Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 846

Search results for: nitrate attack

846 Effect of Waste Foundry Slag and Alccofine on Durability Properties of High Strength Concrete

Authors: Devinder Sharma, Sanjay Sharma, Ajay Goyal, Ashish Kapoor

Abstract:

The present research paper discussed the durability properties of high strength concrete (HSC) using Foundry Slag(FD) as partial substitute for fine aggregates (FA) and Alccofine (AF) in addition to portland pozzolana (PPC) cement. Specimens of Concrete M100 grade with water/binder ratio 0.239, with Foundry Slag (FD) varying from 0 to 50% and with optimum quantity of AF(15%) were casted and tested for durability properties such as Water absorption, water permeability, resistance to sulphate attack, alkali attack and nitrate attack of HSC at the age of 7, 14, 28, 56 and 90 days. Substitution of fine aggregates (FA) with up to 45% of foundry slag(FD) content and cement with 15% substitution and addition of alccofine showed an excellent resistance against durability properties at all ages but showed a decrease in these properties with 50% of FD contents. Loss of weight in concrete samples due to sulphate attack, alkali attack and nitrate attack of HSC at the age of 365 days was compared with loss in compressive strength. Correlation between loss in weight and loss in compressive strength in all the tests was found to be excellent.

Keywords: alccofine, alkali attack, foundry slag, high strength concrete, nitrate attack, water absorption, water permeability

Procedia PDF Downloads 236
845 Nitrate Removal from Drinking Water Using Modified Natural Nanozeolite

Authors: T. Meftah, M. M. Zerafat, S. Sabbaghi

Abstract:

Nitrate compounds are considered as groundwater contaminants, the concentration of which has been growing in these resources during recent years. As a result, it seems necessary to use effective methods to remove nitrate from water and wastewater. Adsorption process is generally considered more economical in water treatment. Natural clinoptilolite zeolite is one of the best absorbents because of its high capacity and low cost.In this research, we are going to modify zeolite nanoparticles as a chemical modification. Zeolite nanoparticles have been modified with a kind of organosilane, like 3-aminopropyltriethoxysilane. The advantage of this modification method, in comparison with physical modification, is the good stability in various environmental conditions. In this research, absorbent properties have been analyzed by PSA, FTIR and CHN elemental analysis. Also, nitrate adsorption by modified nanoparticles was examined by UV-Vis spectroscopy. There would be 〖NH〗_2 groups on the zeolite surface as a result of organosilane modification. In order to adsorption of nitrate, we need to convert 〖NH〗_2 groups to〖NH〗_4^+, that it is possible in acidic condition. As a result, the best nitrate removal is possible in the lowest concentration and pH. We obtained 80.12% nitrate removal in pH=3 and 50 mg⁄l nitrate concentration and 4 g⁄l absorbent optimum concentration.

Keywords: nitrate removal, zeolite, surface modification, organosilane

Procedia PDF Downloads 360
844 Usage of Biosorbent Material for the Removal of Nitrate from Wastewater

Authors: M. Abouleish, R. Umer, Z. Sara

Abstract:

Nitrate can cause serious environmental and human health problems. Effluent from different industries and excessive use of fertilizers have increased the level of nitrate in ground and surface water. Nitrate can convert to nitrite in the body, and as a result, can lead to Methemoglobinemia and cancer. Therefore, different organizations have set standard limits for nitrate and nitrite. The United States Environmental Protection Agency (USEPA) has set a Maximum Contaminant Level Goal (MCLG) of 10 mg N/L for nitrate and 1 mg N/L for nitrite. The removal of nitrate from water and wastewater is very important to ensure the availability of clean water. Different plant materials such as banana peel, rice hull, coconut and bamboo shells, have been studied as biosorbents for the removal of nitrates from water. The use of abundantly existing plant material as an adsorbent material and the lack of energy requirement for the adsorption process makes biosorption a sustainable approach. Therefore, in this research, the fruit of the plant was investigated for its ability to act as a biosorbent to remove the nitrate from wastewater. The effect of pH on nitrate removal was studied using both the raw and chemically activated fruit (adsorbent). Results demonstrated that the adsorbent needs to be chemically activated before usage to remove the nitrate from wastewater. pH did not have a significant effect on the adsorption process, with maximum adsorption of nitrate occurring at pH 4. SEM/EDX results demonstrated that there is no change in the surface of the adsorbent as a result of the chemical activation. Chemical activation of the adsorbent using NaOH increased the removal of nitrate by 6%; therefore, various methods of activation of the adsorbent will be investigated to increase the removal of nitrate.

