Search results for: alkali attack
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 806

Search results for: alkali attack

746 Investigation of Alfa Fibers Reinforced Epoxy-Amine Composites Properties

Authors: Amar Boukerrou, Ouerdia Belhadj, Dalila Hammiche, Jean Francois Gerard, Jannick Rumeau

Abstract:

The main goal of this study is the investigation of alfa fiber content, treated with alkali treatment, on the thermal and mechanical properties of epoxy-amine matrix-based composites. The fibers were treated with 5% of sodium hydroxide solution and varied between 10% to 30% weight fractions. The tensile, flexural, and hardness tests are carried out to investigate the mechanical properties of composites. The results show those composites’ mechanical properties are higher than the neat epoxy-amine. It was noticed that the alkali treatment is more effective in the case of the tensile and flexural modulus than the tensile and flexural strength. The decline of both the tensile and flexural behavior of all composites with the increasing of the filler content was due probably to the random dispersion of the fibers in the epoxy resin The Fourier transform infrared (FTIR) was employed to analyze the chemical structure of epoxy resin before and after curing with amine hardener. FTIR and DSC analysis confirmed that epoxy resin was completely cured with amine hardener at room temperature. SEM analysis has highlighted the microstructure of epoxy matrix and its composites.

Keywords: alfa fiber, epoxy resin, alkali treatment, mechanical properties

Procedia PDF Downloads 70
745 Field Evaluation of Concrete Using Hawaiian Aggregates for Alkali Silica Reaction

Authors: Ian N. Robertson

Abstract:

Alkali Silica Reaction (ASR) occurs in concrete when the alkali hydroxides (Na, K and OH) from the cement react with unstable silica, SiO2, in some types of aggregate. The gel that forms during this reaction will expand when it absorbs water, potentially leading to cracking and overall expansion of the concrete. ASR has resulted in accelerated deterioration of concrete highways, dams and other structures that are exposed to moisture during their service life. Concrete aggregates available in Hawaii have not demonstrated a history of ASR, however, accelerated laboratory tests using ASTM 1260 indicated a potential for ASR with some aggregates. Certain clients are now requiring import of aggregates from the US mainland at great expense. In order to assess the accuracy of the laboratory test results, a long-term field study of the potential for ASR in concretes made with Hawaiian aggregates was initiated in 2011 with funding from the US Federal Highway Administration and Hawaii Department of Transportation. Thirty concrete specimens were constructed of various concrete mixtures using aggregates from all Hawaiian aggregate sources, and some US mainland aggregates known to exhibit ASR expansion. The specimens are located in an open field site in Manoa valley on the Hawaiian Island of Oahu, exposed to relatively high humidity and frequent rainfall. A weather station at the site records the ambient conditions on a continual basis. After two years of monitoring, only one of the Hawaiian aggregates showed any sign of expansion. Ten additional specimens were fabricated with this aggregate to confirm the earlier observations. Admixtures known to mitigate ASR, such as fly ash and lithium, were included in some specimens to evaluate their effect on the concrete expansion. This paper describes the field evaluation program and presents the results for all forty specimens after four years of monitoring.

Keywords: aggregate, alkali silica reaction, concrete durability, field exposure

Procedia PDF Downloads 216
744 Numerical Study of Flow Characteristics and Performance of 14-X B Inlet with Blunted Cowl-Lip

Authors: Sergio N. P. Laitón, Paulo G. P. Toro, João F. Martos

Abstract:

A numerical study has been carried out to investigate the flow characteristics and performance of the 14-X B inlet with blunted cowl-lip. The Brazilian aerospace hypersonic vehicle 14-X B is a technology demonstrator of a hypersonic air-breathing propulsion system, based on supersonic combustion ramjet (scramjet). It is designed for Earth's atmospheric flight at Mach number of 6 and an altitude of 30 km. Currently, it is under development in the aerothermodynamics and hypersonic Professor Henry T. Nagamatsu laboratory at Advanced Studies Institute (IEAv). Numerical simulations were conducted at nominal freestream Mach number and altitude for two cowl-lip blunting radius and several angles of attack close to horizontal flight. The results show that the shock interference behavior on the blunted cowl-lip change with the angle of attack and blunted radius. The type VI or V together with III shock interferences are more likely to occur simultaneously at small negative angles of attack. When the inlet operates in positive angles of attack higher to 1, no shock interference occurs, only the bow shock conditions. The results indicate a high air pressure at beginning of the combustor and higher pressure recovery with 2 mm radius and positives angles of attack.

Keywords: blunted cowl-lip, hypersonic inlet, inlet unstart, shock interference

Procedia PDF Downloads 291
743 Diagnostic Investigation of Aircraft Performance at Different Winglet Cant Angles

Authors: M. Dinesh, V. Kenny Mark, Dharni Vasudhevan Venkatesan, B. Santhosh Kumar, R. Sree Radesh, V. R. Sanal Kumar

Abstract:

Comprehensive numerical studies have been carried out to examine the best aerodynamic performance of subsonic aircraft at different winglet cant angles using a validated 3D k-ω SST model. In the parametric analytical studies, NACA series of airfoils are selected. Basic design of the winglet is selected from the literature and flow features of the entire wing including the winglet tip effects have been examined with different cant angles varying from 150 to 600 at different angles of attack up to 140. We have observed, among the cases considered in this study that a case with 150 cant angle the aerodynamics performance of the subsonic aircraft during takeoff was found better up to an angle of attack of 2.80 and further its performance got diminished at higher angles of attack. Analyses further revealed that increasing the winglet cant angle from 150 to 600 at higher angles of attack could negate the performance deterioration and additionally it could enhance the peak CL/CD on the order of 3.5%. The investigated concept of variable-cant-angle winglets appears to be a promising alternative for improving the aerodynamic efficiency of aircraft.

