Search results for: pilot contamination attacks
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 2290

Search results for: pilot contamination attacks

2050 Acupuncture and Topiramat in Treatment of Migraine

Authors: Lazgeen Mohammed

Abstract:

The greatest advantage of acupuncture over western medicine is that it is safe . Unlike synthetic drugs, acupuncture has virtually no side effects, and the procedures for treating headaches are much less invasive. Migraine headaches are usually one-sided, pulsating or throbbing, and moderate or severe in intensity.. Some patients also experience auras, a neurological symptom that develops gradually over 5-20 minutes. The patient may see brief flashes or waves of light, or changes in their vision. Other common features of auras include vertigo, imbalance, confusion and numbness.Acupuncture had been used to treat 50 patients suffering from migraine ,topiramat (topamax) given to prevent the attacks, duration of treatment is 10 weeks , the patients were fallowed up for one year .Topiramat is called an anticonvulsant.Topiramat is also used to prevent migraine headaches in adults and teenagers who are at least 12 years old. This medicine will only prevent migraine headaches or reduce the number of attacks. It will not treat a headache that has already begun.

Keywords: acpuncture, migraine, topiramat, headache

Procedia PDF Downloads 54
2049 Robust Adaptation to Background Noise in Multichannel C-OTDR Monitoring Systems

Authors: Andrey V. Timofeev, Viktor M. Denisov

Abstract:

A robust sequential nonparametric method is proposed for adaptation to background noise parameters for real-time. The distribution of background noise was modelled like to Huber contamination mixture. The method is designed to operate as an adaptation-unit, which is included inside a detection subsystem of an integrated multichannel monitoring system. The proposed method guarantees the given size of a nonasymptotic confidence set for noise parameters. Properties of the suggested method are rigorously proved. The proposed algorithm has been successfully tested in real conditions of a functioning C-OTDR monitoring system, which was designed to monitor railways.

Keywords: guaranteed estimation, multichannel monitoring systems, non-asymptotic confidence set, contamination mixture

Procedia PDF Downloads 410
2048 Research on Coordinated Development Mechanism of Semi-urbanized Areas under the Background of Guangdong-Hong Kong-Macao Greater Bay Area: A Case Study of 'Baiyun-Nanhai' Pilot Area

Authors: Cheng Fang Wang, Fu Li Gao, Jian Ying Zhou

Abstract:

The '1+4' integration pilot area in the border area of Guangzhou-Foshan is an important platform for Guangzhou-Foshan strategic cooperation, as well as a typical semi-urbanized area with mixed urban and rural landscapes, of which the Baiyun-Nanhai pilot area is one of them. Baiyun district and Nanhai district are only separated by the Pearl River. In this paper, the three dimensions, which include production, living, and ecology, have been put forward, as well as cross-regional multi-agency negotiation mechanism has been discussed. Taking 'Baiyun-Nanhai' pilot area as a case study, POI (Point of Interest) data to analyze the distribution characteristics of 'production-living-ecological space' from the spatial dimension has been introduced in this paper, as well as the land-use change of 'production-living-ecological space' in western region of Baiyun district in 2007 and 2017 from the temporal dimension has been analyzed. Based on the above analysis, the integration development strategy and rethinking of cross-administrative region based on 'production-living-ecological integration' mechanism have been discussed later. It will explore the mechanism of industrial collaborative innovation, infrastructure co-construction, and ecological co-protection in semi-urban areas across borders. And it is expected to provide a reference for the integrated construction of the Guangdong-Hong Kong-Macao Greater Bay Area.

Keywords: semi-urbanization, production-living-ecological integration, multi-agency negotiation, Guangzhou-Foshan integration, synergetic development

Procedia PDF Downloads 126
2047 Electronic Equipment Failure due to Corrosion

Authors: Yousaf Tariq

Abstract:

There are many reasons which are involved in electronic equipment failure i.e. temperature, humidity, dust, smoke etc. Corrosive gases are also one of the factor which may involve in failure of equipment. Sensitivity of electronic equipment increased when “lead-free” regulation enforced on manufacturers. In data center, equipment like hard disk, servers, printed circuit boards etc. have been exposed to gaseous contamination due to increase in sensitivity. There is a worldwide standard to protect electronic industrial electronic from corrosive gases. It is well known as “ANSI/ISA S71.04 – 1985 - Environmental Conditions for Control Systems: Airborne Contaminants. ASHRAE Technical Committee (TC) 9.9 members also recommended ISA standard in their whitepaper on Gaseous and Particulate Contamination Guideline for data centers. TC 9.9 members represented some of the major IT equipment manufacturers e.g. IBM, HP, Cisco etc. As per standard practices, first step is to monitor air quality in data center. If contamination level shows more than G1, it means that gas-phase air filtration is required other than dust/smoke air filtration. It is important that outside fresh air entering in data center should have pressurization/re-circulated process in order to absorb corrosive gases and to maintain level within specified limit. It is also important that air quality monitoring should be conducted once in a year. Temperature and humidity should also be monitored as per standard practices to maintain level within specified limit.

Keywords: corrosive gases, corrosion, electronic equipment failure, ASHRAE, hard disk

Procedia PDF Downloads 310
2046 Taxonomy of Threats and Vulnerabilities in Smart Grid Networks

Authors: Faisal Al Yahmadi, Muhammad R. Ahmed

Abstract:

Electric power is a fundamental necessity in the 21st century. Consequently, any break in electric power is probably going to affect the general activity. To make the power supply smooth and efficient, a smart grid network is introduced which uses communication technology. In any communication network, security is essential. It has been observed from several recent incidents that adversary causes an interruption to the operation of networks. In order to resolve the issues, it is vital to understand the threats and vulnerabilities associated with the smart grid networks. In this paper, we have investigated the threats and vulnerabilities in Smart Grid Networks (SGN) and the few solutions in the literature. Proposed solutions showed developments in electricity theft countermeasures, Denial of services attacks (DoS) and malicious injection attacks detection model, as well as malicious nodes detection using watchdog like techniques and other solutions.

