Search results for: salt and peppers attacks
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 1281

Search results for: salt and peppers attacks

1041 Enhancement of the Corrosion Resistance of Fastening System of Ballasted ‎Railway in Sandy Desert by Using Nano-Coating

Authors: Milad Alizadeh Galdiani, Navid Sabet, Mohamad Ali Mohit, Fatemeh Palizdar

Abstract:

Railway as one of the most important transportation modes, passes through ‎various areas with different conditions ‎inevitably, and in many countries such as ‎China, United States, Australia, and Iran, it passes through sandy ‎desert areas. One ‎of the main problems in these areas is the movement of sand, causing various ‎damages ‎to ballasted railway track such as corrosion in the railway fastening system. ‎The soil composition of some desert areas like Fahraj in Iran consists of sand ‎and ‎salt. Due to the movement of sand and corrosive ions of salt, the fastening system ‎of the railway is ‎corroded, which, in turn, reduces the thickness of the components ‎and their life span.‎ In this research, the Nano-coating for fastening system of ‎the railway is ‎introduced, and its performance has been investigated in both ‎laboratory and field tests. The Nano-coating of ‎the fastening system consists of zinc-rich, epoxy, polyurethane, and additive, which is produced through ‎Nano ‎technology. This layer covers the surface of the fastening system and ‎prohibits the chemical reactions, which result in ‎corrosion. The results of ‎Electrochemical Impedance Spectroscopy (EIS) ‎indicate that corrosion resistance ‎increases 315 times by using nano-coating, salt spray test results demonstrate that ‎nano-coated components remained intact after 1000 hours.‎

Keywords: ballasted railway, Nano-coating, railway fastening system, sandy desert

Procedia PDF Downloads 111
1040 The Effects of Leadership on the Claim of Responsibility

Authors: Katalin Kovacs

Abstract:

In most forms of violence the perpetrators intend to hide their identities. Terrorism is different. Terrorist groups often take responsibility for their attacks, and consequently they reveal their identities. This unique characteristic of terrorism has been largely overlooked, and scholars are still puzzled as to why terrorist groups claim responsibility for their attacks. Certainly, the claim of responsibility is worth analysing. It would help to have a clearer picture of what terrorist groups try to achieve and how, but also to develop an understanding of the strategic planning of terrorist attacks and the message the terrorists intend to deliver. The research aims to answer the question why terrorist groups choose to claim responsibility for some of their attacks and not for others. In order to do so the claim of responsibility is considered to be a tactical choice, based on the assumption that terrorists weigh the costs and benefits of claiming responsibility. The main argument is that terrorist groups do not claim responsibility in cases when there is no tactical advantage gained from claiming responsibility. The idea that the claim of responsibility has tactical value offers the opportunity to test these assertions using a large scale empirical analysis. The claim of responsibility as a tactical choice depends on other tactical choices, such as the choice of target, the internationality of the attack, the number of victims and whether the group occupies territory or operates as an underground group. The structure of the terrorist groups and the level of decision making also affects the claim of responsibility. Terrorists on the lower level are less disciplined than the leaders. This means that the terrorists on lower levels pay less attention to the strategic objectives and engage easier in indiscriminate violence, and consequently they would less like to claim responsibility. Therefore, the research argues that terrorists, who are on a highest level of decision making would claim responsibility for the attacks as those are who takes into account the strategic objectives. As most studies on terrorism fail to provide definitions; therefore the researches are fragmented and incomparable. Separate, isolated researches do not support comprehensive thinking. It is also very important to note that there are only a few researches using quantitative methods. The aim of the research is to develop a new and comprehensive overview of the claim of responsibility based on strong quantitative evidence. By using well-established definitions and operationalisation the current research focuses on a broad range of attributes that can have tactical values in order to determine circumstances when terrorists are more likely to claim responsibility.

Keywords: claim of responsibility, leadership, tactical choice, terrorist group

Procedia PDF Downloads 303
1039 Evaluation of Existing Wheat Genotypes of Bangladesh in Response to Salinity

Authors: Jahangir Alam, Ayman El Sabagh, Kamrul Hasan, Shafiqul Islam Sikdar, Celaleddin Barutçular, Sohidul Islam

Abstract:

