Search results for: SQL injection attacks
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 1445

Search results for: SQL injection attacks

1295 Numerical Analysis of CO₂ Storage as Clathrates in Depleted Natural Gas Hydrate Formation

Authors: Sheraz Ahmad, Li Yiming, Li XiangFang, Xia Wei, Zeen Chen

Abstract:

Holding CO₂ at massive scale in the enclathrated solid matter called hydrate can be perceived as one of the most reliable methods for CO₂ sequestration to take greenhouse gases emission control measures and global warming preventive actions. In this study, a dynamically coupled mass and heat transfer mathematical model is developed which elaborates the unsteady behavior of CO₂ flowing into a porous medium and converting itself into hydrates. The combined numerical model solution by implicit finite difference method is explained and through coupling the mass, momentum and heat conservation relations, an integrated model can be established to analyze the CO₂ hydrate growth within P-T equilibrium conditions. CO₂ phase transition, effect of hydrate nucleation by exothermic heat release and variations of thermo-physical properties has been studied during hydrate nucleation. The results illustrate that formation pressure distribution becomes stable at the early stage of hydrate nucleation process and always remains stable afterward, but formation temperature is unable to keep stable and varies during CO₂ injection and hydrate nucleation process. Initially, the temperature drops due to cold high-pressure CO₂ injection since when the massive hydrate growth triggers and temperature increases under the influence of exothermic heat evolution. Intermittently, it surpasses the initial formation temperature before CO₂ injection initiates. The hydrate growth rate increases by increasing injection pressure in the long formation and it also expands overall hydrate covered length in the same induction period. The results also show that the injection pressure conditions and hydrate growth rate affect other parameters like CO₂ velocity, CO₂ permeability, CO₂ density, CO₂ and H₂O saturation inside the porous medium. In order to enhance the hydrate growth rate and expand hydrate covered length, the injection temperature is reduced, but it did not give satisfactory outcomes. Hence, CO₂ injection in vacated natural gas hydrate porous sediment may form hydrate under low temperature and high-pressure conditions, but it seems very challenging on a huge scale in lengthy formations.

Keywords: CO₂ hydrates, CO₂ injection, CO₂ Phase transition, CO₂ sequestration

Procedia PDF Downloads 98
1294 Survey on Malware Detection

Authors: Doaa Wael, Naswa Abdelbaky

Abstract:

Malware is malicious software that is built to cause destructive actions and damage information systems and networks. Malware infections increase rapidly, and types of malware have become more sophisticated, which makes the malware detection process more difficult. On the other side, the Internet of Things IoT technology is vulnerable to malware attacks. These IoT devices are always connected to the internet and lack security. This makes them easy for hackers to access. These malware attacks are becoming the go-to attack for hackers. Thus, in order to deal with this challenge, new malware detection techniques are needed. Currently, building a blockchain solution that allows IoT devices to download any file from the internet and to verify/approve whether it is malicious or not is the need of the hour. In recent years, blockchain technology has stood as a solution to everything due to its features like decentralization, persistence, and anonymity. Moreover, using blockchain technology overcomes some difficulties in malware detection and improves the malware detection ratio over-than the techniques that do not utilize blockchain technology. In this paper, we study malware detection models which are based on blockchain technology. Furthermore, we elaborate on the effect of blockchain technology in malware detection, especially in the android environment.

Keywords: malware analysis, blockchain, malware attacks, malware detection approaches

Procedia PDF Downloads 43
1293 Comprehensive Review of Adversarial Machine Learning in PDF Malware

Authors: Preston Nabors, Nasseh Tabrizi

Abstract:

Portable Document Format (PDF) files have gained significant popularity for sharing and distributing documents due to their universal compatibility. However, the widespread use of PDF files has made them attractive targets for cybercriminals, who exploit vulnerabilities to deliver malware and compromise the security of end-user systems. This paper reviews notable contributions in PDF malware detection, including static, dynamic, signature-based, and hybrid analysis. It presents a comprehensive examination of PDF malware detection techniques, focusing on the emerging threat of adversarial sampling and the need for robust defense mechanisms. The paper highlights the vulnerability of machine learning classifiers to evasion attacks. It explores adversarial sampling techniques in PDF malware detection to produce mimicry and reverse mimicry evasion attacks, which aim to bypass detection systems. Improvements for future research are identified, including accessible methods, applying adversarial sampling techniques to malicious payloads, evaluating other models, evaluating the importance of features to malware, implementing adversarial defense techniques, and conducting comprehensive examination across various scenarios. By addressing these opportunities, researchers can enhance PDF malware detection and develop more resilient defense mechanisms against adversarial attacks.

