Search results for: chloride attack
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 1213

Search results for: chloride attack

973 Durability Study of Binary Blended High Performance Concrete

Authors: Vatsal Patel, Niraj Shah

Abstract:

This paper presents the results of a laboratory study on the properties of binary blended High Performance cementitious systems containing blends of ordinary Portland cement (OPC), Porcelain Powder or Marble Powder blend proportions of 100:00, 95:05, 90:10, 85:15, 80:20 for OPC: Porcelain Powder/Marble Powder. Studies on the Engineering Properties of the cementitious concrete, namely compressive strength, flexural strength, sorptivity, rapid chloride penetration test and accelerated corrosion test have been performed and those of OPC concrete. The results show that the inclusion of Porcelain powder or Marble Powder as binary blended cement alters to a great degree the properties of the binder as well as the resulting concrete. In addition, the results show that the Porcelain powder with 85:15 proportions and Marble powder with 90:10 proportions as binary systems to produce high-performance concrete could potentially be used in the concrete construction industry particular in lowering down the volume of OPC used and lowering emission of CO2 produces during manufacturing of cement.

Keywords: accelerated corrosion, binary blended cementitious system, rapid chloride penetration, sorptivity

Procedia PDF Downloads 386
972 Literature Review: Adversarial Machine Learning Defense in Malware Detection

Authors: Leidy M. Aldana, Jorge E. Camargo

Abstract:

Adversarial Machine Learning has gained importance in recent years as Cybersecurity has gained too, especially malware, it has affected different entities and people in recent years. This paper shows a literature review about defense methods created to prevent adversarial machine learning attacks, firstable it shows an introduction about the context and the description of some terms, in the results section some of the attacks are described, focusing on detecting adversarial examples before coming to the machine learning algorithm and showing other categories that exist in defense. A method with five steps is proposed in the method section in order to define a way to make the literature review; in addition, this paper summarizes the contributions in this research field in the last seven years to identify research directions in this area. About the findings, the category with least quantity of challenges in defense is the Detection of adversarial examples being this one a viable research route with the adaptive approach in attack and defense.

Keywords: Malware, adversarial, machine learning, defense, attack

Procedia PDF Downloads 62
971 Influence of Metakaolin and Cements Types on Compressive Strength and Transport Properties of Self-Consolidating Concrete

Authors: Kianoosh Samimi, Farhad Estakhr, Mahdi Mahdikhani, Faramaz Moodi

Abstract:

The self-consolidating concrete (SCC) performance over ordinary concrete is generally related to the ingredients used. The metakaolin can modify various properties of concrete, due to high pozzolanic reactions and also makes a denser microstructure. The objective of this paper is to examine the influence of three types of Portland cement and metakaolin on compressive strength and transport properties of SCC at early ages and up to 90 days. Six concrete mixtures were prepared with three types of different cements and substitution of 15% metakaolin. The results show that the highest value of compressive strength was achieved for Portland Slag Cement (PSC) and without any metakaolin at age of 90 days. Conversely, the lowest level of compressive strength at all ages of conservation was obtained for Pozzolanic Portland Cement (PPC) and containing 15% metakaolin. As can be seen in the results, compressive strength in SCC containing Portland cement type II with metakaolin is higher compared to that relative to SCC without metakaolin from 28 days of age. On the other hand, the samples containing PSC and PPC with metakaolin had a lower compressive strength than the plain samples. Therefore, it can be concluded that metakaolin has a negative effect on the compressive strength of SCC containing PSC and PPC. In addition, results show that metakaolin has enhanced chloride durability of SCCs and reduced capillary water absorption at 28, 90 days.

Keywords: SCC, metakaolin, cement type, compressive strength, chloride diffusion

Procedia PDF Downloads 220
970 Microbiological Analysis on Anatomical Specimens of Cats for Use in Veterinary Surgery

Authors: Raphael C. Zero, Marita V. Cardozo, Thiago A. S. S. Rocha, Mariana T. Kihara, Fernando A. Ávila, Fabrício S. Oliveira

Abstract:

There are several fixative and preservative solutions for use on cadavers, many of them using formaldehyde as the fixative or anatomical part preservative. In some countries, such as Brazil, this toxic agent has been increasingly restricted. The objective of this study was to microbiologically identify and quantify the key agents in tanks containing 96GL ethanol or sodium chloride solutions, used respectively as fixatives and preservatives of cat cadavers. Eight adult cat corpses, three females and five males, with an average weight of 4.3 kg, were used. After injection via the external common carotid artery (120 ml/kg, 95% 96GL ethyl alcohol and 5% pure glycerin), the cadavers were fixed in a plastic tank with 96GL ethanol for 60 days. After fixing, they were stored in a 30% sodium chloride aqueous solution for 120 days in a similar tank. Samples were collected at the start of the experiment - before the animals were placed in the ethanol tanks, and monthly thereafter. The bacterial count was performed by Pour Plate Method in BHI agar (Brain Heart Infusion) and the plates were incubated aerobically and anaerobically for 24h at 37ºC. MacConkey agar, SPS agar (Sulfite Polymyxin Sulfadizine) and MYP Agar Base were used to isolate the microorganisms. There was no microbial growth in the samples prior to alcohol fixation. After 30 days of fixation in the alcohol solution, total aerobic and anaerobic (<1.0 x 10 CFU/ml) were found and Pseudomonas sp., Staphylococcus sp., Clostridium sp. were the identified agents. After 60 days in the alcohol fixation solution, total aerobes (<1.0 x 10 CFU/ml) and total anaerobes (<2.2 x 10 CFU/mL) were found, and the identified agents were the same. After 30 days of storage in the aqueous solution of 30% sodium chloride, total aerobic (<5.2 x 10 CFU/ml) and total anaerobes (<3.7 x 10 CFU/mL) were found and the agents identified were Staphylococcus sp., Clostridium sp., and fungi. After 60 days of sodium chloride storage, total aerobic (<3.0 x 10 CFU / ml) and total anaerobes (<7.0 x 10 CFU/mL) were found and the identified agents remained the same: Staphylococcus sp., Clostridium sp., and fungi. The microbiological count was low and visual inspection did not reveal signs of contamination in the tanks. There was no strong odor or purification, which proved the technique to be microbiologically effective in fixing and preserving the cat cadavers for the four-month period in which they are provided to undergraduate students of University of Veterinary Medicine for surgery practice. All experimental procedures were approved by the Municipal Legal Department (protocol 02.2014.000027-1). The project was funded by FAPESP (protocol 2015-08259-9).