The experiment (Germination test and seedling growth) was carried out at the laboratory of Agronomy Department, Hajee Mohammad Danesh Science and Technology University (HSTU), Dinajpur, Bangladesh during January 2014. Germination and seedling growth of 22 existing wheat genotypes in Bangladesh viz. Kheri, Kalyansona, Sonora, Sonalika, Pavon, Kanchan, Akbar, Barkat, Aghrani, Prativa, Sourab, Gourab, Shatabdi, Sufi, Bijoy, Prodip, BARI Gom 25, BARI Gom 26, BARI Gom 27, BARI Gom 28, Durum and Triticale were tested with three salinity levels (0, 100 and 200 mM NaCl) for 10 days in sand culture in small plastic pot. Speed of germination as expressed by germination percentage (GP), rate of germination (GR), germination coefficient (GC) and germination vigor index (GVI) of all wheat genotypes was delayed and germination percentage was reduced due to salinization compared to control. The lower reduction of GP, GR, GC and VI due to salinity was observed in BARI Gom 25, BARI Gom 27, Shatabdi, Sonora, and Akbbar and higher reduction was recorded in BARI Gom 26, Duram, Triticale, Sufi and Kheri. Shoot and root lengths, fresh and dry weights were found to be affected due to salinization and shoot was more affected than root. Under saline conditions, longer shoot and root length were recorded in BARI Gom 25, BARI Gom 27, Akbar, and Shatabdi, i.e. less reduction of shoot and root lengths was observed while, BARI Gom 26, Duram, Prodip and Triticale produced shorted shoot and root lengths. In this study, genotypes BARI Gom 25, BARI Gom 27, Shatabdi, Sonora and Aghrani showed better performance in terms shoot and root growth (fresh and dry weights) and proved to be tolerant genotypes to salinity. On the other hand, Duram, BARI Gom 26, Triticale, Kheri and Prodip affected seriously in terms of fresh and dry weights by the saline environment. BARI Gom 25, BARI Gom 27, Shatabdi, Sonora and Aghrani showed more salt tolerance index (STI) based on shoot dry weight while, BARI Gom 26, Triticale, Durum, Sufi, Prodip and Kalyanson demonstrate lower STI value under saline conditions. Based on the most salt tolerance and susceptible trait, genotypes under 100 and 200 mM NaCl stresses can be arranged as salt tolerance genotypes: BARI Gom 25> BARI Gom 27> Shatabdi> Sonora, and salt susceptible genotypes: BARI Gom 26> Durum> Triticale> Prodip> Sufi> Kheri. Considering the experiment, it can be concluded that the BARI Gom 25 may be treated as the most salt tolerant and BARI Gom 26 as the most salt sensitive genotypes in Bangladesh.

Keywords: genotypes, germination, salinity, wheat

Procedia PDF Downloads 285
1038 Identifying Common Behavioural Traits of Lone-Wolves in Recent Terrorist Attacks in Europe

Authors: Khaled M. Khan, Armstrong Nhlabatsi

Abstract:

This article attempts to analyse behavioural traits of lone-wolves who struck and killed innocents in six different attacks in Europe in last nine months. The main objective of this study is to develop a profiling template in order to capture commonality of characteristics of these attackers. This study tries to understand the homogeneity of lone-wolves in terms of their social background and state of mind. The commonality among them can possibly be used to build a profiling template that could help detecting vulnerable persons who are prone to be self-radicalised or radicalised by someone else. The result of this study provides us an understanding of their commonality in terms of their state of mind and social characteristics.

Keywords: behavioral pattern, terrorism, profiling, commonality

Procedia PDF Downloads 392
1037 Image Denoising Using Spatial Adaptive Mask Filter for Medical Images

Authors: R. Sumalatha, M. V. Subramanyam

Abstract:

In medical image processing the quality of the image is degraded in the presence of noise. Especially in ultra sound imaging and Magnetic resonance imaging the data was corrupted by signal dependent noise known as salt and pepper noise. Removal of noise from the medical images is a critical issue for researchers. In this paper, a new type of technique Adaptive Spatial Mask Filter (ASMF) has been proposed. The proposed filter is used to increase the quality of MRI and ultra sound images. Experimental results show that the proposed filter outperforms the implementation of mean, median, adaptive median filters in terms of MSE and PSNR.

Keywords: salt and pepper noise, ASMF, PSNR, MSE

Procedia PDF Downloads 423
1036 Detect QOS Attacks Using Machine Learning Algorithm

Authors: Christodoulou Christos, Politis Anastasios

Abstract:

A large majority of users favoured to wireless LAN connection since it was so simple to use. A wireless network can be the target of numerous attacks. Class hijacking is a well-known attack that is fairly simple to execute and has significant repercussions on users. The statistical flow analysis based on machine learning (ML) techniques is a promising categorization methodology. In a given dataset, which in the context of this paper is a collection of components representing frames belonging to various flows, machine learning (ML) can offer a technique for identifying and characterizing structural patterns. It is possible to classify individual packets using these patterns. It is possible to identify fraudulent conduct, such as class hijacking, and take necessary action as a result. In this study, we explore a way to use machine learning approaches to thwart this attack.

Keywords: wireless lan, quality of service, machine learning, class hijacking, EDCA remapping

Procedia PDF Downloads 44
1035 Software-Defined Networking: A New Approach to Fifth Generation Networks: Security Issues and Challenges Ahead

Authors: Behrooz Daneshmand

Abstract:

Software Defined Networking (SDN) is designed to meet the future needs of 5G mobile networks. The SDN architecture offers a new solution that involves separating the control plane from the data plane, which is usually paired together. Network functions traditionally performed on specific hardware can now be abstracted and virtualized on any device, and a centralized software-based administration approach is based on a central controller, facilitating the development of modern applications and services. These plan standards clear the way for a more adaptable, speedier, and more energetic network beneath computer program control compared with a conventional network. We accept SDN gives modern inquire about openings to security, and it can significantly affect network security research in numerous diverse ways. Subsequently, the SDN architecture engages systems to effectively screen activity and analyze threats to facilitate security approach modification and security benefit insertion. The segregation of the data planes and control and, be that as it may, opens security challenges, such as man-in-the-middle attacks (MIMA), denial of service (DoS) attacks, and immersion attacks. In this paper, we analyze security threats to each layer of SDN - application layer - southbound interfaces/northbound interfaces - controller layer and data layer. From a security point of see, the components that make up the SDN architecture have a few vulnerabilities, which may be abused by aggressors to perform noxious activities and hence influence the network and its administrations. Software-defined network assaults are shockingly a reality these days. In a nutshell, this paper highlights architectural weaknesses and develops attack vectors at each layer, which leads to conclusions about further progress in identifying the consequences of attacks and proposing mitigation strategies.

Keywords: software-defined networking, security, SDN, 5G/IMT-2020

Procedia PDF Downloads 85
1034 Pathogenic Bacteria Isolated from Diseased Giant Freshwater Prawn in Shrimp Culture Ponds

Authors: Kusumawadee Thancharoen, Rungrat Nontawong, Thanawat Junsom

Abstract:

Pathogenic bacterial flora was isolated from giant freshwater prawns, Macrobrachium rosenbergii. Infected shrimp samples were collected from BuaBan Aquafarm in Kalasin Province, Thailand, between June and September 2018. Bacterial species were isolated by serial dilution and plated on Thiosulfate Citrate Bile Salt Sucrose (TCBS) agar medium. A total 89 colonies were isolated and identified using the API 20E biochemical tests. Results showed the presence of genera Aeromonas, Citrobacter, Chromobacterium, Providencia, Pseudomonas, Stenotrophomonas and Vibrio. Maximum number of species was recorded in Pseudomonas (50.57%) with minimum observed in Chromobacterium and Providencia (1.12%).

Keywords: biochemical test, giant freshwater prawn, isolation, salt tolerance, shrimp diseases

Procedia PDF Downloads 229
1033 Salinity Stress: Effects on Growth Biochemical Parameters and Ion Homeostasis in Spinach (Spinacia Oleracea L.)

Authors: Umar Jaafar, Mungadi

Abstract:

Plant growth, biochemical parameters, cytotoxic ion sequestration and ionic in balance were determined for spinach in response to varied concentrations of NaCl. The plant show decline in all vegetative parameters measured. Free proline content increase with increasing salt concentration and differ significantly (p<0.05) while the glycine betaine insignificantly (p>0.05) affected by concentration of NaCl. Salinity increases the cytotoxic ions, sodium chlorine ion and calcium with corresponding decrease in potassium ion concentrations. The ionic balance (Na+/K+) is low due to high content of potassium ion in plant accumulation ranging from 7700 to 6500 mg/kg. It can be concluded that the osmolyte accumulations, high number of leaves are possible indicators of salt tolerance in the spinach.

Keywords: spinach, salinity, osmolyte, cytotoxic

Procedia PDF Downloads 347
1032 Artificial Intelligence in Penetration Testing of a Connected and Autonomous Vehicle Network

Authors: Phillip Garrad, Saritha Unnikrishnan

Abstract:

The recent popularity of connected and autonomous vehicles (CAV) corresponds with an increase in the risk of cyber-attacks. These cyber-attacks have been instigated by both researchers or white-coat hackers and cyber-criminals. As Connected Vehicles move towards full autonomy, the impact of these cyber-attacks also grows. The current research details challenges faced in cybersecurity testing of CAV, including access and cost of the representative test setup. Other challenges faced are lack of experts in the field. Possible solutions to how these challenges can be overcome are reviewed and discussed. From these findings, a software simulated CAV network is established as a cost-effective representative testbed. Penetration tests are then performed on this simulation, demonstrating a cyber-attack in CAV. Studies have shown Artificial Intelligence (AI) to improve runtime, increase efficiency and comprehensively cover all the typical test aspects in penetration testing in other industries. There is an attempt to introduce similar AI models to the software simulation. The expectation from this implementation is to see similar improvements in runtime and efficiency for the CAV model. If proven to be an effective means of penetration test for CAV, this methodology may be used on a full CAV test network.

Keywords: cybersecurity, connected vehicles, software simulation, artificial intelligence, penetration testing

Procedia PDF Downloads 93
1031 Adsorption of Congo Red on MgO Nanoparticles Prepared by Molten Salt Method

Authors: Shahbaa F. Bdewi, Bakhtyar K. Aziz, Ayad A. R. Mutar

Abstract:

Nano-materials show different surface properties due to their high surface area and active sites. This study investigates the feasibility of using nano-MgO (NMO) for removing Congo red (CR) dye from wastewater. NMO was prepared by molten salt method. Equilibrium experiments show the equilibrium was reached after 120 minutes and maximum adsorption efficiency was obtained in acidic media up to pH 6. Isotherm studies revealed the favorability of the adsorption process. The overall adsorption process was spontaneous and endothermic in nature with a maximum adsorption capacity of 1100 mg g-1 at 40°C as estimated from Langmuir isotherm. The adsorption kinetics was found to follow pseudo second-order rate equation. Relatively high activation energy (180.7 kJ mol-1) was obtained which is consistent with chemisorption mechanism for the adsorption process.

