Search results for: metamorphic malware
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 95

Search results for: metamorphic malware

35 Web Proxy Detection via Bipartite Graphs and One-Mode Projections

Authors: Zhipeng Chen, Peng Zhang, Qingyun Liu, Li Guo

Abstract:

With the Internet becoming the dominant channel for business and life, many IPs are increasingly masked using web proxies for illegal purposes such as propagating malware, impersonate phishing pages to steal sensitive data or redirect victims to other malicious targets. Moreover, as Internet traffic continues to grow in size and complexity, it has become an increasingly challenging task to detect the proxy service due to their dynamic update and high anonymity. In this paper, we present an approach based on behavioral graph analysis to study the behavior similarity of web proxy users. Specifically, we use bipartite graphs to model host communications from network traffic and build one-mode projections of bipartite graphs for discovering social-behavior similarity of web proxy users. Based on the similarity matrices of end-users from the derived one-mode projection graphs, we apply a simple yet effective spectral clustering algorithm to discover the inherent web proxy users behavior clusters. The web proxy URL may vary from time to time. Still, the inherent interest would not. So, based on the intuition, by dint of our private tools implemented by WebDriver, we examine whether the top URLs visited by the web proxy users are web proxies. Our experiment results based on real datasets show that the behavior clusters not only reduce the number of URLs analysis but also provide an effective way to detect the web proxies, especially for the unknown web proxies.

Keywords: bipartite graph, one-mode projection, clustering, web proxy detection

Procedia PDF Downloads 220
34 Porphyry Cu-Mo-(Au) Mineralization at Paraga Area, Nakhchivan District, Azerbaijan: Evidence from Mineral Paragenesis, Hyrothermal Alteration and Geochemical Studies

Authors: M. Kumral, A. Abdelnasser, M. Budakoglu, M. Karaman, D. K. Yildirim, Z. Doner, A. Bostanci

Abstract:

The Paraga area is located at the extreme eastern part of Nakhchivan district at the boundary with Armenia. The field study is situated at Ordubad region placed in 9 km from Paraga village and stays at 2300-2800 m height over sea level. It lies within a region of low-grade metamorphic porphyritic volcanic and plutonic rocks. The detailed field studies revealed that this area composed mainly of metagabbro-diorite intrusive rocks with porphyritic character emplaced into meta-andesitic rocks. This complex is later intruded by unmapped olivine gabbroic rocks. The Cu-Mo-(Au) mineralization at Paraga deposit is vein-type mineralization that is essentially related to quartz veins stockwork which cut the dioritic rocks and concentrated at the eastern and northeastern parts of the area with different directions N80W, N25W, N70E and N45E. Also, this mineralization is associated with two shearing zones directed N75W and N15E. The host porphyritic rocks were affected by intense sulfidation, carbonatization, sericitization and silicification with pervasive hematitic alterations accompanied with mineralized quartz veins and quartz-carbonate veins. Sulfide minerals which are chalcopyrite, pyrite, arsenopyrite and sphalerite occurred in two cases either inside these mineralized quartz veins or disseminated in the highly altered rocks as well as molybdenite and also at the peripheries between the altered host rock and veins. Gold found as inclusion disseminated in arsenopyrite and pyrite as well as in their cracks.

Keywords: porphyry Cu-Mo-(Au), Paraga area, Nakhchivan, Azerbaijan, paragenesis, hyrothermal alteration

Procedia PDF Downloads 375
33 Integration of Edible Insects into the Animal Husbandry Curriculum in Senior Secondary Schools in Nigeria: Teachers’ Perception

Authors: Ali Christian Chinedu, Asogwa Vincent Chidindu, Ejiofor Toochukwu Eleazar, Okadi Ashagwu Ojang

Abstract:

The increasing rate of Boko Haram insurgency, farmer-herder clashes, and kidnapping in Nigeria has resulted in food shortages and high cost of protein sources like beef and fish. This challenge could be curbed with the production of edible insects, which contain several nutritional benefits like calories, protein, fat, vitamins, and minerals, depending on their species, metamorphic stage, and diet. Unfortunately, the benefits and competencies in producing, preserving, and marketing edible insects are still unknown to the public, including prospective farmers in Nigeria. Hence, this study determined teachers’ perception of integrating edible insects into the Animal Husbandry Curriculum in Senior Secondary Schools in Nigeria to equip the future generation with the relevant competencies for alternative sustainable protein supply. The study was carried out in Enugu State, Nigeria. The participants for the study comprised 162 agricultural science teachers. A questionnaire titled: Edible Insects Integration in Animal Husbandry Curriculum Questionnaire (EIIAHCQ) was used to collect data using a descriptive survey research design. We conducted data collection with the help of six research assistants. The study identified 11 objectives, 11 contents, 10 teaching methods, and 9 evaluation methods that could be integrated into the existing curriculum of animal husbandry in Nigeria. Among others, the Ministry of Education should integrate the finding of this study into the curriculum of Animal Husbandry in Nigeria to enhance the protein supply and curb food insecurity now and in the future.

Keywords: animal husbandry curriculum, edible insects, entomophagy, integration, secondary school, Nigeria

Procedia PDF Downloads 55
32 Neotectonic Characteristics of the Western Part of Konya, Central Anatolia, Turkey

Authors: Rahmi Aksoy

Abstract:

The western part of Konya consists of an area of block faulted basin and ranges. Present day topography is characterized by alternating elongate mountains and depressions trending east-west. A number of depressions occur in the region. One of the large depressions is the E-W trending Kızılören-Küçükmuhsine (KK basin) basin bounded on both sides by normal faults and located on the west of the Konya city. The basin is about 5-12 km wide and 40 km long. Ranges north and south of the basin are composed of undifferentiated low grade metamorphic rocks of Silurian-Cretaceous age and smaller bodies of ophiolites of probable Cretaceous age. The basin fill consists of the upper Miocene-lower Pliocene fluvial, lacustrine, alluvial sediments and volcanic rocks. The younger and undeformed Plio-Quaternary basin fill unconformably overlies the older basin fill and is composed predominantly of conglomerate, mudstone, silt, clay and recent basin floor deposits. The paleostress data on the striated fault planes in the basin indicates NW-SE extension and associated with an NE-SW compression. The eastern end of the KK basin is cut and terraced by the active Konya fault zone. The Konya fault zone is NE trending, east dipping normal fault forming the western boundary of the Konya depression. The Konya depression consists mainly of Plio-Quaternary alluvial complex and recent basin floor sediments. The structural data gathered from the Konya fault zone support normal faulting with a small amount of dextral strike-slip tensional tectonic regime that shaped under the WNW-ESE extensional stress regime.

Keywords: central Anatolia, fault kinematics, Kızılören-Küçükmuhsine basin, Konya fault zone, neotectonics

Procedia PDF Downloads 332
31 Power System Cyber Security Risk in the Era of Digital Transformation

Authors: Rafat Rob, Khaled Alotaibi, Dana Nour, Abdullah Albadrani, Abdulmohsen Mulhim

Abstract:

Power systems digitization solutions provides a comprehensive smart, cohesive, interconnected network, extensive connectivity between digital assets, physical power plants, and resources to form digital economies. However, digitization has exposed the classical air gapped power plants to the rapid spread of cyber threats and attacks in the process delaying and forcing many organizations to rethink their cyber security policies and standards before they can augment their operation the new advanced digital devices. Cyber Security requirements for power systems (and industry control systems therein) demand a new approach, unique methodology, and design process that is completely different to Cyber Security measures designed for the IT systems. In practice, Cyber Security strategy, as applied to power systems, tends to be closely aligned to those measures applied for IT system purposes. The differentiator for Cyber Security in terms of power systems are the physical assets and applications used, alongside the ever-growing rate of expansion within the industry controls sector (in comparison to the relatively saturated growth observed for corporate IT systems). These factors increase the magnitude of the cyber security risk within such systems. The introduction of smart devices and sensors along the grid initiate vulnerable entry points to the systems. Every installed Smart Meter is a target; the way these devices communicate with each other may instigate a Denial of Service (DoS) and Distributed Denial of Service (DDoS) attack. Attacking one sensor or meter has the potential to propagate itself throughout the power grid reaching the IT network, where it may manifest itself as a malware infiltration.