Keywords: aerodynamic efficiency, cant angle, drag reduction, flexible winglets

Procedia PDF Downloads 491
742 Durability of Cement Bonded Particleboards Produced from Terminalia superba and Gmelina arborea against Subterranean Termite Attack

Authors: Amos Olajide Oluyege, Emmanuel Uchechukwu Opara, Sunday Adeniyi Adedutan, Joseph Adeola Fuwape

Abstract:

This study was conducted to determine the durability of wood-cement particleboards when exposed to attack by subterranean termites, Macrotermes subhylinus. The boards were made from Terminalia superba and Gmelina arborea wood sawdust at nominal board densities (BD) of 1000, 900, and 800 kg/m³ using wood-cement mixing ratios (MR) of 3:1, 2.5:1, 2:1, and 1:1. Above ground durability tests against termite attack were carried out according to ASTM D 2017 for 14 weeks. Results of visual assessment of the wood cement particleboards show that all the board samples had a visual rating that was not less than 7 (i.e., moderate attack) for both species irrespective of the MR and BD. T. superba boards were found to have higher resistance to termite attack compared to their G. arborea counterparts. The mean values for weight loss following exposure ranged from 1.93 to 6.13% and 3.24 to 12.44%. Analysis of variance (ANOVA) results of the weight loss assessment revealed a significant (p < 0.05) effect of species and mixing ratio on the weight loss of the boards due to termite attack with F(₁,₇₂) = 92.890 and P = 0.000 and F(₃,₇₂) = 8.318 and p = 0.000, while board density did not have any significant effect (p > 0.05) with F (₂,₇₂) = 1.307 and p = 0.277. Thus, boards made from a higher mixing ratio had better resistance against termite attacks. Thus, it can be concluded that the durability of cement-bonded particleboards when exposed to subterranean termite attack is not only dependent on the quality of the wood raw material (species) but also on the enhanced protection imparted by the cement matrix; the protection increased with increase in cement/wood mixing ratio.

Keywords: cement-bonded particleboard, mixing ratio, board density, Gmelina arborea, Terminalia superba

Procedia PDF Downloads 177
741 Catalytic Study of Methanol-to-Propylene Conversion over Nano-Sized HZSM-5

Authors: Jianwen Li, Hongfang Ma, Weixin Qian, Haitao Zhang, Weiyong Ying

Abstract:

Methanol-to-propylene conversion was carried out in a continuous-flow fixed-bed reactor over nano-sized HZSM-5 zeolites. The HZSM-5 catalysts were synthesized with different Si/Al ratio and silicon sources, and treated with NaOH. The structural property, morphology, and acidity of catalysts were measured by XRD, N2 adsorption, FE-SEM, TEM, and NH3-TPD. The results indicate that the increment of Si/Al ratio decreased the acidity of catalysts and then improved propylene selectivity, while silicon sources had slight impact on the acidity but affected the product distribution. The desilication after alkali treatment could increase intracrystalline mesopores and enhance propylene selectivity.

Keywords: alkali treatment, HZSM-5, methanol-to-propylene, synthesis condition

Procedia PDF Downloads 183
740 Two-Level Graph Causality to Detect and Predict Random Cyber-Attacks

Authors: Van Trieu, Shouhuai Xu, Yusheng Feng

Abstract:

Tracking attack trajectories can be difficult, with limited information about the nature of the attack. Even more difficult as attack information is collected by Intrusion Detection Systems (IDSs) due to the current IDSs having some limitations in identifying malicious and anomalous traffic. Moreover, IDSs only point out the suspicious events but do not show how the events relate to each other or which event possibly cause the other event to happen. Because of this, it is important to investigate new methods capable of performing the tracking of attack trajectories task quickly with less attack information and dependency on IDSs, in order to prioritize actions during incident responses. This paper proposes a two-level graph causality framework for tracking attack trajectories in internet networks by leveraging observable malicious behaviors to detect what is the most probable attack events that can cause another event to occur in the system. Technically, given the time series of malicious events, the framework extracts events with useful features, such as attack time and port number, to apply to the conditional independent tests to detect the relationship between attack events. Using the academic datasets collected by IDSs, experimental results show that the framework can quickly detect the causal pairs that offer meaningful insights into the nature of the internet network, given only reasonable restrictions on network size and structure. Without the framework’s guidance, these insights would not be able to discover by the existing tools, such as IDSs. It would cost expert human analysts a significant time if possible. The computational results from the proposed two-level graph network model reveal the obvious pattern and trends. In fact, more than 85% of causal pairs have the average time difference between the causal and effect events in both computed and observed data within 5 minutes. This result can be used as a preventive measure against future attacks. Although the forecast may be short, from 0.24 seconds to 5 minutes, it is long enough to be used to design a prevention protocol to block those attacks.

