Search results for: nitrate attack
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 962

Search results for: nitrate attack

962 Effect of Waste Foundry Slag and Alccofine on Durability Properties of High Strength Concrete

Authors: Devinder Sharma, Sanjay Sharma, Ajay Goyal, Ashish Kapoor

Abstract:

The present research paper discussed the durability properties of high strength concrete (HSC) using Foundry Slag(FD) as partial substitute for fine aggregates (FA) and Alccofine (AF) in addition to portland pozzolana (PPC) cement. Specimens of Concrete M100 grade with water/binder ratio 0.239, with Foundry Slag (FD) varying from 0 to 50% and with optimum quantity of AF(15%) were casted and tested for durability properties such as Water absorption, water permeability, resistance to sulphate attack, alkali attack and nitrate attack of HSC at the age of 7, 14, 28, 56 and 90 days. Substitution of fine aggregates (FA) with up to 45% of foundry slag(FD) content and cement with 15% substitution and addition of alccofine showed an excellent resistance against durability properties at all ages but showed a decrease in these properties with 50% of FD contents. Loss of weight in concrete samples due to sulphate attack, alkali attack and nitrate attack of HSC at the age of 365 days was compared with loss in compressive strength. Correlation between loss in weight and loss in compressive strength in all the tests was found to be excellent.

Keywords: alccofine, alkali attack, foundry slag, high strength concrete, nitrate attack, water absorption, water permeability

Procedia PDF Downloads 299
961 Nitrate Removal from Drinking Water Using Modified Natural Nanozeolite

Authors: T. Meftah, M. M. Zerafat, S. Sabbaghi

Abstract:

Nitrate compounds are considered as groundwater contaminants, the concentration of which has been growing in these resources during recent years. As a result, it seems necessary to use effective methods to remove nitrate from water and wastewater. Adsorption process is generally considered more economical in water treatment. Natural clinoptilolite zeolite is one of the best absorbents because of its high capacity and low cost.In this research, we are going to modify zeolite nanoparticles as a chemical modification. Zeolite nanoparticles have been modified with a kind of organosilane, like 3-aminopropyltriethoxysilane. The advantage of this modification method, in comparison with physical modification, is the good stability in various environmental conditions. In this research, absorbent properties have been analyzed by PSA, FTIR and CHN elemental analysis. Also, nitrate adsorption by modified nanoparticles was examined by UV-Vis spectroscopy. There would be 〖NH〗_2 groups on the zeolite surface as a result of organosilane modification. In order to adsorption of nitrate, we need to convert 〖NH〗_2 groups to〖NH〗_4^+, that it is possible in acidic condition. As a result, the best nitrate removal is possible in the lowest concentration and pH. We obtained 80.12% nitrate removal in pH=3 and 50 mg⁄l nitrate concentration and 4 g⁄l absorbent optimum concentration.

Keywords: nitrate removal, zeolite, surface modification, organosilane

Procedia PDF Downloads 461
960 Usage of Biosorbent Material for the Removal of Nitrate from Wastewater

Authors: M. Abouleish, R. Umer, Z. Sara

Abstract:

Nitrate can cause serious environmental and human health problems. Effluent from different industries and excessive use of fertilizers have increased the level of nitrate in ground and surface water. Nitrate can convert to nitrite in the body, and as a result, can lead to Methemoglobinemia and cancer. Therefore, different organizations have set standard limits for nitrate and nitrite. The United States Environmental Protection Agency (USEPA) has set a Maximum Contaminant Level Goal (MCLG) of 10 mg N/L for nitrate and 1 mg N/L for nitrite. The removal of nitrate from water and wastewater is very important to ensure the availability of clean water. Different plant materials such as banana peel, rice hull, coconut and bamboo shells, have been studied as biosorbents for the removal of nitrates from water. The use of abundantly existing plant material as an adsorbent material and the lack of energy requirement for the adsorption process makes biosorption a sustainable approach. Therefore, in this research, the fruit of the plant was investigated for its ability to act as a biosorbent to remove the nitrate from wastewater. The effect of pH on nitrate removal was studied using both the raw and chemically activated fruit (adsorbent). Results demonstrated that the adsorbent needs to be chemically activated before usage to remove the nitrate from wastewater. pH did not have a significant effect on the adsorption process, with maximum adsorption of nitrate occurring at pH 4. SEM/EDX results demonstrated that there is no change in the surface of the adsorbent as a result of the chemical activation. Chemical activation of the adsorbent using NaOH increased the removal of nitrate by 6%; therefore, various methods of activation of the adsorbent will be investigated to increase the removal of nitrate.