Keywords: anatomy, fixation, microbiology, small animal, surgery

Procedia PDF Downloads 289
969 The Use of Social Media Sarcasm as a Response to Media-Coverage of Iran’s Unprecedented Attack on Israel

Authors: Afif J. Arabi

Abstract:

On April 15, 2024, Iran announced its unprecedented military attack by sending waves of more than 300 drones and ballistic missiles toward Israel. The Attack lasted approximately five hours and was a widely covered, distributed, and followed media event. Iran’s military action against Israel was a long-awaited action across the Middle East since the early days of the October 7th war on Gaza and after a long history of verbal threats. While people in many Arab countries stayed up past midnight in anticipation of watching the disastrous results of this unprecedented attack, voices on traditional and social media alike started to question the timed public announcement of the attack, which gave Israel at least a two-hour notice to prepare its defenses. When live news coverage started showing that nearly all the drones and missiles were intercepted by Israel – with help from the U.S. and other countries – and no deaths were reported, the social media response to this media event turned toward sarcasm, mockery, irony, and humor. Social media users posted sarcastic pictures, jokes, and comments mocking the Iranian offensive. This research examines this unique media event and the sarcastic response it generated on social media. The study aims to investigate the causes leading to media sarcasm in militarized political conflict, the social function of such generated sarcasm, and the role of social media as a platform for consuming frustration, dissatisfaction, and outrage passively through various media products. The study compares the serious traditional media coverage of the event with the humorous social media response among Arab countries. The research uses an eclectic theoretical approach using framing theory as a paradigm for understanding and investigating communication social functionalism theory in media studies to examine sarcasm. Social functionalism theory is a sociological perspective that views society as a complex system whose parts work together to promote solidarity and stability. In the context of media and sarcasm, this theory would suggest that sarcasm serves specific functions within society, such as reinforcing social norms, providing a means for social critique, or functioning as a safety valve for expressing social tension.; and a qualitative analysis of specific examples including responses of SM commentators to such manifestations of political criticism. The preliminary findings of this study point to a heightened dramatization of the televised event and a widespread belief that this attack was a staged show incongruent with Iran’s official enmity and death threats toward Israel. The social media sarcasm reinforces Arab’s view of Iran and Israel as mutual threats. This belief stems from the complex dynamics, historical context, and regional conflict surrounding these three nations: Iran, Israel, and Arabs.

Keywords: social functionalism, social media sarcasm, Television news framing, live militarized conflict coverage, iran, israel, communication theory

Procedia PDF Downloads 44
968 Tracing Back the Bot Master

Authors: Sneha Leslie

Abstract:

The current situation in the cyber world is that crimes performed by Botnets are increasing and the masterminds (botmaster) are not detectable easily. The botmaster in the botnet compromises the legitimate host machines in the network and make them bots or zombies to initiate the cyber-attacks. This paper will focus on the live detection of the botmaster in the network by using the strong framework 'metasploit', when distributed denial of service (DDOS) attack is performed by the botnet. The affected victim machine will be continuously monitoring its incoming packets. Once the victim machine gets to know about the excessive count of packets from any IP, that particular IP is noted and details of the noted systems are gathered. Using the vulnerabilities present in the zombie machines (already compromised by botmaster), the victim machine will compromise them. By gaining access to the compromised systems, applications are run remotely. By analyzing the incoming packets of the zombies, the victim comes to know the address of the botmaster. This is an effective and a simple system where no specific features of communication protocol are considered.

Keywords: bonet, DDoS attack, network security, detection system, metasploit framework

Procedia PDF Downloads 254
967 The Effect of Chloride Dioxide and High Concentration of CO2 Gas Injection on the Quality and Shelf-Life for Exporting Strawberry 'Maehyang' in Modified Atmosphere Condition

Authors: Hyuk Sung Yoon, In-Lee Choi, Mohammad Zahirul Islam, Jun Pill Baek, Ho-Min Kang

Abstract:

The strawberry ‘Maehyang’ cultivated in South Korea has been increased to export to Southeast Asia. The degradation of quality often occurs in strawberries during short export period. Botrytis cinerea has been known to cause major damage to the export strawberries and the disease was caused during shipping and distribution. This study was conducted to find out the sterilized effect of chlorine dioxide(ClO2) gas and high concentration of CO2 gas injection for ‘Maehyang’ strawberry and it was packaged with oxygen transmission rate (OTR) films. The strawberry was harvested at 80% color changed stage and packaged with OTR film and perforated film (control). The treatments were a MAP used by with 20,000 cc·m-2·day·atm OTR film and gas injection in packages. The gas type of ClO2 and CO2 were injected into OTR film packages, and treatments were 6 mg/L ClO2, 15% CO2, and they were combined. The treated strawberries were stored at 3℃ for 30 days. Fresh weight loss rate was less than 1% in all OTR film packages but it was more than 15% in a perforated film treatment that showed severe deterioration of visual quality during storage. Carbon dioxide concentration within a package showed approximately 15% of the maximum CO2 concentration in all treatments except control until the 21st day, it was the tolerated range of maximum CO2 concentration of strawberry in recommended CA or MA conditions. But, it increased to almost 50% on the 30th day. Oxygen concentration showed a decrease down to approximately 0% in all treatments except control for 25 days. Ethylene concentration was shown to be steady until the 17th day, but it quickly increased on the 17th day and dropped down on the final storage day (30th day). All treatments did not show any significant differences in gas treatments. Firmness increased in CO2 (15%) and ClO2 (6mg/L) + CO2 (15%) treatments during storage. It might be the effect of high concentration CO2 known by reducing decay and cell wall degradation. The soluble solid decreased in all treatments during storage. These results were caused to use up the sugar by the increase of respiration during storage. The titratable acidity showed a similarity in all treatments. Incidence of fungi was 0% in CO2 (15%) and ClO2 (6mg/L)+ CO2 (15%), but was more than 20% in a perforated film treatment. Consequently, The result indicates that Chloride Dioxide(ClO2) and high concentration of CO2 inhibited fungi growth. Due to the fact that fresh weight loss rate and incidence of fungi were lower, the ClO2(6mg/L)+ CO2(15%) prove to be most efficient in sterilization. These results suggest that Chloride Dioxide (ClO2) and high concentration of CO2 gas injection treatments were an effective decontamination technique for improving the safety of strawberries.