Keywords: adsorption, congo red, magnesium oxide, nanoparticles

Procedia PDF Downloads 197
1030 Heat Transfer Performance for Turbulent Flow through a Tube Using Baffles

Authors: Amina Benabderrahmane, Abdelylah Benazza, Samir Laouedj

Abstract:

Three dimensional numerical investigation of heat transfer enhancement inside a non-uniformly heated parabolic trough solar collector fitted with baffles under turbulent flow was studied in the current paper. Molten salt is used as heat transfer fluid and simulations are carried out in ANSYS computational fluid dynamics (CFD). The present data was validating by the empirical correlations available in the literatures and good agreement was obtained. The Nusselt number and friction factor values for using baffles are considerably higher than that for smooth pipe. The emplacement and the distance between two consecutive baffles have an effect non-negligible on heat transfer characteristics; the results demonstrate that the temperature gradient reduces with the inclusion of inserts.

Keywords: Baffles, heat transfer enhancement, molten salt, Monte Carlo ray trace technique, numerical investigation

Procedia PDF Downloads 288
1029 Cyber Operational Design and Military Decision Making Process

Authors: M. Karaman, H. Catalkaya

Abstract:

Due to the complex nature of cyber attacks and their effects ranging from personal to governmental level, it becomes one of the priority tasks for operation planners to take into account the risks, influences and effects of cyber attacks. However it can also be embedded or integrated technically with electronic warfare planning, cyber operation planning is needed to have a sole and broadened perspective. This perspective embodies itself firstly in operational design and then military decision making process. In order to find out the ill-structured problems, understand or visualize the operational environment and frame the problem, operational design can help support cyber operation planners and commanders. After having a broadened and conceptual startup with cyber operational design, military decision making process will follow the principles of design into more concrete elements like reaching results after risk management and center of gravity analysis of our and the enemy. In this paper we tried to emphasize the importance of cyber operational design, cyber operation planning and its integration to military decision making problem. In this foggy, uncertain and unaccountable cyber security environment, it is inevitable to stay away from cyber attacks. Therefore, a cyber operational design should be formed with line of operations, decisive points and end states in cyber then a tactical military decision making process should be followed with cyber security focus in order to support the whole operation.

Keywords: cyber operational design, military decision making process (MDMP), operation planning, end state

Procedia PDF Downloads 573
1028 A Simple Heat and Mass Transfer Model for Salt Gradient Solar Ponds

Authors: Safwan Kanan, Jonathan Dewsbury, Gregory Lane-Serff

Abstract:

A salinity gradient solar pond is a free energy source system for collecting, converting and storing solar energy as heat. In this paper, the principles of solar pond are explained. A mathematical model is developed to describe and simulate heat and mass transfer behavior of salinity gradient solar pond. Matlab codes are programmed to solve the one dimensional finite difference method for heat and mass transfer equations. Temperature profiles and concentration distributions are calculated. The numerical results are validated with experimental data and the results are found to be in good agreement.

Keywords: finite difference method, salt-gradient solar-pond, solar energy, transient heat and mass transfer

Procedia PDF Downloads 359
1027 Polyacrylate Modified Copper Nanoparticles with Controlled Size

Authors: Robert Prucek, Aleš Panáček, Jan Filip, Libor Kvítek, Radek Zbořil

Abstract:

The preparation of Cu nanoparticles (NPs) through the reduction of copper ions by sodium borohydride in the presence of sodium polyacrylate with a molecular weight of 1200 is reported. Cu NPs were synthesized at a concentration of copper salt equal to 2.5, 5, and 10 mM, and at a molar ratio of copper ions and monomeric unit of polyacrylate equal to 1:2. The as-prepared Cu NPs have diameters of about 2.5–3 nm for copper concentrations of 2.5 and 5 mM, and 6 nm for copper concentration of 10 mM. Depending on the copper salt concentration and concentration of additionally added polyacrylate to Cu particle dispersion, primarily formed NPs grow through the process of aggregation and/or coalescence into clusters and/or particles with a diameter between 20–100 nm. The amount of additionally added sodium polyacrylate influences the stability of Cu particles against air oxidation. The catalytic efficiency of the prepared Cu particles for the reduction of 4-nitrophenol is discussed.

Keywords: copper, nanoparticles, sodium polyacrylate, catalyst, 4-nitrophenol

Procedia PDF Downloads 268
1026 On the Use of Machine Learning for Tamper Detection

Authors: Basel Halak, Christian Hall, Syed Abdul Father, Nelson Chow Wai Kit, Ruwaydah Widaad Raymode

Abstract:

The attack surface on computing devices is becoming very sophisticated, driven by the sheer increase of interconnected devices, reaching 50B in 2025, which makes it easier for adversaries to have direct access and perform well-known physical attacks. The impact of increased security vulnerability of electronic systems is exacerbated for devices that are part of the critical infrastructure or those used in military applications, where the likelihood of being targeted is very high. This continuously evolving landscape of security threats calls for a new generation of defense methods that are equally effective and adaptive. This paper proposes an intelligent defense mechanism to protect from physical tampering, it consists of a tamper detection system enhanced with machine learning capabilities, which allows it to recognize normal operating conditions, classify known physical attacks and identify new types of malicious behaviors. A prototype of the proposed system has been implemented, and its functionality has been successfully verified for two types of normal operating conditions and further four forms of physical attacks. In addition, a systematic threat modeling analysis and security validation was carried out, which indicated the proposed solution provides better protection against including information leakage, loss of data, and disruption of operation.