Keywords: biosorption, nitrates, plant material, water, and wastewater treatment

Procedia PDF Downloads 58
843 A Reasoning Method of Cyber-Attack Attribution Based on Threat Intelligence

Authors: Li Qiang, Yang Ze-Ming, Liu Bao-Xu, Jiang Zheng-Wei

Abstract:

With the increasing complexity of cyberspace security, the cyber-attack attribution has become an important challenge of the security protection systems. The difficult points of cyber-attack attribution were forced on the problems of huge data handling and key data missing. According to this situation, this paper presented a reasoning method of cyber-attack attribution based on threat intelligence. The method utilizes the intrusion kill chain model and Bayesian network to build attack chain and evidence chain of cyber-attack on threat intelligence platform through data calculation, analysis and reasoning. Then, we used a number of cyber-attack events which we have observed and analyzed to test the reasoning method and demo system, the result of testing indicates that the reasoning method can provide certain help in cyber-attack attribution.

Keywords: reasoning, Bayesian networks, cyber-attack attribution, Kill Chain, threat intelligence

Procedia PDF Downloads 318
842 Mathematical Based Forecasting of Heart Attack

Authors: Razieh Khalafi

Abstract:

Myocardial infarction (MI) or acute myocardial infarction (AMI), commonly known as a heart attack, occurs when blood flow stops to part of the heart causing damage to the heart muscle. An ECG can often show evidence of a previous heart attack or one that's in progress. The patterns on the ECG may indicate which part of your heart has been damaged, as well as the extent of the damage. In chaos theory, the correlation dimension is a measure of the dimensionality of the space occupied by a set of random points, often referred to as a type of fractal dimension. In this research by considering ECG signal as a random walk we work on forecasting the oncoming heart attack by analyzing the ECG signals using the correlation dimension. In order to test the model a set of ECG signals for patients before and after heart attack was used and the strength of model for forecasting the behavior of these signals were checked. Results shows this methodology can forecast the ECG and accordingly heart attack with high accuracy.

Keywords: heart attack, ECG, random walk, correlation dimension, forecasting

Procedia PDF Downloads 448
841 A New Mathematical Method for Heart Attack Forecasting

Authors: Razi Khalafi

Abstract:

Myocardial Infarction (MI) or acute Myocardial Infarction (AMI), commonly known as a heart attack, occurs when blood flow stops to part of the heart causing damage to the heart muscle. An ECG can often show evidence of a previous heart attack or one that's in progress. The patterns on the ECG may indicate which part of your heart has been damaged, as well as the extent of the damage. In chaos theory, the correlation dimension is a measure of the dimensionality of the space occupied by a set of random points, often referred to as a type of fractal dimension. In this research by considering ECG signal as a random walk we work on forecasting the oncoming heart attack by analysing the ECG signals using the correlation dimension. In order to test the model a set of ECG signals for patients before and after heart attack was used and the strength of model for forecasting the behaviour of these signals were checked. Results show this methodology can forecast the ECG and accordingly heart attack with high accuracy.

Keywords: heart attack, ECG, random walk, correlation dimension, forecasting

Procedia PDF Downloads 410
840 Temperature Dependence and Seasonal Variation of Denitrifying Microbial Consortia from a Woodchip Bioreactor in Denmark

Authors: A. Jéglot, F. Plauborg, M. K. Schnorr, R. S. Sørensen, L. Elsgaard

Abstract:

Artificial wetlands such as woodchip bioreactors are efficient tools to remove nitrate from agricultural wastewater with a minimized environmental impact. However, the temperature dependence of the microbiological nitrate removal prevents the woodchip bioreactors from being an efficient system when the water temperature drops below 8℃. To quantify and describe the temperature effects on nitrate removal efficiency, we studied nitrate-reducing enrichments from a woodchip bioreactor in Denmark based on samples collected in Spring and Fall. Growth was quantified as optical density, and nitrate and nitrous oxide concentrations were measured in time-course experiments to compare the growth of the microbial population and the nitrate conversion efficiencies at different temperatures. Ammonia was measured to indicate the importance of dissimilatory nitrate reduction to ammonia (DNRA) in nitrate conversion for the given denitrifying community. The temperature responses observed followed the increasing trend proposed by the Arrhenius equation, indicating higher nitrate removal efficiencies at higher temperatures. However, the growth and the nitrous oxide production observed at low temperature provided evidence of the psychrotolerance of the microbial community under study. The assays conducted showed higher nitrate removal from the microbial community extracted from the woodchip bioreactor at the cold season compared to the ones extracted during the warmer season. This indicated the ability of the bacterial populations in the bioreactor to evolve and adapt to different seasonal temperatures.

Keywords: agricultural waste water treatment, artificial wetland, denitrification, psychrophilic conditions

Procedia PDF Downloads 53
839 Intelligent System for Diagnosis Heart Attack Using Neural Network

Authors: Oluwaponmile David Alao

Abstract:

Misdiagnosis has been the major problem in health sector. Heart attack has been one of diseases that have high level of misdiagnosis recorded on the part of physicians. In this paper, an intelligent system has been developed for diagnosis of heart attack in the health sector. Dataset of heart attack obtained from UCI repository has been used. This dataset is made up of thirteen attributes which are very vital in diagnosis of heart disease. The system is developed on the multilayer perceptron trained with back propagation neural network then simulated with feed forward neural network and a recognition rate of 87% was obtained which is a good result for diagnosis of heart attack in medical field.

Keywords: heart attack, artificial neural network, diagnosis, intelligent system

Procedia PDF Downloads 376
838 Some Observations on the Preparation of Zinc Hydroxide Nitrate Nanoparticles

Authors: Krasimir Ivanov, Elitsa Kolentsova, Nguyen Nguyen, Alexander Peltekov, Violina Angelova

Abstract:

The nanosized zinc hydroxide nitrate has been recently estimated as perspective foliar fertilizer, which has improved zinc solubility, but low phytotoxicity, in comparison with ZnO and other Zn containing compounds. The main problem is obtaining of stable particles with dimensions less than 100 nm. This work studies the effect of preparation conditions on the chemical compositions and particle size of the zinc hydroxide nitrates, prepared by precipitation. Zn(NO3)2.6H2O and NaOH with concentrations, ranged from 0.2 to 3.2M and the initial OH/Zn ratio from 0.5 to 1.6 were used at temperatures from 20 to 60 °C. All samples were characterized in detail by X-ray diffraction, scanning electron microscopy, differential thermal analysis and ICP. Stability and distribution of the zinc hydroxide nitrate particles were estimated too.

Keywords: zinc hydroxide nitrate, nanoparticles, preparation, foliar fertilizer

Procedia PDF Downloads 240
837 Reliable and Energy-Aware Data Forwarding under Sink-Hole Attack in Wireless Sensor Networks

Authors: Ebrahim Alrashed

Abstract:

Wireless sensor networks are vulnerable to attacks from adversaries attempting to disrupt their operations. Sink-hole attacks are a type of attack where an adversary node drops data forwarded through it and hence affecting the reliability and accuracy of the network. Since sensor nodes have limited battery power, it is essential that any solution to the sinkhole attack problem be very energy-aware. In this paper, we present a reliable and energy efficient scheme to forward data from source nodes to the base station while under sink-hole attack. The scheme also detects sink-hole attack nodes and avoid paths that includes them.

Keywords: energy-aware routing, reliability, sink-hole attack, WSN

Procedia PDF Downloads 294
836 The Effects of Hydraulic Retention Time on the Sludge Characteristics and Effluent Quality in an Aerobic Suspension Sequencing Batch Reactor

Authors: Ali W. N. Alattabi, Clare B. Harris, Rafid M. Alkhaddar, Montserrat Ortoneda, David A. Phipps, Ali Alzeyadi, Khalid S. Hashim

Abstract:

This study was performed to optimise the hydraulic retention time (HRT) and study its effects on the sludge characteristics and the effluent quality in an aerobic suspension sequencing batch reactor (ASSBR) treating synthetic wastewater. The results showed that increasing the HRT from 6 h to 12 h significantly improved the COD and Nitrate removal efficiency; it was increased from 78.7% - 75.7% to 94.7% – 97% for COD and Nitrate respectively. However, increasing the HRT from 12 h to 18 h reduced the COD and Nitrate removal efficiency from 94.7% - 97% to 91.1% – 94.4% respectively. Moreover, Increasing the HRT from 18 h to 24 h did not affect the COD and Nitrate removal efficiency. Sludge volume index (SVI) was used to monitor the sludge settling performance. The results showed a direct relationship between the HRT and SVI value. Increasing the HRT from 6 h to 12 h led to decrease the SVI value from 123 ml/g to 82.5 ml/g, and then it remained constant despite of increasing the HRT from 12 h to 18 h and to 24 h. The results obtained from this study showed that the HRT of 12 h was better for COD and Nitrate removal and a good settling performance occurred during that range.

Keywords: COD, hydraulic retention time, nitrate, sequencing batch reactor, sludge characteristics

Procedia PDF Downloads 243
835 Comparison between Experimental Modeling and HYDRUS-2D for Nitrate Transport through a Saturated Soil Column

Authors: Mohamed Eltarabily, Abdelazim Negm, Chihiro Yoshimura

Abstract:

Recently, the pollution of groundwater from the use of nitrogenous fertilizer is at the increase. Also, due to the increase in area under cultivation and regular use of fertilizer in irrigated agriculture, groundwater pollution from agricultural activities is becoming a major concern. Because of the high mobility of Nitrate (NO3-) in soil which is governed by electrostatic processes, particularly anion exclusion, nitrate can be intercepted by shallow subsurface drainage pipe systems and then discharged offsite into streams, rivers, and lakes causing many hazards. In order to solve these environmental problems associated with nitrate, a better understanding of how NO3- moves through the soil profile under flow conditions is required. In the present paper, the results of a comparative study between experimental and numerical modeling of Nitrate transport through a saturated soil column are presented and analyzed. In order to achieve that, three water fluxes densities; 0.008, 0.007, and 0.006 m sec-1 and N concentration rates 10 mol cm-3 were used. The same concentrations were used in the simulation using HYDRUS-2D. The physical and chemical properties of the collected soil samples were calculated. Besides, the soil texture was determined which was silty sand. Results showed that HYDRUS-2D can successfully predict the relative behavior of N transport in the present experiment. Nitrate concentrations will reach deeper depth with the increase in the water flux. Overall, it was overestimated in the final concentration of (NO3-) in the soil by numerical simulation than by experimental column test. The column experiment is a useful tool for assessing the nitrate concentrations in the soil profile.

Keywords: groundwater, nitrate leaching, HYDRUS-2D, soil column

Procedia PDF Downloads 159
834 An Attack on the Lucas Based El-Gamal Cryptosystem in the Elliptic Curve Group Over Finite Field Using Greater Common Divisor

Authors: Lee Feng Koo, Tze Jin Wong, Pang Hung Yiu, Nik Mohd Asri Nik Long

Abstract:

Greater common divisor (GCD) attack is an attack that relies on the polynomial structure of the cryptosystem. This attack required two plaintexts differ from a fixed number and encrypted under same modulus. This paper reports a security reaction of Lucas Based El-Gamal Cryptosystem in the Elliptic Curve group over finite field under GCD attack. Lucas Based El-Gamal Cryptosystem in the Elliptic Curve group over finite field was exposed mathematically to the GCD attack using GCD and Dickson polynomial. The result shows that the cryptanalyst is able to get the plaintext without decryption by using GCD attack. Thus, the study concluded that it is highly perilous when two plaintexts have a slight difference from a fixed number in the same Elliptic curve group over finite field.

Keywords: decryption, encryption, elliptic curve, greater common divisor

Procedia PDF Downloads 140
833 Cross Site Scripting (XSS) Attack and Automatic Detection Technology Research

Authors: Tao Feng, Wei-Wei Zhang, Chang-Ming Ding

Abstract:

Cross-site scripting (XSS) is one of the most popular WEB Attacking methods at present, and also one of the most risky web attacks. Because of the population of JavaScript, the scene of the cross site scripting attack is also gradually expanded. However, since the web application developers tend to only focus on functional testing and lack the awareness of the XSS, which has made the on-line web projects exist many XSS vulnerabilities. In this paper, different various techniques of XSS attack are analyzed, and a method automatically to detect it is proposed. It is easy to check the results of vulnerability detection when running it as a plug-in.