Keywords: supply chain, cybersecurity, maturity model, risk, smart grid

Procedia PDF Downloads 77
30 Cyber Security and Risk Assessment of the e-Banking Services

Authors: Aisha F. Bushager

Abstract:

Today we are more exposed than ever to cyber threats and attacks at personal, community, organizational, national, and international levels. More aspects of our lives are operating on computer networks simply because we are living in the fifth domain, which is called the Cyberspace. One of the most sensitive areas that are vulnerable to cyber threats and attacks is the Electronic Banking (e-Banking) area, where the banking sector is providing online banking services to its clients. To be able to obtain the clients trust and encourage them to practice e-Banking, also, to maintain the services provided by the banks and ensure safety, cyber security and risks control should be given a high priority in the e-banking area. The aim of the study is to carry out risk assessment on the e-banking services and determine the cyber threats, cyber attacks, and vulnerabilities that are facing the e-banking area specifically in the Kingdom of Bahrain. To collect relevant data, structured interviews were taken place with e-banking experts in different banks. Then, collected data where used as in input to the risk management framework provided by the National Institute of Standards and Technology (NIST), which was the model used in the study to assess the risks associated with e-banking services. The findings of the study showed that the cyber threats are commonly human errors, technical software or hardware failure, and hackers, on the other hand, the most common attacks facing the e-banking sector were phishing, malware attacks, and denial-of-service. The risks associated with the e-banking services were around the moderate level, however, more controls and countermeasures must be applied to maintain the moderate level of risks. The results of the study will help banks discover their vulnerabilities and maintain their online services, in addition, it will enhance the cyber security and contribute to the management and control of risks that are facing the e-banking sector.

Keywords: cyber security, e-banking, risk assessment, threats identification

Procedia PDF Downloads 320
29 An Evaluation of Discontinuities in Rock Mass Using Coupled Hydromechanical Finite Element and Discrete Element Analyses

Authors: Mohammad Moridzadeh, Aaron Gallant

Abstract:

The paper will present the design and construction of the underground excavations of a pump station forebay and its related components including connector tunnels, access shaft, riser shaft and well shafts. The underground openings include an 8 m-diameter riser shaft, an 8-m-diameter access shaft, 34 2.4-m-diameter well shafts, a 107-m-long forebay with a cross section having a height of 11 m and width of 10 m, and a 6 m by 6 m stub connector tunnel between the access shaft and a future forebay extension. The riser shaft extends down from the existing forebay connector tunnel at elevation 247 m to the crown of the forebay at elevation 770.0 feet. The access shaft will extend from the platform at the surface down to El. 223.5 m. The pump station will have the capacity to deliver 600 million gallons per day. The project is located on an uplifted horst consisting of a mass of Precambrian metamorphic rock trending in a north-south direction. The eastern slope of the area is very steep and pronounced and is likely the result of high-angle normal faulting. Toward the west, the area is bordered by a high angle normal fault and recent alluvial, lacustrine, and colluvial deposits. An evaluation of rock mass properties, fault and discontinuities, foliation and joints, and in situ stresses was performed. The response of the rock mass was evaluated in 3DEC using Discrete Element Method (DEM) by explicitly accounting for both major and minor discontinuities within the rock mass (i.e. joints, shear zones, faults). Moreover, the stability of the entire subsurface structure including the forebay, access and riser shafts, future forebay, well shafts, and connecting tunnels and their interactions with each other were evaluated using a 3D coupled hydromechanical Finite Element Analysis (FEA).

Keywords: coupled hydromechanical analysis, discontinuities, discrete element, finite element, pump station

Procedia PDF Downloads 240
28 Applications of Engineering Geology in Hydro Power Tunnel Projects in Himalayan Geological Regime

Authors: Rameh Chauhan

Abstract:

Tunnel construction in Himalayan rock is a challenging task due to fragile nature of the strata. Tunnel excavation carried out from lower Himalayas to high Himalayas in different metamorphic rock. Therefore application of engineering geology plays a vital role during various stage of the tunneling projects. Engineering geology is defined as application of geology to construction of civil structures through engineering practice. It is applied to the design, construction and performance aspects of engineering structure on the surface or sub-surface like dam, underground and surface power house, cut slopes, tunnels and underground storage cavern for nuclear material. But this paper emphasized mostly on underground structures like big caverns of Power house, desilting chambers, and tunnels of various sizes. Construction of these structures in the fragile rock conditions of Himalayan geology from Western Himalayas to Eastern Himalayas necessitated the application of the engineering geology on the micro-scale base for the stability, performance, and longevity of the civil structures. Number of hydropower projects have been constructed, some of them are under construction and under investigation stage. These projects are located in various parts of Himalayas under various seismic-tectonic zones. Tunneling works are involved in these projects. This paper represents the various engineering geological practices adopted in investigation and construction stage of various projects based on experiences gained during past construction histories in Himalayan geology of young mountains in very fragile geological conditions. Highlighting and sharing of use of these techniques on various platforms will definitely enhance the knowledge for carrying out the construction of various projects for the development of society. Construction of the tunnels, surface, and sub-surface caverns, dams, highway, metro, highway tunnels are all based on engineering geological parameters in combinations with other engineering considerations.

Keywords: cavern-power house, desilting chambers and tunnels, seismic-tectonic-zones, earthquake-prone zones based on intensities

Procedia PDF Downloads 195
27 Gold-Bearing Alteration Zones in South Eastern Desert of Egypt: Geology and Remote Sensing Analysis

Authors: Mohamed F. Sadek, Safaa M. Hassan, Safwat S. Gabr

Abstract:

Several alteration zones hosting gold mineralization are wide spreading in the South Eastern Desert of Egypt where gold has been mined from many localities since the time of the Pharaohs. The Sukkari is the only mine currently producing gold in the Eastern Desert of Egypt. Therefore, it is necessary to conduct more detailed studies on these locations using modern exploratory methods. The remote sensing plays an important role in lithological mapping and detection of associated hydrothermal mineralization particularly the exploration of gold mineralization. This study is focused on three localities in South Eastern Desert of Egypt, namely Beida, Defiet and Hoteib-Eiqat aiming to detect the gold-bearing hydrothermal alteration zones using the integrated data of remote sensing, field study and mineralogical investigation. Generally, these areas are dominated by Precambrian basement rocks including metamorphic and magmatic assemblages. They comprise ophiolitic serpentinite-talc carbonate, island-arc metavolcanics which were intruded by syn to late orogenic mafic and felsic intrusions mainly gabbro, granodiorite and monzogranite. The processed data of Advanced Spaceborne Thermal Emission and Reflection (ASTER) and Landsat-8 images are used in the present study to map the gold bearing-hydrothermal alteration zones. Band rationing and principal component analysis techniques are used to discriminate the different lithologic units exposed in the studied three areas. Field study and mineralogical investigation have been used to verify the remote sensing data. This study concluded that, the integrated remote sensing data with geological, field and mineralogical investigations are very effective in lithological discrimination, detailed geological mapping and detection of the gold-bearing hydrothermal alteration zones. More detailed exploration for gold mineralization with the help of remote sensing techniques is recommended to evaluate its potentiality in the study areas.

Keywords: pan-african, Egypt, landsat-8; ASTER, gold, alteration zones

Procedia PDF Downloads 96
26 Analysis of Aquifer Productivity in the Mbouda Area (West Cameroon)

Authors: Folong Tchoffo Marlyse Fabiola, Anaba Onana Achille Basile

Abstract:

Located in the western region of Cameroon, in the BAMBOUTOS department, the city of Mbouda belongs to the Pan-African basement. The water resources exploited in this region consist of surface water and groundwater from weathered and fractured aquifers within the same basement. To study the factors determining the productivity of aquifers in the Mbouda area, we adopted a methodology based on collecting data from boreholes drilled in the region, identifying different types of rocks, analyzing structures, and conducting geophysical surveys in the field. The results obtained allowed us to distinguish two main types of rocks: metamorphic rocks composed of amphibolites and migmatitic gneisses and igneous rocks, namely granodiorites and granites. Several types of structures were also observed, including planar structures (foliation and schistosity), folded structures (folds), and brittle structures (fractures and lineaments). A structural synthesis combines all these elements into three major phases of deformation. Phase D1 is characterized by foliation and schistosity, phase D2 is marked by shear planes and phase D3 is characterized by open and sealed fractures. The analysis of structures (fractures in outcrops, Landsat lineaments, subsurface structures) shows a predominance of ENE-WSW and WNW-ESE directions. Through electrical surveys and borehole data, we were able to identify the sequence of different geological formations. Four geo-electric layers were identified, each with a different electrical conductivity: conductive, semi-resistive, or resistive. The last conductive layer is considered a potentially aquiferous zone. The flow rates of the boreholes ranged from 2.6 to 12 m3/h, classified as moderate to high according to the CIEH classification. The boreholes were mainly located in basalts, which are mineralogically rich in ferromagnesian minerals. This mineral composition contributes to their high productivity as they are more likely to be weathered. The boreholes were positioned along linear structures or at their intersections.