Keywords: smart grid network, security, threats, vulnerabilities

Procedia PDF Downloads 118
2045 GIS-Based Spatial Distribution and Evaluation of Selected Heavy Metals Contamination in Topsoil around Ecton Mining Area, Derbyshire, UK

Authors: Zahid O. Alibrahim, Craig D. Williams, Clive L. Roberts

Abstract:

The study area (Ecton mining area) is located in the southern part of the Peak District in Derbyshire, England. It is bounded by the River Manifold from the west. This area has been mined for a long period. As a result, huge amounts of potentially toxic metals were released into the surrounding area and are most likely to be a significant source of heavy metal contamination to the local soil, water and vegetation. In order to appraise the potential heavy metal pollution in this area, 37 topsoil samples (5-20 cm depth) were collected and analysed for their total content of Cu, Pb, Zn, Mn, Cr, Ni and V using ICP (Inductively Coupled Plasma) optical emission spectroscopy. Multivariate Geospatial analyses using the GIS technique were utilised to draw geochemical maps of the metals of interest over the study area. A few hotspot points, areas of elevated concentrations of metals, were specified, which are presumed to be the results of anthropogenic activities. In addition, the soil’s environmental quality was evaluated by calculating the Mullers’ Geoaccumulation index (I geo), which suggests that the degree of contamination of the investigated heavy metals has the following trend: Pb > Zn > Cu > Mn > Ni = Cr = V. Furthermore, the potential ecological risk, using the enrichment factor (EF), was also specified. On the basis of the calculated amount or the EF, the levels of pollution for the studied metals in the study area have the following order: Pb>Zn>Cu>Cr>V>Ni>Mn.

Keywords: enrichment factor, geoaccumulation index, GIS, heavy metals, multivariate analysis

Procedia PDF Downloads 335
2044 Introduce a New Model of Anomaly Detection in Computer Networks Using Artificial Immune Systems

Authors: Mehrshad Khosraviani, Faramarz Abbaspour Leyl Abadi

Abstract:

The fundamental component of the computer network of modern information society will be considered. These networks are connected to the network of the internet generally. Due to the fact that the primary purpose of the Internet is not designed for, in recent decades, none of these networks in many of the attacks has been very important. Today, for the provision of security, different security tools and systems, including intrusion detection systems are used in the network. A common diagnosis system based on artificial immunity, the designer, the Adhasaz Foundation has been evaluated. The idea of using artificial safety methods in the diagnosis of abnormalities in computer networks it has been stimulated in the direction of their specificity, there are safety systems are similar to the common needs of m, that is non-diagnostic. For example, such methods can be used to detect any abnormalities, a variety of attacks, being memory, learning ability, and Khodtnzimi method of artificial immune algorithm pointed out. Diagnosis of the common system of education offered in this paper using only the normal samples is required for network and any additional data about the type of attacks is not. In the proposed system of positive selection and negative selection processes, selection of samples to create a distinction between the colony of normal attack is used. Copa real data collection on the evaluation of ij indicates the proposed system in the false alarm rate is often low compared to other ir methods and the detection rate is in the variations.

Keywords: artificial immune system, abnormality detection, intrusion detection, computer networks

Procedia PDF Downloads 333
2043 Design and Implementation of a Cross-Network Security Management System

Authors: Zhiyong Shan, Preethi Santhanam, Vinod Namboodiri, Rajiv Bagai

Abstract:

In recent years, the emerging network worms and attacks have distributive characteristics, which can spread globally in a very short time. Security management crossing networks to co-defense network-wide attacks and improve the efficiency of security administration is urgently needed. We propose a hierarchical distributed network security management system (HD-NSMS), which can integrate security management across multiple networks. First, we describe the system in macrostructure and microstructure; then discuss three key problems when building HD-NSMS: device model, alert mechanism, and emergency response mechanism; lastly, we describe the implementation of HD-NSMS. The paper is valuable for implementing NSMS in that it derives from a practical network security management system (NSMS).

Keywords: network security management, device organization, emergency response, cross-network

Procedia PDF Downloads 137
2042 Tritium Activities in Romania, Potential Support for Development of ITER Project

Authors: Gheorghe Ionita, Sebastian Brad, Ioan Stefanescu

Abstract:

In any fusion device, tritium plays a key role both as a fuel component and, due to its radioactivity and easy incorporation, as tritiated water (HTO). As for the ITER project, to reduce the constant potential of tritium emission, there will be implemented a Water Detritiation System (WDS) and an Isotopic Separation System (ISS). In the same time, during operation of fission CANDU reactors, the tritium content increases in the heavy water used as moderator and cooling agent (due to neutron activation) and it has to be reduced, too. In Romania, at the National Institute for Cryogenics and Isotopic Technologies (ICIT Rm-Valcea), there is an Experimental Pilot Plant for Tritium Removal (Exp. TRF), with the aim of providing technical data on the design and operation of an industrial plant for heavy water depreciation of CANDU reactors from Cernavoda NPP. The selected technology is based on the catalyzed isotopic exchange process between deuterium and liquid water (LPCE) combined with the cryogenic distillation process (CD). This paper presents an updated review of activities in the field carried out in Romania after the year 2000 and in particular those related to the development and operation of Tritium Removal Experimental Pilot Plant. It is also presented a comparison between the experimental pilot plant and industrial plant to be implemented at Cernavoda NPP. The similarities between the experimental pilot plant from ICIT Rm-Valcea and water depreciation and isotopic separation systems from ITER are also presented and discussed. Many aspects or 'opened issues' relating to WDS and ISS could be checked and clarified by a special research program, developed within ExpTRF. By these achievements and results, ICIT Rm - Valcea has proved its expertise and capability concerning tritium management therefore its competence may be used within ITER project.