Keywords: chloride dioxide, high concentration of CO2, modified atmosphere condition, oxygen transmission rate films

Procedia PDF Downloads 339
966 Tetra Butyl Ammonium Cyanate Mediated Selective Synthesis of Sulfonyltriuret and Their Investigation towards Trypsin Protease Modulation

Authors: Amarjyoti Das Mahapatra, Umesh Kumar, Bhaskar Datta

Abstract:

A pseudo peptide can mimic the biological or structural properties of natural peptides. They have become an increasing attention in medicinal chemistry because of their interesting advantages like more bioavailability and less biodegradation than compare to the physiologically active native peptides which increase their therapeutic applications. Many biologically active compounds contain urea as functional groups, and they have improved pharmacokinetic properties because of their bioavailability and metabolic stability. Recently we have reported a single-step synthesis of sulfonyl urea and sulfonyltriuret from sulfonyl chloride and sodium cyanate. But the yield of sulfonyltriuret was less around 40-60% because of the formation of other products like sulfonamide and sulfonylureas. In the present work, we mainly focused on the selective synthesis of sulfonyltriuret using tetrabutylammonium cyanate and sulfonyl chloride. More precisely, we are interested in the controlled synthesis of oligomeric urea mainly sulfonyltriuret as a new class of pseudo peptide and their application as protease modulators. The distinctive architecture of these molecules in the form of their pseudo-peptide backbone offers promise as a potential pharmacophore. The synthesized molecules have been screened on trypsin enzyme, and we observed that these molecules are the efficient modulator of trypsin enzyme.

Keywords: pseudo peptide, pharmacophore, sulfonyltriuret, trypsin

Procedia PDF Downloads 166
965 Photophysics and Torsional Dynamics of Thioflavin T in Deep Eutectic Solvents

Authors: Rajesh Kumar Gautam, Debabrata Seth

Abstract:

Thioflavin-T (ThT) play a key role of an important biologically active fluorescent sensor for amyloid fibrils. ThT molecule has been developed a method to detect the analysis of different type of diseases such as neurodegenerative disorders, Alzheimer’s, Parkinson’s, and type II diabetes. ThT was used as a fluorescent marker to detect the formation of amyloid fibril. In the presence of amyloid fibril, ThT becomes highly fluorescent. ThT undergoes twisting motion around C-C bonds of the two adjacent benzothiazole and dimethylaniline aromatic rings, which is predominantly affected by the micro-viscosity of the local environment. The present study articulates photophysics and torsional dynamics of biologically active molecule ThT in the presence of deep-eutectic solvents (DESs). DESs are environment-friendly, low cost and biodegradable alternatives to the ionic liquids. DES resembles ionic liquids, but the constituents of a DES include a hydrogen bond donor and acceptor species, in addition to ions. Due to the presence of the H-bonding network within a DES, it exhibits structural heterogeneity. Herein, we have prepared two different DESs by mixing urea with choline chloride and N, N-diethyl ethanol ammonium chloride at ~ 340 K. It was reported that deep eutectic mixture of choline chloride with urea gave a liquid with a freezing point of 12°C. We have experimented by taking two different concentrations of ThT. It was observed that at higher concentration of ThT (50 µM) it forms aggregates in DES. The photophysics of ThT as a function of temperature have been explored by using steady-state, and picoseconds time-resolved fluorescence emission spectroscopic techniques. From the spectroscopic analysis, we have observed that with rising temperature the fluorescence quantum yields and lifetime values of ThT molecule gradually decreases; this is the cumulative effect of thermal quenching and increase in the rate of the torsional rate constant. The fluorescence quantum yield and fluorescence lifetime decay values were always higher for DES-II (urea & N, N-diethyl ethanol ammonium chloride) than those for DES-I (urea & choline chloride). This was mainly due to the presence of structural heterogeneity of the medium. This was further confirmed by comparison with the activation energy of viscous flow with the activation energy of non-radiative decay. ThT molecule in less viscous media undergoes a very fast twisting process and leads to deactivation from the photoexcited state. In this system, the torsional motion increases with increasing temperature. We have concluded that beside bulk viscosity of the media, structural heterogeneity of the medium play crucial role to guide the photophysics of ThT in DESs. The analysis of the experimental data was carried out in the temperature range 288 ≤ T = 333K. The present articulate is to obtain an insight into the DESs as media for studying various photophysical processes of amyloid fibrils sensing molecule of ThT.

Keywords: deep eutectic solvent, photophysics, Thioflavin T, the torsional rate constant

Procedia PDF Downloads 162
964 Regulation of PKA-Dependent Calcineurin as a Switch in Cell Secretion

Authors: Hani M. M. Alothaid, Louise Robson, Richmond Muimo

Abstract:

This study will investigate cyclic adenosine monophosphate (cAMP)/protein kinase A (PKA) dependent calcineurin (Cn), known as protein phosphatase 2 B (PP2B) as well, regulation of chloride ion (Cl⁻) secretion and the release of pro-inflammatory molecules in immune cells such as cytokines. THP-1-derived monocytes, primary human monocytes and the bronchial epithelial cell line (16HBE14o-) were used in this study. The 16HBE14o- cells were chosen as positive control. Hence, to further confirm the expression of cystic fibrosis transmembrane conductance regulator (CFTR), calcium binding protein (S100A10), annexin A2 (AnxA2) and calcineurin A subunit (CnA) in all three cell types, cell lysate was probed against corresponding primary antibodies by immunoblotting. Western blot analyses show the expression of CFTR, AnxA2, CnA and S100A10 in THP-1-derived monocytes and primary human monocytes. In conclusion, CFTR, S100A10, CnA and AnxA2 are expressed in THP-1-derived monocytes and primary human monocytes and regulate Cl⁻ secretion. Also, they may play a role in the pro-inflammatory molecules release. The ongoing work will confirm interaction between these proteins in the cell lines.

