Search results for: magmatic intrusion
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 207

Search results for: magmatic intrusion

87 Analysis of Vapor-Phase Diffusion of Benzene from Contaminated Soil

Authors: Asma A. Parlin, K. Nakamura, N. Watanabe, T. Komai

Abstract:

Understanding the effective diffusion of benzene vapor in the soil-atmosphere interface is important as an intrusion of benzene into the atmosphere from the soil is largely driven by diffusion. To analyze the vertical one dimensional effective diffusion of benzene vapor in porous medium with high water content, diffusion experiments were conducted in soil columns using Andosol soil and Toyoura silica sand with different water content; for soil water content was from 0 to 30 wt.% and for sand it was from 0.06 to 10 wt.%. In soil, a linear relation was found between water content and effective diffusion coefficient while the effective diffusion coefficient didn’t change in the sand with increasing water. A numerical transport model following unsteady-state approaches based on Fick’s second law was used to match the required time for a steady state of the gas phase concentration profile of benzene to the experimentally measured concentration profile gas phase in the column. The result highlighted that both the water content and porosity might increase vertical diffusion of benzene vapor in soil.

Keywords: benzene vapor-phase, effective diffusion, subsurface soil medium, unsteady state

Procedia PDF Downloads 107
86 Long-Term Mechanical and Structural Properties of Metakaolin-Based Geopolymers

Authors: Lenka Matulova

Abstract:

Geopolymers are alumosilicate materials that have long been studied. Despite this fact, little is known about the long-term stability of geopolymer mechanical and structural properties, so crucial for their successful industrial application. To improve understanding, we investigated the effect of four different types of environments on the mechanical and structural properties of a metakaolin-based geopolymer (MK GP). The MK GP samples were stored in laboratory conditions (control samples), in water at 20 °C, in water at 80 °C, and outside exposed to the weather. Compressive and tensile strengths were measured after 28, 56, 90, and 360 days. In parallel, structural properties were analyzed using XRD, SEM, and mercury intrusion porosimetry. Whereas the mechanical properties of the samples in laboratory conditions and in 20 °C water were stable, the mechanical properties of the outdoor samples and the samples 80 °C water decreased noticeably after 360 days. Structural analyses were focused on changes in sample microstructure (developing microcrack network, porosity) and identifying zeolites, the presence of which would indicate detrimental processes in the structure that can change it from amorphous to crystalline. No zeolites were found during the 360-day period in MK GP samples, but the reduction in mechanical properties coincided with a developing network of microcracks and changes in pore size distribution.

Keywords: geopolymer, long-term properties, mechanical properties, metakaolin, structural properties

Procedia PDF Downloads 205
85 The Influence of Water and Salt Crystals Content on Thermal Conductivity Coefficient of Red Clay Brick

Authors: Dalia Bednarska, Marcin Koniorczyk

Abstract:

This paper presents results of experiments aimed at studying hygro-thermal properties of red clay brick. The main objective of research was to investigate the relation between thermal conductivity coefficient of brick and its water or Na2SO4 solution content. The research was conducted using stationary technique for the totally dried specimens, as well as the ones 25%, 50%, 75% and 100% imbued with water or sodium sulfate solution. Additionally, a sorption isotherm test was conducted for seven relative humidity levels. Furthermore the change of red clay brick pore structure before and after imbuing with water and salt solution was investigated by multi-cycle mercury intrusion test. The experimental results confirm negative influence of water or sodium sulphate on thermal properties of material. The value of thermal conductivity coefficient increases along with growth of water or Na₂SO₄ solution content. The study shows that the presence of Na₂SO₄ solution has less negative influence on brick’s thermal conductivity coefficient than water.

Keywords: building materials, red clay brick, sodium sulfate, thermal conductivity coefficient

Procedia PDF Downloads 375
84 Vertical and Horizantal Distribution Patterns of Major and Trace Elements: Surface and Subsurface Sediments of Endhorheic Lake Acigol Basin, Denizli Turkey

Authors: M. Budakoglu, M. Karaman

Abstract:

Lake Acıgöl is located in area with limited influences from urban and industrial pollution sources, there is nevertheless a need to understand all potential lithological and anthropogenic sources of priority contaminants in this closed basin. This study discusses vertical and horizontal distribution pattern of major, trace elements of recent lake sediments to better understand their current geochemical analog with lithological units in the Lake Acıgöl basin. This study also provides reliable background levels for the region by the detailed surfaced lithological units data. The detail results of surface, subsurface and shallow core sediments from these relatively unperturbed ecosystems, highlight its importance as conservation area, despite the high-scale industrial salt production activity. While P2O5/TiO2 versus MgO/CaO classification diagram indicate magmatic and sedimentary origin of lake sediment, Log(SiO2/Al2O3) versus Log(Na2O/K2O) classification diagrams express lithological assemblages of shale, iron-shale, vacke and arkose. The plot between TiO2 vs. SiO2 and P2O5/TiO2 vs. MgO/CaO also supports the origin of the primary magma source. The average compositions of the 20 different lithological units used as a proxy for geochemical background in the study area. As expected from weathered rock materials, there is a large variation in the major element content for all analyzed lake samples. The A-CN-K and A-CNK-FM ternary diagrams were used to deduce weathering trends. Surface and subsurface sediments display an intense weathering history according to these ternary diagrams. The most of the sediments samples plot around UCC and TTG, suggesting a low to moderate weathering history for the provenance. The sediments plot in a region clearly suggesting relative similar contents in Al2O3, CaO, Na2O, and K2O from those of lithological samples.