Keywords: ITER project, heavy water detritiation, tritium removal, isotopic exchange

Procedia PDF Downloads 393
2041 Assessment of the Efficiency of Virtual Orthodontic Consultations during COVID-19

Authors: R. Litt, A. Brown

Abstract:

Aims: We aimed to assess the efficiency of ‘Attend Anywhere’ orthodontic clinics within a district general hospital during COVID- 19. Our secondary aim was to pilot a questionnaire to assess patient satisfaction with virtual orthodontic appointments. Design: The study design is a service evaluation including pilot questionnaire. Methods: The average number of patients seen per virtual clinic and the number of patients failing to attend was compared to face-to-face clinics. The capability of virtual appointments to be successful in preventing the need for a face-to-face appointment was assessed. Patients were invited to complete a telephone pilot questionnaire focusing on patient satisfaction and accessibility. Results: There was a small increase in the number of patients failing to attend virtual appointments, with a third of the patients who did not attend failing to receive the appointment link. 81.9% of virtual clinic appointments were successful and prevented the need for a face-to-face appointment. Overall patients were very satisfied with their virtual orthodontic appointment and the majority required no assistance to access the service. Conclusions: The use of ‘Attend Anywhere’ clinics in orthodontics offers patients and clinicians an effective and efficient alternative to face-to-face appointments that patients on average find easy to use and completely satisfactory.

Keywords: clinics, COVID, orthodontics, patient satisfaction, virtual

Procedia PDF Downloads 110
2040 Cybersecurity Awareness through Laboratories and Cyber Competitions in the Education System: Practices to Promote Student Success

Authors: Haydar Teymourlouei

Abstract:

Cybersecurity is one of the greatest challenges society faces in an age revolving around technological development. With cyber-attacks on the continuous rise, the nation needs to understand and learn ways that can prevent such attacks. A major contribution that can change the education system is to implement laboratories and competitions into academia. This method can improve and educate students with more hands-on exercises in a highly motivating setting. Considering the fact that students are the next generation of the nation’s workforce, it is important for students to understand concepts not only through books, but also through actual hands-on experiences in order for them to be prepared for the workforce. An effective cybersecurity education system is critical for creating a strong cyber secure workforce today and for the future. This paper emphasizes the need for awareness and the need for competitions and cybersecurity laboratories to be implemented into the education system.

Keywords: awareness, competition, cybersecurity, laboratories, workforce

Procedia PDF Downloads 311
2039 Application of Various Methods for Evaluation of Heavy Metal Pollution in Soils around Agarak Copper-Molybdenum Mine Complex, Armenia

Authors: K. A. Ghazaryan, H. S. Movsesyan, N. P. Ghazaryan

Abstract:

The present study was aimed in assessing the heavy metal pollution of the soils around Agarak copper-molybdenum mine complex and related environmental risks. This mine complex is located in the south-east part of Armenia, and the present study was conducted in 2013. The soils of the five riskiest sites of this region were studied: surroundings of the open mine, the sites adjacent to processing plant of Agarak copper-molybdenum mine complex, surroundings of Darazam active tailing dump, the recultivated tailing dump of “ravine - 2”, and the recultivated tailing dump of “ravine - 3”. The mountain cambisol was the main soil type in the study sites. The level of soil contamination by heavy metals was assessed by Contamination factors (Cf), Degree of contamination (Cd), Geoaccumulation index (I-geo) and Enrichment factor (EF). The distribution pattern of trace metals in the soil profile according to Cf, Cd, I-geo and EF values shows that the soil is much polluted. Almost in all studied sites, Cu, Mo, Pb, and Cd were the main polluting heavy metals, and this was conditioned by Agarak copper-molybdenum mine complex activity. It is necessary to state that the pollution problem becomes pressing as some parts of these highly polluted region are inhabited by population, and agriculture is highly developed there; therefore, heavy metals can be transferred into human bodies through food chains and have direct influence on public health. Since the induced pollution can pose serious threats to public health, further investigations on soil and vegetation pollution are recommended. Finally, Cf calculating based on distance from the pollution source and the wind direction can provide more reasonable results.

Keywords: Agarak copper-molybdenum mine complex, heavy metals, soil contamination, enrichment factor (EF), Armenia

Procedia PDF Downloads 206
2038 Visual Odometry and Trajectory Reconstruction for UAVs

Authors: Sandro Bartolini, Alessandro Mecocci, Alessio Medaglini

Abstract:

The growing popularity of systems based on unmanned aerial vehicles (UAVs) is highlighting their vulnerability, particularly in relation to the positioning system used. Typically, UAV architectures use the civilian GPS, which is exposed to a number of different attacks, such as jamming or spoofing. This is why it is important to develop alternative methodologies to accurately estimate the actual UAV position without relying on GPS measurements only. In this paper, we propose a position estimate method for UAVs based on monocular visual odometry. We have developed a flight control system capable of keeping track of the entire trajectory travelled, with a reduced dependency on the availability of GPS signals. Moreover, the simplicity of the developed solution makes it applicable to a wide range of commercial drones. The final goal is to allow for safer flights in all conditions, even under cyber-attacks trying to deceive the drone.

