Search results for: image compression and salt and peppers attacks
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 4706

Search results for: image compression and salt and peppers attacks

4466 Treatment of Oil Recovery Water Using Direct and Indirect Electrochemical Oxidation

Authors: Tareg Omar Mansour, Khaled Omar Elhaji

Abstract:

Model solutions of pentanol in the salt water of various concentrations were subjected to electrochemical oxidation using a dimensionally stable anode (DSA) and a platinised titanium cathode. The removal of pentanol was analysed over time using gas chromatography (GC) and by monitoring the total organic carbon (TOC) concentration of the reaction mixture. It was found that the removal of pentanol occurred more efficiently at higher salinities and higher applied electrical current values. When using a salt concentration of 20,000 ppm and an applied current of 100 mA there was a decrease in concentration of pentanol of 15 %. When the salt concentration and applied current were increased to 58,000 ppm and 500 mA respectively, the decrease in concentration was improved to 64 %.

Keywords: dimensionally stable anode (DSA), total organic hydrocarbon (TOC), gas chromatography mass spectrometry (GCMS), electrochemical oxidation

Procedia PDF Downloads 358
4465 Effect of Nanobentonite Particles on Geotechnical Properties of Kerman Clay

Authors: A. Ghasemipanah, R. Ziaie Moayed, H. Niroumand

Abstract:

Improving the geotechnical properties of soil has always been one of the issues in geotechnical engineering. Traditional materials have been used to improve and stabilize soils to date, each with its own advantages and disadvantages. Although the soil stabilization by adding materials such as cement, lime, bitumen, etc. is one of the effective methods to improve the geotechnical properties of soil, but nanoparticles are one of the newest additives which can improve the loose soils. This research is intended to study the effect of adding nanobentonite on soil engineering properties, especially the unconfined compression strength and maximum dry unit weight, using clayey soil with low liquid limit (CL) from Kerman (Iran). Nanobentonite was mixed with soil in three different percentages (i.e. 3, 5, 7% by weight of the parent soil) with different curing time (1, 7 and 28 days). The unconfined compression strength, liquid and plastic limits and plasticity index of treated specimens were measured by unconfined compression and Atterberg limits test. It was found that increase in nanobentonite content resulted in increase in the unconfined compression strength, liquid and plastic limits of the clayey soil and reduce in plasticity index.

Keywords: nanobentonite particles, clayey soil, unconfined compression stress, soil improvement.

Procedia PDF Downloads 102
4464 Gray Level Image Encryption

Authors: Roza Afarin, Saeed Mozaffari

Abstract:

The aim of this paper is image encryption using Genetic Algorithm (GA). The proposed encryption method consists of two phases. In modification phase, pixels locations are altered to reduce correlation among adjacent pixels. Then, pixels values are changed in the diffusion phase to encrypt the input image. Both phases are performed by GA with binary chromosomes. For modification phase, these binary patterns are generated by Local Binary Pattern (LBP) operator while for diffusion phase binary chromosomes are obtained by Bit Plane Slicing (BPS). Initial population in GA includes rows and columns of the input image. Instead of subjective selection of parents from this initial population, a random generator with predefined key is utilized. It is necessary to decrypt the coded image and reconstruct the initial input image. Fitness function is defined as average of transition from 0 to 1 in LBP image and histogram uniformity in modification and diffusion phases, respectively. Randomness of the encrypted image is measured by entropy, correlation coefficients and histogram analysis. Experimental results show that the proposed method is fast enough and can be used effectively for image encryption.

Keywords: correlation coefficients, genetic algorithm, image encryption, image entropy

Procedia PDF Downloads 304
4463 Resilient Machine Learning in the Nuclear Industry: Crack Detection as a Case Study

Authors: Anita Khadka, Gregory Epiphaniou, Carsten Maple

Abstract:

There is a dramatic surge in the adoption of machine learning (ML) techniques in many areas, including the nuclear industry (such as fault diagnosis and fuel management in nuclear power plants), autonomous systems (including self-driving vehicles), space systems (space debris recovery, for example), medical surgery, network intrusion detection, malware detection, to name a few. With the application of learning methods in such diverse domains, artificial intelligence (AI) has become a part of everyday modern human life. To date, the predominant focus has been on developing underpinning ML algorithms that can improve accuracy, while factors such as resiliency and robustness of algorithms have been largely overlooked. If an adversarial attack is able to compromise the learning method or data, the consequences can be fatal, especially but not exclusively in safety-critical applications. In this paper, we present an in-depth analysis of five adversarial attacks and three defence methods on a crack detection ML model. Our analysis shows that it can be dangerous to adopt machine learning techniques in security-critical areas such as the nuclear industry without rigorous testing since they may be vulnerable to adversarial attacks. While common defence methods can effectively defend against different attacks, none of the three considered can provide protection against all five adversarial attacks analysed.