Keywords: Lake Acıgöl, recent lake sediment, geochemical speciation of major and trace elements, heavy metals, Denizli, Turkey

Procedia PDF Downloads 378
83 Impacts Of Salinity on Co2 Turnover in Some Gefara Soils of Libya

Authors: Fathi Elyaagubi

Abstract:

Salinization is a major threat to the productivity of agricultural land. The Gefara Plain located in the northwest of Libya; comprises about 80% of the total agricultural activity. The high water requirements for the populations and agriculture are depleting the groundwater aquifer, resulting in intrusion of seawater in the first few kilometers along the coast. Due to increasing salinity in the groundwater used for irrigation, the soils of the Gefara Plain are becoming increasingly saline. This research paper investigated the sensitivity of these soils to increased salinity using Co2 evolution as an integrating measure of soil function. Soil was collected from four sites located in the Gefara Plain, Almaya, Janzur, Gargaresh and Tajura. Soil collected from Tajura had the highest background salinity, and Janzur had the highest organic matter content. All of the soils had relatively low organic matter content, ranging between 0.49-%1.25. The cumulative rate of 14CO2 of added 14C-labelled Lolium shoots (Lolium perenne L.) to soils was decreased under effects of water containing different concentrations of NaCl at 20, 50, 70, 90, 150, and 200 mM compared to the control at any time of incubation in four sites.

Keywords: soil salinity, gefara plain, organic matter, 14C-labelled lolium shoots

Procedia PDF Downloads 192
82 A Study on the Impact of Artificial Intelligence on Human Society and the Necessity for Setting up the Boundaries on AI Intrusion

Authors: Swarna Pundir, Prabuddha Hans

Abstract:

As AI has already stepped into the daily life of human society, one cannot be ignorant about the data it collects and used it to provide a quality of services depending up on the individuals’ choices. It also helps in giving option for making decision Vs choice selection with a calculation based on the history of our search criteria. Over the past decade or so, the way Artificial Intelligence (AI) has impacted society is undoubtedly large.AI has changed the way we shop, the way we entertain and challenge ourselves, the way information is handled, and has automated some sections of our life. We have answered as to what AI is, but not why one may see it as useful. AI is useful because it is capable of learning and predicting outcomes, using Machine Learning (ML) and Deep Learning (DL) with the help of Artificial Neural Networks (ANN). AI can also be a system that can act like humans. One of the major impacts be Joblessness through automation via AI which is seen mostly in manufacturing sectors, especially in the routine manual and blue-collar occupations and those without a college degree. It raises some serious concerns about AI in regards of less employment, ethics in making moral decisions, Individuals privacy, human judgement’s, natural emotions, biased decisions, discrimination. So, the question is if an error occurs who will be responsible, or it will be just waved off as a “Machine Error”, with no one taking the responsibility of any wrongdoing, it is essential to form some rules for using the AI where both machines and humans are involved.

Keywords: AI, ML, DL, ANN

Procedia PDF Downloads 63
81 DISGAN: Efficient Generative Adversarial Network-Based Method for Cyber-Intrusion Detection

Authors: Hongyu Chen, Li Jiang

Abstract:

Ubiquitous anomalies endanger the security of our system con- stantly. They may bring irreversible damages to the system and cause leakage of privacy. Thus, it is of vital importance to promptly detect these anomalies. Traditional supervised methods such as Decision Trees and Support Vector Machine (SVM) are used to classify normality and abnormality. However, in some case, the abnormal status are largely rarer than normal status, which leads to decision bias of these methods. Generative adversarial network (GAN) has been proposed to handle the case. With its strong generative ability, it only needs to learn the distribution of normal status, and identify the abnormal status through the gap between it and the learned distribution. Nevertheless, existing GAN-based models are not suitable to process data with discrete values, leading to immense degradation of detection performance. To cope with the discrete features, in this paper, we propose an efficient GAN-based model with specifically-designed loss function. Experiment results show that our model outperforms state-of-the-art models on discrete dataset and remarkably reduce the overhead.

Keywords: GAN, discrete feature, Wasserstein distance, multiple intermediate layers

Procedia PDF Downloads 97
80 An Innovative Auditory Impulsed EEG and Neural Network Based Biometric Identification System

Authors: Ritesh Kumar, Gitanjali Chhetri, Mandira Bhatia, Mohit Mishra, Abhijith Bailur, Abhinav

Abstract:

The prevalence of the internet and technology in our day to day lives is creating more security issues than ever. The need for protecting and providing a secure access to private and business data has led to the development of many security systems. One of the potential solutions is to employ the bio-metric authentication technique. In this paper we present an innovative biometric authentication method that utilizes a person’s EEG signal, which is acquired in response to an auditory stimulus,and transferred wirelessly to a computer that has the necessary ANN algorithm-Multi layer perceptrol neural network because of is its ability to differentiate between information which is not linearly separable.In order to determine the weights of the hidden layer we use Gaussian random weight initialization. MLP utilizes a supervised learning technique called Back propagation for training the network. The complex algorithm used for EEG classification reduces the chances of intrusion into the protected public or private data.

Keywords: EEG signal, auditory evoked potential, biometrics, multilayer perceptron neural network, back propagation rule, Gaussian random weight initialization

Procedia PDF Downloads 362
79 Deep Learning and Accurate Performance Measure Processes for Cyber Attack Detection among Web Logs

Authors: Noureddine Mohtaram, Jeremy Patrix, Jerome Verny

Abstract:

As an enormous number of online services have been developed into web applications, security problems based on web applications are becoming more serious now. Most intrusion detection systems rely on each request to find the cyber-attack rather than on user behavior, and these systems can only protect web applications against known vulnerabilities rather than certain zero-day attacks. In order to detect new attacks, we analyze the HTTP protocols of web servers to divide them into two categories: normal attacks and malicious attacks. On the other hand, the quality of the results obtained by deep learning (DL) in various areas of big data has given an important motivation to apply it to cybersecurity. Deep learning for attack detection in cybersecurity has the potential to be a robust tool from small transformations to new attacks due to its capability to extract more high-level features. This research aims to take a new approach, deep learning to cybersecurity, to classify these two categories to eliminate attacks and protect web servers of the defense sector which encounters different web traffic compared to other sectors (such as e-commerce, web app, etc.). The result shows that by using a machine learning method, a higher accuracy rate, and a lower false alarm detection rate can be achieved.