Keywords: visual odometry, autonomous uav, position measurement, autonomous outdoor flight

Procedia PDF Downloads 198
2037 Hydrogeochemical Investigation of Lead-Zinc Deposits in Oshiri and Ishiagu Areas, South Eastern Nigeria

Authors: Christian Ogubuchi Ede, Moses Oghenenyoreme Eyankware

Abstract:

This study assessed the concentration of heavy metals (HMs) in soil, rock, mine dump pile, and water from Oshiri and Ishiagu areas of Ebonyi State. Investigations on mobile fraction equally evaluated the geochemical condition of different HM using UV spectrophotometer for Mineralized and unmineralized rocks, dumps, and soil, while AAS was used in determining the geochemical nature of the water system. Analysis revealed very high pollution of Cd mostly in Ishiagu (Ihetutu and Amaonye) active mine zones and with subordinates enrichments of Pb, Cu, As, and Zn in Amagu and Umungbala. Oshiri recorded sparingly moderate to high contamination of Cd and Mn but out rightly high anthropogenic input. Observation showed that most of the contamination conditions were unbearable while at the control but decrease with increasing distance from the mine vicinity. The potential heavy metal risk of the environments was evaluated using the risk factors such as enrichment factor, index of Geoacumulation, Contamination Factor, and Effect Range Median. Cadmium and Zn showed moderate to extreme contamination using Geoaccumulation Index (Igeo) while Pb, Cd, and As indicated moderate to strong pollution using the Effect Range Median. Results, when compared with the allowable limits and standards, showed the concentration of the metals in the following order Cd>Zn>Pb>As>Cu>Ni (rocks), Cd>As>Pb>Zn>Cu>Ni (soil) while Cd>Zn>As>Pb> Cu (for mine dump pile. High concentrations of Zn and As were recorded more in mine pond and salt line/drain channels along active mine zones, it heightened its threat during the rainy period as it settles into river course, living behind full-scale contaminations to inhabitants depending on it for domestic uses. Pb and Cu with moderate pollution were recorded in surface/stream water source as its mobility were relatively low. Results from Ishiagu Crush rock sites and Fedeco metallurgical and auto workshop where groundwater contamination was seen infiltrating some of the wells points gave rise to values that were 4 times high than the allowable limits. Some of these metal concentrations according to WHO (2015) if left unmitigated pose adverse effects to the soil and human community.

Keywords: water, geo-accumulation, heavy metals, mine and Nigeria.

Procedia PDF Downloads 153
2036 Bacteria Removal from Wastewater by Electrocoagulation Process

Authors: Boudjema Nouara, Mameri Nabil

Abstract:

Bacteria have played an important role in water contamination as a consequence of organic pollution. In this study, an electrocoagulation process was adopted to remove fecal contamination and pathogenic bacteria from waste water. The effect of anode/cathodes materials as well as operating conditions for bacteria removal from water, such as current intensity and initial pH and temperature. The results indicated that the complete removal was achevied when using aluminium anode as anode at current intensity of 3A, initial pH of 7-8 and electrolysis time of 30 minutes. This process showed a bactericidal effect of 95 to 99% for the total and fecal coliforms and 99% to 100% for Eschercichia coli and fecal Streptococci. A decrease of 72% was recorded for sulphite-reducing Clostridia. Thus, this process has the potential to be one the options for treatment where high amount of bacteria in wastewater river.

Keywords: bacteria, el Harrach river, electrocoagulation, wastewater, treatment

Procedia PDF Downloads 470
2035 The Shadow of Terrorism in the World Tourism Industry: Impacts, Prevention and Recovery Strategies

Authors: Maria Brás

Abstract:

The main purpose of the presentation is to identify the impacts and appropriate measures to prevent potential attacks, or minimize the risk of an attack in tourist destination. Terrorism has been growing in the shadow of unpredictability, however, is possible to minimize the danger of a terrorist attack by doing the: (1) recognition; (2); evaluation; (3) avoidance; (4) threat reduction. The vulnerability of tourism industry to terrorism is an undeniable fact, and terrorists know it. They use this advantage attacking tourists for very specific reasons, such as the: (1) international coverage by the media, “if it bleeds it leads” ; (2) chances of getting different nationalities at the same place and time; (3) possibility of destroyed the economy of a destination, or destinations (“terrorism contamination effect”), through the reduction of tourist demand; (4) psychological, and social disruption based on fear of negative consequences. Security incidents, such as terrorism, include different preventive measures that can be conducted in partnership with: tourism industry (hotels, airports, tourist attractions, among others); central government; public and/or private sector; local community; and media. The recovery strategies must be based on the dissemination of positive information to the media; in creating new marketing strategies that emphasize the social and cultural values of the destination; encourage domestic tourism; get government, or state, financial support.

Keywords: terrorism, tourism, safety, security, impacts, prevention, recovery

Procedia PDF Downloads 322
2034 Direct and Indirect Impacts of Predator Conflict in Kanha National Park, India

Authors: Diane H. Dotson, Shari L. Rodriguez

Abstract:

Habitat for predators is on the decline worldwide, which often brings humans and predators into conflict over remaining shared space and common resources. While the direct impacts of human predator conflict on humans (i.e., attacks on livestock or humans resulting in injury or death) are well documented, the indirect impacts of conflict on humans (i.e., downstream effects such as fear, stress, opportunity costs, PTSD) have not been addressed. We interviewed 437 people living in 54 villages on the periphery of Kanha National Park, India, to assess the amount and severity of direct and indirect impacts of predator conflict. ​While 58% of livestock owners believed that predator attacks on livestock guards occurred frequently and 62% of those who collect forest products believed that predator attacks on those collecting occurred frequently, less than 20% of all participants knew of someone who had experienced an attack. Data related to indirect impacts suggest that such impacts are common; 76% of participants indicated they were afraid a predator will physically injure them. Livestock owners reported that livestock guarding took time away from their primary job (61%) and getting enough sleep (73%), and believed that it increased their vulnerability to illnesses (80%). These results suggest that the perceptions of risk of predator attack are likely inflated, yet the costs of human predator impacts may be substantially higher than previously estimated, particularly related to human well-being, making the implementation of appropriate and effective conservation and conflict mitigation strategies and policies increasingly urgent.

