of spaceborne hyperspectral image data that are now becoming available. Practical limitations of using these satellite data for wetland vegetation mapping include inadequate spatial resolution, complexity of image processing procedures, and lack of stereo viewing.

Keywords: Algal community, NASA’s EO-1 Hyperion, salt-tolerant species, wetland vegetation mapping

Procedia PDF Downloads 135
1107 A Phishing Email Detection Approach Using Machine Learning Techniques

Authors: Kenneth Fon Mbah, Arash Habibi Lashkari, Ali A. Ghorbani

Abstract:

Phishing e-mails are a security issue that not only annoys online users, but has also resulted in significant financial losses for businesses. Phishing advertisements and pornographic e-mails are difficult to detect as attackers have been becoming increasingly intelligent and professional. Attackers track users and adjust their attacks based on users’ attractions and hot topics that can be extracted from community news and journals. This research focuses on deceptive Phishing attacks and their variants such as attacks through advertisements and pornographic e-mails. We propose a framework called Phishing Alerting System (PHAS) to accurately classify e-mails as Phishing, advertisements or as pornographic. PHAS has the ability to detect and alert users for all types of deceptive e-mails to help users in decision making. A well-known email dataset has been used for these experiments and based on previously extracted features, 93.11% detection accuracy is obtainable by using J48 and KNN machine learning techniques. Our proposed framework achieved approximately the same accuracy as the benchmark while using this dataset.

Keywords: phishing e-mail, phishing detection, anti phishing, alarm system, machine learning

Procedia PDF Downloads 338
1106 Isolation and Identification of Probiotic Lactic Acid Bacteria with Cholesterol Lowering Potential and Their Use in Fermented Milk Product

Authors: Preeyarach Whisetkhan, Malai Taweechotipatr, Ulisa Pachekrepapol

Abstract:

Elevated level of blood cholesterol or hypercholesterolemia may lead to atherosclerosis and poses a major risk for cardiovascular diseases. Probiotics play a crucial role in human health, and probiotic bacteria that possesses bile salt hydrolase (BSH) activity can be used to lower cholesterol level of the host. The aim of this study was to investigate whether lactic acid bacteria (LAB) isolated from traditional Thai fermented foods were able to exhibit bile salt hydrolase activity and their use in fermented milk. A total of 28 isolates were tested for BSH activity by plate method on MRS agar supplemented with 0.5% sodium salt of taurodeoxycholic acid and incubated at 37°C for 48 h under anaerobic condition. The results showed that FN1-1 and FN23-3 isolates possessed strong BSH activity. FN1-1 and FN23-3 isolates were then identified for phenotype, biochemical characteristics, and genotype (16S rRNA sequencing). FN1-1 isolate showed 99.92% similarity to Lactobacillus pentosus DSM 20314(T), while FN23-3 isolate showed 99.94% similarity to Enterococcus faecium CGMCC1.2136 (T). Lactobacillus pentosus FN1-1 and Enterococcus faecium FN23-3 were tolerant of pH 3-4 and 0.3 and 0.8% bile. Bacterial count and pH of milk fermented with Lactobacillus pentosus FN1-1 at 37°C and 43°C were investigated. The results revealed that Lactobacillus pentosus FN1-1 was able to grow in milk, which led to decrease in pH level. Fermentation at 37°C resulted in faster growth rate than at 43 °C. Lactobacillus pentosus FN1-1 was a candidate probiotic to be used in fermented milk products to reduce the risk of high-cholesterol diseases.

Keywords: probiotics, lactic acid bacteria, bile salt hydrolase, cholesterol

Procedia PDF Downloads 149
1105 Detoxification and Recycling of the Harvested Microalgae using Eco-friendly Food Waste Recycling Technology with Salt-tolerant Mushroom Strains

Authors: J. M. Kim, Y. W. Jung, E. Lee, Y. K. Kwack, , S. K. Sim*

Abstract:

Cyanobacterial blooms in lakes, reservoirs, and rivers have been environmental and social issues due to its toxicity, odor, etc. Among the cyanotoxins, microcystins exist mostly within the cyanobacterial cells, and they are released from the cells. Therefore, an innovative technology is needed to detoxify the harvested microalgae for environment-friendly utilization of the harvested microalgae. This study develops detoxification method of microcystins in the harvested microalgae and recycling harvested microalgae with food waste using salt-tolerant mushroom strains and natural ecosystem decomposer. During this eco-friendly organic waste recycling process, diverse bacteria or various enzymes of the salt-tolerant mushroom strains decompose the microystins and cyclic peptides. Using PHLC/Mass analysis, it was verified that 99.8% of the microcystins of the harvested microalgae was detoxified in the harvested mushroom as well as in the recycled organic biomass. Further study is planned to verify the decomposition mechanisms of the microcystins by the bacteria or enzymes. In this study, the harvested microalgae is mixed with the food waste, and then the mixed toxic organic waste is used as mushroom compost by adjusting the water content of about 70% using cellulose such as sawdust cocopeats and cottonseeds. The mushroom compost is bottled, sterilized, and salt-tolerant mushroom spawn is inoculated. The mushroom is then cultured and growing in the temperature, humidity, and CO2 controlled environment. During the cultivation and growing process of the mushroom, microcystins are decomposed into non-toxic organic or inorganic compounds by diverse bacteria or various enzymes of the mushroom strains. Various enzymes of the mushroom strains decompose organics of the mixed organic waste and produce nutritious and antibiotic mushrooms. Cultured biomass compost after mushroom harvest can be used for organic fertilizer, functional bio-feed, and RE-100 biomass renewable energy source. In this eco-friendly organic waste recycling process, no toxic material, wastewater, nor sludge is generated; thus, sustainable with the circular economy.

Keywords: microalgae, microcystin, food waste, salt-tolerant mushroom strains, sustainability, circular economy

Procedia PDF Downloads 143
1104 Clathrate Hydrate Measurements and Thermodynamic Modelling for Refrigerants with Electrolytes Solution in the Presence of Cyclopentane

Authors: Peterson Thokozani Ngema, Paramespri Naidoo, Amir H. Mohammadi, Deresh Ramjugernath

Abstract:

Phase equilibrium data (dissociation data) for clathrate hydrate (gas hydrate) were undertaken for systems involving fluorinated refrigerants with a single and mixed electrolytes (NaCl, CaCl₂, MgCl₂, and Na₂SO₄) aqueous solution at various salt concentrations in the absence and presence of cyclopentane (CP). The ternary systems for (R410a or R507) with the water system in the presence of CP were performed in the temperature and pressures ranges of (279.8 to 294.4) K and (0.158 to 1.385) MPa, respectively. Measurements for R410a with single electrolyte {NaCl or CaCl₂} solution in the presence of CP were undertaken at salt concentrations of (0.10, 0.15 and 0.20) mass fractions in the temperature and pressure ranges of (278.4 to 293.7) K and (0.214 to1.179) MPa, respectively. The temperature and pressure conditions for R410a with Na₂SO₄ aqueous solution system were investigated at a salt concentration of 0.10 mass fraction in the range of (283.3 to 291.6) K and (0.483 to 1.373) MPa respectively. Measurements for {R410a or R507} with mixed electrolytes {NaCl, CaCl₂, MgCl₂} aqueous solution was undertaken at various salt concentrations of (0.002 to 0.15) mass fractions in the temperature and pressure ranges of (274.5 to 292.9) K and (0.149 to1.119) MPa in the absence and presence of CP, in which there is no published data related to mixed salt and a promoter. The phase equilibrium measurements were performed using a non-visual isochoric equilibrium cell that co-operates the pressure-search technique. This study is focused on obtaining equilibrium data that can be utilized to design and optimize industrial wastewater, desalination process and the development of Hydrate Electrolyte–Cubic Plus Association (HE–CPA) Equation of State. The results show an impressive improvement in the presence of promoter (CP) on hydrate formation because it increases the dissociation temperatures near ambient conditions. The results obtained were modeled using a developed HE–CPA equation of state. The model results strongly agree with the measured hydrate dissociation data.