Keywords: causality, multilevel graph, cyber-attacks, prediction

Procedia PDF Downloads 129
739 Non-Targeted Adversarial Image Classification Attack-Region Modification Methods

Authors: Bandar Alahmadi, Lethia Jackson

Abstract:

Machine Learning model is used today in many real-life applications. The safety and security of such model is important, so the results of the model are as accurate as possible. One challenge of machine learning model security is the adversarial examples attack. Adversarial examples are designed by the attacker to cause the machine learning model to misclassify the input. We propose a method to generate adversarial examples to attack image classifiers. We are modifying the successfully classified images, so a classifier misclassifies them after the modification. In our method, we do not update the whole image, but instead we detect the important region, modify it, place it back to the original image, and then run it through a classifier. The algorithm modifies the detected region using two methods. First, it will add abstract image matrix on back of the detected image matrix. Then, it will perform a rotation attack to rotate the detected region around its axes, and embed the trace of image in image background. Finally, the attacked region is placed in its original position, from where it was removed, and a smoothing filter is applied to smooth the background with foreground. We test our method in cascade classifier, and the algorithm is efficient, the classifier confident has dropped to almost zero. We also try it in CNN (Convolutional neural network) with higher setting and the algorithm was successfully worked.

Keywords: adversarial examples, attack, computer vision, image processing

Procedia PDF Downloads 304
738 NaOH/Pumice and LiOH/Pumice as Heterogeneous Solid Base Catalysts for Biodiesel Production from Soybean Oil: An Optimization Study

Authors: Joy Marie Mora, Mark Daniel De Luna, Tsair-Wang Chung

Abstract:

Transesterification reaction of soybean oil with methanol was carried out to produce fatty acid methyl esters (FAME) using calcined alkali metal (Na and Li) supported by pumice silica as the solid base catalyst. Pumice silica catalyst was activated by loading alkali metal ions to its surface via an ion-exchange method. Response surface methodology (RSM) in combination with Box-Behnken design (BBD) was used to optimize the operating parameters in biodiesel production, namely: reaction temperature, methanol to oil molar ratio, reaction time, and catalyst concentration. Using the optimized sets of parameters, FAME yields using sodium and lithium silicate catalysts were 98.80% and 98.77%, respectively. A pseudo-first order kinetic equation was applied to evaluate the kinetic parameters of the reaction. The prepared catalysts were characterized by several techniques such as X-ray diffraction (XRD), Fourier transform infrared spectroscopy (FTIR), Brunauer-Emmett-Teller (BET) sorptometer, and scanning electron microscopy (SEM). In addition, the reusability of the catalysts was successfully tested in two subsequent cycles.

Keywords: alkali metal, biodiesel, Box-Behnken design, heterogeneous catalyst, kinetics, optimization, pumice, transesterification

Procedia PDF Downloads 267
737 Mechanical and Durability Characteristics of Roller Compacted Geopolymer Concrete Using Recycled Concrete Aggregate

Authors: Syfur Rahman, Mohammad J. Khattak

Abstract:

Every year a huge quantity of recycling concrete aggregate (RCA) is generated in the United States of America. Utilization of RCA can solve the storage problem, prevent environmental pollution, and reduce the construction cost. However, due to the overall low strength and durability characteristics of RCA, its usages are limited to a certain area like a landfill, low strength base material, replacement of a few percentages of virgin aggregates in Portland cement concrete, etc. This study focuses on the improvement of the strength and durability characteristics of RCA by introducing the concept of roller-compacted geopolymer concrete. In this research, developed roller-compacted geopolymer concrete (RCGPC) and roller-compacted cement concrete (RCC) mixtures containing 100% recycled concrete aggregate were evaluated and compared. Several selected RCGPC mixtures were investigated to find out the effect of mixture variables, including sodium hydroxide (NaOH) molar concentration, sodium silicate (Na₂SiO₃), to sodium hydroxide (NaOH) ratio on the strength, stiffness and durability characteristics of the developed RCGPC. Sodium hydroxide (NaOH) and sodium silicate (Na₂SiO₃) were mixed in different ratios to synthesize the alkali activator. American Concrete Pavement Association (ACPA) recommended RCC gradation was used with a maximum nominal aggregate size of 19 mm with a 4% fine particle passing 0.075 mm sieve. The mixtures were made using NaOH molar concentration of 8M and 10M along with, Na₂SiO₃ to NaOH ratio of 0 and 1 by mass and 15% class F fly ash. Optimum alkali content and moisture content were determined for each RCGPC and RCC mixtures, respectively, using modified proctor test. Compressive strength, semi-circular bending beam strength, and dynamic modulus test were conducted to evaluate the mechanistic characteristics of both mixtures. To determine the optimum curing conditions for RCGPC, effects of different curing temperature and curing duration on compressive strength were also studied. Sulphate attack and freeze-thaw tests were also carried out to assess the durability properties of the developed mixtures. X-ray diffraction (XRD) was used for morphology and microstructure analysis. From the optimum moisture content results, it was found that RCGPC has high alkali content, which was mainly due to the high absorption capacity of RCA. It was found that the mixtures with Na₂SiO₃ to NaOH ratio of 1 yielded about 60% higher compressive strength than the ratio of 0. Further, the mixtures using 10M NaOH concentrations and alkali ratio of 1 produced about 28 MPa of compressive strength, which was around 33% higher than 8M NaOH mixtures. Similar results were obtained for elastic and dynamic modulus of the mixtures. On the other hand, the semi-circular bending beam strength remained the same for both 8 and 10 molar NaOH geopolymer mixtures. Formation of new geopolymeric compounds and chemical bonds in the newly formed novel RCGPC mixtures were also discovered using XRD analysis. The results of mechanical and durability testing further revealed that RCGPC performed similarly to that of RCC mixtures. Based on the results of mechanical and durability testing, the developed RCGPC mixtures using 100% recycled concrete could be used as a cost-effective solution for the construction of pavement structures.