Keywords: anomaly detection, HTTP protocol, logs, cyber attack, deep learning

Procedia PDF Downloads 178
78 What It Means to Be an Internally Displaced Person: The Story of the Abu-Shouk Camp

Authors: Mawa Abdelbagi Mohamed Mohamed, Eslam Alaa Elbahlawan

Abstract:

This study examines the complex social fabric woven within the Abu-Shouk internally displaced persons camp, shaped by the chaotic waves of armed conflict and displacement in the early 2000s. The impact of war, economic constraints, and altered living conditions have fundamentally reshaped families and traditions, presenting both challenges and opportunities. In this exploration, we navigate the resilience of a community thrust into adversity, spotlighting how it emerged as essential in rebuilding social bonds. Exchanges of culture, intertribal marriages, and communal gathering spots have become essential tools in fostering cohesion and understanding amidst diversity. However, this resilience has been tested by the intrusion of politics, leading to shifts in governance structures and community dynamics. As we conclude, it is evident that while the scars of displacement and political disruptions are present, the community's enduring spirit and adaptability shine through. Empowering the community to rebuild their social tapestry, bridging the gaps, and restoring unity amid evolving political realities remain the beacon guiding their journey toward a shared, purposeful future.

Keywords: darfur, internally displaced person, social fabric, conflict

Procedia PDF Downloads 32
77 Lower Cretaceous Bahi Sandstone Reservoir as Sourced of Co2 Accumulation Within the En-Naga Sub Basin, Sirte Basin, Libya

Authors: Moawia Abulgader Gdara

Abstract:

En -Naga sub - basin considered to be the most southern of the concessions in the Sirte Basin operated by HOO. En Naga Sub – basin have likely been point-sourced of CO2 accumulations during the last 7 million years from local satellite intrusives associated with the Haruj Al Aswad igneous complex. CO2 occurs in the En Naga Sub-basin as a result of the igneous activity of the Al Harouge Al Aswad complex. Igneous extrusive have been pierced in the subsurface are exposed at the surface. The lower cretaceous Bahi Sandstone facies are recognized in the En Naga Sub-basin. They result from the influence of paleotopography on the processes associated with continental deposition over the Sirt Unconformity and the Cenomanian marine transgression In the Lower Cretaceous Bahi Sandstones, the presence of trapped carbon dioxide is proven within the En Naga Sub-basin. This makes it unique in providing an abundance of CO2 gas reservoirs with almost pure magmatic CO2, which can be easily sampled. Huge amounts of CO2 exist in the Lower Cretaceous Bahi Sandstones in the En-Naga sub-basin, where the economic value of CO2 is related to its use for enhanced oil recovery (EOR) Based on the production tests for the drilled wells that makes Lower Cretaceous Bahi sandstones the principle reservoir rocks for CO2 where large volumes of CO2 gas have been discovered in the Bahi Formation on and near EPSA 120/136(En -Naga sub basin). The Bahi sandstones are generally described as a good reservoir rock. Intergranular porosities and permeabilities are highly variable and can exceed 25% and 100 MD.In the (En Naga sub – basin), The very high pressures assumed associated with local igneous intrusives may account for the abnormally high Bahi (and Lidam Formation) reservoir pressures. The best gas tests from this facies are at F1-72 on the (Barrut I structure) from part of a 458 feet+ section having an estimated high value of CO2 as 98% overpressured. Bahi CO2 prospectivity is thought to be excellent in the central to western areas where At U1-72 (En Naga O structure) a significant CO2 gas kick occurred at 11,971 feet and quickly led to blowout conditions due to uncontrollable leaks in the surface equipment. Which reflects a better reservoir quality sandstones associated with Paleostructural highs. Condensate and gas prospectivity increases to the east as the CO2 prospectivity decreases with distance away from the Al Haruj Al Aswad igneous complex. To date, it has not been possible to accurately determine the volume of these strategically valuable reserves although there are positive indications that they are very large.

Keywords: 1)en naga sub basin, 2)alharouge al aswad igneous complex, 3)co2 generation and migration, 4)lower cretaceous bahi sandstone

Procedia PDF Downloads 43
76 Advanced Seismic Retrofit of a School Building by a DFP Base Isolation Solution

Authors: Stefano Sorace, Gloria Terenzi

Abstract:

The study of a base isolation seismic retrofit solution for a reinforced concrete school building is presented in this paper. The building was assumed as a benchmark structure for a Research Project financed by the Italian Department of Civil Protection, and is representative of several similar public edifices designed with earlier Technical Standards editions, in Italy as well as in other earthquake-prone European countries. The structural characteristics of the building, and a synthesis of the investigation campaigns developed on it, are initially presented. The mechanical parameters, dimensions, locations and installation details of the base isolation system, incorporating double friction pendulum sliding bearings as protective devices, are then illustrated, along with the performance assessment analyses carried out in original and rehabilitated conditions according to a full non-linear dynamic approach. The results of the analyses show a remarkable enhancement of the seismic response capacities of the structure in base-isolated configuration. This allows reaching the high performance levels postulated in the rehabilitation design with notably lower costs and architectural intrusion as compared to traditional retrofit interventions designed for the same objectives.

Keywords: seismic retrofit, seismic assessment, r/c structures, school buildings, base isolation

Procedia PDF Downloads 242
75 Smart-Textile Containers for Urban Mobility

Authors: René Vieroth, Christian Dils, M. V. Krshiwoblozki, Christine Kallmayer, Martin Schneider-Ramelow, Klaus-Dieter Lang

Abstract:

Green urban mobility in commercial and private contexts is one of the great challenges for the continuously growing cities all over the world. Bicycle based solutions are already and since a long time the key to success. Modern developments like e-bikes and high-end cargo-bikes complement the portfolio. Weight, aerodynamic drag, and security for the transported goods are the key factors for working solutions. Recent achievements in the field of smart-textiles allowed the creation of a totally new generation of intelligent textile cargo containers, which fulfill those demands. The fusion of technical textiles, design and electrical engineering made it possible to create an ecological solution which is very near to become a product. This paper shows all the details of this solution that includes an especially developed sensor textile for cut detection, a protective textile layer for intrusion prevention, an universal-charging-unit for energy harvesting from diverse sources and a low-energy alarm system with GSM/GPRS connection, GPS location and RFID interface.