Keywords: adversarial attacks, adversarial defense, adversarial machine learning, intrusion detection, PDF malware, malware detection, malware detection evasion

Procedia PDF Downloads 14
1292 'Propaganda by the Deed', 'Armed Propaganda' and Mass Mobilization: The Missing Link in the Left-Wing Terrorist Thinking

Authors: Ersun N. Kurtulus

Abstract:

One of the strategic goals of left-wing terrorism, both in its Anarchist and Marxist-Leninist forms, was mobilization of masses as a first step in launching a revolution. However, in the canonical texts of left-wing terrorist literature (such as the works of Brousse, Nachaev, Bakunin, Kropotkin, Most, Heinzen, Guevara and Marighella) it is not clear how resort to terrorist tactics such as assassinations or bomb attacks will lead to mobilization of masses. This link is usually presumed and taken for granted. However, in other, less known terrorist texts, where there is some elaboration upon this link, two conflicting views emerge: (i) terrorist attacks are supposed to cause state repression which in turn radicalizes masses and opens up the way for recruitment and mobilization versus (ii) terrorist attacks are supposed to demonstrate the hollowness of the already existent state repression and thereby encourage mobilization of masses that are already radicalized but inactive due fear caused by state repression. The paper argues that terrorism studies have largely overemphasized the former while the latter has remained more or less unnoticed.

Keywords: terrorism, repression, radical left, mobilization of masses

Procedia PDF Downloads 187
1291 Effect of Thermal Radiation on Flow, Heat, and Mass Transfer of a Nanofluid over a Stretching Horizontal Cylinder Embedded in a Porous Medium with Suction/Injection

Authors: Elsayed M. A. Elbashbeshy, T. G. Emam, M. S. El-Azab, K. M. Abdelgaber

Abstract:

The effect of thermal radiation on flow, heat and mass transfer of an incompressible viscous nanofluid over a stretching horizontal cylinder embedded in a porous medium with suction/injection is discussed numerically. The governing boundary layer equations are reduced to a system of ordinary differential equations. Mathematica has been used to solve such system after obtaining the missed initial conditions. Comparison of obtained numerical results is made with previously published results in some special cases, and found to be in a good agreement.

Keywords: laminar flow, boundary layer, stretching horizontal cylinder, thermal radiation, suction/injection, nanofluid

Procedia PDF Downloads 357
1290 A Time since of Injection Model for Hepatitis C Amongst People Who Inject Drugs

Authors: Nader Al-Rashidi, David Greenhalgh

Abstract:

Mathematical modelling techniques are now being used by health organizations worldwide to help understand the likely impact that intervention strategies treatment options and combinations of these have on the prevalence and incidence of hepatitis C virus (HCV) in the people who inject drugs (PWID) population. In this poster, we develop a deterministic, compartmental mathematical model to approximate the spread of the HCV in a PWID population that has been divided into two groups by time since onset of injection. The model assumes that after injection needles adopt the most infectious state of their previous state or that of the PWID who last injected with them. Using analytical techniques, we find that the model behaviour is determined by the basic reproductive number R₀, where R₀ = 1 is a critical threshold separating two different outcomes. The disease-free equilibrium is globally stable if R₀ ≤ 1 and unstable if R₀ > 1. Additionally, we make some simulations where have confirmed that the model tends to this endemic equilibrium value with realistic parameter values giving an HCV prevalence.

Keywords: hepatitis C, people who inject drugs, HCV, PWID

Procedia PDF Downloads 121
1289 Xiaflex (Collagenase) Impact on the Management of Dupuytren's Disease: Making the Case for Treatment in a Public Healthcare System

Authors: Anthony Barker, Roland Jiang

Abstract:

Dupuytren’s contractures are a debilitating condition affecting the palmar fascia of the hand reducing its function. This case series looks at the minimally-invasive technique of Xiaflex injections and the outcome in a public health setting. 15 patients undertook collagenase injection (Xiaflex, C. histolyticum) injection over the period from September 2015 to May 2017 at Fairfield Hospital, NSW. Their reported outcome post injection and in follow-up was recorded as well as their satisfaction and likelihood to request the procedure in the future. Other treatment modalities include percutaneous needle aponeurotomy, limited palmar fasciotomy, and palmar fasciectomy. A literature review of cost-effectiveness was performed to compare Xiaflex suitability for waitlist reduction in a public setting given average waiting times in the public setting extend past 365 days.

Keywords: Dupuytrens Disease, xiaflex, collagenase, plastic surgery

Procedia PDF Downloads 149
1288 Specific Biomarker Level and Function Outcome Changes in Treatment of Patients with Frozen Shoulder Using Dextrose Prolotherapy Injection

Authors: Nuralam Sam, Irawan Yusuf, Irfan Idris, Endi Adnan

Abstract:

The most case in the shoulder in the the adult is the frozen shoulder. It make an uncomfortable sensation which disturbance daily activity. The studies of frozen shoulder are still limited. This study used a true experimental pre and post test design with a group design. The participant underwent dextrose prolotherapy injection in the rotator cuff, intraarticular glenohumeral joint, long head tendon biceps, and acromioclavicular joint injections with 15% dextrose, respectively, at week 2, week 4, and week 6. Participants were followed for 12 weeks. The specific biomarker MMP and TIMP, ROM, DASH score were measured at baseline, at week 6, and week 12. The data were analyzed by multivariate analysis (repeated measurement ANOVA, Paired T-Test, and Wilcoxon) to determine the effect of the intervention. The result showed a significant decrease in The Disability of the Arm, Shoulder, and Hand (DASH) score in prolo injection patients in each measurement week (p < 0.05). While the measurement of Range of Motion (ROM), each direction of shoulder motion showed a significant difference in average each week, from week 0 to week 6 (p <0.05).Dextrose prolotherapy injection results give a significant improvement in functional outcome of the shoulder joint, and ROMand did not show significant results in assessing the specific biomarker, MMP-1, and TIMP-1 in tissue repair. This study suggestion an alternative to the use of injection prolotherapy in Frozen shoulder patients, which has fewer side effects and better effectiveness than the use of corticosteroid injections.