Keywords: XSS, no target attack platform, automatic detection,XSS detection

Procedia PDF Downloads 289
832 Cryptographic Attack on Lucas Based Cryptosystems Using Chinese Remainder Theorem

Authors: Tze Jin Wong, Lee Feng Koo, Pang Hung Yiu

Abstract:

Lenstra’s attack uses Chinese remainder theorem as a tool and requires a faulty signature to be successful. This paper reports on the security responses of fourth and sixth order Lucas based (LUC4,6) cryptosystem under the Lenstra’s attack as compared to the other two Lucas based cryptosystems such as LUC and LUC3 cryptosystems. All the Lucas based cryptosystems were exposed mathematically to the Lenstra’s attack using Chinese Remainder Theorem and Dickson polynomial. Result shows that the possibility for successful Lenstra’s attack is less against LUC4,6 cryptosystem than LUC3 and LUC cryptosystems. Current study concludes that LUC4,6 cryptosystem is more secure than LUC and LUC3 cryptosystems in sustaining against Lenstra’s attack.

Keywords: Lucas sequence, Dickson polynomial, faulty signature, corresponding signature, congruence

Procedia PDF Downloads 80
831 A Game of Information in Defense/Attack Strategies: Case of Poisson Attacks

Authors: Asma Ben Yaghlane, Mohamed Naceur Azaiez

Abstract:

In this paper, we briefly introduce the concept of Poisson attacks in the case of defense/attack strategies where attacks are assumed to be continuous. We suggest a game model in which the attacker will combine both criteria of a sufficient confidence level of a successful attack and a reasonably small size of the estimation error in order to launch an attack. Here, estimation error arises from assessing the system failure upon attack using aggregate data at the system level. The corresponding error is referred to as aggregation error. On the other hand, the defender will attempt to deter attack by making one or both criteria inapplicable. The defender will build his/her strategy by both strengthening the targeted system and increasing the size of error. We will formulate the defender problem based on appropriate optimization models. The attacker will opt for a Bayesian updating in assessing the impact on the improvement made by the defender. Then, the attacker will evaluate the feasibility of the attack before making the decision of whether or not to launch it. We will provide illustrations to better explain the process.

Keywords: attacker, defender, game theory, information

Procedia PDF Downloads 379
830 11-Round Impossible Differential Attack on Midori64

Authors: Zhan Chen, Wenquan Bi

Abstract:

This paper focuses on examining the strength of Midori against impossible differential attack. The Midori family of light weight block cipher orienting to energy-efficiency is proposed in ASIACRYPT2015. Using a 6-round property, the authors implement an 11-round impossible differential attack on Midori64 by extending two rounds on the top and three rounds on the bottom. There is enough key space to consider pre-whitening keys in this attack. An impossible differential path that minimises the key bits involved is used to reduce computational complexity. Several additional observations such as partial abort technique are used to further reduce data and time complexities. This attack has data complexity of 2 ⁶⁹·² chosen plaintexts, requires 2 ¹⁴·⁵⁸ blocks of memory and 2 ⁹⁴·⁷ 11- round Midori64 encryptions.

Keywords: cryptanalysis, impossible differential, light weight block cipher, Midori

Procedia PDF Downloads 197
829 External Sulphate Attack: Advanced Testing and Performance Specifications

Authors: G. Massaad, E. Roziere, A. Loukili, L. Izoret

Abstract:

Based on the monitoring of mass, hydrostatic weighing, and the amount of leached OH- we deduced the nature of leached and precipitated minerals, the amount of lost aggregates and the evolution of porosity and cracking during the sulphate attack. Using these information, we are able to draw the volume / mass changes brought by mineralogical variations and cracking of the cement matrix. Then we defined a new performance indicator, the averaged density, capable to resume along the test of sulphate attack the occurred physicochemical variation occurred in the cementitious matrix and then highlight.