Keywords: roller compacted concrete, geopolymer concrete, recycled concrete aggregate, concrete pavement, fly ash

Procedia PDF Downloads 102
736 The Proactive Approach of Digital Forensics Methodology against Targeted Attack Malware

Authors: Mohamed Fadzlee Sulaiman, Mohd Zabri Adil Talib, Aswami Fadillah Mohd Ariffin

Abstract:

Each individual organization has their own mechanism to build up cyber defense capability in protecting their information infrastructures from data breaches and cyber espionage. But, we can not deny the possibility of failing to detect and stop cyber attacks especially for those targeting credential information and intellectual property (IP). In this paper, we would like to share the modern approach of effective digital forensic methodology in order to identify the artifacts in tracing the trails of evidence while mitigating the infection from the target machine/s. This proposed approach will suit the digital forensic investigation to be conducted while resuming the business critical operation after mitigating the infection and minimizing the risk from the identified attack to transpire. Therefore, traditional digital forensics methodology has to be improvised to be proactive which not only focusing to discover the root caused and the threat actor but to develop the relevant mitigation plan in order to prevent from the same attack.

Keywords: digital forensic, detection, eradication, targeted attack, malware

Procedia PDF Downloads 240
735 Use of Waste Tire Rubber Alkali-Activated-Based Mortars in Repair of Concrete Structures

Authors: Mohammad Ebrahim Kianifar, Ehsan Ahmadi

Abstract:

Reinforced concrete structures experience local defects such as cracks over their lifetime under various environmental loadings. Consequently, they are repaired by mortars to avoid detrimental effects such as corrosion of reinforcement, which in long-term may lead to strength loss of a member or collapse of structures. However, repaired structures may need multiple repairs due to changes in load distribution, and thus, lack of compatibility between mortar and substrate concrete. On the other hand, waste tire rubber alkali-activated (WTRAA)-based materials have very high potential to be used as repair mortars because of their ductility and flexibility, which may delay the failure of repair mortar and thus, provide sufficient compatibility. Hence, this work presents a pioneering study on suitability of WTRAA-based materials as mortars for the repair of concrete structures through an experimental program. To this end, WTRAA mortars with 15% aggregate replacement, alkali-activated (AA) mortars, and ordinary mortars are made to repair a number of concrete beams. The WTRAA mortars are composed of slag as base material, sodium hydroxide as an alkaline activator, and different gradations of waste tire rubber (fine and coarse gradations). Flexural tests are conducted on the concrete beams repaired by the ordinary, AA, and WTRAA mortars. It is found that, despite having lower compressive strength and modulus of elasticity, the WTRAA and AA mortars increase the flexural strength of the repaired beams, give compatible failures, and provide sufficient mortar-concrete interface bondings. The ordinary mortars, however, show incompatible failure modes. This study demonstrates the promising application of WTRAA mortars in the practical repairs of concrete structures.

Keywords: alkali-activated mortars, concrete repair, mortar compatibility, flexural strength, waste tire rubber

Procedia PDF Downloads 107
734 Deployment of Attack Helicopters in Conventional Warfare: The Gulf War

Authors: Mehmet Karabekir

Abstract:

Attack helicopters (AHs) are usually deployed in conventional warfare to destroy armored and mechanized forces of enemy. In addition, AHs are able to perform various tasks in the deep, and close operations – intelligence, surveillance, reconnaissance, air assault operations, and search and rescue operations. Apache helicopters were properly employed in the Gulf Wars and contributed the success of campaign by destroying a large number of armored and mechanized vehicles of Iraq Army. The purpose of this article is to discuss the deployment of AHs in conventional warfare in the light of Gulf Wars. First, the employment of AHs in deep and close operations will be addressed regarding the doctrine. Second, the US armed forces AH-64 doctrinal and tactical usage will be argued in the 1st and 2nd Gulf Wars.

Keywords: attack helicopter, conventional warfare, gulf wars

Procedia PDF Downloads 439
733 Data Analysis to Uncover Terrorist Attacks Using Data Mining Techniques

Authors: Saima Nazir, Mustansar Ali Ghazanfar, Sanay Muhammad Umar Saeed, Muhammad Awais Azam, Saad Ali Alahmari

Abstract:

Terrorism is an important and challenging concern. The entire world is threatened by only few sophisticated terrorist groups and especially in Gulf Region and Pakistan, it has become extremely destructive phenomena in recent years. Predicting the pattern of attack type, attack group and target type is an intricate task. This study offers new insight on terrorist group’s attack type and its chosen target. This research paper proposes a framework for prediction of terrorist attacks using the historical data and making an association between terrorist group, their attack type and target. Analysis shows that the number of attacks per year will keep on increasing, and Al-Harmayan in Saudi Arabia, Al-Qai’da in Gulf Region and Tehreek-e-Taliban in Pakistan will remain responsible for many future terrorist attacks. Top main targets of each group will be private citizen & property, police, government and military sector under constant circumstances.