Keywords: frozen shoulder, ROM, DASH score, prolotherapy, MMP-1, TIMP-1

Procedia PDF Downloads 82
1287 Classification of IoT Traffic Security Attacks Using Deep Learning

Authors: Anum Ali, Kashaf ad Dooja, Asif Saleem

Abstract:

The future smart cities trend will be towards Internet of Things (IoT); IoT creates dynamic connections in a ubiquitous manner. Smart cities offer ease and flexibility for daily life matters. By using small devices that are connected to cloud servers based on IoT, network traffic between these devices is growing exponentially, whose security is a concerned issue, since ratio of cyber attack may make the network traffic vulnerable. This paper discusses the latest machine learning approaches in related work further to tackle the increasing rate of cyber attacks, machine learning algorithm is applied to IoT-based network traffic data. The proposed algorithm train itself on data and identify different sections of devices interaction by using supervised learning which is considered as a classifier related to a specific IoT device class. The simulation results clearly identify the attacks and produce fewer false detections.

Keywords: IoT, traffic security, deep learning, classification

Procedia PDF Downloads 123
1286 Botulinum Toxin type A for Lower Limb Lengthening and Deformity Correction: A Systematic Review and Meta-analysis

Authors: Jawaher F. Alsharef, Abdullah A. Ghaddaf, Mohammed S. Alomari, Abdullah A. Al Qurashi, Ahmed S. Abdulhamid, Mohammed S. Alshehri, Majed Alosaimi

Abstract:

Botulinum toxin type A (BTX-A) is the most popular therapeutic agent for muscle relaxation and pain control. Lately, BTX-A injection received great interest as a part of multimodal pain management for lower limb lengthening and deformity correction. This systematic review aimed to determine the role of BTX-A injection in pain management for during lower limb lengthening and/or deformity correction. We searched Medline, Embase, and CENTRAL. We included randomized controlled trials (RCTs) that compared the BTX-A injection to placebo for individuals undergoing lower limb lengthening and/or deformity correction. We sought to evaluate the following outcomes: pain on visual analogue scale (VAS), range of motion parameters, average opioid consumption, and adverse events. The standardized mean difference (SMD) was used to represent continuous outcomes while risk ratio (RR) was used to represent dichotomous outcomes. A total of 4 RCTs that enrolled 257 participants (337 limbs) deemed eligible. Adjuvant BTX-A injection showed a significant reduction in post-operative pain compared to placebo (SMD=–0.28, 95% CI –0.53 to –0.04). No difference was found between BTX-A injection and placebo in terms of range of motion parameters, average opioid consumption, or adverse events after surgical limb lengthening and/or deformity correction (RR= 0.77, 95% CI –0.58 to 1.03). Conclusions: Adjuvant BTX-A injection conferred a discernible reduction in post-operative pain during surgical limb lengthening and/or deformity without increasing the risk of adverse events.

Keywords: botulinum toxin type A, limb lengthening, distraction osteogenesis, deformity correction, pain management

Procedia PDF Downloads 114
1285 Intrusion Detection In MANET Using Game Theory

Authors: S. B. Kumbalavati, J. D. Mallapur, K. Y. Bendigeri

Abstract:

A mobile Ad-hoc network (MANET) is a multihop wireless network where nodes communicate each other without any pre-deployed infrastructure. There is no central administrating unit. Hence, MANET is generally prone to many of the attacks. These attacks may alter, release or deny data. These attacks are nothing but intrusions. Intrusion is a set of actions that attempts to compromise integrity, confidentiality and availability of resources. A major issue in the design and operation of ad-hoc network is sharing the common spectrum or common channel bandwidth among all the nodes. We are performing intrusion detection using game theory approach. Game theory is a mathematical tool for analysing problems of competition and negotiation among the players in any field like marketing, e-commerce and networking. In this paper mathematical model is developed using game theory approach and intruders are detected and removed. Bandwidth utilization is estimated and comparison is made between bandwidth utilization with intrusion detection technique and without intrusion detection technique. Percentage of intruders and efficiency of the network is analysed.

Keywords: ad-hoc network, IDS, game theory, sensor networks

Procedia PDF Downloads 352
1284 Pressure Drop Study in Moving and Stationary Beds with Lateral Gas Injection

Authors: Vinci Mojamdar, Govind S. Gupta

Abstract:

Moving beds in the presence of gas flow are widely used in metallurgical and chemical industries like blast furnaces, catalyst reforming, drying, etc. Pressure drop studies in co- and counter – current conditions have been done by a few researchers. However, to the best of authours knowledge, proper pressure drop study with lateral gas injection lacks especially in the presence of cavity and nozzle protrusion inside the packed bed. The latter study is more useful for metallurgical industries for the processes such as blast furnaces, shaft reduction and, COREX. In this experimental work, a two dimensional cold model with slot type nozzle for lateral gas injection along with the plastic beads as packing material and dry air as gas have been used. The variation of pressure drop is recorded at various horizontal and vertical directions in the presence of cavity and nozzle protrusion. The study has been performed in both moving and stationary beds. Also, the experiments have been carried out in both increasing as well as decreasing gas flow conditions. Experiments have been performed at various gas flow rates and packed bed heights. Some interesting results have been reported such as there is no pressure variation in the moving bed for both the increasing and decreasing gas flow condition that is different from the stationary bed. Pressure hysteresis loop has been observed in a stationary bed.