Keywords: biosorption, nitrates, plant material, water, and wastewater treatment

Procedia PDF Downloads 108
959 A Reasoning Method of Cyber-Attack Attribution Based on Threat Intelligence

Authors: Li Qiang, Yang Ze-Ming, Liu Bao-Xu, Jiang Zheng-Wei

Abstract:

With the increasing complexity of cyberspace security, the cyber-attack attribution has become an important challenge of the security protection systems. The difficult points of cyber-attack attribution were forced on the problems of huge data handling and key data missing. According to this situation, this paper presented a reasoning method of cyber-attack attribution based on threat intelligence. The method utilizes the intrusion kill chain model and Bayesian network to build attack chain and evidence chain of cyber-attack on threat intelligence platform through data calculation, analysis and reasoning. Then, we used a number of cyber-attack events which we have observed and analyzed to test the reasoning method and demo system, the result of testing indicates that the reasoning method can provide certain help in cyber-attack attribution.

Keywords: reasoning, Bayesian networks, cyber-attack attribution, Kill Chain, threat intelligence

Procedia PDF Downloads 407
958 Characterization of the State of Pollution by Nitrates in the Groundwater in Arid Zones Case of Eloued District (South-East of Algeria)

Authors: Zair Nadje, Attoui Badra, Miloudi Abdelmonem

Abstract:

This study aims to assess sensitivity to nitrate pollution and monitor the temporal evolution of nitrate contents in groundwater using statistical models and map their spatial distribution. The nitrate levels observed in the waters of the town of El-Oued differ from one aquifer to another. Indeed, the waters of the Quaternary aquifer are the richest in nitrates, with average annual contents varying from 6 mg/l to 85 mg/l, for an average of 37 mg/l. These levels are higher than the WHO standard (50 mg/l) for drinking water. At the water level of the Terminal Complex (CT) aquifer, the annual average nitrate levels vary from 14 mg/l to 37 mg/l, with an average of 18 mg/l. In the Terminal Complex, excessive nitrate levels are observed in the central localities of the study area. The spatial distribution of nitrates in the waters of the Quaternary aquifer shows that the majority of the catchment points of this aquifer are subject to nitrate pollution. This study shows that in the waters of the Terminal Complex aquifer, nitrate pollution evolves in two major areas. The first focus is South-North, following the direction of underground flow. The second is West-East, progressing towards the East zone. The temporal distribution of nitrate contents in the water of the Terminal Complex aquifer in the city of El-Oued showed that for decades, nitrate contents have suffered a decline after an increase. This evolution of nitrate levels is linked to demographic growth and the rapid urbanization of the city of El-Oued.

Keywords: anthropogenic activities, groundwater, nitrates, pollution, arid zones city of El-Oued, Algeria

Procedia PDF Downloads 11
957 Temperature Dependence and Seasonal Variation of Denitrifying Microbial Consortia from a Woodchip Bioreactor in Denmark

Authors: A. Jéglot, F. Plauborg, M. K. Schnorr, R. S. Sørensen, L. Elsgaard

Abstract:

Artificial wetlands such as woodchip bioreactors are efficient tools to remove nitrate from agricultural wastewater with a minimized environmental impact. However, the temperature dependence of the microbiological nitrate removal prevents the woodchip bioreactors from being an efficient system when the water temperature drops below 8℃. To quantify and describe the temperature effects on nitrate removal efficiency, we studied nitrate-reducing enrichments from a woodchip bioreactor in Denmark based on samples collected in Spring and Fall. Growth was quantified as optical density, and nitrate and nitrous oxide concentrations were measured in time-course experiments to compare the growth of the microbial population and the nitrate conversion efficiencies at different temperatures. Ammonia was measured to indicate the importance of dissimilatory nitrate reduction to ammonia (DNRA) in nitrate conversion for the given denitrifying community. The temperature responses observed followed the increasing trend proposed by the Arrhenius equation, indicating higher nitrate removal efficiencies at higher temperatures. However, the growth and the nitrous oxide production observed at low temperature provided evidence of the psychrotolerance of the microbial community under study. The assays conducted showed higher nitrate removal from the microbial community extracted from the woodchip bioreactor at the cold season compared to the ones extracted during the warmer season. This indicated the ability of the bacterial populations in the bioreactor to evolve and adapt to different seasonal temperatures.

Keywords: agricultural waste water treatment, artificial wetland, denitrification, psychrophilic conditions

Procedia PDF Downloads 92
956 Mathematical Based Forecasting of Heart Attack

Authors: Razieh Khalafi

Abstract:

Myocardial infarction (MI) or acute myocardial infarction (AMI), commonly known as a heart attack, occurs when blood flow stops to part of the heart causing damage to the heart muscle. An ECG can often show evidence of a previous heart attack or one that's in progress. The patterns on the ECG may indicate which part of your heart has been damaged, as well as the extent of the damage. In chaos theory, the correlation dimension is a measure of the dimensionality of the space occupied by a set of random points, often referred to as a type of fractal dimension. In this research by considering ECG signal as a random walk we work on forecasting the oncoming heart attack by analyzing the ECG signals using the correlation dimension. In order to test the model a set of ECG signals for patients before and after heart attack was used and the strength of model for forecasting the behavior of these signals were checked. Results shows this methodology can forecast the ECG and accordingly heart attack with high accuracy.