Keywords: annexin A2, calcineurin, CFTR, chloride, monocytes, pro-inflammatory molecules, S100A10

Procedia PDF Downloads 235
963 A Software Engineering Methodology for Developing Secure Obfuscated Software

Authors: Carlos Gonzalez, Ernesto Linan

Abstract:

We propose a methodology to conciliate two apparently contradictory processes in the development of secure obfuscated software and good software engineered software. Our methodology consists first in the system designers defining the type of security level required for the software. There are four types of attackers: casual attackers, hackers, institution attack, and government attack. Depending on the level of threat, the methodology we propose uses five or six teams to accomplish this task. One Software Engineer Team and one or two software Obfuscation Teams, and Compiler Team, these four teams will develop and compile the secure obfuscated software, a Code Breakers Team will test the results of the previous teams to see if the software is not broken at the required security level, and an Intrusion Analysis Team will analyze the results of the Code Breakers Team and propose solutions to the development teams to prevent the detected intrusions. We also present an analytical model to prove that our methodology is no only easier to use, but generates an economical way of producing secure obfuscated software.

Keywords: development methodology, obfuscated software, secure software development, software engineering

Procedia PDF Downloads 250
962 Air Cargo Network Structure Characteristics and Robustness Analysis under the Belt and Road Area

Authors: Feng-jie Xie, Jian-hong Yan

Abstract:

Based on the complex network theory, we construct the air cargo network of the Belt and Road area, analyze its regional distribution and structural characteristics, measure the robustness of the network. The regional distribution results show that Southeast Asia and China have the most prominent development in the air cargo network of the Belt and Road area, Central Asia is the least developed. The structure characteristics found that the air cargo network has obvious small-world characteristics; the degree distribution has single-scale property; it shows a significant rich-club phenomenon simultaneously. The network robustness is measured by two attack strategies of degree and betweenness, but the betweenness of network nodes has a greater impact on network connectivity. And identified 24 key cities that have a large impact on the robustness of the network under the two attack strategies. Based on these results, recommendations are given to maintain the air cargo network connectivity in the Belt and Road area.

Keywords: air cargo, complex network, robustness, structure properties, The Belt and Road

Procedia PDF Downloads 196
961 Demonic Possession and Health Care Complications: Concept and Remedy from Islamic Point-of-View

Authors: Khalid Ishola Bello

Abstract:

Many religions and cultures believe in the existence of invisible beings who co-exist with man on earth. Muslims, for example, believe in malaikah (Angel) and jinn (demon), who have their source of creation from light and flame, respectively. Jinn, according to Islamic texts, possesses unique characteristics which give them an advantage over the man. Invisibility, transforming into or taking possession of another being are parts of advantages jinn have above man. Hence, jinn can attack man and truncate his well-being by causing malfunction of his physiological and psychological realms, which may go beyond physical health care. It is on this background that this paper aims to articulate the possibility of a demonic attack on human health and the care processes recommended by Islam to heal and restore well-being of the victim. Through analysis of the inductive, deductive, and historical approaches, the process of ruqyah (healing method based on recitation of the Qur’an) and hijamah (cupping) therapies shall be analyzed. The finding shows the efficacy of Islamic remedies to demonic possession, which usually complicates health challenges in the care of man. This alternative approach is therefore recommended for holistic health care since physical health care cannot fix spiritual health challenges.

Keywords: wellbeing, healthcare, demonic possession, cupping, jinn

Procedia PDF Downloads 64
960 Records of Lepidopteron Borers (Lepidoptera) on Stored Seeds of Indian Himalayan Conifers

Authors: Pawan Kumar, Pitamber Singh Negi

Abstract:

Many of the regeneration failures in conifers are often being attributed to heavy insect attack and pathogens during the period of seed formation and under storage conditions. Conifer berries and seed insects occur throughout the known range of the hosts and also limit the production of seed for nursery stock. On occasion, even entire seed crops are lost due to insect attacks. The berry and seeds of both the species have been found to be infected with insects. Recently, heavy damage to the berry and seeds of Juniper and Chilgoza Pine was observed in the field as well as in stored conditions, leading to reduction in the viability of seeds to germinate. Both the species are under great threat and regeneration of the species is very low. Due to lack of adequate literature, the study on the damage potential of seed insects was urgently required to know the exact status of the insect-pests attacking seeds/berries of both the pine species so as to develop pest management practices against the insect pests attack. As both the species are also under threat and are fighting for survival, so the study is important to develop management practices for the insect-pests of seeds/berries of Juniper and Chilgoza pine so as to evaluate in the nursery, as these species form major vegetation of their distribution zones. A six-year study on the management of insect pests of seeds of Chilgoza revealed that seeds of this species are prone to insect pests mainly borers. During present investigations, it was recorded that cones of are heavily attacked only by Dioryctria abietella (Lepidoptera: Pyralidae) in natural conditions, but seeds which are economically important are heavily infected, (sometimes up to 100% damage was also recorded) by insect borer, Plodia interpunctella (Lepidoptera: Pyralidae) and is recorded for the first time ‘to author’s best knowledge’ infesting the stored Chilgoza seeds. Similarly, Juniper berries and seeds were heavily attacked only by a single borer, Homaloxestis cholopis (Lepidoptera: Lecithoceridae) recorded as a new report in natural habitat as well as in stored conditions. During the present investigation details of insect pest attack on Juniper and Chilgoza pine seeds and berries was observed and suitable management practices were also developed to contain the insect-pests attack.