Keywords: cargo-bike, cut-detection, e-bike, energy-harvesting, green urban mobility, logistics, smart-textiles, textile-integrity sensor

Procedia PDF Downloads 289
74 Detection of Cyberattacks on the Metaverse Based on First-Order Logic

Authors: Sulaiman Al Amro

Abstract:

There are currently considerable challenges concerning data security and privacy, particularly in relation to modern technologies. This includes the virtual world known as the Metaverse, which consists of a virtual space that integrates various technologies and is therefore susceptible to cyber threats such as malware, phishing, and identity theft. This has led recent studies to propose the development of Metaverse forensic frameworks and the integration of advanced technologies, including machine learning for intrusion detection and security. In this context, the application of first-order logic offers a formal and systematic approach to defining the conditions of cyberattacks, thereby contributing to the development of effective detection mechanisms. In addition, formalizing the rules and patterns of cyber threats has the potential to enhance the overall security posture of the Metaverse and, thus, the integrity and safety of this virtual environment. The current paper focuses on the primary actions employed by avatars for potential attacks, including Interval Temporal Logic (ITL) and behavior-based detection to detect an avatar’s abnormal activities within the Metaverse. The research established that the proposed framework attained an accuracy of 92.307%, resulting in the experimental results demonstrating the efficacy of ITL, including its superior performance in addressing the threats posed by avatars within the Metaverse domain.

Keywords: security, privacy, metaverse, cyberattacks, detection, first-order logic

Procedia PDF Downloads 14
73 Climate Change Effects on Western Coastal Groundwater in Yemen (1981-2020)

Authors: Afrah S. M. Al-Mahfadi

Abstract:

Climate change is a global issue that has significant impacts on water resources, resulting in environmental, economic, and political consequences. Groundwater reserves, particularly in coastal areas, are facing depletion, leading to serious problems in regions such as Yemen. This study focuses on the western coastal region of Yemen, which already faces risks such as water crises, food insecurity, and widespread poverty. Climate change exacerbates these risks by causing high temperatures, sea level rise, inadequate sea level rise, and inadequate environmental policies. Research Aim: The aim of this research is to provide a comprehensive overview of the impact of climate change on the western coastal region of Yemen. Specifically, the study aims to analyze the relationship between climate change and the loss of fresh groundwater resources in this area. Methodology: The research utilizes a combination of a literature review and three case studies conducted through site visits. Arch-GIS mapping is employed to analyze and visualize the relationship between climate change and the depletion of fresh groundwater resources. Additionally, data on precipitation from 1981 to 2020 and scenarios of projected sea level rise (SLR) are considered. Findings: The study reveals several future issues resulting from climate change. It is projected that the annual temperature will increase while the rainfall rate will decrease. Furthermore, the sea level is expected to rise by approximately 0.30 to 0.72 meters by 2100. These factors contribute to the loss of wetlands, the retreat of shorelines and estuaries, and the intrusion of seawater into the coastal aquifer, rendering drinking water from wells increasingly saline. Data Collection and Analysis Procedures: Data for this research are collected through a literature review, including studies on climate change impacts in coastal areas and the hydrogeology of the study region. Furthermore, three case studies are conducted through site visits. Arch-GIS mapping techniques are utilized to analyze the relationship between climate change and the loss of fresh groundwater resources. Historical precipitation data from 1981 to 2020 and scenarios of projected sea level rise are also analyzed. Questions Addressed: (1) What is the impact of climate change on the western coastal region of Yemen? (2) How does climate change affect the availability of fresh groundwater resources in this area? Conclusion: The study concludes that the western coastal region of Yemen is facing significant challenges due to climate change. The projected increase in temperature, decrease in rainfall, and rise in sea levels have severe implications, such as the loss of wetlands, shorelines, and estuaries. Additionally, the intrusion of seawater into the coastal aquifer further exacerbates the issue of saline drinking water. Urgent measures are needed to address climate change, including improving water management, implementing integrated coastal zone planning, raising awareness among stakeholders, and implementing emergency projects to mitigate the impacts. Recommendations: To mitigate the adverse effects of climate change, several recommendations are provided. These include improving water management practices, developing integrated coastal zone planning strategies, raising awareness among all stakeholders, improving health and education, and implementing emergency projects to combat climate change. These measures aim to enhance adaptive capacity and resilience in the face of future climate change impacts.

Keywords: climate change, groundwater, coastal wetlands, Yemen

Procedia PDF Downloads 42
72 Human-Tiger Conflict in Chitwan National Park, Nepal

Authors: Abishek Poudel

Abstract:

Human-tiger conflicts are serious issues of conflicts between local people and park authority and the conflicting situation potentially play negative role in park management. The study aimed (1) To determine the trend and nature of human-tiger conflicts (2) To understand people's perception and mitigation measures towards tiger conservation. Both primary and secondary information were used to determine human- tiger conflicts in Chitwan National Park. Systematic random sampling with 5% intensity was done to collect the perception of the villagers regarding human-tiger conflicts. The study sites were selected based on frequencies of incidences of human attacks and livestock depredation viz. Rajahar and Ayodhyapuri VDCs respectively. The trend of human casualties by tiger has increased in last five year whereas the trend of livestock has decreased. Reportedly, between 2008 and 2012, tigers killed 22 people, injured 10 and killed at least 213 livestock. Conflict was less common in the park and more intense in the sub-optimal habitats of Buffer Zone. Goat was the most vulnerable livestock followed by cattle. The livestock grazing and human intrusion into tiger habitat were the causes of conflicts. Developing local stewardship and support for tiger conservation, livestock insurance, and compensation policy simplification may help reduce human-tiger conflicts.