Keywords: association, desalination, electrolytes, promoter

Procedia PDF Downloads 245
1103 Bond Strength of Different Strengthening Systems: Concrete Elements under Freeze–Thaw Cycles and Salt Water Immersion Exposure

Authors: Firas Al-Mahmoud, Jean-Michel Mechling, Mohamed Shaban

Abstract:

The long-term durability of fibre reinforced polymer (FRP) composites is often stated as being the main reason for the use of these materials. Indeed, structures externally or Near Surface Mounted (NSM) reinforced with Carbon Fibre Reinforcement Polymer CFRP are often in contact with temperature cycles and salt water immersion and other environmental conditions that reduce the expected durability of the system. Bond degradation is a frequent cause of premature failure of structural elements and environmental conditions are known to relate to such failures. The purpose of this study is to investigate the effect of environmental exposure on the bond for different CFRP strengthening systems. Bending tests were conducted to evaluate the bond with and without environmental exposure. The specimens were strengthened with CFRP sheets, CFRP plates and NSM CFRP rods embedded in two filling materials: epoxy resin and mortar. Then, they were exposed to up to 300 freeze–thaw cycles. One freeze–thaw cycle consisted of four stages according to ASTM or immersed in 3.5% salted tap water. A total of thirty-six specimens were prepared for this purpose. Results showed a decrease in ultimate bond strength for specimens strengthened by CFRP sheets that were immersed in salt water for 120 days, while a reduction was shown for CFRP sheet and plate bonded specimens that were subjected to 300 freeze–thaw cycles. Exposing NSM CFRP rod strengthened specimens, embedded in resin or mortar, to freeze–thaw cycles or to immersion in salt water does not affect the bond strength.

Keywords: durability, strengthening, FRP, bond, freeze–thaw

Procedia PDF Downloads 350
1102 Application of Chinese Remainder Theorem to Find The Messages Sent in Broadcast

Authors: Ayubi Wirara, Ardya Suryadinata

Abstract:

Improper application of the RSA algorithm scheme can cause vulnerability to attacks. The attack utilizes the relationship between broadcast messages sent to the user with some fixed polynomial functions that belong to each user. Scheme attacks carried out by applying the Chinese Remainder Theorem to obtain a general polynomial equation with the same modulus. The formation of the general polynomial becomes a first step to get back the original message. Furthermore, to solve these equations can use Coppersmith's theorem.

Keywords: RSA algorithm, broadcast message, Chinese Remainder Theorem, Coppersmith’s theorem

Procedia PDF Downloads 341
1101 Using GIS and Map Data for the Analysis of the Relationship between Soil and Groundwater Quality at Saline Soil Area of Kham Sakaesaeng District, Nakhon Ratchasima, Thailand

Authors: W. Thongwat, B. Terakulsatit

Abstract:

The study area is Kham Sakaesaeng District in Nakhon Ratchasima Province, the south section of Northeastern Thailand, located in the Lower Khorat-Ubol Basin. This region is the one of saline soil area, located in a dry plateau and regularly experience standing with periods of floods and alternating with periods of drought. Especially, the drought in the summer season causes the major saline soil and saline water problems of this region. The general cause of dry land salting resulted from salting on irrigated land, and an excess of water leading to the rising water table in the aquifer. The purpose of this study is to determine the relationship of physical and chemical properties between the soil and groundwater. The soil and groundwater samples were collected in both rainy and summer seasons. The content of pH, electrical conductivity (EC), total dissolved solids (TDS), chloride and salinity were investigated. The experimental result of soil and groundwater samples show the slightly pH less than 7, EC (186 to 8,156 us/cm and 960 to 10,712 us/cm), TDS (93 to 3,940 ppm and 480 to 5,356 ppm), chloride content (45.58 to 4,177,015 mg/l and 227.90 to 9,216,736 mg/l), and salinity (0.07 to 4.82 ppt and 0.24 to 14.46 ppt) in the rainy and summer seasons, respectively. The distribution of chloride content and salinity content were interpolated and displayed as a map by using ArcMap 10.3 program, according to the season. The result of saline soil and brined groundwater in the study area were related to the low-lying topography, drought area, and salt-source exposure. Especially, the Rock Salt Member of Maha Sarakham Formation was exposed or lies near the ground surface in this study area. During the rainy season, salt was eroded or weathered from the salt-source rock formation and transported by surface flow or leached into the groundwater. In the dry season, the ground surface is dry enough resulting salt precipitates from the brined surface water or rises from the brined groundwater influencing the increasing content of chloride and salinity in the ground surface and groundwater.