Keywords: Mbouda, Pan-African basement, productivity, west-Cameroon

Procedia PDF Downloads 29
25 Principles to Design Urbanism in Cinema; An Aesthetic Study on Identity and Representation of a City in a Movie

Authors: Dorsa Moayedi

Abstract:

‘The Cities’ and Cinema have a history going as far back as silent films; however, the standards of picturing a city in a film are somewhat vague. ‘Genius Loci’ of a city can be easily described with parameters that architects have detected; nevertheless, the genius loci of an ‘urban movie’ is untouched. Cities have been among the provocative matters that pushed filmmakers to ponder upon them and to picture them along with their urban identity thoroughly in their artworks, though the impacts of the urban life on the plot and characters is neglected, and so a city in a movie is usually restricted to ‘the place where the story happens’. Cities and urban life are among those that are in constant change and ongoing expansion; therefore, they are always fresh and ready to challenge people with their existence. Thus, the relationship between the city and cinema is metamorphic, though it could be defined and explored. The dominant research on the idea of urbanism has been conducted by outstanding scholars of architecture, like Christian Norberg-Schulz, and the studies on Cinema have been done by theorists of cinema, like Christian Metz, who have mastered defining their own realm; still, the idea to mingle the domains to reach a unified theory which could be applied to ‘urban movies’ is barely worked on. In this research, we have sought mutual grounds to discuss ‘urbanism in cinema,’ the grounds that cinema could benefit from and get to a more accurate audio-visual representation of a city, in accordance with the ideas of Christopher Alexander and the term he coined ‘The Timeless Way of Building.’ We concentrate on movies that are dependent on urban life, mainly those that possess the names of cities, like ‘Nashville (1975), Manhattan (1979), Fargo (1996), Midnight in Paris (2011) or Roma (2018), according to the ideas of urban design and narratives of cinema. Contrary to what has often been assumed, cinema and architecture could be defined in line with similar parameters, and architectural terms could be applied to the research done on movies. Our findings indicate that the theories of Christopher Alexander can best fit the paradigm to study an ‘Urban Movie’, definitions of a timeless building, elaborate on the characteristics of a design that could be applied to definitions of an urban movie, and set a prototype for further filmmaking regarding the urban life.

Keywords: city, urbanism, urban movies, identity, representation

Procedia PDF Downloads 26
24 Geochemical and Mineralogical Characters of the Coastal Plain Sediments of the Arabian Gulf, Kuwait

Authors: Adel Ahmed Aly Elhabab, Ibrahim Adsani

Abstract:

The present study deals with detailed geochemical and mineralogical studies of the coastal plain sediments formed along the shoreline of the Arabian Gulf area, Kuwait. These deposits are mainly fluviomarine and beach sands. The coastal plain deposits of the central Kuwait shoreline zone were found to consist of average medium-grained sand. The sand composed, on average of about 90% sand, and about 10% or less is mud, and has a unimodal distribution with a mode of medium sand (1-2 ф). The sediments consist mainly quartz, Feldspar, clay minerals with carbonate minerals (detritus calcite and dolomite) and rock fragments (chert). The mineralogy of the clay fractions of the sediments is dominated by illite, palygorskite, mixed layer illite-montmorillonite with minor amounts of chlorite and Kaolinite Heavy minerals are concentrated in the very fine sand fraction and are dominated by opaque minerals, and non opaque minerals which represented by amphiboles, pyroxenes, epidotes, dolomite, zircon, tourmaline, rutile, garnet and other which represented by Staurolite, Kyanite, Andalusite and Sillimenite as a trace amounts. The chemical analysis for the detrital amphibole grains from sandstone of coastal plain sediments shows the following features; the grains which have (Na+K) <0.50 its composition ranges from actino hornblende to magnesio hornblende, but the grains which have (Na+K) >0.50 its composition have wide variation and on the (Na+K)-AlIV diagram can be characterized two association: Association 1 which characterized by low amount of AlIV and low amount of (Na+K), by comparing the chemical composition of this association and the chemical composition of amphibole grains from older basement rock, can be say, these association may be derived from metamorphic source rocks and association 2 which characterized by high amount of AlIV and low amount of (Na+K), may be derived from volcanic source rocks.

Keywords: chemical composition, clay minerals, coastal area, electro probe micro analyzer (EPMA), fluviomarine sediments, heavy minerals

Procedia PDF Downloads 360
23 An Analysis of the Continuum in Inter-Caste Relations in India

Authors: Sujit Kumar

Abstract:

Historicity of inter-caste relations can be traced in the early stages of evolution of rural community in the Indian society. These have witnessed vicissitudes during long drawn interactions between caste groups. Inter-caste relations evolved in a more organized form in the guise of Jajmani system. This is a system of permanent and hereditary inter-caste relations and gives a kaleidoscopic view of socio-economic relations among various caste groupings. Universality of its prevalence in rural India for centuries is well recognized and documented. But it has been undergoing metamorphic change in some regions and changing at a slower pace in the others during post-independence period. An empirical study was conducted with the objectives to know whether Jajmani system is in vogue in the rural areas and type and intensity of socio-economic ties among different caste categories and to find out the change in inter-caste relations, if any owing to industrialization and modernization. Information was elicited from 225 respondents using interview schedule designed for this purpose. It is discernible that in majority of cases, inter-caste social relations which find better expression on the occasions like marriage, death, birth and festivals etc. among Brahmins and lower castes vis-à-vis other caste categories have grown weak. The data further unearth that economic relations as maintained on the occasions of marriage, sacred thread ceremony, mundan sacrament, birthday, death, yajna, katha, routine hair cut, manufacture and repair of various iron, earthen, wooden and leather articles between members of higher castes (general category) and lower castes (scheduled castes) are moderate but weak in case of Other Backward Classes vis-à-vis all other caste categories. Overwhelming majority of informants believe that decline in hereditary occupations, depreciation of old products and services and their availability from the market being made by industry are main reasons in descending order for change in inter caste relations. Modernization, westernization, industrialization, transportation and communications, growing materialism and consumerism together have brought change in relations among caste groups affecting about a billion population inhabiting rural India.

Keywords: inter-caste, Jajmani, sacrament, Yajna

Procedia PDF Downloads 103
22 Polygenetic Iron Mineralization in the Baba-Ali and Galali Deposits, Further Evidences from Stable (S, O, H) Isotope Data, NW Hamedan, Iran

Authors: Ghodratollah Rostami Paydar

Abstract:

The Baba-Ali and Galali iron deposits are located in northwest Hamedan and the Iranian Sanandaj-Sirjan geological structural zone. The host rocks of these deposits are metavolcanosedimentary successions of Songhor stratigraphic series with permo-trriassic age. Field investigation, ore geometry, textures and structures and paragenetic sequence of minerals, all indicate that the ore minerals are crystallized in four stages: primary volcanosedimentary stage, secondary regional metamorphism with formation of ductile shear zones, contact metamorphism and metasomatism stage and the finally late hydrothermal mineralization within uplift and exposure. Totally 29 samples of sulfide, oxide-silicate and carbonate minerals of iron orees and gangue has been purified for stable isotope analysis. The isotope ratio data assure that occurrence of dynamothermal metamorphism in these areas typically involves a lengthy period of time, which results in a tendency toward isotopic homogenization specifically in O and H stable isotopes and showing the role of metamorphic waters in mineralization process. Measurement of δ34S (CDT) in first generation of pyrite is higher than another ones, so it confirms the volcanogenic origin of primary iron mineralization. δ13C data measurements in Galali carbonate country rocks show a marine origin. δ18O in magnetite and skarn forming silicates, δ18O and δ13C in limestone and skarn calcite and δ34S in sulphides are all consistent with the interaction of a magmatic-equilibrated fluid with Galali limestone, and a dominantly magmatic source for S. All these data imply skarn formation and mineralisation in a magmatic-hydrothermal system that maintained high salinity to relatively late stages resulting in the formation of the regional Na metasomatic alteration halo. Late stage hydrothermal quartz-calcite veinlets are important for gold mineralization, but the economic evaluation is required to detailed geochemical studies.