Keywords: livestock depredation, sub optimal habitat, human-tiger, local stewardship

Procedia PDF Downloads 441
71 Sustainable Use of Fresh Groundwater Lens of Pleistocene Aquifer in Nam Dinh, Vietnam

Authors: Tran Thanh Le, Pham Trong Duc

Abstract:

The fresh groundwater lens of the Pleistocene aquifer in Nam Dinh was formed since 12,900 years ago. Currently, the Pleistocene aquifer has been continuously exploited on average of 154,163m3/day, distributed mainly in the districts of Nghia Hung, Hai Hau, a part of Truc Ninh, Y Yen, Nam Truc and Giao Thuy. The groundwater level is still on a declining trend, saltwater intrusion in this freshwater lens can occur if the growth rate in exploitation is maintained. This study focused on groundwater sustainable use by means of 4 groups of criteria including: Groundwater quality and pollution; Aquifers’ productivity and capacity; Environment impacts due to exploitation (groundwater level decline, land subsidence due to water exploitation); Social and economic impacts. Using a combination of methods including field surveys, geophysics, hydrogeochemistry, isotope and numerical models to determine safe groundwater exploitation thresholds for the whole study area has been determined to be 544,314m3/day and the actual exploitation amount is currently about 30% compared to the safe exploitation threshold. However, it should also be noted that the current groundwater exploitation threshold and level of its exploitation compared to the safe exploitation threshold of each locality are not the same. From this result, the groundwater exploitation threshold map of the study area was established to serve the management, licensing and orientation of groundwater exploitation.

Keywords: criteria, groundwater, fresh groundwater lens, pleistocene, Nam Dinh

Procedia PDF Downloads 119
70 Enhancing Internet of Things Security: A Blockchain-Based Approach for Preventing Spoofing Attacks

Authors: Salha Abdullah Ali Al-Shamrani, Maha Muhammad Dhaher Aljuhani, Eman Ali Ahmed Aldhaheri

Abstract:

With the proliferation of Internet of Things (IoT) devices in various industries, there has been a concurrent rise in security vulnerabilities, particularly spoofing attacks. This study explores the potential of blockchain technology in enhancing the security of IoT systems and mitigating these attacks. Blockchain's decentralized and immutable ledger offers significant promise for improving data integrity, transaction transparency, and tamper-proofing. This research develops and implements a blockchain-based IoT architecture and a reference network to simulate real-world scenarios and evaluate a blockchain-integrated intrusion detection system. Performance measures including time delay, security, and resource utilization are used to assess the system's effectiveness, comparing it to conventional IoT networks without blockchain. The results provide valuable insights into the practicality and efficacy of employing blockchain as a security mechanism, shedding light on the trade-offs between speed and security in blockchain deployment for IoT. The study concludes that despite minor increases in time consumption, the security benefits of incorporating blockchain technology into IoT systems outweigh potential drawbacks, demonstrating a significant potential for blockchain in bolstering IoT security.

Keywords: internet of things, spoofing, IoT, access control, blockchain, raspberry pi

Procedia PDF Downloads 37
69 Listening to the Voices of Syrian Refugee Women in Canada: An Ethnographic Insight into the Journey from Trauma to Adaptation

Authors: Areej Al-Hamad, Cheryl Forchuk, Abe Oudshoorn, Gerald Patrick Mckinley

Abstract:

Syrian refugee women face many obstacles when accessing health services in host countries that are influenced by various cultural, structural, and practical factors. This paper is based on critical ethnographic research undertaken in Canada to explore Syrian refugee women's migration experiences. Also, we aim to critically examine how the intersection of gender, trauma, violence and the political and economic conditions of Syrian refugee women shapes their everyday lives and health. The study also investigates the strategies and practices by which Syrian refugee women are currently addressing their healthcare needs and the models of care that are suggested for meeting their physical and mental health needs. Findings show that these women experienced constant worries, hardship, vulnerability, and intrusion of dignity. These experiences and challenges were aggravated by the structure of the Canadian social and health care system. This study offers a better understanding of the impact of migration and trauma on Syrian refugee women's roles, responsibilities, gender dynamics, and interaction with Ontario's healthcare system to improve interaction and outcomes. Health care models should address these challenges among Syrian refugee families in Canada.

Keywords: Syrian refugee women, intersectionality, critical ethnography, migration

Procedia PDF Downloads 61
68 Petrographic Properties of Sedimentary-Exhalative Type Ores of Filizchay Polymetallic Deposit

Authors: Samir Verdiyev, Fuad Huseynov, Islam Guliyev, Coşqun İsmayıl

Abstract:

The Filizchay polymetallic deposit is located on the southern slope of the Greater Caucasus Mountain Range, northwest of Azerbaijan in the Balaken district. Filizchay is the largest polymetallic deposit in the region and the second-largest polymetallic deposit in Europe. The mineral deposits in the region are associated with two different geodynamic evolutions that began with the Mesozoic collision along the Eurasian continent and the formation of a magmatic arc after the collision and continued with subduction in the Cenozoic. The bedrocks associated with Filizchay mineralization are Early Jurassic aged. The stratigraphic sequence of the deposit is consisting of black metamorphic clay shales, sandstones, and ore layers. Shales, sandstones, and siltstones are encountered in the upper and middle sections of the ore body, while only shales are observed at the lowest ranges. The ore body is mainly layered by the geometric structure of the bedrock; folding can be observed in the ore layers along with the bedrock foliation, and just in few points indirect laying due to the metamorphism. This suggests that the Filizchay ore mineralization is syngenetic, which is proved by the mineralization by the bedrock. To determine the ore petrography properties of the Filizchay deposit, samples were collected from the region where the ore is concentrated, and a polished section was prepared. These collected samples were examined under the mineralogical microscope to reveal the paragenesis of the mineralization and to explain the relation of ore minerals to each other. In this study, macroscopically observed minerals and textures of these minerals were used in the cores revealed during drilling exploration made by AzerGold CJS company. As a result of all these studies, it has been determined that there are three main mineralization types in the Filizchay deposit: banded, massive, and veinlet ores. The mineralization is in the massive pyrite; furthermore, the basis of the ore-mass contains pyrite, chalcopyrite, sphalerite, and galena. The pyrite in some parts of the ore body transformed to pyrrhotite as a result of metamorphism. Pyrite-chalcopyrite, pyrite-sphalerite-galena, pyrite-pyrrhotite mineral assemblages were determined during microscopic studies of mineralization. The replacement texture is more developed in Filizchay ores. The banded polymetallic type mineralization and near bedrocks are cut by quartz-carbonate veins. The geotectonic position and lithological conditions of the Filizchay deposit, the texture, and interrelationship of the sulfide mineralization indicate that it is a sedimentary-exhalative type of Au-Cu-Ag-Zn-Pb polymetallic deposit that is genetically related to the massive sulfide deposits.

Keywords: Balaken, Filizchay, metamorphism, polymetallic mineralization

Procedia PDF Downloads 166
67 Designing and Implementation of MPLS Based VPN

Authors: Muhammad Kamran Asif

Abstract:

MPLS stands for Multi-Protocol Label Switching. It is the technology which replaces ATM (Asynchronous Transfer Mode) and frame relay. In this paper, we have designed a full fledge small scale MPLS based service provider network core network model, which provides communication services (e.g. voice, video and data) to the customer more efficiently using label switching technique. Using MPLS VPN provides security to the customers which are either on LAN or WAN. It protects its single customer sites from being attacked by any intruder from outside world along with the provision of concept of extension of a private network over an internet. In this paper, we tried to implement a service provider network using minimum available resources i.e. five 3800 series CISCO routers comprises of service provider core, provider edge routers and customer edge routers. The customers on the one end of the network (customer side) is capable of sending any kind of data to the customers at the other end using service provider cloud which is MPLS VPN enabled. We have also done simulation and emulation for the model using GNS3 (Graphical Network Simulator-3) and achieved the real time scenarios. We have also deployed a NMS system which monitors our service provider cloud and generates alarm in case of any intrusion or malfunctioning in the network. Moreover, we have also provided a video help desk facility between customers and service provider cloud to resolve the network issues more effectively.

Keywords: MPLS, VPN, NMS, ATM, asynchronous transfer mode

Procedia PDF Downloads 308
66 Mechanical Properties and Chloride Diffusion of Ceramic Waste Aggregate Mortar Containing Ground Granulated Blast-Furnace Slag

Authors: H. Higashiyama, M. Sappakittipakorn, M. Mizukoshi, O. Takahashi

Abstract:

Ceramic waste aggregates (CWAs) were made from electric porcelain insulator wastes supplied from an electric power company, which were crushed and ground to fine aggregate sizes. In this study, to develop the CWA mortar as an eco–efficient, ground granulated blast–furnace slag (GGBS) as a supplementary cementitious material (SCM) was incorporated. The water–to–binder ratio (W/B) of the CWA mortars was varied at 0.4, 0.5, and 0.6. The cement of the CWA mortar was replaced by GGBS at 20 and 40% by volume (at about 18 and 37% by weight). Mechanical properties of compressive and splitting tensile strengths, and elastic modulus were evaluated at the age of 7, 28, and 91 days. Moreover, the chloride ingress test was carried out on the CWA mortars in a 5.0% NaCl solution for 48 weeks. The chloride diffusion was assessed by using an electron probe microanalysis (EPMA). To consider the relation of the apparent chloride diffusion coefficient and the pore size, the pore size distribution test was also performed using a mercury intrusion porosimetry at the same time with the EPMA. The compressive strength of the CWA mortars with the GGBS was higher than that without the GGBS at the age of 28 and 91 days. The resistance to the chloride ingress of the CWA mortar was effective in proportion to the GGBS replacement level.

Keywords: ceramic waste aggregate, chloride diffusion, GGBS, pore size distribution

Procedia PDF Downloads 315
65 Geotechnical Design of Bridge Foundations and Approaches in Hilly Granite Formation

Authors: Q. J. Yang

Abstract:

This paper presents a case study of geotechnical design of bridge foundations and approaches in hilly granite formation in northern New South Wales of Australia. Firstly, the geological formation and existing cut slope conditions which have high risks of rock fall will be described. The bridge has three spans to be constructed using balanced cantilever method with a middle span of 150 m. After concept design option engineering, it was decided to change from pile foundation to pad footing with ground anchor system to optimize the bridge foundation design. The geotechnical design parameters were derived after two staged site investigations. The foundation design was carried out to satisfy both serviceability limit state and ultimate limit state during construction and in operation. It was found that the pad footing design was governed by serviceability limit state design loading cases. The design of bridge foundation also considered presence of weak rock layer intrusion and a layer of “no core” to ensure foundation stability. The precast mass concrete block system was considered for the retaining walls for the bridge approaches to resolve the constructability issue over hilly terrain. The design considered the retaining wall block sliding stability, while the overturning and internal stabilities are satisfied.