Keywords: adversarial machine learning, attacks, defences, nuclear industry, crack detection

Procedia PDF Downloads 133
4462 Data Hiding in Gray Image Using ASCII Value and Scanning Technique

Authors: R. K. Pateriya, Jyoti Bharti

Abstract:

This paper presents an approach for data hiding methods which provides a secret communication between sender and receiver. The data is hidden in gray-scale images and the boundary of gray-scale image is used to store the mapping information. In this an approach data is in ASCII format and the mapping is in between ASCII value of hidden message and pixel value of cover image, since pixel value of an image as well as ASCII value is in range of 0 to 255 and this mapping information is occupying only 1 bit per character of hidden message as compared to 8 bit per character thus maintaining good quality of stego image.

Keywords: ASCII value, cover image, PSNR, pixel value, stego image, secret message

Procedia PDF Downloads 394
4461 American Criminal Justice Responses to Terrorism in the Post 9/11 Era

Authors: Summer Jackson

Abstract:

September 11, 2001 terrorist attacks exposed weaknesses in federal law enforcement’s ability to proactively counter threats to American homeland security. Following the attacks, legislative reforms and policy changes cleared both bureaucratic and legal obstacles to anti-terrorism efforts. The Federal Bureau of Investigation (FBI) transformed into a domestic intelligence agency responsible for preventing future terrorist attacks. Likewise, the passage of the 2001 USA Patriot Act gave federal agents new discretionary powers to more easily collect intelligence on those suspected of supporting terrorism. Despite these changes, there has been only limited scholarly attention paid to terrorism responses by the federal criminal justice system. This study sought to examine the investigative and prosecutorial changes made in the Post-9/11 era. The methodology employed bivariate and multivariate statistics using data from the American Terrorism Study (ATS). This analysis examined how policy changes are reflected in the nature of terrorism investigations, the handling of terrorist defendants by federal prosecutors, and the outcomes of terrorism cases since 2001. The findings indicate significant investigative and prosecutorial changes in the Post-9/11 era. Specifically, this study found terrorism cases involved younger defendants, fewer indictees per case, less use of human intelligence, less complicated attacks, less serious charges, and more plea bargains. Overall, this study highlights the important shifts in responses to terrorism following the 9/11 attacks.

Keywords: terrorism, law enforcement, post-9/11, federal policy

Procedia PDF Downloads 97
4460 High-Capacity Image Steganography using Wavelet-based Fusion on Deep Convolutional Neural Networks

Authors: Amal Khalifa, Nicolas Vana Santos

Abstract:

Steganography has been known for centuries as an efficient approach for covert communication. Due to its popularity and ease of access, image steganography has attracted researchers to find secure techniques for hiding information within an innocent looking cover image. In this research, we propose a novel deep-learning approach to digital image steganography. The proposed method, DeepWaveletFusion, uses convolutional neural networks (CNN) to hide a secret image into a cover image of the same size. Two CNNs are trained back-to-back to merge the Discrete Wavelet Transform (DWT) of both colored images and eventually be able to blindly extract the hidden image. Based on two different image similarity metrics, a weighted gain function is used to guide the learning process and maximize the quality of the retrieved secret image and yet maintaining acceptable imperceptibility. Experimental results verified the high recoverability of DeepWaveletFusion which outperformed similar deep-learning-based methods.

Keywords: deep learning, steganography, image, discrete wavelet transform, fusion

Procedia PDF Downloads 49
4459 Comparative Analysis of Short and Long Term Salt Stress on the Photosynthetic Apparatus and Chloroplast Ultrastructure of Thellungiella salsuginea

Authors: Rahma Goussi, Walid Derbali, Arafet Manaa, Simone Cantamessa, Graziella Berta, Chedly Abdelly, Roberto Barbato

Abstract:

Salinity is one of the most important abiotic affecting plant growth and productivity worldwide. Photosynthesis, together with cell growth, is among the primary processes to be affected by salinity. Here, we report the effects of salinity stress on the primary processes of photosynthesis in a model halophyte Thellungiella Salsuginea. Plants were cultivated in hydroponic system with different NaCl concentrations (0, 100, 200 and 400 mM) during 2 weeks. The obtained results showed an obvious change in the photosynthetic efficiency of photosystem I (PSI) and phostosytem II (PSII), related to NaCl concentration supplemented to the medium and the stress duration considered. With moderate salinity (100 and 200 mM NaCl), no significant variation was observed in photosynthetic parameters of PSI and PSII and Chl fluorescence whatever the time of stress application. Also, the photosynthesis apparatus Fo, Fm and Fv fluorescence, as well as Fv/Fm were not affected by salt stress. While a significant decrease was observed on quantum yields Y(I), Y(II) and electron transport rate ETR(I), ETR(II) under high salt treatment (400 mM NaCl) with prolonged period (15 days). This reduction is quantitatively compensated by a corresponding increase of energy dissipation Y(NPQ) and a progressive decrease in Fv/Fm under salt treatment. The intensity of the OJIP fluorescence transient decreased with increase in NaCl concentration, with a major effect observed during prolonged period of salt stress. Ultrastructural analysis with Light Microscopy and Transmission Electron Microscopy of T. salsuginea chloroplasts showed some cellular changes, such as the shape of the mesophyll cells and number of chloroplast/cell only under higher NaCl concentration. Salt-stress caused the swelling of thylakoids in T. Salsuginea mesophyll with more accumulation of starch as compared to control plant.

Keywords: fluorescence, halophyte, photosynthesis, salt stress

Procedia PDF Downloads 349
4458 Mitigating Denial of Service Attacks in Information Centric Networking

Authors: Bander Alzahrani

Abstract:

Information-centric networking (ICN) using architectures such as Publish-Subscribe Internet Routing Paradigm (PSIRP) is one of the promising candidates for a future Internet, has recently been under the spotlight by the research community to investigate the possibility of redesigning the current Internet architecture to solve many issues such as routing scalability, security, and quality of services issues.. The Bloom filter-based forwarding is a source-routing approach that is used in the PSIRP architecture. This mechanism is vulnerable to brute force attacks which may lead to denial-of-service (DoS) attacks. In this work, we present a new forwarding approach that keeps the advantages of Bloom filter-based forwarding while mitigates attacks on the forwarding mechanism. In practice, we introduce a special type of forwarding nodes called Edge-FW to be placed at the edge of the network. The role of these node is to add an extra security layer by validating and inspecting packets at the edge of the network against brute-force attacks and check whether the packet contains a legitimate forwarding identifier (FId) or not. We leverage Certificateless Aggregate Signature (CLAS) scheme with a small size of 64-bit which is used to sign the FId. Hence, this signature becomes bound to a specific FId. Therefore, malicious nodes that inject packets with random FIds will be easily detected and dropped at the Edge-FW node when the signature verification fails. Our preliminary security analysis suggests that with the proposed approach, the forwarding plane is able to resist attacks such as DoS with very high probability.

Keywords: bloom filter, certificateless aggregate signature, denial-of-service, information centric network

Procedia PDF Downloads 180
4457 Modelling Insider Attacks in Public Cloud

Authors: Roman Kulikov, Svetlana Kolesnikova

Abstract:

Last decade Cloud Computing technologies have been rapidly becoming ubiquitous. Each year more and more organizations, corporations, internet services and social networks trust their business sensitive information to Public Cloud. The data storage in Public Cloud is protected by security mechanisms such as firewalls, cryptography algorithms, backups, etc.. In this way, however, only outsider attacks can be prevented, whereas virtualization tools can be easily compromised by insider. The protection of Public Cloud’s critical elements from internal intruder remains extremely challenging. A hypervisor, also called a virtual machine manager, is a program that allows multiple operating systems (OS) to share a single hardware processor in Cloud Computing. One of the hypervisor's functions is to enforce access control policies. Furthermore, it prevents guest OS from disrupting each other and from accessing each other's memory or disk space. Hypervisor is the one of the most critical and vulnerable elements in Cloud Computing infrastructure. Nevertheless, it has been poorly protected from being compromised by insider. By exploiting certain vulnerabilities, privilege escalation can be easily achieved in insider attacks on hypervisor. In this way, an internal intruder, who has compromised one process, is able to gain control of the entire virtual machine. Thereafter, the consequences of insider attacks in Public Cloud might be more catastrophic and significant to virtual tools and sensitive data than of outsider attacks. So far, almost no preventive security countermeasures have been developed. There has been little attention paid for developing models to assist risks mitigation strategies. In this paper formal model of insider attacks on hypervisor is designed. Our analysis identifies critical hypervisor`s vulnerabilities that can be easily compromised by internal intruder. Consequently, possible conditions for successful attacks implementation are uncovered. Hence, development of preventive security countermeasures can be improved on the basis of the proposed model.