Keywords: iron, polygenetic, stable isotope, BabaAli, Galali

Procedia PDF Downloads 258
21 Metamorphic Approach in Architecture Studio to Re-Imagine Drawings in Acknowledgement of Architectural/Artistic Identity

Authors: Hassan Wajid, Syed T. Ahmed, Syed G. Haider Jr., Razia Latif, Ahsan Ali, Maira Anam

Abstract:

The phenomenon of Metamorphosis can be associated with any object, organism, or structure gradually and progressively going through the change of systemic or morphological form. This phenomenon can be integrated while teaching drawing to architecture students. In architectural drawings, metamorphosis’s main focus and purpose are not to completely imitate any object. In the process of drawing, the changes in systemic or morphological form happen until the complete process, and the visuals of the complete process change the drawing, opening up possibilities for the imagination of the perceivers. Metamorphosis in architectural drawings begins with an initial form and, through various noticeable stages, ends up final form or manifestation. How much of the initial form is manifested in the final form and progressively among various intermediate stages becomes an indication of the nature of metamorphosis as a phenomenon. It is important at this stage to clarify that the term metamorphosis is presently being coopted from its original domain, usually in life sciences. In this current exercise, the architectural drawings are to act as an operative analog process transforming one image of art and/or architecture in its broadest sense. That composition is claimed to have come from one source (individual work, a cultural artifact, civilizational remain). It dialectically meets, opposes, or confronts some carefully chosen alien opposites from a different domain. As an example, the layers of a detailed drawing of a Turkish prayer rug of 5 x 7 ratio over a detailed architectural plan of a religious, historical complex can be observed such that the two drawings, though at markedly different scales could dialectically converse with one another and through their mutual congruencies. In the final stage, the idea concludes contradictions across the scales to initiate the analogous roles of metamorphosed third reality, which suggests the previous un-acknowledged architectural or artistic identity. The proposed paper explores the trajectory of reproduction by analyzing drawings through detailed drawing stages and analyzes challenges as well as opportunities in the discovered realm of imagination. This description further aims at identifying factors influencing creativity and innovation in producing architectural drawings through the process of observing drawings from inception to the concluding stage.

Keywords: architectural drawings, metamorphosis, perceptions, discovery

Procedia PDF Downloads 74
20 Production of Pig Iron by Smelting of Blended Pre-Reduced Titaniferous Magnetite Ore and Hematite Ore Using Lean Grade Coal

Authors: Bitan Kumar Sarkar, Akashdeep Agarwal, Rajib Dey, Gopes Chandra Das

Abstract:

The rapid depletion of high-grade iron ore (Fe2O3) has gained attention on the use of other sources of iron ore. Titaniferous magnetite ore (TMO) is a special type of magnetite ore having high titania content (23.23% TiO2 present in this case). Due to high TiO2 content and high density, TMO cannot be treated by the conventional smelting reduction. In this present work, the TMO has been collected from high-grade metamorphic terrain of the Precambrian Chotanagpur gneissic complex situated in the eastern part of India (Shaltora area, Bankura district, West Bengal) and the hematite ore has been collected from Visakhapatnam Steel Plant (VSP), Visakhapatnam. At VSP, iron ore is received from Bailadila mines, Chattisgarh of M/s. National Mineral Development Corporation. The preliminary characterization of TMO and hematite ore (HMO) has been investigated by WDXRF, XRD and FESEM analyses. Similarly, good quality of coal (mainly coking coal) is also getting depleted fast. The basic purpose of this work is to find how lean grade coal can be utilised along with TMO for smelting to produce pig iron. Lean grade coal has been characterised by using TG/DTA, proximate and ultimate analyses. The boiler grade coal has been found to contain 28.08% of fixed carbon and 28.31% of volatile matter. TMO fines (below 75 μm) and HMO fines (below 75 μm) have been separately agglomerated with lean grade coal fines (below 75 μm) in the form of briquettes using binders like bentonite and molasses. These green briquettes are dried first in oven at 423 K for 30 min and then reduced isothermally in tube furnace over the temperature range of 1323 K, 1373 K and 1423 K for 30 min & 60 min. After reduction, the reduced briquettes are characterized by XRD and FESEM analyses. The best reduced TMO and HMO samples are taken and blended in three different weight percentage ratios of 1:4, 1:8 and 1:12 of TMO:HMO. The chemical analysis of three blended samples is carried out and degree of metallisation of iron is found to contain 89.38%, 92.12% and 93.12%, respectively. These three blended samples are briquetted using binder like bentonite and lime. Thereafter these blended briquettes are separately smelted in raising hearth furnace at 1773 K for 30 min. The pig iron formed is characterized using XRD, microscopic analysis. It can be concluded that 90% yield of pig iron can be achieved when the blend ratio of TMO:HMO is 1:4.5. This means for 90% yield, the maximum TMO that could be used in the blend is about 18%.

Keywords: briquetting reduction, lean grade coal, smelting reduction, TMO

Procedia PDF Downloads 291
19 The Road Ahead: Merging Human Cyber Security Expertise with Generative AI

Authors: Brennan Lodge

Abstract:

Cybersecurity professionals have long been embroiled in a digital arms race, confronting increasingly sophisticated threats with innovative solutions. The field of cybersecurity is in an unending race against malicious adversaries. As threats evolve in complexity, the tools used to defend against them need to advance even faster. Burdened with a vast arsenal of tools and an expansive scope of threat intelligence, analysts frequently navigate a complex web, trying to discern patterns amidst information overload. Herein lies the potential of Retrieval Augmented Generation (RAG). By combining the capabilities of Large Language Models (LLMs) with a generative AI facet, RAG brings to the table an unparalleled ability for real-time cross-referencing, bridging the gap between raw data and actionable insights. Imagine an analyst named Sarah working at a global Fortune 500 company. Every day, Sarah navigates a maze of diverse knowledge bases, real-time threat intelligence, and her company's vast proprietary data, from network specifics to intricate technical blueprints. One day, she's challenged by a potential breach through a personal device due to the company's global "Bring Your Own Device" policy. With the clock ticking, Sarah has mere minutes to trace the malware's origin, all while considering complex regional regulations. As she races against the benchmark of Mean Time To Resolution (MTTR), she wonders: Could "Cozy Bear" with its notorious malware tactic, HAMMERTOSS, be behind this? Balancing policy intricacies, global network considerations, and ever-emerging cyber threats, Sarah's role epitomizes the intense challenges faced by today's cybersecurity analysts. While analysts grapple with this array of intricate, time-sensitive challenges, the necessity for precision and efficiency is key. RAG technology—a cutting-edge advancement in Gen AI—is a promising solution. Designed to assimilate diverse data sources such as cyber advisory notices, phishing email sentiment, secure and insecure code examples, information security policy documentation, and the MITRE ATT&CK framework, RAG equips analysts with real-time querying capabilities through a vector database and a cross referenced concise response from a Gen AI model. Traditional relational databases often necessitate a tedious process of filtering through numerous entries. Now, with the synergy of vector databases and Gen AI models, analysts can rapidly access both contextually or semantically akin data points. This augmented approach equips analysts with a comprehensive understanding of the prevailing cyber threats, elevating the robustness of cybersecurity defenses and upskilling the analyst and team, too. Vector databases underpin the knowledge translation in Gen AI. They bridge the gap between raw data and translation into meaningful insights, ensuring that analysts are equipped with comprehensive and relevant information. This superior capability of the RAG framework, with its impressive depth and precision, finds application across a broad spectrum of cybersecurity challenges. Let's delve into some use cases where its potential becomes particularly evident: Phishing Email Sentiment Analysis: Phishing remains a predominant vector for cybersecurity breaches. Leveraging RAG's capabilities, analysts can not only assess the potential malevolence of an email but can also understand the context behind it. By cross-referencing patterns from varied data sources in real-time, the detection process evolves from a mere content evaluation to a holistic understanding of attacker tactics, behaviors, and evolving profiles. This allows for the identification of nuanced phishing strategies that might otherwise go undetected. Insecure Code Analysis: Software vulnerabilities form a critical entry point for cyber adversaries. With RAG, the process of code evaluation undergoes a transformation. Instead of manual code reviews, the system pulls insights from vector databases and historical code snippets marked as insecure, enabling detection of vulnerabilities based on historical patterns, emerging threat vectors, and even predictive threat modeling. This ensures that even the most obfuscated or embedded vulnerabilities are identified, and corrective measures can be promptly implemented. Vulnerability and Upskill Advisory: In the fast-paced world of cybersecurity, staying updated is paramount. Through RAG's capabilities, analysts are not only made aware of real-time vulnerabilities but are also guided on the necessary skills and tools needed to combat them. By dynamically sourcing data through vulnerability advisories, news on advanced persistent threats, and tactics to defend, RAG ensures that analysts are not only reactive to threats but are also proactively upskilled, thereby bolstering their defense mechanisms. Information Security Policies for Compliance Teams: Compliance remains at the heart of many organizational cybersecurity strategies. However, with ever-shifting regulatory landscapes, staying compliant becomes a moving target. RAG's ability to source real-time data ensures that compliance teams always have access to the latest policy changes, guidelines, and best practices. This not only facilitates adherence to current standards but also anticipates future shifts, assists with audits, and ensures that organizations remain ahead of the compliance curve. Fusing a RAG architecture with platforms like Slack amplifies its practical utility. Slack, known for its real-time communication prowess, seamlessly evolves into more than just a messaging platform in this context. Cybersecurity analysts can pose intricate queries within Slack and, almost instantaneously, receive comprehensive feedback powered by the harmonious interplay of RAG and Gen AI. This integration effectively transforms Slack into an AI-augmented chatbot-like assistant for cybersecurity professionals, always ready to provide informed insights on-demand, making it an indispensable ally in the ever-evolving cyber battlefield. Navigating the vast landscape of cybersecurity, analysts often encounter unfamiliar terminologies and techniques., analysts require tools that not only detect or inform them of threats, like CISA (U.S Cybersecurity Infrastructure Security Agency) Advisories, but also interpret and communicate them effectively. Consider a junior cybersecurity analyst named Alex, who comes across the term "Kerberoasting" while reviewing a network log. Unfamiliar with its intricacies, Alex turns to Slack to pose a query: "chat explain is Kerberoasting, using CISA." Almost instantaneously, Slack, powered by the harmonious interplay of RAG and Gen AI, provides a detailed response, cross-referencing a recent cyber advisory on the technique. It explains how attackers can exploit the Kerberos Ticket Granting Service to decipher service account passwords, potentially compromising a network. In this dynamic realm of cybersecurity, the blend of RAG and Generative AI represents more than just a technological leap. It embodies a paradigm shift, promising a future where human expertise and AI-driven precision join forces. As cyber threats continue their relentless advance, this synergy ensures that defenders are equipped with an arsenal that's not just reactive, but also profoundly insightful. No longer should analysts be submerged in a deluge of data without direction. Instead, they should be empowered, to discern, act, and preempt with unparalleled clarity and confidence. By harmoniously intertwining human discernment with AI capabilities, we should chart a path towards a future where cybersecurity is not just about defense, but about achieving a strategic advantage, paving the way for a safer, informed and a more secure digital horizon.