Keywords: environmental geology, soil salinity, geochemistry, groundwater hydrology

Procedia PDF Downloads 120
1100 Evaluation and Possibilities of Valorization of Ecotourism Potentials in the Mbam and Djerem National Park

Authors: Rinyu Shei Mercy

Abstract:

Protected areas are the potential areas for the development of ecotourism because of their biodiversity, landscapes, waterfalls, lakes, caves, salt lick and cultural heritage of local or indigenous people. These potentials have not yet been valorized, so this study will enable to investigate the evaluation and possibilities of valorization of ecotourism potentials in the Mbam and Djerem National Park. Hence, this was done by employing a combination of field observations, examination, data collection and evaluation, using a SWOT analysis. The SWOT provides an analysis to determine the strengths, weaknesses, opportunities and threats, and strategic suggestions for ecological planning. The study helps to determine an ecotouristic inventory and mapping of ecotourism potentials of the park, evaluate the degree of valorization of these potentials and the possibilities of valorization. Finally, the study has proven that the park has much natural potentials such as rivers, salt licks, waterfall and rapids, lakes, caves and rocks, etc. Also, from the study, it was realized that as concerns the degree of valorization of these ecotourism potentials, 50% of the population visit the salt lick of Pkayere because it’s a biodiversity hotspot and rich in mineral salt attracting a lot of animals and the least is the lake Miyere with 1% due to the fact that it is sacred. Moreover, from the results, there are possibilities that these potentials can be valorized and put into use because of their attractive nature such as creating good roads and bridges, good infrastructural facilities, good communication network etc. So, the study recommends that, in this process, MINTOUR, WCS, tour operators must interact sufficiently in order to develop the potential interest to ecotourism, ecocultural tourism and scientific tourism.

Keywords: ecotourism, national park Mbam and Djerem, valorization of biodiversity, protected areas of Cameroon

Procedia PDF Downloads 137
1099 Influence of Chemical Pollution on Thermal Habitats of the Ciliate Tetrahymena thermophila

Authors: Doufoungognon C. Kone

Abstract:

Global change, in particular pollution and global warming, threatens ecosystems and the biodiversity they harbor. Due to pollutants exposure, organisms might modify their thermal niches in order to track the thermal conditions limiting the negative impacts of chemical stressors depending on their mode of action. This study tests the influence of different pollutants, copper, salt, and chloramphenicol, on the thermal preferences of the ciliate Tetrahymena thermophila. Six genotypes were exposed to a gradient of concentrations ranging from 0 to 500mg/L for copper, 0 to 300 mg/l for chloramphenicol, and 0 to 12g/l for salt in synthetic media at eight temperatures ranging from 11 to 39° C. The measured fitness proxies are the maximum growth rate and the 50% growth inhibitory concentration (IC50). The results show that the majority of genotypes are more resistant to chloramphenicol in temperatures below their thermal optimum without pollutants, while they better tolerate other salt and copper in temperatures above their thermal optimum. In addition, generalists reduce their niche width while specialists widen it in chloramphenicol. Overall, results suggest that global warming would have a particularly deleterious effect in the case of chemical pollution. This pollution would induce the full disruption of the thermal habitats.