Keywords: insider attack, public cloud, cloud computing, hypervisor

Procedia PDF Downloads 343
4456 Image Segmentation Techniques: Review

Authors: Lindani Mbatha, Suvendi Rimer, Mpho Gololo

Abstract:

Image segmentation is the process of dividing an image into several sections, such as the object's background and the foreground. It is a critical technique in both image-processing tasks and computer vision. Most of the image segmentation algorithms have been developed for gray-scale images and little research and algorithms have been developed for the color images. Most image segmentation algorithms or techniques vary based on the input data and the application. Nearly all of the techniques are not suitable for noisy environments. Most of the work that has been done uses the Markov Random Field (MRF), which involves the computations and is said to be robust to noise. In the past recent years' image segmentation has been brought to tackle problems such as easy processing of an image, interpretation of the contents of an image, and easy analysing of an image. This article reviews and summarizes some of the image segmentation techniques and algorithms that have been developed in the past years. The techniques include neural networks (CNN), edge-based techniques, region growing, clustering, and thresholding techniques and so on. The advantages and disadvantages of medical ultrasound image segmentation techniques are also discussed. The article also addresses the applications and potential future developments that can be done around image segmentation. This review article concludes with the fact that no technique is perfectly suitable for the segmentation of all different types of images, but the use of hybrid techniques yields more accurate and efficient results.

Keywords: clustering-based, convolution-network, edge-based, region-growing

Procedia PDF Downloads 60
4455 Cryptocurrency Crime: Behaviors of Malicious Smart Contracts in Blockchain

Authors: Malaw Ndiaye, Karim Konate

Abstract:

Blockchain and smart contracts can be used to facilitate almost any financial transaction. Thanks to these smart contracts, the settlement of dividends and coupons could be automated. The blockchain would allow all these transactions to be saved in a single ledger rather than in many databases through many organizations as is currently the case. Smart contracts have become lucrative and profitable targets for attackers because they can hold a large amount of money. This paper takes stock of cryptocurrency crime by assessing attacks due to smart contracts and the cost of losses. These losses are often the result of two types of malicious contracts: vulnerable contracts and criminal smart contracts. Studying the behavior of malicious contracts allows us to understand the root causes and consequences of attacks and the defense capabilities that exist although they do not definitively solve the crime problem. It makes it possible to approach new defense perspectives which will be concretized in future work.

Keywords: blockchain, malicious smart contracts, crypto-currency, crimes, attacks

Procedia PDF Downloads 247
4454 Improvement Image Summarization using Image Processing and Particle swarm optimization Algorithm

Authors: Hooman Torabifard

Abstract:

In the last few years, with the progress of technology and computers and artificial intelligence entry into all kinds of scientific and industrial fields, the lifestyles of human life have changed and in general, the way of humans live on earth has many changes and development. Until now, some of the changes has occurred in the context of digital images and image processing and still continues. However, besides all the benefits, there have been disadvantages. One of these disadvantages is the multiplicity of images with high volume and data; the focus of this paper is on improving and developing a method for summarizing and enhancing the productivity of these images. The general method used for this purpose in this paper consists of a set of methods based on data obtained from image processing and using the PSO (Particle swarm optimization) algorithm. In the remainder of this paper, the method used is elaborated in detail.

Keywords: image summarization, particle swarm optimization, image threshold, image processing

Procedia PDF Downloads 108
4453 Improved Super-Resolution Using Deep Denoising Convolutional Neural Network

Authors: Pawan Kumar Mishra, Ganesh Singh Bisht

Abstract:

Super-resolution is the technique that is being used in computer vision to construct high-resolution images from a single low-resolution image. It is used to increase the frequency component, recover the lost details and removing the down sampling and noises that caused by camera during image acquisition process. High-resolution images or videos are desired part of all image processing tasks and its analysis in most of digital imaging application. The target behind super-resolution is to combine non-repetition information inside single or multiple low-resolution frames to generate a high-resolution image. Many methods have been proposed where multiple images are used as low-resolution images of same scene with different variation in transformation. This is called multi-image super resolution. And another family of methods is single image super-resolution that tries to learn redundancy that presents in image and reconstruction the lost information from a single low-resolution image. Use of deep learning is one of state of art method at present for solving reconstruction high-resolution image. In this research, we proposed Deep Denoising Super Resolution (DDSR) that is a deep neural network for effectively reconstruct the high-resolution image from low-resolution image.

Keywords: resolution, deep-learning, neural network, de-blurring

Procedia PDF Downloads 488
4452 Parametric Study and Design on under Reamed Pile - An Experimental and Numerical Study

Authors: S. Chandrakaran, Aarthy D.