Keywords: cybersecurity, gen AI, retrieval augmented generation, cybersecurity defense strategies

Procedia PDF Downloads 47
18 Modal Composition and Tectonic Provenance of the Sandstones of Ecca Group, Karoo Supergroup in the Eastern Cape Province, South Africa

Authors: Christopher Baiyegunhi, Kuiwu Liu, Oswald Gwavava

Abstract:

Petrography of the sandstones of Ecca Group, Karoo Supergroup in the Eastern Cape Province of South Africa have been investigated on composition, provenance and influence of weathering conditions. Petrographic studies based on quantitative analysis of the detrital minerals revealed that the sandstones are composed mostly of quartz, feldspar and lithic fragments of metamorphic and sedimentary rocks. The sandstones have an average framework composition of 24.3% quartz, 19.3% feldspar, 26.1% rock fragments, and 81.33% of the quartz grains are monocrystalline. These sandstones are generally very fine to fine grained, moderate to well sorted, and subangular to subrounded in shape. In addition, they are compositionally immature and can be classified as feldspathic wacke and lithic wacke. The absence of major petrographically distinctive compositional variations in the sandstones perhaps indicate homogeneity of their source. As a result of this, it is inferred that the transportation distance from the source area was quite short and the main mechanism of transportation was by river systems to the basin. The QFL ternary diagrams revealed dissected and transitional arc provenance pointing to an active margin and uplifted basement preserving the signature of a recycled provenance. This is an indication that the sandstones were derived from a magmatic arc provenance. Since magmatic provenance includes transitional arc and dissected arc, it also shows that the source area of the Ecca sediments had a secondary sedimentary and metasedimentary rocks from a marginal belt that developed as a result of rifting. The weathering diagrams and semi-quantitative weathering index indicate that the Ecca sandstones are mostly from a plutonic source area, with climatic conditions ranging from arid to humid. The compositional immaturity of the sandstones is suggested to be due to weathering or recycling and low relief or short transport from the source area. The detrital modal compositions of these sandstones are related to back arc to island and continental margin arc. The origin and deposition of the Ecca sandstones are due to low-moderate weathering, recycling of pre-existing rocks, erosion and transportation of debris from the orogeny of the Cape Fold Belt.

Keywords: petrography, tectonic setting, provenance, Ecca Group, Karoo Basin

Procedia PDF Downloads 384
17 Understanding the Basics of Information Security: An Act of Defense

Authors: Sharon Q. Yang, Robert J. Congleton

Abstract:

Information security is a broad concept that covers any issues and concerns about the proper access and use of information on the Internet, including measures and procedures to protect intellectual property and private data from illegal access and online theft; the act of hacking; and any defensive technologies that contest such cybercrimes. As more research and commercial activities are conducted online, cybercrimes have increased significantly, putting sensitive information at risk. Information security has become critically important for organizations and private citizens alike. Hackers scan for network vulnerabilities on the Internet and steal data whenever they can. Cybercrimes disrupt our daily life, cause financial losses, and instigate fear in the public. Since the start of the pandemic, most data related cybercrimes targets have been either financial or health information from companies and organizations. Libraries also should have a high interest in understanding and adopting information security methods to protect their patron data and copyrighted materials. But according to information security professionals, higher education and cultural organizations, including their libraries, are the least prepared entities for cyberattacks. One recent example is that of Steven’s Institute of Technology in New Jersey in the US, which had its network hacked in 2020, with the hackers demanding a ransom. As a result, the network of the college was down for two months, causing serious financial loss. There are other cases where libraries, colleges, and universities have been targeted for data breaches. In order to build an effective defense, we need to understand the most common types of cybercrimes, including phishing, whaling, social engineering, distributed denial of service (DDoS) attacks, malware and ransomware, and hacker profiles. Our research will focus on each hacking technique and related defense measures; and the social background and reasons/purpose of hacker and hacking. Our research shows that hacking techniques will continue to evolve as new applications, housing information, and data on the Internet continue to be developed. Some cybercrimes can be stopped with effective measures, while others present challenges. It is vital that people understand what they face and the consequences when not prepared.

Keywords: cybercrimes, hacking technologies, higher education, information security, libraries

Procedia PDF Downloads 101
16 Petrographic Properties of Sedimentary-Exhalative Type Ores of Filizchay Polymetallic Deposit

Authors: Samir Verdiyev, Fuad Huseynov, Islam Guliyev, Coşqun İsmayıl

Abstract:

The Filizchay polymetallic deposit is located on the southern slope of the Greater Caucasus Mountain Range, northwest of Azerbaijan in the Balaken district. Filizchay is the largest polymetallic deposit in the region and the second-largest polymetallic deposit in Europe. The mineral deposits in the region are associated with two different geodynamic evolutions that began with the Mesozoic collision along the Eurasian continent and the formation of a magmatic arc after the collision and continued with subduction in the Cenozoic. The bedrocks associated with Filizchay mineralization are Early Jurassic aged. The stratigraphic sequence of the deposit is consisting of black metamorphic clay shales, sandstones, and ore layers. Shales, sandstones, and siltstones are encountered in the upper and middle sections of the ore body, while only shales are observed at the lowest ranges. The ore body is mainly layered by the geometric structure of the bedrock; folding can be observed in the ore layers along with the bedrock foliation, and just in few points indirect laying due to the metamorphism. This suggests that the Filizchay ore mineralization is syngenetic, which is proved by the mineralization by the bedrock. To determine the ore petrography properties of the Filizchay deposit, samples were collected from the region where the ore is concentrated, and a polished section was prepared. These collected samples were examined under the mineralogical microscope to reveal the paragenesis of the mineralization and to explain the relation of ore minerals to each other. In this study, macroscopically observed minerals and textures of these minerals were used in the cores revealed during drilling exploration made by AzerGold CJS company. As a result of all these studies, it has been determined that there are three main mineralization types in the Filizchay deposit: banded, massive, and veinlet ores. The mineralization is in the massive pyrite; furthermore, the basis of the ore-mass contains pyrite, chalcopyrite, sphalerite, and galena. The pyrite in some parts of the ore body transformed to pyrrhotite as a result of metamorphism. Pyrite-chalcopyrite, pyrite-sphalerite-galena, pyrite-pyrrhotite mineral assemblages were determined during microscopic studies of mineralization. The replacement texture is more developed in Filizchay ores. The banded polymetallic type mineralization and near bedrocks are cut by quartz-carbonate veins. The geotectonic position and lithological conditions of the Filizchay deposit, the texture, and interrelationship of the sulfide mineralization indicate that it is a sedimentary-exhalative type of Au-Cu-Ag-Zn-Pb polymetallic deposit that is genetically related to the massive sulfide deposits.