Keywords: pad footing, Hilly formation, stability, block works

Procedia PDF Downloads 295
64 Comprehensive Review of Adversarial Machine Learning in PDF Malware

Authors: Preston Nabors, Nasseh Tabrizi

Abstract:

Portable Document Format (PDF) files have gained significant popularity for sharing and distributing documents due to their universal compatibility. However, the widespread use of PDF files has made them attractive targets for cybercriminals, who exploit vulnerabilities to deliver malware and compromise the security of end-user systems. This paper reviews notable contributions in PDF malware detection, including static, dynamic, signature-based, and hybrid analysis. It presents a comprehensive examination of PDF malware detection techniques, focusing on the emerging threat of adversarial sampling and the need for robust defense mechanisms. The paper highlights the vulnerability of machine learning classifiers to evasion attacks. It explores adversarial sampling techniques in PDF malware detection to produce mimicry and reverse mimicry evasion attacks, which aim to bypass detection systems. Improvements for future research are identified, including accessible methods, applying adversarial sampling techniques to malicious payloads, evaluating other models, evaluating the importance of features to malware, implementing adversarial defense techniques, and conducting comprehensive examination across various scenarios. By addressing these opportunities, researchers can enhance PDF malware detection and develop more resilient defense mechanisms against adversarial attacks.

Keywords: adversarial attacks, adversarial defense, adversarial machine learning, intrusion detection, PDF malware, malware detection, malware detection evasion

Procedia PDF Downloads 14
63 The Sr-Nd Isotope Data of the Platreef Rocks from the Northern Limb of the Bushveld Igneous Complex: Evidence of Contrasting Magma Composition and Origin

Authors: Tshipeng Mwenze, Charles Okujeni, Abdi Siad, Russel Bailie, Dirk Frei, Marcelene Voigt, Petrus Le Roux

Abstract:

The Platreef is a platinum group element (PGE) deposit in the northern limb of the Bushveld Igneous Complex (BIC) which was emplaced as a series of mafic and ultramafic sills between the Main Zone (MZ) and the country rocks. The PGE mineralisation in the Platreef is hosted in different rock types, and its distribution and style vary with depth and along strike. This study contributes towards understanding the processes involved in the genesis of the Platreef. Twenty-four Platreef (2 harzburgites, 4 olivine pyroxenites, 17 feldspathic pyroxenites and 1 gabbronorite) and few MZ (1 gabbronorite and 1 leucogabbronorite) quarter core samples were collected from four drill cores (e.g., TN754, TN200, SS339, and OY482) and analysed for whole-rock Sr-Nd isotope data. The results show positive ɛNd values (+3.53 to +7.51) for harzburgites suggesting their parental magmas derived from the depleted Mantle. The remaining Platreef rocks have negative ɛNd values (-2.91 to -22.88) and show significant variations in Sr-Nd isotopic compositions. The first group of Platreef samples has relatively high isotopic compositions (ɛNd= -2.91 to -5.68; ⁸⁷Sr/⁸⁶Sri= 0.709177 - 0.711998). The second group of Platreef samples has Sr ratios (⁸⁷Sr/⁸⁶Sri= 0.709816-0.712106) overlapping with samples of the first group but slightly lower ɛNd values (-7.44 to -8.39). Lastly, the third group of Platreef samples has low ɛNd values (-10.82 to -14.32) and low Sr ratios (⁸⁷Sr/⁸⁶Sri= 0.707545-0.710042) than those from samples of the two Platreef groups mentioned above. There is, however, a Platreef sample with ɛNd value (-5.26) in range with the Platreef samples of the first group, but its Sr ratio (0.707281) is the lowest even when compared to samples of the third Platreef group. There are also five other Platreef samples which have either anomalous ɛNd or Sr ratios which make it difficult to assess their isotopic compositions relative to other samples. These isotopic variations for the Platreef samples indicate both multiple sources and multiple magma chambers where varying crustal contamination styles have operated during the evolution of these magmas prior their emplacements into the Platreef setting as sills. Furthermore, the MZ rocks have different Sr-Nd isotopic compositions (For OY482 gabbronorite [ɛNd= +0.65; ⁸⁷Sr/⁸⁶Sri= 0.711746]; for TN754 leucogabbronorite [ɛNd= -7.44; ⁸⁷Sr/⁸⁶Sri= 0.709322]) which do not only indicate different MZ magma chambers, but also different magmas from those of the Platreef. Although the Platreef is still considered a single stratigraphic unit in the northern limb of the BIC, its genesis involved multiple magmatic processes which evolved independently from each other.

Keywords: crustal contamination styles, magma chambers, magma sources, multiple sills emplacement

Procedia PDF Downloads 143
62 Mother's Knowledge, Attitude and Practices towards Childhood Immunization in District Nankana Sahib

Authors: Farina Maqbool

Abstract:

Background: It is well said that children are considered the future masons of the country and a healthy brain is found in a healthy body. Therefore, a healthy generation can be produced by giving knowledge of immunization to mothers. Immunization is the most lucrative public health intrusion that has placed the greatest effect on the health of the people. The main objective of the present study was to find out the mother’s knowledge, attitude, and practices towards childhood immunization. Methods: Multistage sampling technique was used. One hundred and sixty mothers were selected conveniently who have at least one child up to two years. Data were collected through the face to face interview. The chi-square test was used to test the significance of the association between independent and dependent variables. Data were analyzed using the Statistical Package for Social Science. Results: A higher percentage of mothers (85.0%) knew vaccine-preventable diseases. Major proportion (82.5%) of the mothers had thought that immunization is important for their child’s health. A majority (66.3%) of the respondents’ children were fully immunized, whereas 26.3 percent of them were replied negatively. Remaining 7.5 percent of the respondents’ child un-immunized Chi-square value (39.14) shows a highly significant association between the education of the respondents and receiving of all recommended vaccines for children. Gamma value shows a strong positive relationship between the variables.