Abstract:

Abstract: Under reamed piles are piles which are of different types like bored cast in-situ pile or bored compaction concrete piles where one or more bulbs are provided. In this paper, the design procedure of under reamed pile by both experimental study and numerical study using PLAXIS 3D Foundation software was studied. The soil chosen for study was M Sand. The Single and double under reamed pile modelling was made using mild steel. The pile load test experiment was conducted in the laboratory and the ultimate compression load for 25 mm settlement on single and double under reamed pile was observed and finally the result was compared with conventional pile (pile without bulb). The parametric influence on under reamed pile was studied by varying the geometrical parameters like diameter of bulbs, spacing between bulbs, position of bulbs and number of bulbs. The results of the numerical model showed that when the diameter of bulb D u =2.5D, the ultimate compression load for an under-reamed pile with a single bulb increased by 55 % compared to a pile without a bulb. It was observed that when the spacing between the bulbs was S=6D u with three different positions of bulb from bottom of pile as D u , 2D u and 3D u , the ultimate compression load increased by 88%, 94% and 73 % respectively, compared to the ultimate compression load for 25 mm settlement on conventional pile and if spacing was more than 6D u , ultimate compression load for 25 mm settlement started to decrease. It was observed that when the bucket length was more than 2D u , the ultimate compression

Keywords: load capcity, under remed bulb . sand, model study, sand

Procedia PDF Downloads 60
4451 High Secure Data Hiding Using Cropping Image and Least Significant Bit Steganography

Authors: Khalid A. Al-Afandy, El-Sayyed El-Rabaie, Osama Salah, Ahmed El-Mhalaway

Abstract:

This paper presents a high secure data hiding technique using image cropping and Least Significant Bit (LSB) steganography. The predefined certain secret coordinate crops will be extracted from the cover image. The secret text message will be divided into sections. These sections quantity is equal the image crops quantity. Each section from the secret text message will embed into an image crop with a secret sequence using LSB technique. The embedding is done using the cover image color channels. Stego image is given by reassembling the image and the stego crops. The results of the technique will be compared to the other state of art techniques. Evaluation is based on visualization to detect any degradation of stego image, the difficulty of extracting the embedded data by any unauthorized viewer, Peak Signal-to-Noise Ratio of stego image (PSNR), and the embedding algorithm CPU time. Experimental results ensure that the proposed technique is more secure compared with the other traditional techniques.

Keywords: steganography, stego, LSB, crop

Procedia PDF Downloads 244
4450 Application of Arbuscular Mycorrhizal Fungi as Biologically Based Strategy for Mitigation of Adverse Impact of Salt Stress on Wheat

Authors: Abeer Hashem, Khalid F. Almutairi, Ulkar Ibrahimova, Elsayed Fathi Abdallah

Abstract:

Salinity poses a significant challenge to wheat production, necessitating the exploration of strategies to mitigate its adverse effects. The present investigation aims to study the impact of arbuscular mycorrhizal fungi (AMF) application to improve plant tolerance in terms of growth, carbohydrate, photosynthetic characteristics, and antioxidant enzyme activities under salt stress conditions. So, a randomized complete block design with five replications was employed comprising various treatments of AMF application under salinity stress (200mM), and control samples were used for each treatment. The obtained results demonstrated significantly that AMF used in this study showed beneficial impacts in all parameters used as sensitive monitor for relation of plant-salt microbe interaction. The root colonization by AMF showed the highest plant growth criteria, relative water content, soluble sugar, starch, and total non-structural carbohydrates under both control and salinity stress conditions. Moreover, the application of AMF-treated plants showed the highest soluble protein concentration and activity in leaves and antioxidant enzymes (catalase, superoxide dismutase, guaiacol peroxidase). These findings highlight the potential impact of AMF application as a biologically based strategy to manage the mitigation of salt stress on wheat, which increases the availability of many salt marsh habitats for sustainable agriculture of such strategy crops.

Keywords: arbuscular mycorrhizal fungi, salt stress, plant growth criteria, soluble protein, antioxidant enzymes, wheat plant

Procedia PDF Downloads 15
4449 Noise Detection Algorithm for Skin Disease Image Identification

Authors: Minakshi Mainaji Sonawane, Bharti W. Gawali, Sudhir Mendhekar, Ramesh R. Manza

Abstract:

People's lives and health are severely impacted by skin diseases. A new study proposes an effective method for identifying the different forms of skin diseases. Image denoising is a technique for improving image quality after it has been harmed by noise. The proposed technique is based on the usage of the wavelet transform. Wavelet transform is the best method for analyzing the image due to the ability to split the image into the sub-band, which has been used to estimate the noise ratio at the noisy image. According to experimental results, the proposed method presents the best values for MSE, PSNR, and Entropy for denoised images. we can found in Also, by using different types of wavelet transform filters is make the proposed approach can obtain the best results 23.13, 20.08, 50.7 for the image denoising process

Keywords: MSE, PSNR, entropy, Gaussian filter, DWT

Procedia PDF Downloads 195
4448 Data Security: An Enhancement of E-mail Security Algorithm to Secure Data Across State Owned Agencies

Authors: Lindelwa Mngomezulu, Tonderai Muchenje

Abstract:

Over the decades, E-mails provide easy, fast and timely communication enabling businesses and state owned agencies to communicate with their stakeholders and with their own employees in real-time. Moreover, since the launch of Microsoft office 365 and many other clouds based E-mail services, many businesses have been migrating from the on premises E-mail services to the cloud and more precisely since the beginning of the Covid-19 pandemic, there has been a significant increase of E-mails utilization, which then leads to the increase of cyber-attacks. In that regard, E-mail security has become very important in the E-mail transportation to ensure that the E-mail gets to the recipient without the data integrity being compromised. The classification of the features to enhance E-mail security for further from the enhanced cyber-attacks as we are aware that since the technology is advancing so at the cyber-attacks. Therefore, in order to maximize the data integrity we need to also maximize security of the E-mails such as enhanced E-mail authentication. The successful enhancement of E-mail security in the future may lessen the frequency of information thefts via E-mails, resulting in the data of South African State-owned agencies not being compromised.

Keywords: e-mail security, cyber-attacks, data integrity, authentication

Procedia PDF Downloads 107
4447 Digital Watermarking Based on Visual Cryptography and Histogram

Authors: R. Rama Kishore, Sunesh

Abstract:

Nowadays, robust and secure watermarking algorithm and its optimization have been need of the hour. A watermarking algorithm is presented to achieve the copy right protection of the owner based on visual cryptography, histogram shape property and entropy. In this, both host image and watermark are preprocessed. Host image is preprocessed by using Butterworth filter, and watermark is with visual cryptography. Applying visual cryptography on water mark generates two shares. One share is used for embedding the watermark, and the other one is used for solving any dispute with the aid of trusted authority. Usage of histogram shape makes the process more robust against geometric and signal processing attacks. The combination of visual cryptography, Butterworth filter, histogram, and entropy can make the algorithm more robust, imperceptible, and copy right protection of the owner.

Keywords: digital watermarking, visual cryptography, histogram, butter worth filter

Procedia PDF Downloads 333
4446 Distributed Cyber Physical Secure Framework for DC Microgrids: DC Ship Power System Applications

Authors: Grace karimi Muriithi, Behnaz Papari, Ali Arsalan, Christopher Shannon Edrington

Abstract:

Complexity and nonlinearity of the control system design is increasing for DC microgrid applications when the cyber concept associated with the technology constraints will added to the picture. Controllers’ functionality during the critical operation mode is required to guaranteed specifically for a high profile applications such as NAVY DC ship power system (SPS) as an small-scaled DC microgrid. Thus, SPS is susceptible to cyber-attacks and, accordingly, can provide the disastrous effects. In this study, a machine learning (ML) approach is demonstrated to offer the promising performance of SPS for developing an effective and robust functionality over attacks time. Simulation results analysis demonstrate that the proposed method can improve the controllability successfully.

Keywords: controlability, cyber attacks, distribute control, machine learning

Procedia PDF Downloads 78
4445 Thermo-Economic Analysis of a Natural Draft Direct Cooling System for a Molten Salt Power Tower

Authors: Huiqiang Yang, Domingo Santana

Abstract:

Reducing parasitic power consumption of concentrating solar power plants is the main challenge to increase the overall efficiency, particularly for molten salt tower technology. One of the most effective approaches to reduce the parasitic power consumption is to implement a natural draft dry cooling system instead of the standard utilized mechanical draft dry cooling system. In this paper, a thermo-economic analysis of a natural draft direct cooling system was performed based on a 100MWe commercial scale molten salt power plant. In this configuration with a natural draft direct cooling system, the exhaust steam from steam turbine flows directly to the heat exchanger bundles inside the natural draft dry cooling tower, which eliminates the power consumption of circulation pumps or fans, although the cooling tower shadows a portion of the heliostat field. The simulation results also show that compared to a mechanical draft cooling system the annual solar field efficiency is decreased by about 0.2% due to the shadow, which is equal to a reduction of approximately 13% of the solar field area. As a contrast, reducing the solar field size by 13% in purpose in a molten salt power plant with a natural draft drying cooling system actually will lead to a reduction of levelized cost of electricity (LCOE) by about 4.06% without interfering the power generated.

Keywords: molten salt power tower, natural draft dry cooling, parasitic power consumption, commercial scale

Procedia PDF Downloads 143
4444 Red Green Blue Image Encryption Based on Paillier Cryptographic System

Authors: Mamadou I. Wade, Henry C. Ogworonjo, Madiha Gul, Mandoye Ndoye, Mohamed Chouikha, Wayne Patterson

Abstract:

In this paper, we present a novel application of the Paillier cryptographic system to the encryption of RGB (Red Green Blue) images. In this method, an RGB image is first separated into its constituent channel images, and the Paillier encryption function is applied to each of the channels pixel intensity values. Next, the encrypted image is combined and compressed if necessary before being transmitted through an unsecured communication channel. The transmitted image is subsequently recovered by a decryption process. We performed a series of security and performance analyses to the recovered images in order to verify their robustness to security attack. The results show that the proposed image encryption scheme produces highly secured encrypted images.