Keywords: Balaken, Filizchay, metamorphism, polymetallic mineralization

Procedia PDF Downloads 164
15 An Insight Into the Effective Distribution of Lineaments Over Sheared Terrains to Hydraulically Characterize the Shear Zones in Hard Rock Aquifer System

Authors: Tamal Sur, Tapas Acharya

Abstract:

Identifying the water resource in hard crystalline rock terrain has been a huge challenge over the decades as it is considered a poor groundwater province area. Over the years, usage of satellite imagery for the delineation of groundwater potential zone in sheared hard rock terrain has been occasionally successful. In numerous circumstances, it has been observed that groundwater potential zone delineated by satellite imagery study has failed to yield satisfactory result on its own. The present study discusses the fact that zones having a high concentration of lineaments oblique to the general trend of shear fabric could be good groundwater potential zones within a shear zone in crystalline fractured rock aquifer system. Due to this fact, the density of lineaments and the number of intersecting lineaments increases over that particular region, making it a suitable locale for good groundwater recharge, which is mostly composed of Precambrian metamorphic rocks i.e., quartzite, granite gneisses, porphyroclastic granite-gneiss, quartzo-feldspathic-granite-gneiss, mylonitic granites, quartz-biotite-granite gneiss and some phyllites of Purulia district of West Bengal, NE India. This study aims to construct an attempt to demonstrate the relationship of the high amount of lineament accumulation and their intersection with high groundwater fluctuation zones, i.e., good groundwater potential zones. On the basis of that, an effort has been made to characterize the shear zones with respect to their groundwater potentiality. Satellite imagery data (IRS-P6 LISS IV standard FCC image) analysis reveals the bifurcating nature of North Purulia shear zone (NPSZ) and South Purulia shear zone (SPSZ) over the study area. Careful analysis of lineament rose diagrams, lineament density map, lineament intersection density map, and frequency diagrams for water table depths with an emphasis on high water table fluctuations exhibit the fact that different structural features existing over North and South Purulia shear zones can affect the nature of hydraulic potential of that region.

Keywords: crystalline hard rock terrain, groundwater recharge, hydrogeology, lineaments, shear zone, water table fluctuation

Procedia PDF Downloads 55
14 An Insight into the Distribution of Lineaments over Sheared Terrains to Hydraulically Characterize the Shear Zones in Precambrian Hard Rock Aquifer System

Authors: Tamal Sur, Tapas Acharya

Abstract:

Identifying the water resource in hard crystalline rock terrain has been a huge challenge over the decades as it is considered a poor groundwater province area. Over the years, usage of satellite imagery for the delineation of groundwater potential zone in sheared hard rock terrain has been occasionally successful. In numerous circumstances, it has been observed that groundwater potential zone delineated by satellite imagery study has failed to yield satisfactory result on its own. The present study discusses the fact that zones having high concentration of lineaments oblique to the general trend of shear fabric could be good groundwater potential zones within a shear zone in crystalline fractured rock aquifer system. Due to this fact, the density of lineaments and the number of intersecting lineaments increases over that particular region, making it a suitable locale for good groundwater recharge, which is mostly composed of Precambrian metamorphic rocks i.e., quartzite, granite gneisses, porphyroclastic granite-gneiss, quartzo-feldspathic-granite-gneiss, mylonitic granites, quartz-biotite-granite gneiss and some phyllites of Purulia district of West Bengal, NE India. This study aims to construct an attempt to demonstrate the relationship of high amount of lineament accumulation and their intersection with high groundwater fluctuation zones i.e., good groundwater potential zones. On the basis of that, an effort has been made to characterize the shear zones with respect to their groundwater potentiality. Satellite imagery data (IRS-P6 LISS IV standard FCC image) analysis reveals the bifurcating nature of North Purulia shear zone (NPSZ) and South Purulia shear zone (SPSZ) over the study area. Careful analysis of lineament rose diagrams, lineament density map, lineament intersection density map, and frequency diagrams for water table depths with an emphasis on high water table fluctuations exhibit the fact that different structural features existing over North and South Purulia shear zones can affect the nature of hydraulic potential of that region.

Keywords: crystalline hard rock terrain, groundwater recharge, hydrogeology, lineaments, shear zone, water table fluctuation

Procedia PDF Downloads 48
13 Groundwater Potential Mapping using Frequency Ratio and Shannon’s Entropy Models in Lesser Himalaya Zone, Nepal

Authors: Yagya Murti Aryal, Bipin Adhikari, Pradeep Gyawali

Abstract:

The Lesser Himalaya zone of Nepal consists of thrusting and folding belts, which play an important role in the sustainable management of groundwater in the Himalayan regions. The study area is located in the Dolakha and Ramechhap Districts of Bagmati Province, Nepal. Geologically, these districts are situated in the Lesser Himalayas and partly encompass the Higher Himalayan rock sequence, which includes low-grade to high-grade metamorphic rocks. Following the Gorkha Earthquake in 2015, numerous springs dried up, and many others are currently experiencing depletion due to the distortion of the natural groundwater flow. The primary objective of this study is to identify potential groundwater areas and determine suitable sites for artificial groundwater recharge. Two distinct statistical approaches were used to develop models: The Frequency Ratio (FR) and Shannon Entropy (SE) methods. The study utilized both primary and secondary datasets and incorporated significant role and controlling factors derived from field works and literature reviews. Field data collection involved spring inventory, soil analysis, lithology assessment, and hydro-geomorphology study. Additionally, slope, aspect, drainage density, and lineament density were extracted from a Digital Elevation Model (DEM) using GIS and transformed into thematic layers. For training and validation, 114 springs were divided into a 70/30 ratio, with an equal number of non-spring pixels. After assigning weights to each class based on the two proposed models, a groundwater potential map was generated using GIS, classifying the area into five levels: very low, low, moderate, high, and very high. The model's outcome reveals that over 41% of the area falls into the low and very low potential categories, while only 30% of the area demonstrates a high probability of groundwater potential. To evaluate model performance, accuracy was assessed using the Area under the Curve (AUC). The success rate AUC values for the FR and SE methods were determined to be 78.73% and 77.09%, respectively. Additionally, the prediction rate AUC values for the FR and SE methods were calculated as 76.31% and 74.08%. The results indicate that the FR model exhibits greater prediction capability compared to the SE model in this case study.

Keywords: groundwater potential mapping, frequency ratio, Shannon’s Entropy, Lesser Himalaya Zone, sustainable groundwater management

Procedia PDF Downloads 44
12 Lacustrine Sediments of the Poljanska Locality in the Miocene Climatic Optimum North Croatian Basin, Croatia

Authors: Marijan KovačIć, Davor Pavelić, Darko Tibljaš, Ivo Galić, Frane Marković, Ivica PavičIć

Abstract:

The North Croatian Basin (NCB) occupies the southwestern part of the Pannonian Basin System and belongs to the Central Paratethys realm. In a quarry near the village of Poljanska, on the southern slopes of Mt. Papuk in eastern Croatia, a 40-meter-thick section is exposed, consisting of well-bedded, mixed, carbonate-siliciclastic deposits with occurrences of pyroclastics. Sedimentological investigation indicates that a salina lake developed in the central NCB during the late early Miocene. Field studies and mineralogical and petrological analyses indicate that alternations of laminated crypto- characterize the lower part of the section to microcrystalline dolomite and analcimolite (sedimentary rocks composed essentially of authigenic analcime) associated with tuffites and marls. The pyroclastic material is a product of volcanic activity at the end of the early Miocene, while the formation of analcime, the zeolite group mineral, is a result of an alteration of pyroclastic material in an alkaline lacustrine environment. These sediments were deposited in a shallow, hydrologically closed lake that was controlled by an arid climate during the first phase of its development. The middle part of the section consists of dolomites interbedded with analcimolites and sandstones. The sandstone beds are a result of the increased supply of clastic material derived from the locally uplifted metamorphic and granitoid basement. The emplacement of sandstones and dolomites reflects a distinct alternation of hydrologically open and closed lacustrine environments controlled by the frequent alternation of humid and arid climates, representing the second phase of lake development. The siliciclastics of the third phase of lake development were deposited during the Middle Miocene in a hydrologically mostly open lake. All lacustrine deposition coincides with the Miocene Climatic Optimum, which was characterized by a hot and warm climate. The sedimentological data confirm the mostly wet conditions previously identified by paleobotanical studies in the region. The exception is the relatively long interval of arid climate in the late early Miocene that controlled the first phase of lake evolution, i.e., the salina-type lake.