Keywords: heart attack, ECG, random walk, correlation dimension, forecasting

Procedia PDF Downloads 501
955 A New Mathematical Method for Heart Attack Forecasting

Authors: Razi Khalafi

Abstract:

Myocardial Infarction (MI) or acute Myocardial Infarction (AMI), commonly known as a heart attack, occurs when blood flow stops to part of the heart causing damage to the heart muscle. An ECG can often show evidence of a previous heart attack or one that's in progress. The patterns on the ECG may indicate which part of your heart has been damaged, as well as the extent of the damage. In chaos theory, the correlation dimension is a measure of the dimensionality of the space occupied by a set of random points, often referred to as a type of fractal dimension. In this research by considering ECG signal as a random walk we work on forecasting the oncoming heart attack by analysing the ECG signals using the correlation dimension. In order to test the model a set of ECG signals for patients before and after heart attack was used and the strength of model for forecasting the behaviour of these signals were checked. Results show this methodology can forecast the ECG and accordingly heart attack with high accuracy.

Keywords: heart attack, ECG, random walk, correlation dimension, forecasting

Procedia PDF Downloads 465
954 Some Observations on the Preparation of Zinc Hydroxide Nitrate Nanoparticles

Authors: Krasimir Ivanov, Elitsa Kolentsova, Nguyen Nguyen, Alexander Peltekov, Violina Angelova

Abstract:

The nanosized zinc hydroxide nitrate has been recently estimated as perspective foliar fertilizer, which has improved zinc solubility, but low phytotoxicity, in comparison with ZnO and other Zn containing compounds. The main problem is obtaining of stable particles with dimensions less than 100 nm. This work studies the effect of preparation conditions on the chemical compositions and particle size of the zinc hydroxide nitrates, prepared by precipitation. Zn(NO3)2.6H2O and NaOH with concentrations, ranged from 0.2 to 3.2M and the initial OH/Zn ratio from 0.5 to 1.6 were used at temperatures from 20 to 60 °C. All samples were characterized in detail by X-ray diffraction, scanning electron microscopy, differential thermal analysis and ICP. Stability and distribution of the zinc hydroxide nitrate particles were estimated too.

Keywords: zinc hydroxide nitrate, nanoparticles, preparation, foliar fertilizer

Procedia PDF Downloads 310
953 The Effects of Hydraulic Retention Time on the Sludge Characteristics and Effluent Quality in an Aerobic Suspension Sequencing Batch Reactor

Authors: Ali W. N. Alattabi, Clare B. Harris, Rafid M. Alkhaddar, Montserrat Ortoneda, David A. Phipps, Ali Alzeyadi, Khalid S. Hashim

Abstract:

This study was performed to optimise the hydraulic retention time (HRT) and study its effects on the sludge characteristics and the effluent quality in an aerobic suspension sequencing batch reactor (ASSBR) treating synthetic wastewater. The results showed that increasing the HRT from 6 h to 12 h significantly improved the COD and Nitrate removal efficiency; it was increased from 78.7% - 75.7% to 94.7% – 97% for COD and Nitrate respectively. However, increasing the HRT from 12 h to 18 h reduced the COD and Nitrate removal efficiency from 94.7% - 97% to 91.1% – 94.4% respectively. Moreover, Increasing the HRT from 18 h to 24 h did not affect the COD and Nitrate removal efficiency. Sludge volume index (SVI) was used to monitor the sludge settling performance. The results showed a direct relationship between the HRT and SVI value. Increasing the HRT from 6 h to 12 h led to decrease the SVI value from 123 ml/g to 82.5 ml/g, and then it remained constant despite of increasing the HRT from 12 h to 18 h and to 24 h. The results obtained from this study showed that the HRT of 12 h was better for COD and Nitrate removal and a good settling performance occurred during that range.

Keywords: COD, hydraulic retention time, nitrate, sequencing batch reactor, sludge characteristics

Procedia PDF Downloads 337
952 Intelligent System for Diagnosis Heart Attack Using Neural Network

Authors: Oluwaponmile David Alao

Abstract:

Misdiagnosis has been the major problem in health sector. Heart attack has been one of diseases that have high level of misdiagnosis recorded on the part of physicians. In this paper, an intelligent system has been developed for diagnosis of heart attack in the health sector. Dataset of heart attack obtained from UCI repository has been used. This dataset is made up of thirteen attributes which are very vital in diagnosis of heart disease. The system is developed on the multilayer perceptron trained with back propagation neural network then simulated with feed forward neural network and a recognition rate of 87% was obtained which is a good result for diagnosis of heart attack in medical field.