Keywords: attitude, childhood, immunization, knowledge, practices

Procedia PDF Downloads 107
61 Climate Change and Its Impact on Water Security and Health in Coastal Community: A Gender Outlook

Authors: Soorya Vennila

Abstract:

The present study answers the questions; how does climate change affect the water security in drought prone Ramanathapuram district? and what has water insecurity done to the health of the coastal community? The study area chosen is Devipattinam in Ramanathapuram district. Climate change evidentially wreaked havoc on the community with saltwater intrusion, water quality degradation, water scarcity and its eventual economic, social like power inequality within family and community and health hazards. The climatological data such as rainfall, minimum temperature and maximum temperature were statistically analyzed for trend using Mann-Kendall test. The test was conducted for 14 years (1989-2002) of rainfall data, maximum and minimum temperature and the data were statistically analyzed. At the outset, the water quality samples were collected from Devipattinam to test its physical and chemical parameters and their spatial variation. The results were derived as shown in ARC GIS. Using the water quality test water quality index were framed. And finally, key Informant interview, questionnaire were conducted to capture the gender perception and problem. The data collected were thereafter interpreted using SPSS software for recommendations and suggestions to overcome water scarcity and health problems.

Keywords: health, watersecurity, water quality, climate change

Procedia PDF Downloads 45
60 Resilient Machine Learning in the Nuclear Industry: Crack Detection as a Case Study

Authors: Anita Khadka, Gregory Epiphaniou, Carsten Maple

Abstract:

There is a dramatic surge in the adoption of machine learning (ML) techniques in many areas, including the nuclear industry (such as fault diagnosis and fuel management in nuclear power plants), autonomous systems (including self-driving vehicles), space systems (space debris recovery, for example), medical surgery, network intrusion detection, malware detection, to name a few. With the application of learning methods in such diverse domains, artificial intelligence (AI) has become a part of everyday modern human life. To date, the predominant focus has been on developing underpinning ML algorithms that can improve accuracy, while factors such as resiliency and robustness of algorithms have been largely overlooked. If an adversarial attack is able to compromise the learning method or data, the consequences can be fatal, especially but not exclusively in safety-critical applications. In this paper, we present an in-depth analysis of five adversarial attacks and three defence methods on a crack detection ML model. Our analysis shows that it can be dangerous to adopt machine learning techniques in security-critical areas such as the nuclear industry without rigorous testing since they may be vulnerable to adversarial attacks. While common defence methods can effectively defend against different attacks, none of the three considered can provide protection against all five adversarial attacks analysed.

Keywords: adversarial machine learning, attacks, defences, nuclear industry, crack detection

Procedia PDF Downloads 129
59 Blue Eyes and Blonde Hair in Mass Media: A News Discourse Analysis of Western Media on the News Coverage of Ukraine

Authors: Zahra Mehrabbeygi

Abstract:

This research is opted to analyze and survey discourse variety and news image-making in western media regarding the news coverage of the Russian army intrusion into Ukraine. This research will be done on the news coverage of Ukraine in a period from February 2022 to May 2022 in five western media, "BBC, CBS, NBC, Al Jazeera, and Telegraph." This research attempts to discover some facts about the news policies of the five western news agencies during the circumstances of the Ukraine-Russia war. Critical theories in the news, such as Framing, Media Imperialism of News, Image Making, Discourse, and Ideology, were applied to achieve this goal. The research methodology uses Van Dijk's discourse exploration method based on discourse analysis. The research's statistical population is related to all the news about racial discrimination during the mentioned period. After a statistical population survey with Targeted Sampling, the researcher randomly selected ten news cases for exploration. The research findings show that the western media have similarities in their texts via lexical items, polarization, citations, persons, and institutions. The research findings also imply pre-suppositions, connotations, and components of consensus agreement and underlying predicates in the outset, middle, and end events. The reaction of some western media not only shows their bewilderment but also exposes their prejudices rooted in racism.

Keywords: news discourse analysis, western media, racial discrimination, Ukraine-Russia war

Procedia PDF Downloads 68
58 Structural-Lithological Conditions of Formation of Epithermal Gold Sulphide Satellite Deposits in the North Part of Chovdar Ore Area

Authors: Nabat Gojaeva, Mikayil Naghiyev, Sultan Jafarov, Gular Mikayilova

Abstract:

Chovdar ore area is located in the contact of Dashkesan caldera and Shamkir horst-graben uplift, which comprises the central part of Lok-Karabakh Island arcs of South Caucasus metallogenic province in terms of regional tectonics. One of the main structural features of formation of the Mereh and Aghyokhush group of low sulfidation epithermal gold deposits, locating in the north peripheric part of the ore area, is involving the crossing areas of ore-hosting and ore-forming Pan-Caucasian-direction structurally-compound faults with the meridional, rhombically shaped faults. In addition, another significant feature is the temporally two- or three-stage ore formation. In the first stage -an early phase of Upper Bathonian age, sulfides are the dominant minerals, in the second stage- late ‘productive’ phase of Upper Bathonian age, mainly gold mineralization is formed. Also, in the Upper Jurassic – Lower Cretaceous ages, rarely-encountered Cu-polymetallic ore formations are documented. Finally, in the last stage, the re-dislocation of ore-formation is foreseen in the previously-formed mineralization areas. The faults in the strike and dip directions formed shearing, brecciation, sulfide mineralization aureoles, and hydrothermal alteration zones in the wall rocks along with the local depression blocks. The geological-structural analysis of the area shows that multiple and various morphogenetic volcano-tectonically fault systems have developed in the area. These fault systems have played a trap role for ore-formation in the intersected parts of faults mentioned above. Thus, in the referred parts, mostly predominance of felsic volcanism and metasomatic alteration (silicification, argillitic, etc.) of wall rocks, as well as the products of this volcanism, account for the inclusion of hydrothermal ore-forming fluids along these faults. It is possible to determine temporally and lithological-structural connection between the ore-formation along with local depression blocks and faults as borders for products of felsic volcanism of Upper Cretaceous-Lesser Jurassic ages, in the results of the replacement of hydrothermal alteration zones with relatively low-temperature metasomatic alterations while moving from the felsic parts to the margins, and due to being non-ore bearing intermediate and intermediate-felsic magmatic facies.

Keywords: Aghyokhush, fault, gold deposit, Mereh

Procedia PDF Downloads 193