Search results for: Tomer Zidki
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 8

Search results for: Tomer Zidki

8 Structural Alteration of MoS₂ by Incorporating Fe, Co Composite for an Enhanced Oxygen Evolution Reaction

Authors: Krishnamoorthy Sathiyan, Shanti Gopal Patra, Ronen Bar-Ziv, Tomer Zidki

Abstract:

Developing efficient non-noble metal catalysts that are cheap and durable for oxygen evolution reaction (OER) is a great challenge. Moreover, altering the electronic structure of the catalyst and structural engineering of the materials provide a new direction for enhancing the OER. Herein, we have successfully synthesized Fe and Co incorporated MoS₂ catalysts, which show improved catalytic activity for OER when compared with MoS₂, Fe-MoS₂, and Co-MoS₂. It was found that at an optimal ratio of Fe and Co, the electronic and structural modification of MoS₂ occurs, which leads to change in orientation and thereby enhances the active catalytic sites on the edges, which are more exposed for OER. The nanocomposites have been well characterized by X-ray diffraction (XRD), scanning electron microscope (SEM), and energy dispersive X-ray analysis (EDX), Elemental Mapping, transmission electron microscope (TEM), and high-resolution transmission electron microscope (HR-TEM) analysis. Among all, a particular ratio of FeCo-MoS₂ exhibits a much smaller onset with better catalytic current density. The remarkable catalytic activity is mainly attributed to the synergistic effect from the Fe and Co. Most importantly, our work provides an essential insight in altering the electronic structure of MoS₂ based materials by incorporating promoters such as Co and Fe in an optimal amount, which enhances OER activity.

Keywords: electrocatalysts, molybdenum disulfide, oxygen evolution reaction, transition metals

Procedia PDF Downloads 130
7 Eu³⁺ Ions Doped-SnO₂ for Effective Degradation of Malachite Green Dye

Authors: Ritu Malik, Vijay K. Tomer, Satya P. Nehra, Anshu Nehra

Abstract:

Visible light sensitive Eu³⁺ doped-SnO₂ nanoparticles were successfully synthesized via the hydrothermal method and extensively characterized by a combination of X-ray diffraction (XRD), Field emission scanning electron microscopy (FESEM) and N₂ adsorption-desorption isotherms (BET). Their photocatalytic activities were evaluated using Malachite Green (MG) as decomposition objective by varying the concentration of Eu³⁺ in SnO₂. The XRD analysis showed that lanthanides phase was not observed on lower loadings of Eu³⁺ ions doped-SnO₂. Eu³⁺ ions can enhance the photocatalytic activity of SnO₂ to some extent as compared with pure SnO₂, and it was found that 3 wt% Eu³⁺ -doped SnO₂ is the most effective photocatalyst due to its lowest band gap, crystallite size and also the highest surface area. The photocatalytic tests indicate that at the optimum conditions, illumination time 40 min, pH 65, 0.3 g/L photocatalyst loading and 50 ppm dye concentration, the dye removal efficiency was 98%.

Keywords: photocatalyst, visible light, lanthanide, SnO₂

Procedia PDF Downloads 282
6 Barred from Each Other: Why Normative Husbands Remain Married to Incarcerated Wives

Authors: Tomer Einat, Sharon Rabinovitz, Inbal Harel-Aviram

Abstract:

This study explores men’s motivation and justification to remain married to their criminal, imprisoned wives. Using semi-structured interviews and content-analysis, data were collected and analyzed from eight men who maintain stable marriage relationships with their incarcerated wives. Participants are normative men who describe incarceration as a challenge that enhances mutual responsibility and commitment. They exaggerate the extent to which their partners resemble archetypal romantic ideals. They use motivational accounts to explain the woman’s criminal conduct, which is perceived as non-relevant to her real identity. Physical separation and lack of physical intimacy are perceived as the major difficulties in maintaining their marriage relations. Length of imprisonment and marriage was found to be related to the decision whether to continue or terminate the relationships. Women-inmates’ partners experience difficulties and use coping strategies very similar to those cited by other normative spouses facing lengthy separation.