Keywords: heart attack, artificial neural network, diagnosis, intelligent system

Procedia PDF Downloads 618
951 Reliable and Energy-Aware Data Forwarding under Sink-Hole Attack in Wireless Sensor Networks

Authors: Ebrahim Alrashed

Abstract:

Wireless sensor networks are vulnerable to attacks from adversaries attempting to disrupt their operations. Sink-hole attacks are a type of attack where an adversary node drops data forwarded through it and hence affecting the reliability and accuracy of the network. Since sensor nodes have limited battery power, it is essential that any solution to the sinkhole attack problem be very energy-aware. In this paper, we present a reliable and energy efficient scheme to forward data from source nodes to the base station while under sink-hole attack. The scheme also detects sink-hole attack nodes and avoid paths that includes them.

Keywords: energy-aware routing, reliability, sink-hole attack, WSN

Procedia PDF Downloads 364
950 Investigating the Effect of Industrial Wastewater Application on the Concentration of Nitrate and Phosphate in the Soil of the Land Space of Chaharmahal and Bakhtiari Sefid Dasht Steel Company

Authors: Seyed Alireza Farrokhzad, Seyed Amin Alavi, Ebrahim Panahpour

Abstract:

The use of industrial wastewater affects the properties of soil, including its chemical properties. This research was conducted randomly in order to investigate the effect of industrial wastewater application on the concentration of nitrate and phosphate in loamy soil in the land space of Chaharmahal and Bakhtiari Sefid Dasht Steel Company. Industrial wastewater was added in ten irrigation periods in the three months of summer 2022 and was used in a part of the land space of the factory. After finishing the irrigation process with wastewater, the soil nitrate and phosphate values were measured at the depths of 0-25, 25-50 and 50-100 cm. The results showed that adding sewage to the soil increased nitrate and phosphate. The increase of these ions in the soil became loamy. Also, the results showed that the amount of phosphate in the soil decreases with increasing depth, while the amount of nitrate in the soil increases with increasing depth, which is due to the high mobility of nitrate along the soil profile. Also, with the increase in the level of use of wastewater, the amount of nitrate accumulation in the lower layers of the soil increased.

Keywords: industrial wastewater, soil chemical properties, loamy texture, land space

Procedia PDF Downloads 39
949 Comparison between Experimental Modeling and HYDRUS-2D for Nitrate Transport through a Saturated Soil Column

Authors: Mohamed Eltarabily, Abdelazim Negm, Chihiro Yoshimura

Abstract:

Recently, the pollution of groundwater from the use of nitrogenous fertilizer is at the increase. Also, due to the increase in area under cultivation and regular use of fertilizer in irrigated agriculture, groundwater pollution from agricultural activities is becoming a major concern. Because of the high mobility of Nitrate (NO3-) in soil which is governed by electrostatic processes, particularly anion exclusion, nitrate can be intercepted by shallow subsurface drainage pipe systems and then discharged offsite into streams, rivers, and lakes causing many hazards. In order to solve these environmental problems associated with nitrate, a better understanding of how NO3- moves through the soil profile under flow conditions is required. In the present paper, the results of a comparative study between experimental and numerical modeling of Nitrate transport through a saturated soil column are presented and analyzed. In order to achieve that, three water fluxes densities; 0.008, 0.007, and 0.006 m sec-1 and N concentration rates 10 mol cm-3 were used. The same concentrations were used in the simulation using HYDRUS-2D. The physical and chemical properties of the collected soil samples were calculated. Besides, the soil texture was determined which was silty sand. Results showed that HYDRUS-2D can successfully predict the relative behavior of N transport in the present experiment. Nitrate concentrations will reach deeper depth with the increase in the water flux. Overall, it was overestimated in the final concentration of (NO3-) in the soil by numerical simulation than by experimental column test. The column experiment is a useful tool for assessing the nitrate concentrations in the soil profile.

Keywords: groundwater, nitrate leaching, HYDRUS-2D, soil column

Procedia PDF Downloads 200
948 An Attack on the Lucas Based El-Gamal Cryptosystem in the Elliptic Curve Group Over Finite Field Using Greater Common Divisor

Authors: Lee Feng Koo, Tze Jin Wong, Pang Hung Yiu, Nik Mohd Asri Nik Long

Abstract:

Greater common divisor (GCD) attack is an attack that relies on the polynomial structure of the cryptosystem. This attack required two plaintexts differ from a fixed number and encrypted under same modulus. This paper reports a security reaction of Lucas Based El-Gamal Cryptosystem in the Elliptic Curve group over finite field under GCD attack. Lucas Based El-Gamal Cryptosystem in the Elliptic Curve group over finite field was exposed mathematically to the GCD attack using GCD and Dickson polynomial. The result shows that the cryptanalyst is able to get the plaintext without decryption by using GCD attack. Thus, the study concluded that it is highly perilous when two plaintexts have a slight difference from a fixed number in the same Elliptic curve group over finite field.