Keywords: borer, chilgozapine, cones, conifer, Lepidoptera, juniper, management, seed

Procedia PDF Downloads 148
959 Investigation of the Kutta Condition Using Unsteady Flow

Authors: K. Bhojnadh, M. Fiddler, D. Cheshire

Abstract:

An investigation into the Kutta effect on the trailing edge of a subsonic aerofoil was conducted which led to an analysis using Ansys Fluent to determine the effect of flow separation over a NACA 0012 aerofoil. This aerofoil was subjected to oscillations to create an unsteady flow over the aerofoil, therefore, creating turbulence, with unsteady aerodynamics playing a key role to determine the flow regimes when the aerofoil is subjected to different angles of attack along with varying Reynolds numbers. Many theories were evolved to determine the flow parameters of a 2-D aerofoil in these unsteady conditions because they behave unpredictably at the trailing edge when subjected to a different angle of attack. The shear area observed in the boundary layer at the trailing edge tends towards an unsteady turbulent flow even at small angles of attack, creating drag as the flow separates, reducing the aerodynamic performance of aerofoil. In this paper, research was conducted to determine the effect of Kutta circulation over the aerofoil and the effect of that circulation in reducing the effect of pressure and boundary layer distribution over the aerofoil. The effect of circulation is observed by using Ansys Fluent by using varying flow parameters and differential schemes to observe the flow behaviour on the aerofoil. Initially, steady flow analysis was conducted on the aerofoil to determine the effect of circulation, and it was noticed that the effect of circulation could only be properly observed when the aerofoil is subjected to oscillations. Therefore, that was modelled by using Ansys user-defined functions, which define the motion of the aerofoil by creating a dynamic mesh on the aerofoil. Initial results were observed, and further development of the dynamic mesh functions in Ansys is taking place. This research will determine the overall basic principles of unsteady flow aerodynamics applied to the investigation of Kutta related circulation, and gives an indication regarding the generation of vortices which is discussed further in this paper.

Keywords: circulation, flow seperation, turbulence modelling, vortices

Procedia PDF Downloads 205
958 O.MG- It’s a Cyber-Enabled Fraud

Authors: Damola O. Lawal, David W. Gresty, Diane E. Gan, Louise Hewitt

Abstract:

This paper investigates the feasibility of using a programmable USB such as the O.MG Cable to perform a file tampering attack. Here, the O.MG Cable, an apparently harmless mobile device charger, is used in an unauthorized way to alter the content of a file (accounts record-January_Contributions.xlsx). The aim is to determine if a forensics analyst can reliably determine who has altered the target file; the O.MG Cable or the user of the machine. This work highlights some of the traces of the O.MG Cable left behind on the target computer itself, such as the Product ID (PID) and Vendor ID (ID). Also discussed is the O.MG Cable’s behavior during the experiments. We determine if a forensics analyst could identify if any evidence has been left behind by the programmable device on the target file once it has been removed from the computer to establish if the analyst would be able to link the traces left by the O.MG Cable to the file tampering. It was discovered that the forensic analyst might mistake the actions of the O.MG Cable for the computer users. Experiments carried out in this work could further the discussion as to whether an innocent user could be punished for the unauthorized changes made by a programmable device.

Keywords: O.MG cable, programmable USB, file tampering attack, digital evidence credibility, miscarriage of justice, cyber fraud

Procedia PDF Downloads 158
957 Combination between Intrusion Systems and Honeypots

Authors: Majed Sanan, Mohammad Rammal, Wassim Rammal

Abstract:

Today, security is a major concern. Intrusion Detection, Prevention Systems and Honeypot can be used to moderate attacks. Many researchers have proposed to use many IDSs ((Intrusion Detection System) time to time. Some of these IDS’s combine their features of two or more IDSs which are called Hybrid Intrusion Detection Systems. Most of the researchers combine the features of Signature based detection methodology and Anomaly based detection methodology. For a signature based IDS, if an attacker attacks slowly and in organized way, the attack may go undetected through the IDS, as signatures include factors based on duration of the events but the actions of attacker do not match. Sometimes, for an unknown attack there is no signature updated or an attacker attack in the mean time when the database is updating. Thus, signature-based IDS fail to detect unknown attacks. Anomaly based IDS suffer from many false-positive readings. So there is a need to hybridize those IDS which can overcome the shortcomings of each other. In this paper we propose a new approach to IDS (Intrusion Detection System) which is more efficient than the traditional IDS (Intrusion Detection System). The IDS is based on Honeypot Technology and Anomaly based Detection Methodology. We have designed Architecture for the IDS in a packet tracer and then implemented it in real time. We have discussed experimental results performed: both the Honeypot and Anomaly based IDS have some shortcomings but if we hybridized these two technologies, the newly proposed Hybrid Intrusion Detection System (HIDS) is capable enough to overcome these shortcomings with much enhanced performance. In this paper, we present a modified Hybrid Intrusion Detection System (HIDS) that combines the positive features of two different detection methodologies - Honeypot methodology and anomaly based intrusion detection methodology. In the experiment, we ran both the Intrusion Detection System individually first and then together and recorded the data from time to time. From the data we can conclude that the resulting IDS are much better in detecting intrusions from the existing IDSs.

Keywords: security, intrusion detection, intrusion prevention, honeypot, anomaly-based detection, signature-based detection, cloud computing, kfsensor

Procedia PDF Downloads 382
956 Effect of Retained Austenite Stability in Corrosion Mechanism of Dual Phase High Carbon Steel

Authors: W. Handoko, F. Pahlevani, V. Sahajwalla

Abstract:

Dual-phase high carbon steels (DHCS) are commonly known for their improved strength, hardness, and abrasive resistance properties due to co-presence of retained austenite and martensite at the same time. Retained austenite is a meta-stable phase at room temperature, and stability of this phase governs the response of DHCS at different conditions. This research paper studies the effect of RA stability on corrosion behaviour of high carbon steels after they have been immersed into 1.0 M NaCl solution for various times. For this purpose, two different steels with different RA stabilities have been investigated. The surface morphology of the samples before and after corrosion attack was observed by secondary electron microscopy (SEM) and atomic force microscopy (AFM), along with the weight loss and Vickers hardness analysis. Microstructural investigations proved the preferential attack to retained austenite phase during corrosion. Hence, increase in the stability of retained austenite in dual-phase steels led to decreasing the weight loss rate.