Keywords: lateral gas injection, moving bed, pressure drop, pressure hysteresis, stationary bed

Procedia PDF Downloads 279
1283 In-Cylinder Exhaust Heat Recovery of an I. C. Engine Using Water Injection

Authors: Jayakrishnan U.

Abstract:

A concept of adding two strokes to a four stroke Otto or Diesel engine cycle presented here for the waste heat recovery in a four stroke internal combustion engine. Four stroke Diesel cycle and Otto cycle engines have very low thermal efficiency due to high amount of energy loss in exhaust and also on the cooling of the engine. It is estimated about 35 percent of fuel energy is lost in exhaust of engine and 30 percent in cooling of engine. So by modifying a four-stroke Otto or Diesel engine by adding two-stroke heat recovery steam cycle is presented here. Water injection is used to get an additional power stroke by partial compression of the exhaust gases at the end of third stroke in a four stroke I.C.Engine. It is the conversion of a four-stroke cycle to a six-stroke cycle. By taking a four stroke petrol engine of known dimensions, an ideal thermodynamic model is used to analyse and calculate the events of exhaust gas compression and following two strokes of water injection. By changing the exhaust valve closing timing during exhaust stroke and analysing it on various points, an optimum amount of exhaust gas re-compression and amount of water injection can be found for maximizing efficiency and fuel economy. It is achieved by changing the exhaust valve timing and finding an optimum amount of exhaust re-compression, maximizing the net mean effective pressure of the steam expansion stroke (MEPsteam). Specific fuel consumption of the engine also decreases increasing the fuel economy. The valve closing timings for maximum MEPsteam is limited by either 1 bar or dew point temperature of expansion gas or moisture mixture to avoid moisture formation. By modifying the four-stroke Otto or Diesel cycle by adding two water injection stroke has the potential to significantly increase the engine efficiency and fuel economy.

Keywords: internal combustion engine, engine efficiency, six-stroke cycle, water injection, specific fuel consumption

Procedia PDF Downloads 275
1282 The Predictive Value of Extensor Grip Test for the Effectiveness of Treatment for Tennis Elbow: A Randomized Controlled Trial

Authors: Mohammad Javad Zehtab, S. Alireza Mirghasemi, Ali Majlesara, Parvin Tajik, Babak Siavashi

Abstract:

Objective: There are different modalities proposed for tennis elbow treatment with few randomized trials comparing them. We designed a study to compare the effectiveness of five different modalities and determine the usefulness of recently proposed extensor grip test (EGT) in predicting the response to treatment. Methods: In a randomized controlled clinical trial 92 of 98 tennis elbow patients in Sina hospital of Tehran, Iran between 2006 and 2007 fulfill trial entry criteria, among these patients 56 (60.9%) had positive EGT result. Stratified on EGT result, patients allocated randomly to 5 treatment groups: Brace (B) group, physiotherapy (P), brace + physiotherapy (BP), injection (I) and injection + physiotherapy (IP). Results: Patients who had positive result of EGT had better response to treatments: less SOC (p = 0.06), less PFFQ and patients’ satisfaction scores (p < 0.001). Among the treatment IP was the most successful, then BP, P and B, respectively; injection was the worst treatment modality. Response to treatment was comparable in all groups between EGT positive and negative patients except bracing; in which positive EGT was correlated with a dramatic response to treatment. Conclusion: In all patients IP and then BP is recommended but in EGT negatives, bracing seems to be of no use. Injection alone is not recommended in either group.

Keywords: tennis elbow, extensor grip test, physiotherapy, tennis elbow treatment

Procedia PDF Downloads 258
1281 Cyber Security and Risk Assessment of the e-Banking Services

Authors: Aisha F. Bushager

Abstract:

Today we are more exposed than ever to cyber threats and attacks at personal, community, organizational, national, and international levels. More aspects of our lives are operating on computer networks simply because we are living in the fifth domain, which is called the Cyberspace. One of the most sensitive areas that are vulnerable to cyber threats and attacks is the Electronic Banking (e-Banking) area, where the banking sector is providing online banking services to its clients. To be able to obtain the clients trust and encourage them to practice e-Banking, also, to maintain the services provided by the banks and ensure safety, cyber security and risks control should be given a high priority in the e-banking area. The aim of the study is to carry out risk assessment on the e-banking services and determine the cyber threats, cyber attacks, and vulnerabilities that are facing the e-banking area specifically in the Kingdom of Bahrain. To collect relevant data, structured interviews were taken place with e-banking experts in different banks. Then, collected data where used as in input to the risk management framework provided by the National Institute of Standards and Technology (NIST), which was the model used in the study to assess the risks associated with e-banking services. The findings of the study showed that the cyber threats are commonly human errors, technical software or hardware failure, and hackers, on the other hand, the most common attacks facing the e-banking sector were phishing, malware attacks, and denial-of-service. The risks associated with the e-banking services were around the moderate level, however, more controls and countermeasures must be applied to maintain the moderate level of risks. The results of the study will help banks discover their vulnerabilities and maintain their online services, in addition, it will enhance the cyber security and contribute to the management and control of risks that are facing the e-banking sector.