Keywords: direct impacts, indirect impacts, human-predator conflict, India

Procedia PDF Downloads 136
2033 Resisting Adversarial Assaults: A Model-Agnostic Autoencoder Solution

Authors: Massimo Miccoli, Luca Marangoni, Alberto Aniello Scaringi, Alessandro Marceddu, Alessandro Amicone

Abstract:

The susceptibility of deep neural networks (DNNs) to adversarial manipulations is a recognized challenge within the computer vision domain. Adversarial examples, crafted by adding subtle yet malicious alterations to benign images, exploit this vulnerability. Various defense strategies have been proposed to safeguard DNNs against such attacks, stemming from diverse research hypotheses. Building upon prior work, our approach involves the utilization of autoencoder models. Autoencoders, a type of neural network, are trained to learn representations of training data and reconstruct inputs from these representations, typically minimizing reconstruction errors like mean squared error (MSE). Our autoencoder was trained on a dataset of benign examples; learning features specific to them. Consequently, when presented with significantly perturbed adversarial examples, the autoencoder exhibited high reconstruction errors. The architecture of the autoencoder was tailored to the dimensions of the images under evaluation. We considered various image sizes, constructing models differently for 256x256 and 512x512 images. Moreover, the choice of the computer vision model is crucial, as most adversarial attacks are designed with specific AI structures in mind. To mitigate this, we proposed a method to replace image-specific dimensions with a structure independent of both dimensions and neural network models, thereby enhancing robustness. Our multi-modal autoencoder reconstructs the spectral representation of images across the red-green-blue (RGB) color channels. To validate our approach, we conducted experiments using diverse datasets and subjected them to adversarial attacks using models such as ResNet50 and ViT_L_16 from the torch vision library. The autoencoder extracted features used in a classification model, resulting in an MSE (RGB) of 0.014, a classification accuracy of 97.33%, and a precision of 99%.

Keywords: adversarial attacks, malicious images detector, binary classifier, multimodal transformer autoencoder

Procedia PDF Downloads 57
2032 Implementation of the Interlock Protocol to Enhance Security in Unmanned Aerial Vehicles

Authors: Vikram Prabhu, Mohammad Shikh Bahaei

Abstract:

This paper depicts the implementation of a new infallible technique to protect an Unmanned Aerial Vehicle from cyber-attacks. An Unmanned Aerial Vehicle (UAV) could be vulnerable to cyber-attacks because of jammers or eavesdroppers over the network which pose as a threat to the security of the UAV. In the field of network security, there are quite a few protocols which can be used to establish a secure connection between UAVs and their Operators. In this paper, we discuss how the Interlock Protocol could be implemented to foil the Man-in-the-Middle Attack. In this case, Wireshark has been used as the sniffer (man-in-the-middle). This paper also shows a comparison between the Interlock Protocol and the TCP Protocols using cryptcat and netcat and at the same time highlights why the Interlock Protocol is the most efficient security protocol to prevent eavesdropping over the communication channel.

Keywords: interlock protocol, Diffie-Hellman algorithm, unmanned aerial vehicles, control station, man-in-the-middle attack, Wireshark

Procedia PDF Downloads 282
2031 Effectivity Analysis of The Decontamination Products for Radioactive 99mTc Used in Nuclear Medicine

Authors: Hayrettin Eroglu, Oguz Aksakal

Abstract:

In this study, it is analysed that which decontamination products are more effective and how decontamination process should be performed in the case of contamination of radioactive 99mTc which is the most common radioactive element used in nuclear applications dealing with the human body or the environment. Based on the study, it is observed that existing radioactive washers are less effective than expected, alcohol has no effect on the decontamination of 99mTc, and temperature and pH are the most important factors. In the light of the analysis, it is concluded that the most effective decontamination product is DM-D (Decontamination Material-D). When the effect of DM-D on surfaces is analysed, it is observed that decontamination is very fast on scrubs and formica with both DM-D and water, and although DM-D is very effective on skin, it is not effective on f ceramic tiles and plastic floor covering material. Also in this study, the effectiveness of different molecular groups in the decontaminant was investigated. As a result, the acetate group has been observed as the most effective component of the decontaminant.

Keywords: contamination, radioactive, technetium, decontamination

Procedia PDF Downloads 390
2030 Wastewater Treatment Sludge as a Potential Source of Heavy Metal Contamination in Livestock

Authors: Glynn K. Pindihama, Rabelani Mudzielwana, Ndamulelo Lilimu

Abstract:

Wastewater treatment effluents, particularly sludges, are known to be potential sources of heavy metal contamination in the environment, depending on how the sludge is managed. Maintenance of wastewater treatment infrastructure in developing countries such as South Africa has become an issue of grave concern, with many wastewater treatment facilities in dilapidating states. Among the problems is the vandalism of the periphery fence to many wastewater treatment facilities, resulting in livestock, such as cows from neighboring villages, grazing within the facilities. This raises human health risks since dried sludge from the treatment plants is usually spread on the grass around the plant, resulting in heavy metal contamination. Animal products such as meat and milk from these cows thus become an indirect route to heavy metals to humans. This study assessed heavy metals in sludges from 3 wastewater treatment plants in Limpopo Province of South Africa. In addition, cow dung and sludge liquors were collected from these plants and evaluated for their heavy metal content. The sludge and cow dung were microwave-digested using the aqua-regia method, and all samples were analyzed for heavy metals using ICP-OES. The loadings of heavy metals in the sludge were in the order Cu>Zn>Ni>Cr>Cd>As>Hg. In cow dung, the heavy metals were in the order Fe>Cu>Mn>Zn>Cr>Pb>Co>Cd. The levels of Zn and Cu in the sludge liquors where the animals were observed drinking were, in some cases, above the permissible limit for livestock consumption. Principal component and correlation analysis are yet to be done to determine if there is a correlation between the heavy metals in the cow dung and sludge and sludge liquors.