Keywords: decryption, encryption, elliptic curve, greater common divisor

Procedia PDF Downloads 216
947 Cross Site Scripting (XSS) Attack and Automatic Detection Technology Research

Authors: Tao Feng, Wei-Wei Zhang, Chang-Ming Ding

Abstract:

Cross-site scripting (XSS) is one of the most popular WEB Attacking methods at present, and also one of the most risky web attacks. Because of the population of JavaScript, the scene of the cross site scripting attack is also gradually expanded. However, since the web application developers tend to only focus on functional testing and lack the awareness of the XSS, which has made the on-line web projects exist many XSS vulnerabilities. In this paper, different various techniques of XSS attack are analyzed, and a method automatically to detect it is proposed. It is easy to check the results of vulnerability detection when running it as a plug-in.

Keywords: XSS, no target attack platform, automatic detection,XSS detection

Procedia PDF Downloads 369
946 Cryptographic Attack on Lucas Based Cryptosystems Using Chinese Remainder Theorem

Authors: Tze Jin Wong, Lee Feng Koo, Pang Hung Yiu

Abstract:

Lenstra’s attack uses Chinese remainder theorem as a tool and requires a faulty signature to be successful. This paper reports on the security responses of fourth and sixth order Lucas based (LUC4,6) cryptosystem under the Lenstra’s attack as compared to the other two Lucas based cryptosystems such as LUC and LUC3 cryptosystems. All the Lucas based cryptosystems were exposed mathematically to the Lenstra’s attack using Chinese Remainder Theorem and Dickson polynomial. Result shows that the possibility for successful Lenstra’s attack is less against LUC4,6 cryptosystem than LUC3 and LUC cryptosystems. Current study concludes that LUC4,6 cryptosystem is more secure than LUC and LUC3 cryptosystems in sustaining against Lenstra’s attack.

Keywords: Lucas sequence, Dickson polynomial, faulty signature, corresponding signature, congruence

Procedia PDF Downloads 127
945 A Game of Information in Defense/Attack Strategies: Case of Poisson Attacks

Authors: Asma Ben Yaghlane, Mohamed Naceur Azaiez

Abstract:

In this paper, we briefly introduce the concept of Poisson attacks in the case of defense/attack strategies where attacks are assumed to be continuous. We suggest a game model in which the attacker will combine both criteria of a sufficient confidence level of a successful attack and a reasonably small size of the estimation error in order to launch an attack. Here, estimation error arises from assessing the system failure upon attack using aggregate data at the system level. The corresponding error is referred to as aggregation error. On the other hand, the defender will attempt to deter attack by making one or both criteria inapplicable. The defender will build his/her strategy by both strengthening the targeted system and increasing the size of error. We will formulate the defender problem based on appropriate optimization models. The attacker will opt for a Bayesian updating in assessing the impact on the improvement made by the defender. Then, the attacker will evaluate the feasibility of the attack before making the decision of whether or not to launch it. We will provide illustrations to better explain the process.

Keywords: attacker, defender, game theory, information

Procedia PDF Downloads 426
944 Kinetic and Thermodynamic Study of Nitrates Removal by Sorption on Biochar

Authors: Amira Touil, Achouak Arfaoui, Ibtissem Mannaii

Abstract:

The aim of this work is to monitor the process adsorption of nitrates by the biochar via studying the influence of various parameters on the adsorption of this pollutant by biochar in a synthetic aqueous solution. The results which obtained indicate that the 4g/L biochar dose is the most efficient in terms of nitrates removal in aqueous solution. The biochar exhibited a good affinity for nitrates after 1hour of contact. The yield of removal of nitrate by the biochar decreases with the increase of pH of the solution and increases with increasing temperature (60°C>40°C>20°C). The best removal yield is about 80% of the initial concentration introduced (25mg/L) obtained at pH=2, T=60°C, and dose of biochar=4g/L. The second order model fit the nitrate adsorption kinetics of biochar with a high coefficient of determination (R2≥0.997); and a new equation correlating the rate constant of the reaction with temperature and pH was been built. Freundlich isotherms performed well to fit the nitrate adsorption data by biochar (R2>0.96) compared to Langmuir isotherms. The thermodynamic parameters (ΔH°, ΔG°, ΔS°) have been calculated for predicting the nature of adsorption.