Keywords: early Miocene, Pannonian basin System, pyroclastics, salina-type lake

Procedia PDF Downloads 187
11 Factors Controlling Marine Shale Porosity: A Case Study between Lower Cambrian and Lower Silurian of Upper Yangtze Area, South China

Authors: Xin Li, Zhenxue Jiang, Zhuo Li

Abstract:

Generally, shale gas is trapped within shale systems with low porosity and ultralow permeability as free and adsorbing states. Its production is controlled by properties, in terms of occurrence phases, gas contents, and percolation characteristics. These properties are all influenced by porous features. In this paper, porosity differences of marine shales were explored between Lower Cambrian shale and Lower Silurian shale of Sichuan Basin, South China. Both the two shales were marine shales with abundant oil-prone kerogen and rich siliceous minerals. Whereas Lower Cambrian shale (3.56% Ro) possessed a higher thermal degree than that of Lower Silurian shale (2.31% Ro). Samples were measured by a combination of organic-chemistry geology measurement, organic matter (OM) isolation, X-ray diffraction (XRD), N2 adsorption, and focused ion beam milling and scanning electron microscopy (FIB-SEM). Lower Cambrian shale presented relatively low pore properties, with averaging 0.008ml/g pore volume (PV), averaging 7.99m²/g pore surface area (PSA) and averaging 5.94nm average pore diameter (APD). Lower Silurian shale showed as relatively high pore properties, with averaging 0.015ml/g PV, averaging 10.53m²/g PSA and averaging 18.60nm APD. Additionally, fractal analysis indicated that the two shales presented discrepant pore morphologies, mainly caused by differences in the combination of pore types between the two shales. More specifically, OM-hosted pores with pin-hole shape and dissolved pores with dead-end openings were the main types in Lower Cambrian shale, while OM-hosted pore with a cellular structure was the main type in Lower Silurian shale. Moreover, porous characteristics of isolated OM suggested that OM of Lower Silurian shale was more capable than that of Lower Cambrian shale in the aspect of pore contribution. PV of isolated OM in Lower Silurian shale was almost 6.6 times higher than that in Lower Cambrian shale, and PSA of isolated OM in Lower Silurian shale was almost 4.3 times higher than that in Lower Cambrian shale. However, no apparent differences existed among samples with various matrix compositions. At late diagenetic or metamorphic epoch, extensive diagenesis overprints the effects of minerals on pore properties and OM plays the dominant role in pore developments. Hence, differences of porous features between the two marine shales highlight the effect of diagenetic degree on OM-hosted pore development. Consequently, distinctive pore characteristics may be caused by the different degrees of diagenetic evolution, even with similar matrix basics.

Keywords: marine shale, lower Cambrian, lower Silurian, om isolation, pore properties, om-hosted pore

Procedia PDF Downloads 109
10 Study of Palung Granite in Central Nepal with Special Reference to Field Occurrence, Petrography and Mineralization

Authors: Narayan Bhattarai, Arjun Bhattarai, Kabi Raj Paudyal, Lalu Paudel

Abstract:

Palung granite is leucocratic, alkali feldspar granite, which is one of the six major granite bodies of the Lesser Himalaya of Nepal. The Cambro-Ordovician granite body has intruded on the Palaeozoic metasedimentary rock of the Kathmandu Complex in Central Nepal. The granite crystallized from magma that was mainly generated by anatexis of the Precambrian continental crust. The magma is heterogeneous with respect to the primary ages and/or metamorphic histories of the magma source rocks. This indicates either a derivation from (meta-) sediments or an intense mixing of different crustally derived magmas. The genesis of the Palung granite is possibly related to an orogeny which affected the Indian shield in lower Paleozoic times. The granite body has been mapped into different zones with visual inspection and petrographical study: i. Quartz rich granite: Quartz is smokey to grayish, euhedral to subherdal, 0.2 to 0.7 cm, and constitutes 30 to 40%. Feldspar is white to brownish, subhedral to euhedral, more than 3 cm, and constitutes 20–30%. Tourmaline is black, 0.1 to 0.2 cm in size, and consists of 10 to 20%. Biotite is black flakes up to o.2 cm, representing 5-8%. ii. Feldspar rich granite: white to grayish, medium to coarse-grained, containing feldspar, quartz, biotite, muscovite and tourmaline. Feldspar porphyritic crystals up to 2.5 cm subherdral represent 50–60%, quartz is smokey transparent and represents 30–40%, biotite is dark brown to black, crystals are irregular, 0.5 cm and represent 8–20%, tourmaline is black fractured, small needles represent 5–10%, and muscovite is white to brown and represents 1-4%. iii. Biotite granite: grey to white, medium to coarse-grained, containing quartz, feldspar, biotite and tourmaline. Feldspar crystals up to 2.5 cm represent 40–50%, quartz is smokey, representing 30–40%, biotite is dark brown to black, crystal size 0.5cm, representing 10–20%, tourmaline is black, small needle, 5–10%, and muscovite is white to brown, representing 3-5%. and iv. Muscovite granite: medium-coarse-grained, brown and gray, containing quartz, feldspar, muscovite and tourmaline. Feldspar is white to brown; crystal sizes 0.2–0.4 cm represents 40–50%; quartz is brown and white, transparent, crystals up to 1 cm represent 35–50%; tourmaline is black, opaque, needle shaped; size up to 7–20%; and muscovite is brownish to white, with flakes up to 0.3 cm representing 5–10%. The xenoliths are very common and are not genetically related. Xenoliths are composed mostly of fine-grained, grayish quartz biotite (muscovite) schist and garnetiferous quartz mica schist.

Keywords: leucocratic granite, cambro-ordovician granite, lesser himalayan granite, pegmatite

Procedia PDF Downloads 37
9 Micro-Analytical Data of Au Mineralization at Atud Gold Deposit, Eastern Desert, Egypt

Authors: A. Abdelnasser, M. Kumral, B. Zoheir, P. Weihed, M. Budakoglu, L. Gumus

Abstract:

Atud gold deposits located at the central part of the Egyptian Eastern Desert of Egypt. It represents the vein-type gold mineralization at the Arabian-Nubian Shield in North Africa. Furthermore, this Au mineralization was closely associated with intense hydrothermal alteration haloes along the NW-SE brittle-ductile shear zone at the mined area. This study reports new data about the mineral chemistry of the hydrothermal and metamorphic minerals as well as the geothermobarometry of the metamorphism and determines the paragenetic interrelationship between Au-bearing sulfides and gangue minerals in Atud gold mine by using the electron microprobe analyses (EMPA). These analyses revealed that the ore minerals associated with gold mineralization are arsenopyrite, pyrite, chalcopyrite, sphalerite, pyrrhotite, tetrahedrite and gersdorffite-cobaltite. Also, the gold is highly associated with arsenopyrite and As-bearing pyrite as well as sphalerite with an average ~70 wt.% Au (+26 wt.% Ag) whereas it occurred either as disseminated grains or along microfractures of arsenopyrite and pyrite in altered wallrocks and mineralized quartz veins. Arsenopyrite occurs as individual rhombic or prismatic zoned grains disseminated in the quartz veins and wallrock and is intergrown with euhedral arsenian pyrite (with ~2 atom % As). Pyrite is As-bearing pyrite that occurs as disseminated subhedral or anhedral zoned grains replacing by chalcopyrite in some samples. Inclusions of sphalerite and pyrrhotite are common in the large pyrite grains. Secondary minerals such as sericite, calcite, chlorite and albite are disseminated either in altered wallrocks or in quartz veins. Sericite is the main secondary and alteration mineral associated with Au-bearing sulfides and calcite. Electron microprobe data of the sericite show that its muscovite component is high in all analyzed flakes (XMs= an average 0.89) and the phengite content (Mg+Fe a.p.f.u.) varies from 0.10 to 0.55 and from 0.13 to 0.29 in wallrocks and mineralized veins respectively. Carbonate occurs either as thin veinlets or disseminated grains in the mineralized quartz vein and/or the wallrocks. It has higher amount of calcite (CaCO3) and low amount of MgCO3 as well as FeCO3 in the wallrocks relative to the quartz veins. Chlorite flakes are associated with arsenopyrite and their electron probe data revealed that they are generally Fe-rich composition (FeOt 20.64–20.10 wt.%) and their composition is clinochlore either pycnochlorite or ripidolite with Al (iv) = 2.30-2.36 pfu and 2.41-2.51 pfu and with narrow range of estimated formation temperatures are (289–295°C) and (301-312°C) for pycnochlorite and ripidolite respectively. Albite is accompanied with chlorite with an Ab content is high in all analyzed samples (Ab= 95.08-99.20).