Keywords: high carbon steel, austenite stability, atomic force microscopy, corrosion

Procedia PDF Downloads 210
955 Physicochemical and Bacteriological Assessment of Water Resources in Ughelli and Its Environs, Delta State Nigeria

Authors: M. O. Eyankware, D. O. Ufomata

Abstract:

Groundwater samples were collected from Otovwodo-Ughelli and Environ with the aim of assessing groundwater quality of the area. Twenty (20) water samples from Boreholes (BH) (six) and Hand Dug Wells (HDW) (fourteen) were randomly sampled and were analysed for different physiochemical and bacteriological parameters. The following 16 parameters have been considered viz: pH, electrical conductivity, temperature, total hardness, total dissolved solids, dissolved oxygen, biological oxygen demand, phosphate, sulphate, chloride, nitrate, calcium, sodium, chloride, magnesium, and total suspended solids. On comparing the results against drinking quality standards laid by World Health Organization and Nigeria industrial standard, it was found that the water quality parameters were not above the (WHO, 2011 and NIS, 2007) permissible limit. Microbial analysis reveals the presence of coliform and E.coli in two hand-dug well (HDW7 and 13) and one borehole well (BH20). These contaminations are perhaps traceable to have originated from human activities (septic tanks, latrines, dumpsites) and have affected the quality of groundwater in Otovwodo-Ughelli. From the piper trilinear diagram, the dominant ionic species is alkali bicarbonate water type, with bicarbonate as the predominant ion (Na+ + K+)-HCO3.

Keywords: groundwater, surface water, Ughelli, Nigeria industrial standard, who standard

Procedia PDF Downloads 444
954 An Efficient and Provably Secure Three-Factor Authentication Scheme with Key Agreement

Authors: Mohan Ramasundaram, Amutha Prabakar Muniyandi

Abstract:

Remote user authentication is one of the important tasks for any kind of remote server applications. Several remote authentication schemes are proposed by the researcher for Telecare Medicine Information System (TMIS). Most of the existing techniques have limitations, vulnerable to various kind attacks, lack of functionalities, information leakage, no perfect forward security and ineffectiveness. Authentication is a process of user verification mechanism for allows him to access the resources of a server. Nowadays, most of the remote authentication protocols are using two-factor authentications. We have made a survey of several remote authentication schemes using three factors and this survey shows that the most of the schemes are inefficient and subject to several attacks. We observed from the experimental evaluation; the proposed scheme is very secure against various known attacks that include replay attack, man-in-the-middle attack. Furthermore, the analysis based on the communication cost and computational cost estimation of the proposed scheme with related schemes shows that our proposed scheme is efficient.

Keywords: Telecare Medicine Information System, elliptic curve cryptography, three-factor, biometric, random oracle

Procedia PDF Downloads 219
953 Preparation of Zno/Ag Nanocomposite and Coating on Polymers for Anti-Infection Biomaterial Application

Authors: Babak Sadeghi, Parisa Ghayomipour

Abstract:

ZnO/Ag nanocomposites coated with polyvinyl chloride (PVC) were prepared by chemical reduction method, for anti-infection biomaterial application. There is a growing interest in attempts in using biomolecular as the templates to grow inorganic nanocomposites in controlled morphology and structure. By optimizing the experiment conditions, we successfully fabricated high yield of ZnO/Ag nanocomposite with full coverage of high-density polyvinyl chloride (PVC) coating. More importantly, ZnO/Ag nanocomposites were shown to significantly inhibit the growth of S. aureus in solution. It was further shown that ZnO/Ag nanocomposites induced thiol depletion that caused death of S. aureus. The coatings were fully characterized using techniques such as scanning electron microscopy (SEM), transmission electron microscopy (TEM) and X-ray diffraction (XRD). Most importantly, compared to uncoated metals, the coatings on PVC promoted healthy antibacterial activity. Importantly, compared to ZnO-Ag -uncoated PVC, the ZnO/Ag nanocomposites coated was approximately triplet more effective in preventing bacteria attachment. The result of Thermal Gravimetric Analysis (TGA) indicates that, the ZnO/Ag nanocomposites are chemically stable in the temperature range from 50 to 900 ºC. This result, for the first time, demonstrates the potential of using ZnO/Ag nanocomposites as a coating material for numerous anti-bacterial applications.

Keywords: nanocomposites, antibacterial activity, scanning electron microscopy (SEM), x-ray diffraction (XRD)

Procedia PDF Downloads 473
952 Effect of Polymer Residues for Wastewater Treatment from Petroleum Production

Authors: Chayonnat Thanamun, Kreangkrai Maneeintr

Abstract:

For petroleum industry, polymer flooding is the one of the main methods in enhanced oil recovery (EOR) that is used water-soluble polymer such as partially hydrolyzed polyacrylamide (HPAM) to increase oil production. It is added to the flooding water to improve the mobility ratio in the flooding process. During the polymer flooding process, water is produced as a by-product along with oil and gas production. This produced water is a mixture of inorganic and organic compound. Moreover, produced water is more difficult to treat than that from water flooding. In this work, the effect of HPAM residue on the wastewater treatment from polymer flooding is studied. Polyaluminium chloride (PAC) is selected to use as a flocculant. Therefore, the objective of this study is to evaluate the effect of polymer residues in produced water on the wastewater treatment by using PAC. The operating parameters of this study are flocculant dosage ranging from 300,400 and 500 mg/L temperature from 30-50 Celsius degree and HPAM concentrations from 500, 1000 and 2000 mg/L. Furthermore, the turbidity, as well as total suspended solids (TSS), are also studied. The results indicated that with an increase in HPAM concentration, the TSS and turbidity increase gradually with the increasing of coagulant dosage under the same temperature. Also, the coagulation-flocculation performance is improved with the increasing temperature. This can be applied to use in the wastewater treatment from oil production before this water can be injected back to the reservoir.

Keywords: wastewater treatment, petroleum production, polyaluminium chloride, polyacrylamide

Procedia PDF Downloads 153
951 Optical Characterization and Surface Morphology of SnO2 Thin Films Prepared by Spin Coating Technique

Authors: J. O. Ajayi, S. S. Oluyamo, D. B. Agunbiade

Abstract:

In this work, tin oxide thin films (SnO2) were prepared using the spin coating technique. The effects of precursor concentration on the thin film properties were investigated. Tin oxide was synthesized from anhydrous Tin (II) Chloride (SnCl2) dispersed in Methanol and Acetic acid. The metallic oxide (SnO2) films deposited were characterized using the UV Spectrophotometer and the Scanning Electron Microscope (SEM). From the absorption spectra, absorption increases with decrease in precursor concentration. Absorbance in the VIS region is lower than 0 % at higher concentration. The optical transmission spectrum shows that transmission increases as the concentration of precursor decreases and the maximum transmission in visible region is about 90% for films prepared with 0.2 M. Also, there is increase in the reflectance of thin films as concentration of precursor increases. The films have high transparency (more than 85%) and low reflectance (less than 40%) in the VIS region. Investigation showed that the direct band gap value increased from 3.79eV, to 3.82eV as the precursor concentration decreased from 0.6 M to 0.2 M. Average direct bandgap energy for all the tin oxide films was estimated to be 3.80eV. The effect of precursor concentration was directly observed in crystal outgrowth and surface particle densification. They were found to increase proportionately with higher concentration.