Keywords: pollution, biochar, nitrate, adsorption

Procedia PDF Downloads 58
943 11-Round Impossible Differential Attack on Midori64

Authors: Zhan Chen, Wenquan Bi

Abstract:

This paper focuses on examining the strength of Midori against impossible differential attack. The Midori family of light weight block cipher orienting to energy-efficiency is proposed in ASIACRYPT2015. Using a 6-round property, the authors implement an 11-round impossible differential attack on Midori64 by extending two rounds on the top and three rounds on the bottom. There is enough key space to consider pre-whitening keys in this attack. An impossible differential path that minimises the key bits involved is used to reduce computational complexity. Several additional observations such as partial abort technique are used to further reduce data and time complexities. This attack has data complexity of 2 ⁶⁹·² chosen plaintexts, requires 2 ¹⁴·⁵⁸ blocks of memory and 2 ⁹⁴·⁷ 11- round Midori64 encryptions.

Keywords: cryptanalysis, impossible differential, light weight block cipher, Midori

Procedia PDF Downloads 249
942 External Sulphate Attack: Advanced Testing and Performance Specifications

Authors: G. Massaad, E. Roziere, A. Loukili, L. Izoret

Abstract:

Based on the monitoring of mass, hydrostatic weighing, and the amount of leached OH- we deduced the nature of leached and precipitated minerals, the amount of lost aggregates and the evolution of porosity and cracking during the sulphate attack. Using these information, we are able to draw the volume / mass changes brought by mineralogical variations and cracking of the cement matrix. Then we defined a new performance indicator, the averaged density, capable to resume along the test of sulphate attack the occurred physicochemical variation occurred in the cementitious matrix and then highlight.

Keywords: monitoring strategy, performance indicator, sulphate attack, mechanism of degradation

Procedia PDF Downloads 288
941 A Survey on Countermeasures of Cache-Timing Attack on AES Systems

Authors: Settana M. Abdulh, Naila A. Sadalla, Yaseen H. Taha, Howaida Elshoush

Abstract:

Side channel attacks are based on side channel information, which is information that is leaked from encryption systems. This includes timing information, power consumption as well as electromagnetic or even sound leaking which can exploited by an attacker. Implementing side channel attacks are possible if and only if an attacker has access to a cryptosystem. In this case, the attacker can exploit bad implementation in software or hardware which is not controlled by encryption implementer. Thus, he/she will represent a real threat to the security system. Several countermeasures have been proposed to eliminate side channel information vulnerability.Cache timing attack is a special type of side channel attack. Here, timing information is collected and analyzed by an attacker to guess sensitive information such as encryption key or plaintext. This paper reviews the technique applied in this attack and surveys the countermeasures against it, evaluating the feasibility and usability of each. Based on this evaluation, finally we pose several recommendations about using these countermeasures.

Keywords: AES algorithm, side channel attack, cache timing attack, cache timing countermeasure

Procedia PDF Downloads 263
940 Achieving Better Security by Using Nonlinear Cellular Automata as a Cryptographic Primitive

Authors: Swapan Maiti, Dipanwita Roy Chowdhury

Abstract:

Nonlinear functions are essential in different cryptoprimitives as they play an important role on the security of the cipher designs. Rule 30 was identified as a powerful nonlinear function for cryptographic applications. However, an attack (MS attack) was mounted against Rule 30 Cellular Automata (CA). Nonlinear rules as well as maximum period CA increase randomness property. In this work, nonlinear rules of maximum period nonlinear hybrid CA (M-NHCA) are studied and it is shown to be a better crypto-primitive than Rule 30 CA. It has also been analysed that the M-NHCA with single nonlinearity injection proposed in the literature is vulnerable against MS attack, whereas M-NHCA with multiple nonlinearity injections provide maximum length cycle as well as better cryptographic primitives and they are also secure against MS attack.

Keywords: cellular automata, maximum period nonlinear CA, Meier and Staffelbach attack, nonlinear functions

Procedia PDF Downloads 280
939 Influence of Electrode Assembly on Catalytic Activation and Deactivation of a PT Film Immobilized H+ Conducting Solid Electrolyte in Electrocatalytic Reduction Reactions

Authors: M. A. Hasnat, M. Amirul Islam, M. A. Rashed, Jamil. Safwan, M. Mahabubul Alam

Abstract:

Symmetric (Cu–Pt|Nafion|Pt–Cu) and asymmetric(Pt|Nafion|Pt–Cu) assemblies were fabricated to study the nitrate reduction processes at the cathode. The electrocatalytic nitrate reduction reactions were performed in these assemblies in order to investigate the prerequisite for the enhanced catalytic activity, electrochemical cell durability as well as preferable product selectivity resulting from the reduction of nitrate at the cathode. It has been observed for the symmetric assembly that Cu particles were oxidized on the anode surface under an applied potential and the resulting copper ions migrated to the cathode surface through the Nafion membrane, which deposited as copper oxide on the cathode surface. The formation of this copper oxide covering layer on the Pt–Cu cathode surface is attributed as the reason for the deactivation of the cathode that governed the reduced nitrate reduction along with increasing nitrite selectivity. These problems were addressed and resolved with the asymmetric design of the electrocatalytic reactor, where enhanced hydrogen evolution activates the surface by eroding the CuO over layer as well as speeding up the slow rate determining hydrogenation reactions.