Keywords: image encryption, Paillier cryptographic system, RBG image encryption, Paillier

Procedia PDF Downloads 210
4443 An Object-Based Image Resizing Approach

Authors: Chin-Chen Chang, I-Ta Lee, Tsung-Ta Ke, Wen-Kai Tai

Abstract:

Common methods for resizing image size include scaling and cropping. However, these two approaches have some quality problems for reduced images. In this paper, we propose an image resizing algorithm by separating the main objects and the background. First, we extract two feature maps, namely, an enhanced visual saliency map and an improved gradient map from an input image. After that, we integrate these two feature maps to an importance map. Finally, we generate the target image using the importance map. The proposed approach can obtain desired results for a wide range of images.

Keywords: energy map, visual saliency, gradient map, seam carving

Procedia PDF Downloads 461
4442 Rough Neural Networks in Adapting Cellular Automata Rule for Reducing Image Noise

Authors: Yasser F. Hassan

Abstract:

The reduction or removal of noise in a color image is an essential part of image processing, whether the final information is used for human perception or for an automatic inspection and analysis. This paper describes the modeling system based on the rough neural network model to adaptive cellular automata for various image processing tasks and noise remover. In this paper, we consider the problem of object processing in colored image using rough neural networks to help deriving the rules which will be used in cellular automata for noise image. The proposed method is compared with some classical and recent methods. The results demonstrate that the new model is capable of being trained to perform many different tasks, and that the quality of these results is comparable or better than established specialized algorithms.

Keywords: rough sets, rough neural networks, cellular automata, image processing

Procedia PDF Downloads 405
4441 Efficient Motion Estimation by Fast Three Step Search Algorithm

Authors: S. M. Kulkarni, D. S. Bormane, S. L. Nalbalwar

Abstract:

The rapid development in the technology have dramatic impact on the medical health care field. Medical data base obtained with latest machines like CT Machine, MRI scanner requires large amount of memory storage and also it requires large bandwidth for transmission of data in telemedicine applications. Thus, there is need for video compression. As the database of medical images contain number of frames (slices), hence while coding of these images there is need of motion estimation. Motion estimation finds out movement of objects in an image sequence and gets motion vectors which represents estimated motion of object in the frame. In order to reduce temporal redundancy between successive frames of video sequence, motion compensation is preformed. In this paper three step search (TSS) block matching algorithm is implemented on different types of video sequences. It is shown that three step search algorithm produces better quality performance and less computational time compared with exhaustive full search algorithm.

Keywords: block matching, exhaustive search motion estimation, three step search, video compression

Procedia PDF Downloads 459
4440 Numerical and Experimental Analysis of Stiffened Aluminum Panels under Compression

Authors: Ismail Cengiz, Faruk Elaldi

Abstract:

Within the scope of the study presented in this paper, load carrying capacity and buckling behavior of a stiffened aluminum panel designed by adopting current ‘buckle-resistant’ design application and ‘Post –Buckling’ design approach were investigated experimentally and numerically. The test specimen that is stabilized by Z-type stiffeners and manufactured from aluminum 2024 T3 Clad material was test under compression load. Buckling behavior was observed by means of 3 – dimensional digital image correlation (DIC) and strain gauge pairs. The experimental study was followed by developing an efficient and reliable finite element model whose ability to predict behavior of the stiffened panel used for compression test is verified by compering experimental and numerical results in terms of load – shortening curve, strain-load curves and buckling mode shapes. While finite element model was being constructed, non-linear behaviors associated with material and geometry was considered. Finally, applicability of aluminum stiffened panel in airframe design against to composite structures was evaluated thorough the concept of ‘Structural Efficiency’. This study reveals that considerable amount of weight saving could be gained if the concept of ‘post-buckling design’ is preferred to the already conventionally used ‘buckle resistant design’ concept in aircraft industry without scarifying any of structural integrity under load spectrum.