Keywords: cyber security, e-banking, risk assessment, threats identification

Procedia PDF Downloads 320
1280 Microbubbles Enhanced Synthetic Phorbol Ester Degradation by Ozonolysis

Authors: D. Kuvshinov, A. Siswanto, W. Zimmerman

Abstract:

A phorbol-12-myristate-13-acetate (TPA) is a synthetic analogue of phorbol ester (PE), a natural toxic compound of Euphorbiaceae plant. The oil extracted from plants of this family is useful source for primarily biofuel. However this oil can also be used as a food stock due to its significant nutrition content. The limitations for utilizing the oil as a food stock are mainly due to a toxicity of PE. Nowadays a majority of PE detoxification processes are expensive as include multi steps alcohol extraction sequence. Ozone is considered as a strong oxidative agent. It reaction with PE it attacks the carbon double bond of PE. This modification of PE molecular structure results into nontoxic ester with high lipid content. This report presents data on development of simple and cheap PE detoxification process with water application as a buffer and ozone as reactive component. The core of this new technique is a simultaneous application of new microscale plasma unit for ozone production and patented gas oscillation technology. In combination with a reactor design the technology permits ozone injection to the water-TPA mixture in form of microbubbles. The efficacy of a heterogeneous process depends on diffusion coefficient which can be controlled by contact time and interface area. The low velocity of rising microbubbles and high surface to volume ratio allow fast mass transfer to be achieved during the process. Direct injection of ozone is the most efficient process for a highly reactive and short lived chemical. Data on the plasma unit behavior are presented and influence of the gas oscillation technology to the microbubbles production mechanism has been discussed. Data on overall process efficacy for TPA degradation is shown.

Keywords: microbubble, ozonolysis, synthetic phorbol ester, chemical engineering

Procedia PDF Downloads 182
1279 BFDD-S: Big Data Framework to Detect and Mitigate DDoS Attack in SDN Network

Authors: Amirreza Fazely Hamedani, Muzzamil Aziz, Philipp Wieder, Ramin Yahyapour

Abstract:

Software-defined networking in recent years came into the sight of so many network designers as a successor to the traditional networking. Unlike traditional networks where control and data planes engage together within a single device in the network infrastructure such as switches and routers, the two planes are kept separated in software-defined networks (SDNs). All critical decisions about packet routing are made on the network controller, and the data level devices forward the packets based on these decisions. This type of network is vulnerable to DDoS attacks, degrading the overall functioning and performance of the network by continuously injecting the fake flows into it. This increases substantial burden on the controller side, and the result ultimately leads to the inaccessibility of the controller and the lack of network service to the legitimate users. Thus, the protection of this novel network architecture against denial of service attacks is essential. In the world of cybersecurity, attacks and new threats emerge every day. It is essential to have tools capable of managing and analyzing all this new information to detect possible attacks in real-time. These tools should provide a comprehensive solution to automatically detect, predict and prevent abnormalities in the network. Big data encompasses a wide range of studies, but it mainly refers to the massive amounts of structured and unstructured data that organizations deal with on a regular basis. On the other hand, it regards not only the volume of the data; but also that how data-driven information can be used to enhance decision-making processes, security, and the overall efficiency of a business. This paper presents an intelligent big data framework as a solution to handle illegitimate traffic burden on the SDN network created by the numerous DDoS attacks. The framework entails an efficient defence and monitoring mechanism against DDoS attacks by employing the state of the art machine learning techniques.

Keywords: apache spark, apache kafka, big data, DDoS attack, machine learning, SDN network

Procedia PDF Downloads 138
1278 Modeling Study of Short Fiber Orientation in Simple Injection Molding Processes

Authors: Ihsane Modhaffar, Kamal Gueraoui, Abouelkacem Qais, Abderrahmane Maaouni, Samir Men-La-Yakhaf, Hamid Eltourroug

Abstract:

The main objective of this paper is to develop a Computational Fluid Dynamics (CFD) model to simulate and characterize the fiber suspension in flow in rectangular cavities. The model is intended to describe the velocity profile and to predict the fiber orientation. The flow was considered to be incompressible, and behave as Newtonian fluid containing suspensions of short-fibers. The numerical model for determination of velocity profile and fiber orientation during mold-filling stage of injection molding process was solved using finite volume method. The governing equations of this problem are: the continuity, the momentum and the energy. The obtained results were compared to available experimental findings. A good agreement between the numerical results and the experimental data was achieved.