Keywords: membrane, nitrate, electrocatalysis, voltammetry, electrolysis

Procedia PDF Downloads 233
938 Induced Pulsation Attack Against Kalman Filter Driven Brushless DC Motor Control System

Authors: Yuri Boiko, Iluju Kiringa, Tet Yeap

Abstract:

We use modeling and simulation tools, to introduce a novel bias injection attack, named the ’Induced Pulsation Attack’, which targets Cyber Physical Systems with closed-loop controlled Brushless DC (BLDC) motor and Kalman filter driver in the feedback loop. This attack involves engaging a linear function with a constant gradient to distort the coefficient of the injected bias, which falsifies the Kalman filter estimates of the rotor’s angular speed. As a result, this manipulation interaction inside the control system causes periodic pulsations in a form of asymmetric sine wave of both current and voltage in the circuit windings, with a high magnitude. It is shown that by varying the gradient of linear function, one can control both the frequency and structure of the induced pulsations. It is also demonstrated that terminating the attack at any point leads to additional compensating effort from the controller to restore the speed to its equilibrium value. This compensation effort produces an exponentially decaying wave, which we call the ’attack withdrawal syndrome’ wave. The conditions for maximizing or minimizing the impact of the attack withdrawal syndrome are determined. Linking the termination of the attack to the end of the full period of the induced pulsation wave has been shown to nullify the attack withdrawal syndrome wave, thereby improving the attack’s covertness.

Keywords: cyber-attack, induced pulsation, bias injection, Kalman filter, BLDC motor, control system, closed loop, P- controller, PID-controller, saw-function, cyber-physical system

Procedia PDF Downloads 43
937 Preparation of CuAlO2 Thin Films on Si or Sapphire Substrate by Sol-Gel Method Using Metal Acetate or Nitrate

Authors: Takashi Ehara, Takayoshi Nakanishi, Kohei Sasaki, Marina Abe, Hiroshi Abe, Kiyoaki Abe, Ryo Iizaka, Takuya Sato

Abstract:

CuAlO2 thin films are prepared on Si or sapphire substrate by sol-gel method using two kinds of sols. One is combination of Cu acetate and Al acetate basic, and the other is Cu nitrate and Al nitrate. In the case of acetate sol, XRD peaks of CuAlO2 observed at annealing temperature of 800-950 ºC on both Si and sapphire substrates. In contrast, in the case of the films prepared using nitrate on Si substrate, XRD peaks of CuAlO2 have been observed only at the annealing temperature of 800-850 ºC. At annealing temperature of 850ºC, peaks of other species have been observed beside the CuAlO2 peaks, then, the CuAlO2 peaks disappeared at annealing temperature of 900 °C with increasing in intensity of the other peaks. Intensity of the other peaks decreased at annealing temperature of 950 ºC with appearance of broad SiO2 peak. In the present, we ascribe these peaks as metal silicide.

Keywords: CuAlO2, silicide, thin Films, transparent conducting oxide

Procedia PDF Downloads 368
936 Study of Biological Denitrification using Heterotrophic Bacteria and Natural Source of Carbon

Authors: Benbelkacem Ouerdia

Abstract:

Heterotrophic denitrification has been proven to be one of the most feasible processes for removing nitrate from wastewater and drinking water. In this process, heterotrophic bacteria use organic carbon for both growth and as an electron source. Underground water pollution by nitrates become alarming in Algeria. A survey carried out revealed that the nitrate concentration is in continual increase. Studies in some region revealed contamination exceeding the recommended permissible dose which is 50 mg/L. Worrying values in the regions of Mascara, Ouled saber, El Eulma, Bouira and Algiers are respectively 72 mg/L, 75 mg/L, 97 mg/L, 102 mg/L, and 158 mg/L. High concentration of nitrate in drinking water is associated with serious health risks. Research on nitrate removal technologies from municipal water supplies is increasing because of nitrate contamination. Biological denitrification enables the transformation of oxidized nitrogen compounds by a wide spectrum of heterotrophic bacteria into harmless nitrogen gas with accompanying carbon removal. Globally, denitrification is commonly employed in biological nitrogen removal processes to enhance water quality The study investigated the valorization of a vegetable residue as a carbon source (dates nodes) in water treatment using the denitrification process. Throughout the study, the effect of inoculums addition, pH, and initial concentration of nitrates was also investigated. In this research, a natural organic substance: dates nodes were investigated as a carbon source in the biological denitrification of drinking water. This material acts as a solid substrate and bio-film carrier. The experiments were carried out in batch processes. Complete denitrification was achieved varied between 80 and 100% according to the type of process used. It was found that the nitrate removal rate based on our results, we concluded that the removal of organic matter and nitrogen compounds depended mainly on the initial concentration of nitrate. The effluent pH was mainly affected by the C/N ratio, where a decrease increases pH.