Keywords: anhydrous TIN (II) chloride, densification, NIS- VIS region, spin coating technique

Procedia PDF Downloads 261
950 Sono- and Photocatalytic Degradation of Indigocarmine in Water Using ZnO

Authors: V. Veena, Suguna Yesodharan, E. P. Yesodharan

Abstract:

Two Advanced Oxidation Processes (AOP) i.e., sono- and photo-catalysis mediated by semiconductor oxide catalyst, ZnO has been found effective for the removal of trace amounts of the toxic dye pollutant Indigocarmine (IC) from water. The effect of various reaction parameters such as concentration of the dye, catalyst dosage, temperature, pH, dissolved oxygen etc. as well as the addition of oxidisers and presence of salts in water on the rate of degradation has been evaluated and optimised. The degradation follows variable kinetics depending on the concentration of the substrate, the order of reaction varying from 1 to 0 with increase in concentration. The reaction proceeds through a number of intermediates and many of them have been identified using GCMS technique. The intermediates do not affect the rate of degradation significantly. The influence of anions such as chloride, sulphate, fluoride, carbonate, bicarbonate, phosphate etc. on the degradation of IC is not consistent and does not follow any predictable pattern. Phosphates and fluorides inhibit the degradation while chloride, sulphate, carbonate and bicarbonate enhance. Adsorption studies of the dye in the absence as well as presence of these anions show that there may not be any direct correlation between the adsorption of the dye on the catalyst and the degradation. Oxidants such as hydrogen peroxide and persulphate enhance the degradation though the combined effect and it is less than the cumulative effect of individual components. COD measurements show that the degradation proceeds to complete mineralisation. The results will be presented and probable mechanism for the degradation will be discussed.

Keywords: AOP, COD, indigocarmine, photocatalysis, sonocatalysis

Procedia PDF Downloads 335
949 Effectiveness of Jackfruit Seed Starch as Coagulant Aid in Landfill Leachate Treatment

Authors: Mohd Suffian Yusoff, Noor Aina Mohamad Zuki, Mohd Faiz Muaz Ahmad Zamri

Abstract:

Currently, aluminium sulphate (alum), ferric chloride and polyaluminium chloride (PAC) are the most common coagulants being used for leachate coagulation-flocculation treatment. However, the impact of these residual’s coagulants have sparked huge concern ceaselessly. Therefore, development of natural coagulant as an alternative coagulant for treatment process has been given full attentions. In this attempt jackfruit seed starch (JSS) was produce by extraction method. The removal efficiency was determined using jar test method. The removal of organic matter and ammonia were compared between JSS used in powder form and diluted form in leachate. The yield of starch from the extraction method was 33.17 % with light brown in colour. The removal of turbidity was the highest at pH 8 for both diluted and powdered JSS with 38% and 8.7% of removal. While for colour removal the diluted JSS showed 18.19% of removal compared to powdered JSS. The diluted JSS also showed the highest removal of suspended solid with 3.5% compared to powdered JSS with 2.8%. Instead of coagulant, JSS as coagulant aid has succeed to reduce the dosage of PAC from 900 mg/L to 528 mg/L by maintaining colour and turbidity removal up to 94% and 92 % respectively. The JSS coagulant also has decreased the negative charge of the leachate nearly to the neutral charge (0.209 mv). The result proved that JSS was more effective to be used as coagulant aid landfill leachate treatment.

Keywords: landfill leachate, natural coagulant, jackfruit seed starch, coagulant

Procedia PDF Downloads 504
948 Numerical Investigations on Dynamic Stall of a Pitching-Plunging Helicopter Blade Airfoil

Authors: Xie Kai, Laith K. Abbas, Chen Dongyang, Yang Fufeng, Rui Xiaoting

Abstract:

Effect of plunging motion on the pitch oscillating NACA0012 airfoil is investigated using computational fluid dynamics (CFD). A simulation model based on overset grid technology and k - ω shear stress transport (SST) turbulence model is established, and the numerical simulation results are compared with available experimental data and other simulations. Two cases of phase angle φ = 0, μ which represents the phase difference between the pitching and plunging motions of an airfoil are performed. Airfoil vortex generation, moving, and shedding are discussed in detail. Good agreements have been achieved with the available literature. The upward plunging motion made the equivalent angle of attack less than the actual one during pitching analysis. It is observed that the formation of the stall vortex is suppressed, resulting in a decrease in the lift coefficient and a delay of the stall angle. However, the downward plunging motion made the equivalent angle of attack higher the actual one.

Keywords: dynamic stall, pitching-plunging, computational fluid dynamics, helicopter blade rotor, airfoil

Procedia PDF Downloads 225
947 Mixed Alumina-Silicate Materials for Groundwater Remediation

Authors: Ziyad Abunada, Abir Al-tabbaa

Abstract:

The current work is investigating the effectiveness of combined mixed materials mainly modified bentonites and organoclay in treating contaminated groundwater. Sodium bentonite was manufactured with a quaternary amine surfactant, dimethyl ammonium chloride to produce organoclay (OC). Inorgano-organo bentonite (IOB) was produced by intercalating alkylbenzyd-methyl-ammonium chloride surfactant into sodium bentonite and pillared with chlorohydrol pillaring agent. The materials efficiency was tested for both TEX compounds from model-contaminated water and a mixture of organic contaminants found in groundwater samples collected from a contaminated site in the United Kingdom. The sorption data was fitted well to both Langmuir and Freundlich adsorption models reflecting the double sorption model where the correlation coefficient was greater than 0.89 for all materials. The mixed materials showed higher sorptive capacity than individual material with a preference order of X> E> T and a maximum sorptive capacity of 21.8 mg/g was reported for IOB-OC materials for o-xylene. The mixed materials showed at least two times higher affinity towards a mixture of organic contaminants in groundwater samples. Other experimental parameters such as pH and contact time were also investigated. The pseudo-second-order rate equation was able to provide the best description of adsorption kinetics.