Keywords: data mining, counter terrorism, machine learning, SVM

Procedia PDF Downloads 373
732 Non-Targeted Adversarial Object Detection Attack: Fast Gradient Sign Method

Authors: Bandar Alahmadi, Manohar Mareboyana, Lethia Jackson

Abstract:

Today, there are many applications that are using computer vision models, such as face recognition, image classification, and object detection. The accuracy of these models is very important for the performance of these applications. One challenge that facing the computer vision models is the adversarial examples attack. In computer vision, the adversarial example is an image that is intentionally designed to cause the machine learning model to misclassify it. One of very well-known method that is used to attack the Convolution Neural Network (CNN) is Fast Gradient Sign Method (FGSM). The goal of this method is to find the perturbation that can fool the CNN using the gradient of the cost function of CNN. In this paper, we introduce a novel model that can attack Regional-Convolution Neural Network (R-CNN) that use FGSM. We first extract the regions that are detected by R-CNN, and then we resize these regions into the size of regular images. Then, we find the best perturbation of the regions that can fool CNN using FGSM. Next, we add the resulted perturbation to the attacked region to get a new region image that looks similar to the original image to human eyes. Finally, we placed the regions back to the original image and test the R-CNN with the attacked images. Our model could drop the accuracy of the R-CNN when we tested with Pascal VOC 2012 dataset.

Keywords: adversarial examples, attack, computer vision, image processing

Procedia PDF Downloads 156
731 Longitudinal Vortices Mixing in Three-Stream Micromixers with Two Inlets

Authors: Yi-Tun Huang, Chih-Yang Wu, Shu-Wei Huang

Abstract:

In this work, we examine fluid mixing in a full three-stream mixing channel with longitudinal vortex generators (LVGs) built on the channel bottom by numerical simulation and experiment. The effects of the asymmetrical arrangement and the attack angle of the LVGs on fluid mixing are investigated. The results show that the micromixer with LVGs at a small asymmetry index (defined by the ratio of the distance from the center plane of the gap between the winglets to the center plane of the main channel to the width of the main channel) is superior to the micromixer with symmetric LVGs and that with LVGs at a large asymmetry index. The micromixer using five mixing modules of the LVGs with an attack angle between 16.5 degrees and 22.5 degrees can achieve excellent mixing over a wide range of Reynolds numbers. Here, we call a section of channel with two pairs of staggered asymmetrical LVGs a mixing module. Besides, the micromixer with LVGs at a small attack angle is more efficient than that with a larger attack angle when pressure losses are taken into account.

Keywords: microfluidics, mixing, longitudinal vortex generators, two stream interfaces

Procedia PDF Downloads 487
730 FE Modelling of Structural Effects of Alkali-Silica Reaction in Reinforced Concrete Beams

Authors: Mehdi Habibagahi, Shami Nejadi, Ata Aminfar

Abstract:

A significant degradation factor that impacts the durability of concrete structures is the alkali-silica reaction. Engineers are frequently charged with the challenges of conducting a thorough safety assessment of concrete structures that have been impacted by ASR. The alkali-silica reaction has a major influence on the structural capacities of structures. In most cases, the reduction in compressive strength, tensile strength, and modulus of elasticity is expressed as a function of free expansion and crack widths. Predicting the effect of ASR on flexural strength is also relevant. In this paper, a nonlinear three-dimensional (3D) finite-element model was proposed to describe the flexural strength degradation induced byASR.Initial strains, initial stresses, initial cracks, and deterioration of material characteristics were all considered ASR factors in this model. The effects of ASR on structural performance were evaluated by focusing on initial flexural stiffness, force–deformation curve, and load-carrying capacity. Degradation of concrete mechanical properties was correlated with ASR growth using material test data conducted at Tech Lab, UTS, and implemented into the FEM for various expansions. The finite element study revealed a better understanding of the ASR-affected RC beam's failure mechanism and capacity reduction as a function of ASR expansion. Furthermore, in this study, decreasing of the residual mechanical properties due to ASRisreviewed, using as input data for the FEM model. Finally, analysis techniques and a comparison of the analysis and the experiment results are discussed. Verification is also provided through analyses of reinforced concrete beams with behavior governed by either flexural or shear mechanisms.

Keywords: alkali-silica reaction, analysis, assessment, finite element, nonlinear analysis, reinforced concrete

Procedia PDF Downloads 135
729 Vulnerable Paths Assessment for Distributed Denial of Service Attacks in a Cloud Computing Environment

Authors: Manas Tripathi, Arunabha Mukhopadhyay

Abstract:

In Cloud computing environment, cloud servers, sometimes may crash after receiving huge amount of request and cloud services may stop which can create huge loss to users of that cloud services. This situation is called Denial of Service (DoS) attack. In Distributed Denial of Service (DDoS) attack, an attacker targets multiple network paths by compromising various vulnerable systems (zombies) and floods the victim with huge amount of request through these zombies. There are many solutions to mitigate this challenge but most of the methods allows the attack traffic to arrive at Cloud Service Provider (CSP) and then only takes actions against mitigation. Here in this paper we are rather focusing on preventive mechanism to deal with these attacks. We analyze network topology and find most vulnerable paths beforehand without waiting for the traffic to arrive at CSP. We have used Dijkstra's and Yen’s algorithm. Finally, risk assessment of these paths can be done by multiplying the probabilities of attack for these paths with the potential loss.