Keywords: cow dung, heavy metals, sludge, wastewater treatment plants, sludge.

Procedia PDF Downloads 32
2029 Effects of Temperature and the Use of Bacteriocins on Cross-Contamination from Animal Source Food Processing: A Mathematical Model

Authors: Benjamin Castillo, Luis Pastenes, Fernando Cerdova

Abstract:

The contamination of food by microbial agents is a common problem in the industry, especially regarding the elaboration of animal source products. Incorrect manipulation of the machinery or on the raw materials can cause a decrease in production or an epidemiological outbreak due to intoxication. In order to improve food product quality, different methods have been used to reduce or, at least, to slow down the growth of the pathogens, especially deteriorated, infectious or toxigenic bacteria. These methods are usually carried out under low temperatures and short processing time (abiotic agents), along with the application of antibacterial substances, such as bacteriocins (biotic agents). This, in a controlled and efficient way that fulfills the purpose of bacterial control without damaging the final product. Therefore, the objective of the present study is to design a secondary mathematical model that allows the prediction of both the biotic and abiotic factor impact associated with animal source food processing. In order to accomplish this objective, the authors propose a three-dimensional differential equation model, whose components are: bacterial growth, release, production and artificial incorporation of bacteriocins and changes in pH levels of the medium. These three dimensions are constantly being influenced by the temperature of the medium. Secondly, this model adapts to an idealized situation of cross-contamination animal source food processing, with the study agents being both the animal product and the contact surface. Thirdly, the stochastic simulations and the parametric sensibility analysis are compared with referential data. The main results obtained from the analysis and simulations of the mathematical model were to discover that, although bacterial growth can be stopped in lower temperatures, even lower ones are needed to eradicate it. However, this can be not only expensive, but counterproductive as well in terms of the quality of the raw materials and, on the other hand, higher temperatures accelerate bacterial growth. In other aspects, the use and efficiency of bacteriocins are an effective alternative in the short and medium terms. Moreover, an indicator of bacterial growth is a low-level pH, since lots of deteriorating bacteria are lactic acids. Lastly, the processing times are a secondary agent of concern when the rest of the aforementioned agents are under control. Our main conclusion is that when acclimating a mathematical model within the context of the industrial process, it can generate new tools that predict bacterial contamination, the impact of bacterial inhibition, and processing method times. In addition, the mathematical modeling proposed logistic input of broad application, which can be replicated on non-meat food products, other pathogens or even on contamination by crossed contact of allergen foods.

Keywords: bacteriocins, cross-contamination, mathematical model, temperature

Procedia PDF Downloads 121
2028 Free Residual Chlorine and Bacteriological Contamination in Addis Ababa Water Supply System, Ethiopia

Authors: Aklilu Zeleke

Abstract:

A cross-sectional study was conducted in order to understand the effect of wet and dry seasons on the free residual chlorine and bacteriological contamination of the Addis Ababa (Ethiopia) water supply system. Water samples were taken at 30 selected distribution points and analyzed for Free Residual Chlorine and bacteriological analysis total coliforms and fecal coliform). It was found that some of the bacteriological data and Free Residual Chlorine levels are below the recommended values and beyond the maximum tolerable limits recommended by World Health Organization and Ethiopian National Standards. Water quality during the dry season is better than that of the wet season. There is a strong relationship between Free Residual Chlorine levels in drinking water and its bacteriological quality.

Keywords: addis ababa, wet season, dry season, free residual chlorine

Procedia PDF Downloads 51
2027 Pilot Directional Protection Scheme Using Wireless Communication

Authors: Nitish Sharma, G. G. Karady

Abstract:

This paper presents a scheme for the protection of loop system from all type of faults using the direction of fault current. The presence of distributed generation in today’s system increases the complexity of fault detection as the power flow is bidirectional. Hence, protection scheme specific to this purpose needs to be developed. This paper shows a fast protection scheme using communication which can be fiber optic or wireless. In this paper, the possibility of wireless communication for protection is studied to exchange the information between the relays. The negative sequence and positive sequence directional elements are used to determine the direction of fault current. A PSCAD simulation is presented and validated using commercial SEL relays.

Keywords: smart grid protection, pilot protection, power system simulation, wireless communication

Procedia PDF Downloads 617
2026 Addressing Microbial Contamination in East Hararghe, Oromia, Ethiopia: Improving Water Sanitation Infrastructure and Promoting Safe Water Practices for Enhanced Food Safety

Authors: Tuji Jemal Ahmed, Hussen Beker Yusuf

Abstract:

Food safety is a major concern worldwide, with microbial contamination being one of the leading causes of foodborne illnesses. In Ethiopia, drinking water and untreated groundwater are a primary source of microbial contamination, leading to significant health risks. East Hararghe, Oromia, is one of the regions in Ethiopia that has been affected by this problem. This paper provides an overview of the impact of untreated groundwater on human health in Haramaya Rural District, East Hararghe and highlights the urgent need for sustained efforts to address the water sanitation supply problem. The use of untreated groundwater for drinking and household purposes in Haramaya Rural District, East Hararghe is prevalent, leading to high rates of waterborne illnesses such as diarrhea, typhoid fever, and cholera. The impact of these illnesses on human health is significant, resulting in significant morbidity and mortality, especially among vulnerable populations such as children and the elderly. In addition to the direct health impacts, waterborne illnesses also have indirect impacts on human health, such as reduced productivity and increased healthcare costs. Groundwater sources are susceptible to microbial contamination due to the infiltration of surface water, human and animal waste, and agricultural runoff. In Haramaya Rural District, East Hararghe, poor water management practices, inadequate sanitation facilities, and limited access to clean water sources contribute to the prevalence of untreated groundwater as a primary source of drinking water. These underlying causes of microbial contamination highlight the need for improved water sanitation infrastructure, including better access to safe drinking water sources and the implementation of effective treatment methods. The paper emphasizes the need for regular water quality monitoring, especially for untreated groundwater sources, to ensure safe drinking water for the population. The implementation of effective preventive measures, such as the use of effective disinfectants, proper waste disposal methods, and regular water quality monitoring, is crucial to reducing the risk of contamination and improving public health outcomes in the region. Community education and awareness-raising campaigns can also play a critical role in promoting safe water practices and reducing the risk of contamination. These campaigns can include educating the population on the importance of boiling water before drinking, the use of water filters, and proper sanitation practices. In conclusion, the use of untreated groundwater as a primary source of drinking water in East Hararghe, Oromia, Ethiopia, has significant impacts on human health, leading to widespread waterborne illnesses and posing a significant threat to public health. Sustained efforts are urgently needed to address the root causes of contamination, such as poor sanitation and hygiene practices, improper waste management, and the water sanitation supply problem, including the implementation of effective preventive measures and community-based education programs, ultimately improving public health outcomes in the region. A comprehensive approach that involves community-based water management systems, point-of-use water treatment methods, and awareness-raising campaigns can contribute to reducing the incidence of microbial contamination in the region.

Keywords: food safety, health risks, microbial contamination, untreated groundwater

Procedia PDF Downloads 80
2025 Investigation of the Effect of Pressure Changes on the Gas Proportional Detector

Authors: S. M. Golgoun, S. M. Taheri

Abstract:

Investigation of radioactive contamination of personnel working in radiation centers to identify radioactive materials and then measure the potential contamination and eliminate it has always been considered. For this purpose, various ways have been proposed so far and different devices have been designed and built. Gas sealed proportional counter has special working conditions. In this research, a gas sealed detector of proportional counter type was made and then its various parameters were investigated. Some parameters are influential on their working conditions and one of these most important parameters is the internal pressure of the proportional gas-filled detector. In this experimental research, we produced software for examination and altering high voltage, registering data, and calculating efficiency. By this, we investigated different gas pressure effects on detector efficiency and proposed optimizing working conditions of this detector. After reviewing the results, we suggested a range between 20-30 mbar pressure for this gas sealed detector.

Keywords: gas sealed, proportional detector, pressure, counter

Procedia PDF Downloads 98
2024 Secure Optimized Ingress Filtering in Future Internet Communication

Authors: Bander Alzahrani, Mohammed Alreshoodi

Abstract:

Information-centric networking (ICN) using architectures such as the Publish-Subscribe Internet Technology (PURSUIT) has been proposed as a new networking model that aims at replacing the current used end-centric networking model of the Internet. This emerged model focuses on what is being exchanged rather than which network entities are exchanging information, which gives the control plane functions such as routing and host location the ability to be specified according to the content items. The forwarding plane of the PURSUIT ICN architecture uses a simple and light mechanism based on Bloom filter technologies to forward the packets. Although this forwarding scheme solve many problems of the today’s Internet such as the growth of the routing table and the scalability issues, it is vulnerable to brute force attacks which are starting point to distributed- denial-of-service (DDoS) attacks. In this work, we design and analyze a novel source-routing and information delivery technique that keeps the simplicity of using Bloom filter-based forwarding while being able to deter different attacks such as denial of service attacks at the ingress of the network. To achieve this, special forwarding nodes called Edge-FW are directly attached to end user nodes and used to perform a security test for malicious injected random packets at the ingress of the path to prevent any possible attack brute force attacks at early stage. In this technique, a core entity of the PURSUIT ICN architecture called topology manager, that is responsible for finding shortest path and creating a forwarding identifiers (FId), uses a cryptographically secure hash function to create a 64-bit hash, h, over the formed FId for authentication purpose to be included in the packet. Our proposal restricts the attacker from injecting packets carrying random FIds with a high amount of filling factor ρ, by optimizing and reducing the maximum allowed filling factor ρm in the network. We optimize the FId to the minimum possible filling factor where ρ ≤ ρm, while it supports longer delivery trees, so the network scalability is not affected by the chosen ρm. With this scheme, the filling factor of any legitimate FId never exceeds the ρm while the filling factor of illegitimate FIds cannot exceed the chosen small value of ρm. Therefore, injecting a packet containing an FId with a large value of filling factor, to achieve higher attack probability, is not possible anymore. The preliminary analysis of this proposal indicates that with the designed scheme, the forwarding function can detect and prevent malicious activities such DDoS attacks at early stage and with very high probability.