Keywords: anti-tamper, hardware, machine learning, physical security, embedded devices, ioT

Procedia PDF Downloads 141
1025 A Review of Ultralightweight Mutual Authentication Protocols

Authors: Umar Mujahid, Greatzel Unabia, Hongsik Choi, Binh Tran

Abstract:

Radio Frequency Identification (RFID) is one of the most commonly used technologies in IoTs and Wireless Sensor Networks which makes the devices identification and tracking extremely easy to manage. Since RFID uses wireless channel for communication, which is open for all types of adversaries, researchers have proposed many Ultralightweight Mutual Authentication Protocols (UMAPs) to ensure security and privacy in a cost-effective manner. These UMAPs involve simple bitwise logical operators such as XOR, AND, OR & Rot, etc., to design the protocol messages. However, most of these UMAPs were later reported to be vulnerable against many malicious attacks. In this paper, we have presented a detailed overview of some eminent UMAPs and also discussed the many security attacks on them. Finally, some recommendations and suggestions have been discussed, which can improve the design of the UMAPs.

Keywords: RFID, Ultralightweight, UMAP, SASI

Procedia PDF Downloads 139
1024 Saudi Human Awareness Needs: A Survey in How Human Causes Errors and Mistakes Leads to Leak Confidential Data with Proposed Solutions in Saudi Arabia

Authors: Amal Hussain Alkhaiwani, Ghadah Abdullah Almalki

Abstract:

Recently human errors have increasingly become a very high factor in security breaches that may affect confidential data, and most of the cyber data breaches are caused by human errors. With one individual mistake, the attacker will gain access to the entire network and bypass the implemented access controls without any immediate detection. Unaware employees will be vulnerable to any social engineering cyber-attacks. Providing security awareness to People is part of the company protection process; the cyber risks cannot be reduced by just implementing technology; the human awareness of security will significantly reduce the risks, which encourage changes in staff cyber-awareness. In this paper, we will focus on Human Awareness, human needs to continue the required security education level; we will review human errors and introduce a proposed solution to avoid the breach from occurring again. Recently Saudi Arabia faced many attacks with different methods of social engineering. As Saudi Arabia has become a target to many countries and individuals, we needed to initiate a defense mechanism that begins with awareness to keep our privacy and protect the confidential data against possible intended attacks.

Keywords: cybersecurity, human aspects, human errors, human mistakes, security awareness, Saudi Arabia, security program, security education, social engineering

Procedia PDF Downloads 143
1023 Reliable and Energy-Aware Data Forwarding under Sink-Hole Attack in Wireless Sensor Networks

Authors: Ebrahim Alrashed

Abstract:

Wireless sensor networks are vulnerable to attacks from adversaries attempting to disrupt their operations. Sink-hole attacks are a type of attack where an adversary node drops data forwarded through it and hence affecting the reliability and accuracy of the network. Since sensor nodes have limited battery power, it is essential that any solution to the sinkhole attack problem be very energy-aware. In this paper, we present a reliable and energy efficient scheme to forward data from source nodes to the base station while under sink-hole attack. The scheme also detects sink-hole attack nodes and avoid paths that includes them.

Keywords: energy-aware routing, reliability, sink-hole attack, WSN

Procedia PDF Downloads 385
1022 RNA-Seq Analysis of the Wild Barley (H. spontaneum) Leaf Transcriptome under Salt Stress

Authors: Ahmed Bahieldin, Ahmed Atef, Jamal S. M. Sabir, Nour O. Gadalla, Sherif Edris, Ahmed M. Alzohairy, Nezar A. Radhwan, Mohammed N. Baeshen, Ahmed M. Ramadan, Hala F. Eissa, Sabah M. Hassan, Nabih A. Baeshen, Osama Abuzinadah, Magdy A. Al-Kordy, Fotouh M. El-Domyati, Robert K. Jansen

Abstract:

Wild salt-tolerant barley (Hordeum spontaneum) is the ancestor of cultivated barley (Hordeum vulgare or H. vulgare). Although the cultivated barley genome is well studied, little is known about genome structure and function of its wild ancestor. In the present study, RNA-Seq analysis was performed on young leaves of wild barley treated with salt (500 mM NaCl) at four different time intervals. Transcriptome sequencing yielded 103 to 115 million reads for all replicates of each treatment, corresponding to over 10 billion nucleotides per sample. Of the total reads, between 74.8 and 80.3% could be mapped and 77.4 to 81.7% of the transcripts were found in the H. vulgare unigene database (unigene-mapped). The unmapped wild barley reads for all treatments and replicates were assembled de novo and the resulting contigs were used as a new reference genome. This resultedin94.3 to 95.3%oftheunmapped reads mapping to the new reference. The number of differentially expressed transcripts was 9277, 3861 of which were uni gene-mapped. The annotated unigene- and de novo-mapped transcripts (5100) were utilized to generate expression clusters across time of salt stress treatment. Two-dimensional hierarchical clustering classified differential expression profiles into nine expression clusters, four of which were selected for further analysis. Differentially expressed transcripts were assigned to the main functional categories. The most important groups were ‘response to external stimulus’ and ‘electron-carrier activity’. Highly expressed transcripts are involved in several biological processes, including electron transport and exchanger mechanisms, flavonoid biosynthesis, reactive oxygen species (ROS) scavenging, ethylene production, signaling network and protein refolding. The comparisons demonstrated that mRNA-Seq is an efficient method for the analysis of differentially expressed genes and biological processes under salt stress.

Keywords: electron transport, flavonoid biosynthesis, reactive oxygen species, rnaseq

Procedia PDF Downloads 376
1021 A Survey in Techniques for Imbalanced Intrusion Detection System Datasets

Authors: Najmeh Abedzadeh, Matthew Jacobs

Abstract:

An intrusion detection system (IDS) is a software application that monitors malicious activities and generates alerts if any are detected. However, most network activities in IDS datasets are normal, and the relatively few numbers of attacks make the available data imbalanced. Consequently, cyber-attacks can hide inside a large number of normal activities, and machine learning algorithms have difficulty learning and classifying the data correctly. In this paper, a comprehensive literature review is conducted on different types of algorithms for both implementing the IDS and methods in correcting the imbalanced IDS dataset. The most famous algorithms are machine learning (ML), deep learning (DL), synthetic minority over-sampling technique (SMOTE), and reinforcement learning (RL). Most of the research use the CSE-CIC-IDS2017, CSE-CIC-IDS2018, and NSL-KDD datasets for evaluating their algorithms.

Keywords: IDS, imbalanced datasets, sampling algorithms, big data

Procedia PDF Downloads 304
1020 Countering Radicalization to Violent Extremism: A Comparative Study of Canada, the UK and South East Asia

Authors: Daniel Alati

Abstract:

Recent high-profile terrorist events in Canada, the United Kingdom and Europe – the London Bridge attacks, the terrorist attacks in Nice, France and Barcelona, Spain, the 2014 Ottawa Parliament attacks and the 2017 attacks in Edmonton – have all raised levels of public and academic concern with so-called “lone-wolf” and “radicalized” terrorism. Similarly, several countries outside of the “Western” world have been dealing with radicalization to violent extremism for several years. Many South East Asian countries, including Indonesia, Malaysia, Singapore and the Philippines have all had experience with what might be described as ISIS or extremist-inspired acts of terrorism. Indeed, it appears the greatest strength of groups such as ISIS has been their ability to spread a global message of violent extremism that has led to radicalization in markedly different jurisdictions throughout the world. These markedly different jurisdictions have responded with counter-radicalization strategies that warrant further comparative analysis. This paper utilizes an inter-disciplinary legal methodology. In doing so, it compares legal, political, cultural and historical aspects of the counter-radicalization strategies employed by Canada, the United Kingdom and several South East Asian countries (Indonesia, Malaysia, Singapore and the Philippines). Whilst acknowledging significant legal and political differences between these jurisdictions, the paper engages in these analyses with an eye towards understanding which best practices might be shared between the jurisdictions. In doing so, it presents valuable findings of a comparative nature that are useful to both academic and practitioner audiences in several jurisdictions.

Keywords: Canada, United Kingdom and South East Asia, comparative law and politics, radicalization to violent extremism, terrorism

Procedia PDF Downloads 330
1019 Cyber Supply Chain Resilient: Enhancing Security through Leadership to Protect National Security

Authors: Katie Wood

Abstract:

Cyber criminals are constantly on the lookout for new opportunities to exploit organisation and cause destruction. This could lead to significant cause of economic loss for organisations in the form of destruction in finances, reputation and even the overall survival of the organization. Additionally, this leads to serious consequences on national security. The threat of possible cyber attacks places further pressure on organisations to ensure they are secure, at a time where international scale cyber attacks have occurred in a range of sectors. Stakeholders are wanting confidence that their data is protected. This is only achievable if a business fosters a resilient supply chain strategy which is implemented throughout its supply chain by having a strong cyber leadership culture. This paper will discuss the essential role and need for organisations to adopt a cyber leadership culture and direction to learn about own internal processes to ensure mitigating systemic vulnerability of its supply chains. This paper outlines that to protect national security there is an urgent need for cyber awareness culture change. This is required in all organisations, regardless of their sector or size, to implementation throughout the whole supplier chain to support and protect economic prosperity to make the UK more resilient to cyber-attacks. Through businesses understanding the supply chain and risk management cycle of their own operates has to be the starting point to ensure effective cyber migration strategies.