Keywords: ciliate, thermal niche, growth rate, toxicity, multiple stressors

Procedia PDF Downloads 90
1098 Cooperative Agents to Prevent and Mitigate Distributed Denial of Service Attacks of Internet of Things Devices in Transportation Systems

Authors: Borhan Marzougui

Abstract:

Road and Transport Authority (RTA) is moving ahead with the implementation of the leader’s vision in exploring all avenues that may bring better security and safety services to the community. Smart transport means using smart technologies such as IoT (Internet of Things). This technology continues to affirm its important role in the context of Information and Transportation Systems. In fact, IoT is a network of Internet-connected objects able to collect and exchange different data using embedded sensors. With the growth of IoT, Distributed Denial of Service (DDoS) attacks is also growing exponentially. DDoS attacks are the major and a real threat to various transportation services. Currently, the defense mechanisms are mainly passive in nature, and there is a need to develop a smart technique to handle them. In fact, new IoT devices are being used into a botnet for DDoS attackers to accumulate for attacker purposes. The aim of this paper is to provide a relevant understanding of dangerous types of DDoS attack related to IoT and to provide valuable guidance for the future IoT security method. Our methodology is based on development of the distributed algorithm. This algorithm manipulates dedicated intelligent and cooperative agents to prevent and to mitigate DDOS attacks. The proposed technique ensure a preventive action when a malicious packets start to be distributed through the connected node (Network of IoT devices). In addition, the devices such as camera and radio frequency identification (RFID) are connected within the secured network, and the data generated by it are analyzed in real time by intelligent and cooperative agents. The proposed security system is based on a multi-agent system. The obtained result has shown a significant reduction of a number of infected devices and enhanced the capabilities of different security dispositives.

Keywords: IoT, DDoS, attacks, botnet, security, agents

Procedia PDF Downloads 143
1097 Cyber-Med: Practical Detection Methodology of Cyber-Attacks Aimed at Medical Devices Eco-Systems

Authors: Nir Nissim, Erez Shalom, Tomer Lancewiki, Yuval Elovici, Yuval Shahar

Abstract:

Background: A Medical Device (MD) is an instrument, machine, implant, or similar device that includes a component intended for the purpose of the diagnosis, cure, treatment, or prevention of disease in humans or animals. Medical devices play increasingly important roles in health services eco-systems, including: (1) Patient Diagnostics and Monitoring; Medical Treatment and Surgery; and Patient Life Support Devices and Stabilizers. MDs are part of the medical device eco-system and are connected to the network, sending vital information to the internal medical information systems of medical centers that manage this data. Wireless components (e.g. Wi-Fi) are often embedded within medical devices, enabling doctors and technicians to control and configure them remotely. All these functionalities, roles, and uses of MDs make them attractive targets of cyber-attacks launched for many malicious goals; this trend is likely to significantly increase over the next several years, with increased awareness regarding MD vulnerabilities, the enhancement of potential attackers’ skills, and expanded use of medical devices. Significance: We propose to develop and implement Cyber-Med, a unique collaborative project of Ben-Gurion University of the Negev and the Clalit Health Services Health Maintenance Organization. Cyber-Med focuses on the development of a comprehensive detection framework that relies on a critical attack repository that we aim to create. Cyber-Med will allow researchers and companies to better understand the vulnerabilities and attacks associated with medical devices as well as providing a comprehensive platform for developing detection solutions. Methodology: The Cyber-Med detection framework will consist of two independent, but complementary detection approaches: one for known attacks, and the other for unknown attacks. These modules incorporate novel ideas and algorithms inspired by our team's domains of expertise, including cyber security, biomedical informatics, and advanced machine learning, and temporal data mining techniques. The establishment and maintenance of Cyber-Med’s up-to-date attack repository will strengthen the capabilities of Cyber-Med’s detection framework. Major Findings: Based on our initial survey, we have already found more than 15 types of vulnerabilities and possible attacks aimed at MDs and their eco-system. Many of these attacks target individual patients who use devices such pacemakers and insulin pumps. In addition, such attacks are also aimed at MDs that are widely used by medical centers such as MRIs, CTs, and dialysis engines; the information systems that store patient information; protocols such as DICOM; standards such as HL7; and medical information systems such as PACS. However, current detection tools, techniques, and solutions generally fail to detect both the known and unknown attacks launched against MDs. Very little research has been conducted in order to protect these devices from cyber-attacks, since most of the development and engineering efforts are aimed at the devices’ core medical functionality, the contribution to patients’ healthcare, and the business aspects associated with the medical device.