Keywords: injection, composites, short-fiber reinforced thermoplastics, fiber orientation, incompressible fluid, numerical simulation

Procedia PDF Downloads 439
1277 Machine Learning-Based Techniques for Detecting and Mitigating Cyber-attacks on Automatic Generation Control in Smart Grids

Authors: Sami M. Alshareef

Abstract:

The rapid growth of smart grid technology has brought significant advancements to the power industry. However, with the increasing interconnectivity and reliance on information and communication technologies, smart grids have become vulnerable to cyber-attacks, posing significant threats to the reliable operation of power systems. Among the critical components of smart grids, the Automatic Generation Control (AGC) system plays a vital role in maintaining the balance between generation and load demand. Therefore, protecting the AGC system from cyber threats is of paramount importance to maintain grid stability and prevent disruptions. Traditional security measures often fall short in addressing sophisticated and evolving cyber threats, necessitating the exploration of innovative approaches. Machine learning, with its ability to analyze vast amounts of data and learn patterns, has emerged as a promising solution to enhance AGC system security. Therefore, this research proposal aims to address the challenges associated with detecting and mitigating cyber-attacks on AGC in smart grids by leveraging machine learning techniques on automatic generation control of two-area power systems. By utilizing historical data, the proposed system will learn the normal behavior patterns of AGC and identify deviations caused by cyber-attacks. Once an attack is detected, appropriate mitigation strategies will be employed to safeguard the AGC system. The outcomes of this research will provide power system operators and administrators with valuable insights into the vulnerabilities of AGC systems in smart grids and offer practical solutions to enhance their cyber resilience.

Keywords: machine learning, cyber-attacks, automatic generation control, smart grid

Procedia PDF Downloads 54
1276 Detecting Black Hole Attacks in Body Sensor Networks

Authors: Sara Alshehri, Bayan Alenzi, Atheer Alshehri, Samia Chelloug, Zainab Almry, Hussah Albugmai

Abstract:

This paper concerns body area networks sensor that collect signals around a human body. The black hole attacks are the main security challenging problem because the data traffic can be dropped at any node. The focus of our proposed solution is to efficiently route data packets while detecting black hole nodes.

Keywords: body sensor networks, security, black hole, routing, broadcasting, OMNeT++

Procedia PDF Downloads 613
1275 Protection of the Object of the Critical Infrastructure in the Czech Republic

Authors: Michaela Vašková

Abstract:

With the increasing dependence of countries on the critical infrastructure, it increases their vulnerability. Big threat is primarily in the human factor (personnel of the critical infrastructure) and in terrorist attacks. It emphasizes the development of methodology for searching of weak points and their subsequent elimination. This article discusses methods for the analysis of safety in the objects of critical infrastructure. It also contains proposal for methodology for training employees of security services in the objects of the critical infrastructure and developing scenarios of attacks on selected objects of the critical infrastructure.

Keywords: critical infrastructure, object of critical infrastructure, protection, safety, security, security audit

Procedia PDF Downloads 313
1274 A Data-Driven Platform for Studying the Liquid Plug Splitting Ratio

Authors: Ehsan Atefi, Michael Grigware

Abstract:

Respiratory failure secondary to surfactant deficiency resulting from respiratory distress syndrome is considered one major cause of morbidity in preterm infants. Surfactant replacement treatment (SRT) is considered an effective treatment for this disease. Here, we introduce an AI-mediated approach for estimating the distribution of surfactant in the lung airway of a newborn infant during SRT. Our approach implements machine learning to precisely estimate the splitting ratio of a liquid drop during bifurcation at different injection velocities and patient orientations. This technique can be used to calculate the surfactant residue remaining on the airway wall during the surfactant injection process. Our model works by minimizing the pressure drop difference between the two airway branches at each generation, subject to mass and momentum conservation. Our platform can be used to generate feedback for immediately adjusting the velocity of injection and patient orientation during SRT.

Keywords: respiratory failure, surfactant deficiency, surfactant replacement, machine learning

Procedia PDF Downloads 88
1273 A Game of Information in Defense/Attack Strategies: Case of Poisson Attacks

Authors: Asma Ben Yaghlane, Mohamed Naceur Azaiez

Abstract:

In this paper, we briefly introduce the concept of Poisson attacks in the case of defense/attack strategies where attacks are assumed to be continuous. We suggest a game model in which the attacker will combine both criteria of a sufficient confidence level of a successful attack and a reasonably small size of the estimation error in order to launch an attack. Here, estimation error arises from assessing the system failure upon attack using aggregate data at the system level. The corresponding error is referred to as aggregation error. On the other hand, the defender will attempt to deter attack by making one or both criteria inapplicable. The defender will build his/her strategy by both strengthening the targeted system and increasing the size of error. We will formulate the defender problem based on appropriate optimization models. The attacker will opt for a Bayesian updating in assessing the impact on the improvement made by the defender. Then, the attacker will evaluate the feasibility of the attack before making the decision of whether or not to launch it. We will provide illustrations to better explain the process.