Keywords: biofilm, carbon source, dates nodes, heterotrophic denitrification, nitrate, nitrite

Procedia PDF Downloads 450
935 Valorization of Dates Nodes as a Carbon Source Using Biological Denitrification

Authors: Ouerdia Benbelkacem Belouanas

Abstract:

Heterotrophic denitrification has been proven to be one of the most feasible processes for removing nitrate from waste water and drinking water. In this process, heterotrophic bacteria use organic carbon for both growth and as an electron source. Underground water pollution by nitrates become alarming in Algeria. A survey carried out revealed that the nitrate concentration is in continual increase. Studies in some region revealed contamination exceeding the recommended permissible dose which is 50 mg/L. Worrying values in the regions of Mascara, Ouled saber, El Eulma, Bouira and Algiers are respectively 72 mg/L, 75 mg/L, 97 mg/L, 102 mg/L, and 158 mg/L. High concentration of nitrate in drinking water is associated with serious health risks. Research on nitrate removal technologies from municipal water supplies is increasing because of nitrate contamination. Biological denitrification enables transformation of oxidized nitrogen compounds by a wide spectrum of heterotrophic bacteria into harmless nitrogen gas with accompanying carbon removal. Globally, denitrification is commonly employed in biological nitrogen removal processes to enhance water quality. The study investigated the valorization of a vegetable residue as a carbon source (dates nodes) in water treatment using the denitrification process. Throughout the study, the effect of inoculums addition, pH, and initial concentration of nitrates was also investigated. In this research, a natural organic substance: dates nodes were investigated as a carbon source in the biological denitrification of drinking water. This material acts as a solid substrate and bio-film carrier. The experiments were carried out in batch processes. Complete denitrification was achieved varied between 80 and 100% according to the type of process used. It was found that the nitrate removal rate based on our results, we concluded that the removal of organic matter and nitrogen compounds depended mainly on initial concentration of nitrate. The effluent pH was mainly affected by the C/N ratio, where a decrease increases pH.

Keywords: biofilm, carbon source, dates nodes, heterotrophic denitrification, nitrate, nitrite

Procedia PDF Downloads 383
934 Modeling Intelligent Threats: Case of Continuous Attacks on a Specific Target

Authors: Asma Ben Yaghlane, Mohamed Naceur Azaiez

Abstract:

In this paper, we treat a model that falls in the area of protecting targeted systems from intelligent threats including terrorism. We introduce the concept of system survivability, in the context of continuous attacks, as the probability that a system under attack will continue operation up to some fixed time t. We define a constant attack rate (CAR) process as an attack on a targeted system that follows an exponential distribution. We consider the superposition of several CAR processes. From the attacker side, we determine the optimal attack strategy that minimizes the system survivability. We also determine the optimal strengthening strategy that maximizes the system survivability under limited defensive resources. We use operations research techniques to identify optimal strategies of each antagonist. Our results may be used as interesting starting points to develop realistic protection strategies against intentional attacks.

Keywords: CAR processes, defense/attack strategies, exponential failure, survivability

Procedia PDF Downloads 360
933 Growth of Struvite Crystals in Synthetic Urine Using Magnesium Nitrate

Authors: Reneiloe Seodigeng, John Kabuba, Hilary Rutto, Tumisang Seodigeng

Abstract:

Urine diversion toilets have become popular as a means of solving the challenges in sanitation. As a result, the source-separated urine must be adequately treated so that it can be disposed of safely and valuable struvite can be extracted for use as fertilizer. In this study, synthetic urine was prepared, and struvite crystallisation experiments carried out using magnesium nitrate. The effect of residence time on crystal growth was studied. At residence time of 10, 30 and 60 minutes, mean particle sizes were 17, 34 and 53 µm showing that with higher residence times, larger crystal sizes can be achieved. SEM analysis of the crystal showed that the resultant crystals had the typical morphology of struvite crystals.

Keywords: struvite, magnesium nitrate, crystallisation, urine treatment

Procedia PDF Downloads 130