Keywords: micro-analytical data, mineral chemistry, EMPA, Atud gold deposit, Egypt

Procedia PDF Downloads 300
8 Slope Stability Assessment in Metasedimentary Deposit of an Opencast Mine: The Case of the Dikuluwe-Mashamba (DIMA) Mine in the DR Congo

Authors: Dina Kon Mushid, Sage Ngoie, Tshimbalanga Madiba, Kabutakapua Kakanda

Abstract:

Slope stability assessment is still the biggest challenge in mining activities and civil engineering structures. The slope in an opencast mine frequently reaches multiple weak layers that lead to the instability of the pit. Faults and soft layers throughout the rock would increase weathering and erosion rates. Therefore, it is essential to investigate the stability of the complex strata to figure out how stable they are. In the Dikuluwe-Mashamba (DIMA) area, the lithology of the stratum is a set of metamorphic rocks whose parent rocks are sedimentary rocks with a low degree of metamorphism. Thus, due to the composition and metamorphism of the parent rock, the rock formation is different in hardness and softness, which means that when the content of dolomitic and siliceous is high, the rock is hard. It is softer when the content of argillaceous and sandy is high. Therefore, from the vertical direction, it appears as a weak and hard layer, and from the horizontal direction, it seems like a smooth and hard layer in the same rock layer. From the structural point of view, the main structures in the mining area are the Dikuluwe dipping syncline and the Mashamba dipping anticline, and the occurrence of rock formations varies greatly. During the folding process of the rock formation, the stress will concentrate on the soft layer, causing the weak layer to be broken. At the same time, the phenomenon of interlayer dislocation occurs. This article aimed to evaluate the stability of metasedimentary rocks of the Dikuluwe-Mashamba (DIMA) open-pit mine using limit equilibrium and stereographic methods Based on the presence of statistical structural planes, the stereographic projection was used to study the slope's stability and examine the discontinuity orientation data to identify failure zones along the mine. The results revealed that the slope angle is too steep, and it is easy to induce landslides. The numerical method's sensitivity analysis showed that the slope angle and groundwater significantly impact the slope safety factor. The increase in the groundwater level substantially reduces the stability of the slope. Among the factors affecting the variation in the rate of the safety factor, the bulk density of soil is greater than that of rock mass, the cohesion of soil mass is smaller than that of rock mass, and the friction angle in the rock mass is much larger than that in the soil mass. The analysis showed that the rock mass structure types are mostly scattered and fragmented; the stratum changes considerably, and the variation of rock and soil mechanics parameters is significant.

Keywords: slope stability, weak layer, safety factor, limit equilibrium method, stereography method

Procedia PDF Downloads 241
7 Application of 2D Electrical Resistivity Tomographic Imaging Technique to Study Climate Induced Landslide and Slope Stability through the Analysis of Factor of Safety: A Case Study in Ooty Area, Tamil Nadu, India

Authors: S. Maniruzzaman, N. Ramanujam, Qazi Akhter Rasool, Swapan Kumar Biswas, P. Prasad, Chandrakanta Ojha

Abstract:

Landslide is one of the major natural disasters in South Asian countries. Applying 2D Electrical Resistivity Tomographic Imaging estimation of geometry, thickness, and depth of failure zone of the landslide can be made. Landslide is a pertinent problem in Nilgris plateau next to Himalaya. Nilgris range consists of hard Archean metamorphic rocks. Intense weathering prevailed during the Pre-Cambrian time had deformed the rocks up to 45m depth. The landslides are dominant in the southern and eastern part of plateau of is comparatively smaller than the northern drainage basins, as it has low density of drainage; coarse texture permitted the more of infiltration of rainwater, whereas in the northern part of the plateau entombed with high density of drainage pattern and fine texture with less infiltration than run off, and low to the susceptible to landslide. To get comprehensive information about the landslide zone 2D Electrical Resistivity Tomographic imaging study with CRM 500 Resistivity meter are used in Coonoor– Mettupalyam sector of Nilgiris plateau. To calculate Factor of Safety the infinite slope model of Brunsden and Prior is used. Factor of Safety can be expressed (FS) as the ratio of resisting forces to disturbing forces. If FS < 1 disturbing forces are larger than resisting forces and failure may occur. The geotechnical parameters of soil samples are calculated on the basis upon the apparent resistivity values for litho units of measured from 2D ERT image of the landslide zone. Relationship between friction angles for various soil properties is established by simple regression analysis from apparent resistivity data. Increase of water content in slide zone reduces the effectiveness of the shearing resistance and increase the sliding movement. Time-lapse resistivity changes to slope failure is determined through geophysical Factor of Safety which depends on resistivity and site topography. This ERT technique infers soil property at variable depths in wider areas. This approach to retrieve the soil property and overcomes the limit of the point of information provided by rain gauges and porous probes. Monitoring of slope stability without altering soil structure through the ERT technique is non-invasive with low cost. In landslide prone area an automated Electrical Resistivity Tomographic Imaging system should be installed permanently with electrode networks to monitor the hydraulic precursors to monitor landslide movement.

Keywords: 2D ERT, landslide, safety factor, slope stability

Procedia PDF Downloads 286
6 USBware: A Trusted and Multidisciplinary Framework for Enhanced Detection of USB-Based Attacks

Authors: Nir Nissim, Ran Yahalom, Tomer Lancewiki, Yuval Elovici, Boaz Lerner

Abstract:

Background: Attackers increasingly take advantage of innocent users who tend to use USB devices casually, assuming these devices benign when in fact they may carry an embedded malicious behavior or hidden malware. USB devices have many properties and capabilities that have become the subject of malicious operations. Many of the recent attacks targeting individuals, and especially organizations, utilize popular and widely used USB devices, such as mice, keyboards, flash drives, printers, and smartphones. However, current detection tools, techniques, and solutions generally fail to detect both the known and unknown attacks launched via USB devices. Significance: We propose USBWARE, a project that focuses on the vulnerabilities of USB devices and centers on the development of a comprehensive detection framework that relies upon a crucial attack repository. USBWARE will allow researchers and companies to better understand the vulnerabilities and attacks associated with USB devices as well as providing a comprehensive platform for developing detection solutions. Methodology: The framework of USBWARE is aimed at accurate detection of both known and unknown USB-based attacks by a process that efficiently enhances the framework's detection capabilities over time. The framework will integrate two main security approaches in order to enhance the detection of USB-based attacks associated with a variety of USB devices. The first approach is aimed at the detection of known attacks and their variants, whereas the second approach focuses on the detection of unknown attacks. USBWARE will consist of six independent but complimentary detection modules, each detecting attacks based on a different approach or discipline. These modules include novel ideas and algorithms inspired from or already developed within our team's domains of expertise, including cyber security, electrical and signal processing, machine learning, and computational biology. The establishment and maintenance of the USBWARE’s dynamic and up-to-date attack repository will strengthen the capabilities of the USBWARE detection framework. The attack repository’s infrastructure will enable researchers to record, document, create, and simulate existing and new USB-based attacks. This data will be used to maintain the detection framework’s updatability by incorporating knowledge regarding new attacks. Based on our experience in the cyber security domain, we aim to design the USBWARE framework so that it will have several characteristics that are crucial for this type of cyber-security detection solution. Specifically, the USBWARE framework should be: Novel, Multidisciplinary, Trusted, Lightweight, Extendable, Modular and Updatable and Adaptable. Major Findings: Based on our initial survey, we have already found more than 23 types of USB-based attacks, divided into six major categories. Our preliminary evaluation and proof of concepts showed that our detection modules can be used for efficient detection of several basic known USB attacks. Further research, development, and enhancements are required so that USBWARE will be capable to cover all of the major known USB attacks and to detect unknown attacks. Conclusion: USBWARE is a crucial detection framework that must be further enhanced and developed.

Keywords: USB, device, cyber security, attack, detection

Procedia PDF Downloads 358