Keywords: attacker, defender, game theory, information

Procedia PDF Downloads 428
1272 A Game Theory Analysis of the Effectiveness of Passenger Profiling for Transportation Security

Authors: Yael Deutsch, Arieh Gavious

Abstract:

The threat of aviation terrorism and its potential damage became significant after the 9/11 terror attacks. These attacks have led authorities and leaders to suggest that security personnel should overcome politically correct scruples about profiling and use it openly. However, there is a lack of knowledge about the smart usage of profiling and its advantages. We analyze game models that are suitable to specific real-world scenarios, focusing on profiling as a tool to detect potential violators, such as terrorists and smugglers. We provide analytical and clear answers to difficult questions, and by that help fighting against harmful violation acts.

Keywords: game theory, profiling, security, nash equilibrium

Procedia PDF Downloads 79
1271 An Evaluation of People’s Susceptibility to Phishing Attacks in Nepal and Effectiveness of the Applied Countermeasures

Authors: Sunil Chaudhary, Rajendra Bahadur Thapa, Eleni Berki, Marko Helenius

Abstract:

The increasing number of Internet and mobile phone users, and essentially those, who use these electronic media to perform online transactions makes Nepal lucrative for phishing attacks. It is one of the reasons behind escalating phishing attacks in the country. Therefore, in this paper we examine various phishing attempts and real scenarios in Nepal to determine the seriousness of the problem. We also want to find out how prepared are the Internet and mobile phone users and how well-equipped are the private sector and government authorities responsible to handle cybercrime in the country. We considered five areas of research study, i.e., legal measures, technical and procedural measures, organizational structure, capacity building and international cooperation. These constitute important factors in cyber security and are recommended by the Global Cyber security Agenda (GCA). On the basis of our findings, we provide essential suggestions to make anti-phishing measures more appropriate to Nepalese State and society.

Keywords: internet banking, mobile banking, e-commerce, phishing, anti-phishing, Nepal

Procedia PDF Downloads 454
1270 Preclinical Studying of Stable Fe-Citrate Effect on 68Ga-Citrate Tissue Distribution

Authors: A. S. Lunev, A. A. Larenkov, O. E. Klementyeva, G. E. Kodina

Abstract:

Background and aims: 68Ga-citrate is one of prospective radiopharmaceutical for PET-imaging of inflammation and infection. 68Ga-citrate is 67Ga-citrate analogue using since 1970s for SPECT-imaging. There's known rebinding reaction occurs past Ga-citrate injection and gallium (similar iron Fe3+) binds with blood transferrin. Then radiolabeled protein complex is delivered to pathological foci (inflammation/infection sites). But excessive gallium bindings with transferrin are cause of slow blood clearance, long accumulation time in foci (24-72 h) and exception of application possibility of the short-lived gallium-68 (T½ = 68 min). Injection of additional chemical agents (e.g. Fe3+ compounds) competing with radioactive gallium to the blood transferrin joining (blocking of its metal binding capacity) is one of the ways to solve formulated problem. This phenomenon can be used for correction of 68Ga-citrate pharmacokinetics for increasing of the blood clearance and accumulation in foci. The aim of real studying is research of effect of stable Fe-citrate on 68Ga-citrate tissue distribution. Materials and methods: 68Ga-citrate without/with extra injection of stable Fe-citrate (III) was injected nonlinear mice with inflammation models (aseptic soft tissue inflammation, lung infection, osteomyelitis). PET/X-RAY Genisys4 (Sofie Bioscience, USA) was used for non-invasive PET imaging (for 30, 60, 120 min past injection 68Ga-citrate) with subsequent reconstruction of imaging and their analysis (value of clearance, distribution volume). Scanning time is 10 min. Results and conclusions: I. v. injection of stable Fe-citrate blocks the metal-binding capability of transferrin serum and allows decreasing gallium-68 radioactivity in blood significantly and increasing accumulation in inflammation (3-5 time). It allows receiving more informative PET-images of inflammation early (for 30-60 min after injection). Pharmacokinetic parameters prove it. Noted there is no statistically significant difference between 68Ga-citrate accumulation for different inflammation model because PET imaging is indication of pathological processes and is not their identification.

Keywords: 68Ga-citrate, Fe-citrate, PET imaging, mice, inflammation, infection

Procedia PDF Downloads 457
1269 Spin-Dipole Excitations Produced On-Demand in the Fermi Sea

Authors: Mykhailo Moskalets, Pablo Burset, Benjamin Roussel, Christian Flindt

Abstract:

The single-particle injection from the Andreev level and how such injection is simulated using a voltage pulse are discussed. Recently, high-speed quantum-coherent electron sources injecting one- to few-particle excitations into the Fermi sea have been experimentally realized. The main obstacle to using these excitations as flying qubits for quantum-information processing purposes is decoherence due to the long-range Coulomb interaction. An obvious way to get around this difficulty is to employ electrically neutral excitations. Here it is discussed how such excitations can be generated on-demand using the same injection principles as in existing electron sources. Namely, with the help of a voltage pulse of a certain shape applied to the Fermi sea or using a driven quantum dot with superconducting correlations. The advantage of the latter approach is the possibility of varying the electron-hole content in the excitation and the possibility of creating a charge-neutral but spin-dipole excitation.