Keywords: female inmates, marriage, normative spouses, romantic accounts

Procedia PDF Downloads 461
5 Ordered Mesoporous WO₃-TiO₂ Nanocomposites for Enhanced Xylene Gas Detection

Authors: Vijay K. Tomer, Ritu Malik, Satya P. Nehra, Anshu Sharma

Abstract:

Highly ordered mesoporous WO₃-TiO₂ nanohybrids with large intrinsic surface area and highly ordered pore channels were synthesized using mesoporous silica, KIT-6 as hard template using a nanocasting strategy. The nanohybrid samples were characterized by a variety of physico-chemical techniques including X-ray diffraction, Nitrogen adsorption-desorption isotherms, and high resolution transmission electron microscope. The nanohybrids were tested for detection of important indoor Volatile Organic Compounds (VOCs) including acetone, ethanol, n-butanol, toluene, and xylene. The sensing result illustrates that the nanocomposite sensor was highly responsive towards xylene gas at relatively lower operating temperature. A rapid response and recovery time, highly linear response and excellent stability in the concentration ranges from 1 to 100 ppm was observed for xylene gas. It is believed that the promising results of this study can be utilized in the synthesis of ordered mesoporous nanostructures which can extend its configuration for the development of new age e-nose type sensors with enhanced gas-sensing performance.

Keywords: nanohybrids, response, sensor, VOCs, xylene

Procedia PDF Downloads 331
4 Victims of Imprisonment: Incarceration and Post-Release Effects of Confinement with Women with a Mental Illness

Authors: Anat Yaron Antar, Tomer Einat

Abstract:

This study explores the effects of the imprisonment of women together with females with mental disorders on the well-being of the former both during imprisonment and after their release from prison. Based on in-depth interviews with 22 women ex-prisoners who had been imprisoned for a period of at least two years in the single Israeli female correctional facility, Neve Tirza Prison, and released one to three months before the initiation of the study to a community-based agency managed by the Israeli Prisoner Rehabilitation Authority, and based on a qualitative, constructive strategy. We found that: (i) mentally ill prisoners’ conduct creates severe feelings of stress and discomfort among many of the prisoners without a mental disorder prisoners; (ii) The intimate and often long-term encounters with prisoners with a mental illness lead to increased feelings of distress, helplessness, fear, and frustration among many of the women prisoners; (iii) the damaging encounters between women prisoners and mentally-ill prisoners harmed the reintegration of the formers into society after release, and (iv) The women ex-prisoners lacked the basic mental, cognitive, and social tools necessary for dealing with female inmates with a mental illness and had received no psychological or emotional support from the prison personnel. Consequently, they suffered – and still suffer – from traumatic and upsetting memories Our findings led us to conclude that women prisoners should be imprisoned separately from female prisoners with mental disorders or be offered a wide range of psychological and emotional coping tools as well as various rehabilitative treatment programs.

Keywords: women, prisoners, mentally ill, health

Procedia PDF Downloads 127
3 Generalized Limit Equilibrium Solution for the Lateral Pile Capacity Problem

Authors: Tomer Gans-Or, Shmulik Pinkert

Abstract:

The determination of lateral pile capacity per unit length is a key aspect in geotechnical engineering. Traditional approaches for assessing piles lateral capacity in cohesive soils involve the application of upper-bound and lower-bound plasticity theorems. However, a comprehensive solution encompassing the entire spectrum of soil strength parameters, particularly in frictional soils with or without cohesion, is still lacking. This research introduces an innovative implementation of the slice method limit equilibrium solution for lateral capacity assessment. For any given numerical discretization of the soil's domain around the pile, the lateral capacity evaluation is based on mobilized strength concept. The critical failure geometry is then found by a unique optimization procedure which includes both factor of safety minimization and geometrical optimization. The robustness of this suggested methodology is that the solution is independent of any predefined assumptions. Validation of the solution is accomplished through a comparison with established plasticity solutions for cohesive soils. Furthermore, the study demonstrates the applicability of the limit equilibrium method to address unresolved cases related to frictional and cohesive-frictional soils. Beyond providing capacity values, the method enables the utilization of the mobilized strength concept to generate safety-factor distributions for scenarios representing pre-failure states.

Keywords: lateral pile capacity, slice method, limit equilibrium, mobilized strength

Procedia PDF Downloads 60
2 USBware: A Trusted and Multidisciplinary Framework for Enhanced Detection of USB-Based Attacks

Authors: Nir Nissim, Ran Yahalom, Tomer Lancewiki, Yuval Elovici, Boaz Lerner

Abstract:

Background: Attackers increasingly take advantage of innocent users who tend to use USB devices casually, assuming these devices benign when in fact they may carry an embedded malicious behavior or hidden malware. USB devices have many properties and capabilities that have become the subject of malicious operations. Many of the recent attacks targeting individuals, and especially organizations, utilize popular and widely used USB devices, such as mice, keyboards, flash drives, printers, and smartphones. However, current detection tools, techniques, and solutions generally fail to detect both the known and unknown attacks launched via USB devices. Significance: We propose USBWARE, a project that focuses on the vulnerabilities of USB devices and centers on the development of a comprehensive detection framework that relies upon a crucial attack repository. USBWARE will allow researchers and companies to better understand the vulnerabilities and attacks associated with USB devices as well as providing a comprehensive platform for developing detection solutions. Methodology: The framework of USBWARE is aimed at accurate detection of both known and unknown USB-based attacks by a process that efficiently enhances the framework's detection capabilities over time. The framework will integrate two main security approaches in order to enhance the detection of USB-based attacks associated with a variety of USB devices. The first approach is aimed at the detection of known attacks and their variants, whereas the second approach focuses on the detection of unknown attacks. USBWARE will consist of six independent but complimentary detection modules, each detecting attacks based on a different approach or discipline. These modules include novel ideas and algorithms inspired from or already developed within our team's domains of expertise, including cyber security, electrical and signal processing, machine learning, and computational biology. The establishment and maintenance of the USBWARE’s dynamic and up-to-date attack repository will strengthen the capabilities of the USBWARE detection framework. The attack repository’s infrastructure will enable researchers to record, document, create, and simulate existing and new USB-based attacks. This data will be used to maintain the detection framework’s updatability by incorporating knowledge regarding new attacks. Based on our experience in the cyber security domain, we aim to design the USBWARE framework so that it will have several characteristics that are crucial for this type of cyber-security detection solution. Specifically, the USBWARE framework should be: Novel, Multidisciplinary, Trusted, Lightweight, Extendable, Modular and Updatable and Adaptable. Major Findings: Based on our initial survey, we have already found more than 23 types of USB-based attacks, divided into six major categories. Our preliminary evaluation and proof of concepts showed that our detection modules can be used for efficient detection of several basic known USB attacks. Further research, development, and enhancements are required so that USBWARE will be capable to cover all of the major known USB attacks and to detect unknown attacks. Conclusion: USBWARE is a crucial detection framework that must be further enhanced and developed.

Keywords: USB, device, cyber security, attack, detection

Procedia PDF Downloads 397
1 Cyber-Med: Practical Detection Methodology of Cyber-Attacks Aimed at Medical Devices Eco-Systems

Authors: Nir Nissim, Erez Shalom, Tomer Lancewiki, Yuval Elovici, Yuval Shahar

Abstract:

Background: A Medical Device (MD) is an instrument, machine, implant, or similar device that includes a component intended for the purpose of the diagnosis, cure, treatment, or prevention of disease in humans or animals. Medical devices play increasingly important roles in health services eco-systems, including: (1) Patient Diagnostics and Monitoring; Medical Treatment and Surgery; and Patient Life Support Devices and Stabilizers. MDs are part of the medical device eco-system and are connected to the network, sending vital information to the internal medical information systems of medical centers that manage this data. Wireless components (e.g. Wi-Fi) are often embedded within medical devices, enabling doctors and technicians to control and configure them remotely. All these functionalities, roles, and uses of MDs make them attractive targets of cyber-attacks launched for many malicious goals; this trend is likely to significantly increase over the next several years, with increased awareness regarding MD vulnerabilities, the enhancement of potential attackers’ skills, and expanded use of medical devices. Significance: We propose to develop and implement Cyber-Med, a unique collaborative project of Ben-Gurion University of the Negev and the Clalit Health Services Health Maintenance Organization. Cyber-Med focuses on the development of a comprehensive detection framework that relies on a critical attack repository that we aim to create. Cyber-Med will allow researchers and companies to better understand the vulnerabilities and attacks associated with medical devices as well as providing a comprehensive platform for developing detection solutions. Methodology: The Cyber-Med detection framework will consist of two independent, but complementary detection approaches: one for known attacks, and the other for unknown attacks. These modules incorporate novel ideas and algorithms inspired by our team's domains of expertise, including cyber security, biomedical informatics, and advanced machine learning, and temporal data mining techniques. The establishment and maintenance of Cyber-Med’s up-to-date attack repository will strengthen the capabilities of Cyber-Med’s detection framework. Major Findings: Based on our initial survey, we have already found more than 15 types of vulnerabilities and possible attacks aimed at MDs and their eco-system. Many of these attacks target individual patients who use devices such pacemakers and insulin pumps. In addition, such attacks are also aimed at MDs that are widely used by medical centers such as MRIs, CTs, and dialysis engines; the information systems that store patient information; protocols such as DICOM; standards such as HL7; and medical information systems such as PACS. However, current detection tools, techniques, and solutions generally fail to detect both the known and unknown attacks launched against MDs. Very little research has been conducted in order to protect these devices from cyber-attacks, since most of the development and engineering efforts are aimed at the devices’ core medical functionality, the contribution to patients’ healthcare, and the business aspects associated with the medical device.

Keywords: medical device, cyber security, attack, detection, machine learning

Procedia PDF Downloads 356