Keywords: cloud computing, DDoS, Dijkstra, Yen’s k-shortest path, network security

Procedia PDF Downloads 252
728 Adversarial Attacks and Defenses on Deep Neural Networks

Authors: Jonathan Sohn

Abstract:

Deep neural networks (DNNs) have shown state-of-the-art performance for many applications, including computer vision, natural language processing, and speech recognition. Recently, adversarial attacks have been studied in the context of deep neural networks, which aim to alter the results of deep neural networks by modifying the inputs slightly. For example, an adversarial attack on a DNN used for object detection can cause the DNN to miss certain objects. As a result, the reliability of DNNs is undermined by their lack of robustness against adversarial attacks, raising concerns about their use in safety-critical applications such as autonomous driving. In this paper, we focus on studying the adversarial attacks and defenses on DNNs for image classification. There are two types of adversarial attacks studied which are fast gradient sign method (FGSM) attack and projected gradient descent (PGD) attack. A DNN forms decision boundaries that separate the input images into different categories. The adversarial attack slightly alters the image to move over the decision boundary, causing the DNN to misclassify the image. FGSM attack obtains the gradient with respect to the image and updates the image once based on the gradients to cross the decision boundary. PGD attack, instead of taking one big step, repeatedly modifies the input image with multiple small steps. There is also another type of attack called the target attack. This adversarial attack is designed to make the machine classify an image to a class chosen by the attacker. We can defend against adversarial attacks by incorporating adversarial examples in training. Specifically, instead of training the neural network with clean examples, we can explicitly let the neural network learn from the adversarial examples. In our experiments, the digit recognition accuracy on the MNIST dataset drops from 97.81% to 39.50% and 34.01% when the DNN is attacked by FGSM and PGD attacks, respectively. If we utilize FGSM training as a defense method, the classification accuracy greatly improves from 39.50% to 92.31% for FGSM attacks and from 34.01% to 75.63% for PGD attacks. To further improve the classification accuracy under adversarial attacks, we can also use a stronger PGD training method. PGD training improves the accuracy by 2.7% under FGSM attacks and 18.4% under PGD attacks over FGSM training. It is worth mentioning that both FGSM and PGD training do not affect the accuracy of clean images. In summary, we find that PGD attacks can greatly degrade the performance of DNNs, and PGD training is a very effective way to defend against such attacks. PGD attacks and defence are overall significantly more effective than FGSM methods.

Keywords: deep neural network, adversarial attack, adversarial defense, adversarial machine learning

Procedia PDF Downloads 153
727 A Secure Survey against Black Hole Attack in MANET

Authors: G. Usha, S. Kannimuthu, K. Mahalakshmi

Abstract:

Mobile Adhoc Network (MANET) is one of the most promising technologies that have applications ranging from various portable devices to military networks. MANET has no fixed infrastructure and the security of such network is a big concern. Therefore, in order to operate MANET’s securely, the misbehavior and intrusions should be detected before the attackers affect the network communication. In this article, we make a comprehensive survey against black hole attack that is a serious threat against MANET that exploits the routing behavior of the MANET. We have given broad survey solutions that detect black hole attacks in MANET. This is achieved by analyzing the techniques involved in detecting the attacks in each scheme. Furthermore, we examine about the challenges to the researchers for constructing an in-depth solution against black hole attack.

Keywords: AODV, cross layer security, mobile Adhoc network (MANET), packet delivery ratio, single layer security

Procedia PDF Downloads 376
726 Characteristic on Compressive Strength of Blast Slag and Fly Ash Hybrid Geopolymer Mortar

Authors: G. S. Ryu, K. T. Koh, H. Y. Kim, G. H. An, D. W. Seo

Abstract:

Geopolymer mortar is produced by alkaline activation of pozzolanic materials such as fly ground granulated blast-furnace slag (GGBFS) and fly ash (FA). Its unique reaction pathway facilitates rapid strength development in comparison with hydration of ordinary Portland cement (OPC). Geopolymer can be fabricated using various types and dosages of alkali-activator, which effectively gives a wider control over the performance of the final product. The present study investigates the effect of types of precursors and curing conditions on the fresh state and strength development characteristics of geopolymers, thereby comparatively exploring the effect of precursors from various sources of origin. The obtained result showed that the setting time and strength development of the specimens with the identical mix proportion but different precursors displayed significant variations.

Keywords: alkali-activated material, blast furnace slag, fly ash, flowability, strength development

Procedia PDF Downloads 213
725 Aerodynamic Modeling Using Flight Data at High Angle of Attack

Authors: Rakesh Kumar, A. K. Ghosh

Abstract:

The paper presents the modeling of linear and nonlinear longitudinal aerodynamics using real flight data of Hansa-3 aircraft gathered at low and high angles of attack. The Neural-Gauss-Newton (NGN) method has been applied to model the linear and nonlinear longitudinal dynamics and estimate parameters from flight data. Unsteady aerodynamics due to flow separation at high angles of attack near stall has been included in the aerodynamic model using Kirchhoff’s quasi-steady stall model. NGN method is an algorithm that utilizes Feed Forward Neural Network (FFNN) and Gauss-Newton optimization to estimate the parameters and it does not require any a priori postulation of mathematical model or solving of equations of motion. NGN method was validated on real flight data generated at moderate angles of attack before application to the data at high angles of attack. The estimates obtained from compatible flight data using NGN method were validated by comparing with wind tunnel values and the maximum likelihood estimates. Validation was also carried out by comparing the response of measured motion variables with the response generated by using estimates a different control input. Next, NGN method was applied to real flight data generated by executing a well-designed quasi-steady stall maneuver. The results obtained in terms of stall characteristics and aerodynamic parameters were encouraging and reasonably accurate to establish NGN as a method for modeling nonlinear aerodynamics from real flight data at high angles of attack.