Keywords: Andreev level, on-demand, single-electron, spin-dipole

Procedia PDF Downloads 53
1268 Pattern of External Injuries Sustained during Bomb Blast Attacks in Karachi, Pakistan from 2000 to 2007

Authors: Arif Anwar Surani, Salman Ali, Asif Surani, Sohaib Zahid, Akbar Shoukat Ali, Zeeshan-Ul-Hassan Usmani, Joseph Varon, Salim Surani

Abstract:

Objective: Terrorism and suicidal bomb blast attacks are commonplace in Karachi, Pakistan. During the years 2000 to 2007, there were over 60 bomb explosions resulting in more than 1500 casualties. These explosions produce a wide variety of external injuries. We undertook this study to evaluate pattern of external injury produced after bomb blast attacks and to compare injury profile resulting from explosions in open versus semi-confined blast environments. Method: A retrospective, cross-sectional, study was conducted to review injuries sustained after bomb blast attacks in Karachi, Pakistan, from January 2000 to October 2007. Emergency medical records and medico legal certificates of patients presented to three major public sector hospitals of Karachi were evaluated using self-design proforma. Results: Data of 481 victims meet inclusion criteria and were incorporated for final analysis. Of these, 63.6% were injured in open spaces and 36.4% were injured in semi-confined blast environments. Lacerations were commonly encountered as external injury (47.7%) followed by penetrating wounds (15.3%). Lower and upper extremities were most commonly affected (38.6% and 19% respectively). Open and semi-confined blast environments produced a specific injury pattern and profile (p=<0.001). Conclusions: Bomb blast attacks in Karachi produce an external injury pattern consistent with other studies, with exception of an increased frequency in penetrating wounds. Semi-confined blast environments were associated with severe injuries. Further studies are required to better classify injuries and their severity based on standardized scoring systems. Effective emergency response systems must be designed to cope with mass causalities following bomb explosions.

Keywords: bomb blast attacks, injury pattern, external injury, open space, semi-confined space, blast environment

Procedia PDF Downloads 373
1267 Injection of Bradykinin in Femoral Artery Elicits Cardiorespiratory Reflexes Involving Perivascular Afferents in Rat Models

Authors: Sanjeev K. Singh, Maloy B. Mandal, Revand R.

Abstract:

The physiology of baroreceptors and chemoreceptors present in large blood vessels of the heart is well known in regulation of cardiorespiratory functions. Since large blood vessels and peripheral blood vessels are of same mesodermal origin, therefore, involvement of the latter in regulation of cardiorespiratory system is expected. Role of perivascular nerves in mediating cardiorespiratory alterations produced after intra-arterial injection of a nociceptive agent (bradykinin) was examined in urethane anesthetized male rats. Respiratory frequency, blood pressure, and heart rate were recorded for 30 min after the retrograde injection of bradykinin/saline in the femoral artery. In addition, paw edema was determined and water content was expressed as percentage of wet weight. Injection of bradykinin produced immediate tachypnoeic, hypotensive and bradycardiac responses of shorter latency (5-8 s) favoring the neural mechanisms involved in it. Injection of equi-volume of saline did not produce any responses and served as time matched control. Paw edema was observed in the ipsilateral hind limb. Pretreatment with diclofenac sodium significantly attenuated the bradykinin-induced responses and also blocked the paw edema. Ipsilateral femoral and sciatic nerve sectioning attenuated bradykinin-induced responses significantly indicating the origin of responses from the local vascular bed. Administration of bradykinin in the segment of an artery produced reflex cardiorespiratory changes by stimulating the perivascular nociceptors involving prostaglandins. This is a novel study exhibiting the role of peripheral blood vessels in regulation of cardiorespiratory system.

Keywords: vasosensory reflex, cardiorespiratory changes, nociceptive agent, bradykinin, VR1 receptors

Procedia PDF Downloads 114
1266 Numerical Investigation of the Needle Opening Process in a High Pressure Gas Injector

Authors: Matthias Banholzer, Hagen Müller, Michael Pfitzner

Abstract:

Gas internal combustion engines are widely used as propulsion systems or in power plants to generate heat and electricity. While there are different types of injection methods including the manifold port fuel injection and the direct injection, the latter has more potential to increase the specific power by avoiding air displacement in the intake and to reduce combustion anomalies such as backfire or pre-ignition. During the opening process of the injector, multiple flow regimes occur: subsonic, transonic and supersonic. To cover the wide range of Mach numbers a compressible pressure-based solver is used. While the standard Pressure Implicit with Splitting of Operators (PISO) method is used for the coupling between velocity and pressure, a high-resolution non-oscillatory central scheme established by Kurganov and Tadmor calculates the convective fluxes. A blending function based on the local Mach- and CFL-number switches between the compressible and incompressible regimes of the developed model. As the considered operating points are well above the critical state of the used fluids, the ideal gas assumption is not valid anymore. For the real gas thermodynamics, the models based on the Soave-Redlich-Kwong equation of state were implemented. The caloric properties are corrected using a departure formalism, for the viscosity and the thermal conductivity the empirical correlation of Chung is used. For the injector geometry, the dimensions of a diesel injector were adapted. Simulations were performed using different nozzle and needle geometries and opening curves. It can be clearly seen that there is a significant influence of all three parameters.

Keywords: high pressure gas injection, hybrid solver, hydrogen injection, needle opening process, real-gas thermodynamics

Procedia PDF Downloads 435