Keywords: post-buckling, stiffened panel, non-linear finite element method, aluminum, structural efficiency

Procedia PDF Downloads 122
4439 Survival of Four Probiotic Strains in Acid, Bile Salt and After Spray Drying

Authors: Rawichar Chaipojjana, Suttipong Phosuksirikul, Arunsri Leejeerajumnean

Abstract:

The objective of the study was to select the survival of probiotic strains when exposed to acidic and bile salts condition. Four probiotic strains (Lactobacillus casei subsp. rhamnosus TISTR 047, Lactobacillus casei TISTR 1500, Lactobacillus acidophilus TISTR 1338 and Lactobacillus plantarum TISTR 1465) were cultured in MRS broth and incubated at 35ºC for 15 hours before being inoculated into acidic condition (5 M HCl, pH 2) for 2 hours and bile salt (0.3%, pH 5.8) for 8 hour. The survived probiotics were counted in MRS agar. Among four stains, Lactobacillus casei subsp. rhamnosus TISTR 047 was the highest tolerance specie. Lactobacillus casei subsp. rhamnosus TISTR 047 reduced 6.74±0.07 log CFU/ml after growing in acid and 5.52±0.05 log CFU/ml after growing in bile salt. Then, double emulsion of microorganisms was chosen to encapsulate before spray drying. Spray drying was done with the inlet temperature 170ºC and outlet temperature 80ºC. The results showed that the survival of encapsulated Lactobacillus casei subsp. rhamnosus TISTR 047 after spray drying decreased from 9.63 ± 0.32 to 8.31 ± 0.11 log CFU/ml comparing with non-encapsulated, 9.63 ± 0.32 to 4.06 ± 0.08 log CFU/ml. Therefore, Lactobacillus casei subsp. rhamnosus TISTR 047 would be able to survive in gastrointestinal and spray drying condition.

Keywords: probiotic, acid, bile salt, spray drying

Procedia PDF Downloads 335
4438 Adaptive Responses of Carum copticum to in vitro Salt Stress

Authors: R. Razavizadeh, F. Adabavazeh, M. Rezaee Chermahini

Abstract:

Salinity is one of the most widespread agricultural problems in arid and semi-arid areas that limits the plant growth and crop productivity. In this study, the salt stress effects on protein, reducing sugar, proline contents and antioxidant enzymes activities of Carum copticum L. under in vitro conditions were studied. Seeds of C. copticum were cultured in Murashige and Skoog (MS) medium containing 0, 25, 50, 100 and 150 mM NaCl and calli were cultured in MS medium containing 1 μM 2, 4-dichlorophenoxyacetic acid, 4 μM benzyl amino purine and different levels of NaCl (0, 25, 50, 100 and 150 mM). After NaCl treatment for 28 days, the proline and reducing sugar contents of shoots, roots and calli increased significantly in relation to the severity of the salt stress. The highest amount of proline and carbohydrate were observed at 150 and 100 mM NaCl, respectively. The reducing sugar accumulation in shoots was the highest as compared to roots, whereas, proline contents did not show any significant difference in roots and shoots under salt stress. The results showed significant reduction of protein contents in seedlings and calli. Based on these results, proteins extracted from the shoots, roots and calli of C. copticum treated with 150 mM NaCl showed the lowest contents. The positive relationships were observed between activity of antioxidant enzymes and the increase in stress levels. Catalase, ascorbate peroxidase and superoxide dismutase activity increased significantly under salt concentrations in comparison to the control. These results suggest that the accumulation of proline and sugars, and activation of antioxidant enzymes play adaptive roles in the adaptation of seedlings and callus of C. copticum to saline conditions.

Keywords: antioxidant enzymes, Carum copticum, organic solutes, salt stress

Procedia PDF Downloads 259
4437 Effect of Wettability Alteration in Low Salt Water Injection Modeling

Authors: H. Vahdani

Abstract:

By the adsorption of polar compounds and/or the deposition of organic material, the wettability of originally water-wet reservoir rock can be altered. The degree of alteration is determined by the interaction of the oil constituents, the mineral surface, and the brine chemistry. Recently improving oil recovery by tuning wettability alteration is believed as a new recovery method. Various researchers have demonstrated that low salt water injection has a significant impact on oil recovery. It has been shown, for instance, that additional oil can be produced from reservoir rock by managing the injection water. Large wettability sensitivity has been observed, indicating that the oil/water capillary pressure profiles play a major role during low saline water injection simulation. Although the exact physics on how this alteration occurs is still a research topic; however, it has been reported that some of its effect can be captured by a relative permeability shift from an oil-wet system to a water-wet system. Modeling of low salt water injection mainly is based on the theory of wettability alteration and is hence strongly dependent on the wettability of the reservoir. In this article, combination of different wettabilities has been simulated and it is observed that the highest recoveries were from the cases were the reservoir initially was water-wet, and the lowest recoveries was from the cases were the reservoir initially was considered oil-wet. However for the cases where the reservoir initially was oil-wet, the effect of low-salinity waterflooding was the largest.

Keywords: low salt water injection, wettability alteration, modelling, relative permeability

Procedia PDF Downloads 471