Keywords: cyber leadership, cyber migration strategies, resilient supply chain strategy, cybersecurity

Procedia PDF Downloads 229
1018 Corrosion Investigation of Superalloys, Molybdenum and TZM in Chloride Molten Salts

Authors: Craig Jantzen, Tim Abram, Dirk Engelberg, Hugues Lambert, Daniel Cooper

Abstract:

Molten salts are of high interest for use as coolants in nuclear reactors due to favourable high temperature and thermodynamic properties. The corrosive behaviour of molten salts however pose a materials integrity challenge. Three Ni / Ni-Fe based and two Mo based alloys have been exposed to molten eutectics (LiCl-KCl at 59.5:40.5 mol% and KCl-MgCl2 at 68:32 mol%) at 600°C and 800°C for durations up to 500hrs. Corrosion was observed to preferentially attack alloy constituents in order of their reactivity, with chromium the most vulnerable and depleted element. Alloy weight-loss per unit area was calculated to give linear corrosion rates, discounting any initial rapid corrosion of impurities. Further analysis was carried out using ICP-MS, SEM and EDX techniques to give a more detailed view of the corrosion mechanisms.

Keywords: molten salt, salt, corrosion, high temperature, licl, KCL, MgCl, molybdenum, nickel, superalloys

Procedia PDF Downloads 430
1017 Preparation and Characterization of Phosphate-Nickel-Titanium Composite Coating Obtained by Sol Gel Process for Corrosion Protection

Authors: Khalidou Ba, Abdelkrim Chahine, Mohamed Ebn Touhami

Abstract:

A strong industrial interest is focused on the development of coatings for anticorrosion protection. In this context, phosphate composite materials are expanding strongly due to their chemical characteristics and their interesting physicochemical properties. Sol-gel coatings offer high homogeneity and purity that may lead to obtain coating presenting good adhesion to metal surface. The goal behind this work is to develop efficient coatings for corrosion protection of steel to extend its life. In this context, a sol gel process allowing to obtain thin film coatings on carbon steel with high resistance to corrosion has been developed. The optimization of several experimental parameters such as the hydrolysis time, the temperature, the coating technique, the molar ratio between precursors, the number of layers and the drying mode has been realized in order to obtain a coating showing the best anti-corrosion properties. The effect of these parameters on the microstructure and anticorrosion performance of the films sol gel coating has been investigated using different characterization methods (FTIR, XRD, Raman, XPS, SEM, Profilometer, Salt Spray Test, etc.). An optimized coating presenting good adhesion and very stable anticorrosion properties in salt spray test, which consists of a corrosive attack accelerated by an artificial salt spray consisting of a solution of 5% NaCl, pH neutral, under precise conditions of temperature (35 °C) and pressure has been obtained.

Keywords: sol gel, coating, corrosion, XPS

Procedia PDF Downloads 120
1016 Analysing Responses of Intermediate and Expert Karate Athletes towards the Gyaku-Zuki Using Virtual Reality

Authors: Nicole Bandow, Peter Emmermacher, Oliver Wienert, Steffen Masik, Kerstin Witte

Abstract:

Karate-kumite is a fast sport where a good perception and anticipation of movements is needed in order to respond appropriately. Perception and anticipation are therefore essential for an efficient and precise movement control and a limiting factor in karate kumite. Previous studies only used 2D video technologies combined with the occlusion technique to study anticipation in sports. These studies showed limitations in the usage of 2D video footage in regards to realism and the presentation of depth information. To overcome these issues a virtual 3D environment was developed to create a similar to real life environment. The aim of this study was to compare the differences in responses of intermediate and expert karate athletes towards temporally and spatially occluded virtual karate attacks from two attackers. Five male expert and five intermediate karate athletes responded physically to nine (3 temporal combined with 3 spatial) occluded attacks of the Gyaku-Zuki of each attacker in the 3D virtual environment. The responses were evaluated in regards to correct point of time and appropriate response technique. Significant differences between the expertises’ responses for the attackers were found. Experts respond more often correct to early information of attacks than novices.

Keywords: anticipation, karate, occlusion, virtual reality

Procedia PDF Downloads 459
1015 Effect of Different Chemical Concentrations on Control of Dodder (Cuscuta campestris Yunck.) in Vitex (Agnus castus)

Authors: Aliyu B. Mustapha, Poul A. Gida

Abstract:

Pot experiment was conducted at the landscape unit of Modibbo Adama University of Technology, Yola in 2015 and 2016 to determine the effect of some chemicals namely glyphosate, salt and detergent on Golden dodder (Cuscuta campestris Yunk). The experiment was laid in a completely randomized design (CRD) with three replications. The treatments include the following: glyphosate-T0= (control),(Og a.i/ha-1) T1=35g a.i/ha-1, T2=70g a.i/ha-1, T3=105g a.i/ha-1, T4=140 a.i/ha-1 and T5=175g a.i/ha-1: Salt (T0=control O mole/ha-1 T1=1mole/ha-1 T2=2mole/ha-1, T3=3mole/ha-1 , T4=4mole/ha-1 and T5=5mole/ha-1:washing detergent T0=Og/ha-1(control), T1=30ml detergent +70ml distilled water T2=45ml detergent+65ml distilled water T3=60ml detergent+40ml distilled water, T4=75ml detergent+25ml distilled water and T5=90ml detergent +10mldistilled water, the treatments were replicated three times. Data were collected include: plant height, number of leaves, leaf area, leaf area index and Cuscuta cover score at 3,6,9and 12 weeks after sprouting(WAS). Biomas of Vitex was also collected at the end of the experiment. Data collected were analyzed using software Genstat version 8.0. Results showed that glyphosate gave the least Cuscuta cover score and the tallest Vitex plant. However, detergent mildly controlled Cuscuta, while salt has no effect on Cuscuta campestris indicating that glyphosate could be used in the control of parasitic dodder (Cuscuta campestris) on Vitex plant.