Keywords: parameter estimation, NGN method, linear and nonlinear, aerodynamic modeling

Procedia PDF Downloads 409
724 Secure Hashing Algorithm and Advance Encryption Algorithm in Cloud Computing

Authors: Jaimin Patel

Abstract:

Cloud computing is one of the most sharp and important movement in various computing technologies. It provides flexibility to users, cost effectiveness, location independence, easy maintenance, enables multitenancy, drastic performance improvements, and increased productivity. On the other hand, there are also major issues like security. Being a common server, security for a cloud is a major issue; it is important to provide security to protect user’s private data, and it is especially important in e-commerce and social networks. In this paper, encryption algorithms such as Advanced Encryption Standard algorithms, their vulnerabilities, risk of attacks, optimal time and complexity management and comparison with other algorithms based on software implementation is proposed. Encryption techniques to improve the performance of AES algorithms and to reduce risk management are given. Secure Hash Algorithms, their vulnerabilities, software implementations, risk of attacks and comparison with other hashing algorithms as well as the advantages and disadvantages between hashing techniques and encryption are given.

Keywords: Cloud computing, encryption algorithm, secure hashing algorithm, brute force attack, birthday attack, plaintext attack, man in middle attack

Procedia PDF Downloads 247
723 Improved Impossible Differential Cryptanalysis of Midori64

Authors: Zhan Chen, Wenquan Bi, Xiaoyun Wang

Abstract:

The Midori family of light weight block cipher is proposed in ASIACRYPT2015. It has attracted the attention of numerous cryptanalysts. There are two versions of Midori: Midori64 which takes a 64-bit block size and Midori128 the size of which is 128-bit. In this paper an improved 10-round impossible differential attack on Midori64 is proposed. Pre-whitening keys are considered in this attack. A better impossible differential path is used to reduce time complexity by decreasing the number of key bits guessed. A hash table is built in the pre-computation phase to reduce computational complexity. Partial abort technique is used in the key seiving phase. The attack requires 259 chosen plaintexts, 214.58 blocks of memory and 268.83 10-round Midori64 encryptions.

Keywords: cryptanalysis, impossible differential, light weight block cipher, Midori

Procedia PDF Downloads 323
722 System Survivability in Networks in the Context of Defense/Attack Strategies: The Large Scale

Authors: Asma Ben Yaghlane, Mohamed Naceur Azaiez, Mehdi Mrad

Abstract:

We investigate the large scale of networks in the context of network survivability under attack. We use appropriate techniques to evaluate and the attacker-based- and the defender-based-network survivability. The attacker is unaware of the operated links by the defender. Each attacked link has some pre-specified probability to be disconnected. The defender choice is so that to maximize the chance of successfully sending the flow to the destination node. The attacker however will select the cut-set with the highest chance to be disabled in order to partition the network. Moreover, we extend the problem to the case of selecting the best p paths to operate by the defender and the best k cut-sets to target by the attacker, for arbitrary integers p,k > 1. We investigate some variations of the problem and suggest polynomial-time solutions.

Keywords: defense/attack strategies, large scale, networks, partitioning a network

Procedia PDF Downloads 242
721 Evaluation of Properties of Alkali Activated Slag Concrete Blended with Polypropylene Shredding and Admixture

Authors: Jagannath Prasad Tegar, Zeeshan Ahmad

Abstract:

The Ordinary Portland Cement (OPC) is a major constituent of concrete, which is being used extensively since last half century. The production of cement is impacting not only environment alone, but depleting natural materials. During the past 3 decades, the scholars have carried out studies and researches to explore the supplementary cementatious materials such as Ground granulated Blast furnace slag (GGBFS), silica fumes (SF), metakaolin or fly ash (FA). This has contributed towards improved cementatious materials which are being used in construction, but not the way it is supposed to be. The alkali activated slag concrete is another innovation which has constituents of cementatious materials like Ground Granuled Blast Furnace Slag (GGBFS), Fly Ash (FA), Silica Fumes (SF) or Metakaolin. Alkaline activators like Sodium Silicate (Na₂SiO₃) and Sodium Hydroxide (NaOH) is utilized. In view of evaluating properties of alkali activated slag concrete blended with polypropylene shredding and accelerator, research study is being carried out. This research study is proposed to evaluate the effect of polypropylene shredding and accelerating admixture on mechanical properties of alkali-activated slag concrete. The mechanical properties include the compressive strength, splitting tensile strength and workability. The outcomes of this research are matched with the hypothesis and it is found that 27% of cement can be replaced with the ground granulated blast furnace slag (GGBFS) and for split tensile strength 20% replacement is achieved. Overall it is found that 20% of cement can be replaced with ground granulated blast furnace slag. The tests conducted in the laboratory for evaluating properties such as compressive strength test, split tensile strength test, and slump cone test. On the aspect of cost, it is substantially benefitted.

Keywords: ordinary Portland cement, activated slag concrete, ground granule blast furnace slag, fly ash, silica fumes

Procedia PDF Downloads 152
720 Peculiar Mineralogical and Chemical Evolution of Contaminated Igneous Rocks at a Gabbro-Carbonate Contact, Wadai Bayhan, Yemen

Authors: Murad Ali, Shoji Arai, Mohamed Khedr, Mukhtar Nasher, Shawki Nasr

Abstract:

The Wadi Bayhan area of southeastern Yemen is about 60 km NW of Al-Bayda city in the Al-Bayda uplift terrane at the southeast margin of the Arabian-Nubian Shield. Intrusion of alkali gabbro into carbonate rocks apparently produced an 8m to 10 m thick reaction zone at the contact. This had been identified as nepheline pyroxenite. We have observed this to be mineralogically zoned with calc-silicate assemblages (e.g. pyroxene, calcite, spinel, garnet and melilite). The presence of melilite implies a skarn. The sinuous embayed pyroxenite-skarn contact, the presence of skarn minerals in pyroxenite, and textural evidence for growth of calc-silicate skarn by replacement of both carbonate rocks and solid pyroxenite indicate that reaction involved assimilation of carbonate wall rock by magma and loss of Al and Si to the skarn. Textural relationships between minerals provide evidence for a metasomatic development of the skarn at the expense of the pyroxenite. This process, related to the circulation of fluids equilibrated with carbonates, is responsible for those pyroxenite-spinel (± calcite) skarns. The uneven modal distribution of euhedral pyroxenite and enveloping nepheline in pyroxenite, the restricted occurrence of alkali gabbro as dikes in pyroxenite and skarn and the leucocratic matrix of pyroxenite suggest that pyroxenite represents an accumulation of titanaugite cemented by an alkali-rich residual magma and that alkali gabbro represents a part of the residual contaminated magma that was squeezed out of the pyroxene crystal mush. Carbonate assimilation is modeled by reaction of calcite and magmatic plagioclase, which results in resorption of plagioclase, growth of pyroxene enriched in Ca, Fe, Ti, and Al, and solution of nepheline in residual contaminated magma. The composition of nepheline pyroxenite evolved by addition of Ca from dissolved carbonate rocks, loss of Al and Si to skarn, and local segregation of solid pyroxene and alkali gabbro magma. The predominance of pyroxenite among contaminated rocks and their restriction to a large zone along the intrusive contact provide little evidence for the genesis of a significant volume of alkaline magmatic surroundings by carbonate assimilation.

Keywords: Yemen, Wadi Bayhan, skarn, pyroxenite, carbonatite, metasomatic

Procedia PDF Downloads 297
719 Rare Earth Elements and Radioactivity of Granitoid Rocks at Abu Marw Area, South Eastern Desert, Egypt

Authors: Adel H.El-Afandy, Abd Alrahman Embaby, Mona A. El Harairey

Abstract:

Abu Marw area is located in the southeastern part of the Eastern Desert, about 150km south east of Aswan. Abu Marw area is mainly covered by late Proterozoic igneous and metamorphic rocks. These basement rocks are nonconformably overlain by late Cretaceous Nubian sandstones in the western and northern parts of the areas. Abu Marw granitoid batholiths comprises a co-magmatic calc alkaline I type peraluminous suite of rocks ranging in composition from tonalite, granodiorite, monzogranite, syenogranite to alkali feldspar granite. The studied tonalite and granodiorite samples have ΣREE lower than the average REE values (250ppm) of granitic rocks, while the monzogranite, syenogranite and alkali feldspar granite samples have ΣREE above the average REE values of granitic rocks. Chondrite-normalized REE patterns of the considered granites display a gull-wing shape, characterized by large to moderately fractionated patterns and high LREE relative to the MREE and HREE contents. Furthermore, the studied rocks have a steadily decreasing Eu/Eu* values from the tonalite to the alkali feldspar granite with simultaneous increase in the ΣREE contents. The average U contents in different granitic rocks.

Keywords: granite, rare earth element, radioactivity, Abu Marw, south eastern desert

Procedia PDF Downloads 397
718 The Preparation of Silicon and Aluminum Extracts from Tuncbilek and Orhaneli Fly Ashes by Alkali Fusion

Authors: M. Sari Yilmaz, N. Karamahmut Mermer

Abstract:

Coal fly ash is formed as a solid waste product from the combustion of coal in coal fired power stations. Huge amounts of fly ash are produced globally every year and are predicted to increase. Nowadays, less than half of the fly ash is used as a raw material for cement manufacturing, construction and the rest of it is disposed as a waste causing yet another environmental concern. For this reason, the recycling of this kind of slurries into useful materials is quite important in terms of economical and environmental aspects. The purpose of this study is to evaluate the Orhaneli and Tuncbilek coal fly ashes for utilization in some industrial applications. Therefore the mineralogical and chemical compositions of these fly ashes were analyzed by X-ray fluorescence (XRF) spectroscopy and X-ray diffraction (XRD). The silicon (Si) and aluminum (Al) in the fly ashes were activated by alkali fusion technique with sodium hydroxide. The obtained extracts were analyzed for Si and Al content by inductively coupled plasma optical emission spectrometry (ICP-OES).

Keywords: extraction, fly ash, fusion, XRD

Procedia PDF Downloads 293
717 Public Wi-Fi Security Threat Evil Twin Attack Detection Based on Signal Variant and Hop Count

Authors: Said Abdul Ahad Ahadi, Elyas Baray, Nitin Rakesh, Sudeep Varshney

Abstract:

Wi-Fi is a widely used internet source that is used to provide internet access in many areas such as Stores, Cafes, University campuses, Restaurants and so on. This technology brought more facilities in communication and networking. On the other hand, due to the transmission of data over the air, which makes the network vulnerable, so it becomes prone to various threats such as Evil Twin and etc. The Evil Twin is a kind of adversary which impersonates a legitimate access point (LAP) as it can happen by spoofing the name (SSID) and MAC address (BSSID) of a legitimate access point (LAP). And this attack can cause many threats such as MITM, Service Interruption, Access point service blocking. Various Evil Twin Attack Detection Techniques are proposed, but they require additional hardware, or they require protocol modification. In this paper, we proposed a new technique based on Access Point’s two fingerprints, Received Signal Strength Indicator (RSSI) and Hop Count, that is hard to copy by an adversary. And we implemented the technique in a system called “ETDetector,” which can detect and prevent the attack.

Keywords: evil twin, LAP, SSID, Wi-Fi security, signal variation, ETAD, kali linux, scapy, python

Procedia PDF Downloads 118