Keywords: forwarding identifier, filling factor, information centric network, topology manager

Procedia PDF Downloads 133
2023 Potential of Ozonation and Phytoremediation to Reduce Hydrocarbon Levels Remaining after the Pilot Scale Microbial Based Bioremediation (Land-Farming) of a Heavily Polluted Soil

Authors: Hakima Althalb

Abstract:

Petroleum contamination of sandy soils is a severe environmental problem in Libya, but relatively little work has been carried out to optimize the bioremediation of such heavily contaminated soil, particularly at a pilot scale. The purpose of this research was to determine the potential for the microbial-based bioremediation of hydrocarbon-contaminated soil obtained from an oil refinery in Libya and to assess the potential of both ozonation and phytoremediation (both applied after initial bioremediation) to reduce residual hydrocarbon levels. Plots containing 500 kg soil (triplicates) (contaminated soil diluted with clean soil 50% volume) were set up, (designated as Land Treatment Units; LTUs) containing five different nutrient levels and mixtures (Urea + NPK (nitrogen; phosphor; potassium) mixtures) to obtain C:N:P ratios 100:10:1, and monitored for 90 days. Hydrocarbon levels, microbial numbers, and toxicity (EC50 using luminescent microbial based tests) were assessed. Hydrocarbon levels in non-diluted and diluted soil ranged from 20 733-22 366 mg/kg and from 16 000-17 000 mg/kg respectively. Although all the land treatment units revealed a significant hydrocarbon reduction over time, the highest reduction in hydrocarbon levels obtained was around 60%. For example, 63% hydrocarbon removal was observed using a mixture of urea and NPK with a C:N:P ratio of 100:10:1). Soil toxicity (as assessed using luminescence based toxicity assays) reduced in line with the reduction in total petroleum hydrocarbons observed. However, as relatively high residual TPH (total petroleum hydrocarbon) levels (ranging from 6033-14166mg/kg) were still present after initial bioremediation two ‘post-treatments’ (phytoremediation and ozonation) were attempted to remove residual hydrocarbons remaining. Five locally grown (agriculturally important) plant species were tested. The germination of all plants examined was strongly inhibited (80-100%) and seedlings failed to grow well in the contaminated soil, indicating that the previously bioremediated soils were still toxic to the plants. Subsequent ozonation followed by another bioremediation of soil was more successful than phytoremediation. But even the most promising successful treatment in this study (ozonation for 6 hours at 25ppm followed by bioremediation) still only removed approximately 31% of the residual hydrocarbons. Overall, this work showed that the bioremediation of such highly contaminated soils is difficult and that a combination of treatments would be required to achieve successful remediation. Even after initial dilution and bioremediation the soils remained toxic to plant growth and were therefore not suitable for phytoremediation.

Keywords: bioremediation, petroleum hydrocarbons, ozone, phytoremediation

Procedia PDF Downloads 153
2022 Screening Ecological Risk Assessment at an Old Abandoned Mine in Northern Taiwan

Authors: Hui-Chen Tsai, Chien-Jen Ho, Bo-Wei Power Liang, Ying Shen, Yi-Hsin Lai

Abstract:

Former Taiwan Metal Mining Corporation and its associated 3 wasted flue gas tunnels, hereinafter referred to as 'TMMC', was contaminated with heavy metals, Polychlorinated biphenyls (PCBs) and Total Petroleum Hydrocarbons (TPHs) in soil. Since the contamination had been exposed and unmanaged in the environment for more than 40 years, the extent of the contamination area is estimated to be more than 25 acres. Additionally, TMMC is located in a remote, mountainous area where almost no residents are residing in the 1-km radius area. Thus, it was deemed necessary to conduct an ecological risk assessment in order to evaluate the details of future contaminated site management plan. According to the winter and summer, ecological investigation results, one type of endangered, multiple vulnerable and near threaten plant was discovered, as well as numerous other protected species, such as Crested Serpent Eagle, Crested Goshawk, Black Kite, Brown Shrike, Taiwan Blue Magpie were observed. Ecological soil screening level (Eco-SSLs) developed by USEPA was adopted as a reference to conduct screening assessment. Since all the protected species observed surrounding TMMC site were birds, screening ecological risk assessment was conducted on birds only. The assessment was assessed mainly based on the chemical evaluation, which the contamination in different environmental media was compared directly with the ecological impact levels (EIL) of each evaluation endpoints and the respective hazard quotient (HQ) and hazard index (HI) could be obtained. The preliminary ecological risk assessment results indicated HI is greater than 1. In other words, the biological stressors (birds) were exposed to the contamination, which was already exceeded the dosage that could cause unacceptable impacts to the ecological system. This result was mainly due to the high concentration of arsenic, metal and lead; thus it was suggested the above mention contaminants should be remediated as soon as possible or proper risk management measures should be taken.

Keywords: screening, ecological risk assessment, ecological impact levels, risk management

Procedia PDF Downloads 111
2021 DWT-SATS Based Detection of Image Region Cloning

Authors: Michael Zimba

Abstract:

A duplicated image region may be subjected to a number of attacks such as noise addition, compression, reflection, rotation, and scaling with the intention of either merely mating it to its targeted neighborhood or preventing its detection. In this paper, we present an effective and robust method of detecting duplicated regions inclusive of those affected by the various attacks. In order to reduce the dimension of the image, the proposed algorithm firstly performs discrete wavelet transform, DWT, of a suspicious image. However, unlike most existing copy move image forgery (CMIF) detection algorithms operating in the DWT domain which extract only the low frequency sub-band of the DWT of the suspicious image thereby leaving valuable information in the other three sub-bands, the proposed algorithm simultaneously extracts features from all the four sub-bands. The extracted features are not only more accurate representation of image regions but also robust to additive noise, JPEG compression, and affine transformation. Furthermore, principal component analysis-eigenvalue decomposition, PCA-EVD, is applied to reduce the dimension of the features. The extracted features are then sorted using the more computationally efficient Radix Sort algorithm. Finally, same affine transformation selection, SATS, a duplication verification method, is applied to detect duplicated regions. The proposed algorithm is not only fast but also more robust to attacks compared to the related CMIF detection algorithms. The experimental results show high detection rates.

Keywords: affine transformation, discrete wavelet transform, radix sort, SATS

Procedia PDF Downloads 205