Keywords: medical device, cyber security, attack, detection, machine learning

Procedia PDF Downloads 356
1096 A Survey of Attacks and Security Requirements in Wireless Sensor Networks

Authors: Vishnu Pratap Singh Kirar

Abstract:

Wireless sensor network (WSN) is a network of many interconnected networked systems, they equipped with energy resources and they are used to detect other physical characteristics. On WSN, there are many researches are performed in past decades. WSN applicable in many security systems govern by military and in many civilian related applications. Thus, the security of WSN gets attention of researchers and gives an opportunity for many future aspects. Still, there are many other issues are related to deployment and overall coverage, scalability, size, energy efficiency, quality of service (QoS), computational power and many more. In this paper we discus about various applications and security related issue and requirements of WSN.

Keywords: wireless sensor network (WSN), wireless network attacks, wireless network security, security requirements

Procedia PDF Downloads 491
1095 Focalization Used as a Narrative Strategy Mirroring Fadia Faqir’s Ideology in Pillars of Salt 1996

Authors: Malika Hammouche

Abstract:

The novel Pillars of Salt, written by Fadia Faqir in 1996, is a good example where storytelling is utilized as a traditional material to underline the author’s womanist ideology. A study of narrative could be fruitfully combined with that of ideology in this case. This combination could be demonstrated through the narrative technique used by Fadia Faqir in Pillars of Salt (1996), reflecting her anti-colonial ideology. The first step of this work will highlight the storyteller’s narrative in the novel representing, on the one hand, the imperial voice, and on the other exoticism and orientalism. The second step will demonstrate how Faqir’s narrative technique uses focalization as a narratological tool to negotiate her space. Faqir gives a voice to the female protagonist of the novel within the androcentric bias of Arab narrative theory to point to and amend the orientalist discourse typical to colonial literature. The orientalist discourse is represented through the voice of the storyteller in the novel. The juxtaposition of the storyteller’s and the female protagonist narratives is borrowed from the Arab literary background. It is a postcolonial counter-discursive strategy used by the author as a traditional material to underline her Arabo Islamic Womanist ideology in this novel.

Keywords: Arabo Islamic womanism, focalization, ideology, narrative technique, orientalist

Procedia PDF Downloads 240
1094 Synthesis of an Organic-Inorganic Salt of (C2H5NO2) 2H4SiW12O40 and Investigation of Its Anti-Viral Effect on the Tobacco Mosaic Virus (TMV)

Authors: Mahboobeh Mohadeszadeh, Majid Saghi

Abstract:

Polyoxometalates (POMs) are important inorganic compounds that have been considered specifically in recent years due to abundant attributes and applications. Those POMs that have one central tetrahedral atom called keggin. The binding Amino-acid groups to keggin structure give the antivirus effect to these compounds. A new organic-inorganic hybrid structure, with formula (Gly)2H4SiW12O40 was synthesized. Investigation on Anti-viral effect of this compound showed the (Gly)2H4SiW12O40 prevents infection of Tobacco Mosaic Virus (TMV) on the Nicotianatabacum plants.

Keywords: Polyoxometalate, Keggin, Organic-inorganic salt, TMV

Procedia PDF Downloads 288
1093 Synthesis of an Organic- Inorganic Salt of (C2H5NO2)2H4SiW12O40 and Investigation of Its Anti-Viral Effect on the Tobacco Mosaic Virus (TMV)

Authors: Mahboobeh Mohadeszadeh, Majid Saghi

Abstract:

Polyoxometalates (POMs) are important inorganic compounds that have been considered specifically in recent years due to abundant attributes and applications. Those POMs that have one central tetrahedral atom called keggin. The binding Amino-acid groups to keggin structure give the antivirus effect to these compounds. A new organic-inorganic hybrid structure, with formula (Gly)2H4SiW12O40 was synthesized. Investigation on Anti-viral effect of this compound showed the (Gly)2H4SiW12O40 prevents infection of Tobacco Mosaic Virus (TMV) on the Nicotianatabacum plants.

Keywords: polyoxometalate, keggin, organic-inorganic salt, TMV

Procedia PDF Downloads 421