Keywords: chemical, control, dudder, Vitex

Procedia PDF Downloads 174
1014 Swelling Behaviour of Kappa Carrageenan Hydrogel in Neutral Salt Solution

Authors: Sperisa Distantina, Fadilah Fadilah, Mujtahid Kaavessina

Abstract:

Hydrogel films were prepared from kappa carrageenan by crosslinking with glutaraldehyde. Carrageenan films extracted from Kappaphycus alvarezii seaweed were immersed in glutaraldehyde solution for 2 min and then cured at 110 °C for 25 min. The obtained crosslinked films were washed with ethanol to remove the unreacted glutaraldehyde and then air dried to constant weights. The aim of this research was to study the swelling degree behaviour of the hydrogel film to neutral salts solution, namely NaCl, KCl, and CaCl2. The results showed that swelling degree of crosslinked films varied non-monotonically with salinity of NaCl. Swelling degree decreased with the increasing of KCl concentration. Swelling degree of crosslinked film in CaCl2 solution was lower than that in NaCl and in KCl solutions.

Keywords: carrageenan, hydrogel, glutaraldehyde, salt, swelling

Procedia PDF Downloads 228
1013 Assessment of Genetic Variability of Potato Genotypes for Proline Under Salt Stress Conditions

Authors: Elchin Hajiyev, Afet Memmedova Dadash, Sabina Hajiyeva, Aynur Karimova, Ramiz Aliyev

Abstract:

Although potatoes have a wide distribution range, the yield potential of varieties varies greatly depending on the region. Our country is made up of agricultural regions with very different environmental characteristics.In this case, we cannot expect the introduced varieties to show the same adaptation to the different conditions of our country. For this reason, in our country, varieties with high general adaptability should be used, rather than varieties with special adaptability in certain areas. Soil salinization has become a global problem.Increased salinity has a serious impact on food security by reducing plant productivity. Plants have protective mechanisms of adaptation to salt stress, such as the synthesis of physiologically active substances, resistance to antioxidant stress and oxidation of membrane lipids. One of these substances is free proline. Our study revealed genetic variation in proline accumulation among samples exposed to stress factors.Changes in proline content under stress conditions were studied in 50 samples. There was wide variation across all treatments.The amount of proline varied between 7.2–37.7 μM/g under salinity conditions.The lowest rate was in the SF33 genotype (1.5 times more than the control (2.5 μM/g)).The highest level of proline under the influence of salt stress was in the SF45 genotype (7.25 times higher than the control (32.5 μM/g)). Our studies have found that the protective system reacts differently to the influence of stress factors. According to the results obtained on the amount of proline, adaptation mechanisms must be more actively activated to maintain metabolism and ensure viability in sensitive forms under the influence of stress factors. At high doses of the salt stressor, a tenfold increase in proline compared to the control indicates significant damage to the plant organism as a result of stress.To prevent damage to the body, the antioxidant system needs to quickly mobilize and work at full capacity in adverse conditions. An increase in the dose of the stress factor salt in our study caused a greater increase in the amount of free proline in plant tissues. Considering the functions of proline as an osmoprotector and antioxidant, it was found that increasing its amount is aimed at protecting the plant from the acute effects of stressors.

Keywords: genetic variability, potato, genotypes, proline, stress

Procedia PDF Downloads 27
1012 Cerium Salt Effect in 70s Bioactive Glass

Authors: Alessandra N. Santos, Max P. Ferreira, Alexandra R. P. Silva, Agda A. R. de Oliveira, Marivalda M. Pereira

Abstract:

The literature describes experiments, in which ceria nanoparticles in the bioactive glass significantly improve differentiation of stem cells into osteoblasts and increase production of collagen. It is not known whether this effect observed due to the presence of nanoceria can be also observed in the presence of cerium in the bioactive glass network. The effect of cerium into bioactive glasses using the sol–gel route is the focus of this work, with the goal to develop a material for tissue engineering with the potential to enhance osteogenesis. A bioactive glass composition based on 70% SiO2–30% CaO is produced with the addition of cerium. The analyses XRD, FTIR, SEM/EDS, BET/BJH, in vitro bioactivity test and the Cell viability assay were performed. The results show that cerium remains in the bioactive glass structure. The obtained material present in vitro bioactivity and promote the cell viability.

Keywords: bioactive glass, bioactivity, cerium salt, material characterization, sol-gel method

Procedia PDF Downloads 221