Keywords: modified bentobite, groundwater, adsorption, contaminats

Procedia PDF Downloads 222
946 The Language of Fliptop among Filipino Youth: A Discourse Analysis

Authors: Bong Borero Lumabao

Abstract:

This qualitative research is a study on the lines of Fliptop talks performed by the Fliptop rappers employing Finnegan’s (2008) discourse analysis. This paper aimed to analyze the phonological, morphological, and semantic features of the fliptop talk, to explore the structures in the lines of Fliptop among Filipino youth, and to uncover the various insights that can be gained from it. The corpora of the study included all the 20 Fliptop Videos downloaded from the Youtube Channel of Fliptop. Results revealed that Fliptop contains phonological features such as assonance, consonance, deletion, lengthening, and rhyming. Morphological features include acronym, affixation, blending, borrowing, code-mixing and switching, compounding, conversion or functional shifts, and dysphemism. Semantics presented the lexical category, meaning, and words used in the fliptop talks. Structure of Fliptop revolves on the personal attack (physical attributes), attack on the bars (rapping skills), extension: family members and friends, antithesis, profane words, figurative languages, sexual undertones, anime characters, homosexuality, and famous celebrities involvement.

Keywords: discourse analysis, fliptop talks, filipino youth, fliptop videos, Philippines

Procedia PDF Downloads 242
945 Determination of Anti-Fungal Activity of Cedrus deodara Oil against Oligoporus placentus, Trametes versicolor and Xylaria acuminata on Populus deltoids

Authors: Sauradipta Ganguly, Akhato Sumi, Sanjeet Kumar Hom, Ajan T. Lotha

Abstract:

Populus deltoides is a hardwood used predominantly for the manufacturing of plywood, matchsticks, and paper in India and hence has a higher economical significance. Wood-decaying fungi cause serious damage to Populus deltoides products, as the wood itself is perishable and vulnerable to decaying agents, decreasing their aesthetical value which in return results in significant monetary loss for the wood industries concerned. The aim of the study was to determine the antifungal activity of Cedrus deodara oil against three primary wood-decaying fungi namely white-rot fungi (Trametes versicolor), brown-rot fungi (Oligoporus placentus) and soft-rot fungi (Xylaria acuminata) on Populus deltoides samples under optimum laboratory conditions. The susceptibility of Populus deltoides samples on the fungal attack and the ability of deodar oil to control colonization of the wood rotting fungi on the samples were assessed. Three concentrations of deodar oil were considered for the study as treating solutions, i.e., 4%, 5%, and 6%. The Populus deltoides samples were treated with treating solutions, and the ability of the same to prevent a fungal attack on the samples were assessed using accelerated test in the laboratory at Biochemical Oxygen Demand incubator at temperature (25 ± 2°C) and relative humidity 70 ± 4%. Efficacy test and statistical analysis of deodar oil against Trametes versicolor, Oligoporus placentus, and Xylariaacuminataon P. deltoides samples exhibited light, minor and negligible mycelia growth at 4 %, 5% and 6% concentrations of deodar oil, respectively. Whereas, moderate to heavy attack was observed on the surface of the control samples. Statistical analysis further established that the treatments were statistically significant and had significantly inhibited fungal growth of all the three fungus spp by almost 3 to 5 times.

Keywords: populus deltoides, Trametes versicolor, Oligoporus placentus, Xylaria acuminata, Deodar oil, treatment

Procedia PDF Downloads 125
944 How Restorative Justice Can Inform and Assist the Provision of Effective Remedies to Hate Crime, Case Study: The Christchurch Terrorist Attack

Authors: Daniel O. Kleinsman

Abstract:

The 2019 terrorist attack on two masjidain in Christchurch, New Zealand, was a shocking demonstration of the harm that can be caused by hate crime. As legal and governmental responses to the attack struggle to provide effective remedies to its victims, restorative justice has emerged as a tool that can assist, in terms of both meeting victims’ needs and discharging the obligations of the state under the International Covenant on Civil and Political Rights (ICCPR), arts 2(3), 26, 27. Restorative justice is a model that emphasizes the repair of harm caused or revealed by unjust behavior. It also prioritises the facilitation of dialogue, the restoration of equitable relationships, and the prevention of future harm. Returning to the case study, in the remarks of the sentencing judge, the terrorist’s actions were described as a hate crime of vicious malevolence that the Court was required to decisively reject, as anathema to the values of acceptance, tolerance and mutual respect upon which New Zealand’s inclusive society is based and which the country strives to maintain. This was one of the reasons for which the terrorist received a life sentence with no possibility of parole. However, in the report of the Royal Commission of Inquiry into the Attack, it was found that victims felt the attack occurred within the context of widespread racism, discrimination and Islamophobia, where hostile behaviors, including hate-based threats and attacks, were rarely recorded, analysed or acted on. It was also found that the Government had inappropriately concentrated intelligence resources on the risk of ‘Islamist’ terrorism and had failed to adequately respond to concerns raised about threats against the Muslim community. In this light, the remarks of the sentencing judge can be seen to reflect a criminal justice system that, in the absence of other remedies, denies systemic accountability and renders hate crime an isolated incident rather than an expression of more widespread discrimination and hate to be holistically addressed. One of the recommendations of the Royal Commission was to explore with victims the desirability and design of restorative justice processes. This presents an opportunity for victims to meet with state representatives and pursue effective remedies (ICCPR art 2(3)) not only for the harm caused by the terrorist but the harm revealed by a system that has exposed the minority Muslim community in New Zealand to hate in all forms, including but not limited to violent extremism. In this sense, restorative justice can also assist the state in discharging its wider obligations to protect all persons from discrimination (art 26) and allow ethnic and religious minorities to enjoy their own culture and profess and practice their own religion (art 27). It can also help give effect to the law and its purpose as a remedy to hate crime, as expressed in this case study by the sentencing judge.

Keywords: hate crime, restorative justice, minorities, victims' rights

Procedia PDF Downloads 111