Keywords: monitoring strategy, performance indicator, sulphate attack, mechanism of degradation

Procedia PDF Downloads 240
828 A Survey on Countermeasures of Cache-Timing Attack on AES Systems

Authors: Settana M. Abdulh, Naila A. Sadalla, Yaseen H. Taha, Howaida Elshoush

Abstract:

Side channel attacks are based on side channel information, which is information that is leaked from encryption systems. This includes timing information, power consumption as well as electromagnetic or even sound leaking which can exploited by an attacker. Implementing side channel attacks are possible if and only if an attacker has access to a cryptosystem. In this case, the attacker can exploit bad implementation in software or hardware which is not controlled by encryption implementer. Thus, he/she will represent a real threat to the security system. Several countermeasures have been proposed to eliminate side channel information vulnerability.Cache timing attack is a special type of side channel attack. Here, timing information is collected and analyzed by an attacker to guess sensitive information such as encryption key or plaintext. This paper reviews the technique applied in this attack and surveys the countermeasures against it, evaluating the feasibility and usability of each. Based on this evaluation, finally we pose several recommendations about using these countermeasures.

Keywords: AES algorithm, side channel attack, cache timing attack, cache timing countermeasure

Procedia PDF Downloads 207
827 Achieving Better Security by Using Nonlinear Cellular Automata as a Cryptographic Primitive

Authors: Swapan Maiti, Dipanwita Roy Chowdhury

Abstract:

Nonlinear functions are essential in different cryptoprimitives as they play an important role on the security of the cipher designs. Rule 30 was identified as a powerful nonlinear function for cryptographic applications. However, an attack (MS attack) was mounted against Rule 30 Cellular Automata (CA). Nonlinear rules as well as maximum period CA increase randomness property. In this work, nonlinear rules of maximum period nonlinear hybrid CA (M-NHCA) are studied and it is shown to be a better crypto-primitive than Rule 30 CA. It has also been analysed that the M-NHCA with single nonlinearity injection proposed in the literature is vulnerable against MS attack, whereas M-NHCA with multiple nonlinearity injections provide maximum length cycle as well as better cryptographic primitives and they are also secure against MS attack.

Keywords: cellular automata, maximum period nonlinear CA, Meier and Staffelbach attack, nonlinear functions

Procedia PDF Downloads 182
826 Influence of Electrode Assembly on Catalytic Activation and Deactivation of a PT Film Immobilized H+ Conducting Solid Electrolyte in Electrocatalytic Reduction Reactions

Authors: M. A. Hasnat, M. Amirul Islam, M. A. Rashed, Jamil. Safwan, M. Mahabubul Alam

Abstract:

Symmetric (Cu–Pt|Nafion|Pt–Cu) and asymmetric(Pt|Nafion|Pt–Cu) assemblies were fabricated to study the nitrate reduction processes at the cathode. The electrocatalytic nitrate reduction reactions were performed in these assemblies in order to investigate the prerequisite for the enhanced catalytic activity, electrochemical cell durability as well as preferable product selectivity resulting from the reduction of nitrate at the cathode. It has been observed for the symmetric assembly that Cu particles were oxidized on the anode surface under an applied potential and the resulting copper ions migrated to the cathode surface through the Nafion membrane, which deposited as copper oxide on the cathode surface. The formation of this copper oxide covering layer on the Pt–Cu cathode surface is attributed as the reason for the deactivation of the cathode that governed the reduced nitrate reduction along with increasing nitrite selectivity. These problems were addressed and resolved with the asymmetric design of the electrocatalytic reactor, where enhanced hydrogen evolution activates the surface by eroding the CuO over layer as well as speeding up the slow rate determining hydrogenation reactions.

Keywords: membrane, nitrate, electrocatalysis, voltammetry, electrolysis

Procedia PDF Downloads 196
825 Modeling Intelligent Threats: Case of Continuous Attacks on a Specific Target

Authors: Asma Ben Yaghlane, Mohamed Naceur Azaiez

Abstract:

In this paper, we treat a model that falls in the area of protecting targeted systems from intelligent threats including terrorism. We introduce the concept of system survivability, in the context of continuous attacks, as the probability that a system under attack will continue operation up to some fixed time t. We define a constant attack rate (CAR) process as an attack on a targeted system that follows an exponential distribution. We consider the superposition of several CAR processes. From the attacker side, we determine the optimal attack strategy that minimizes the system survivability. We also determine the optimal strengthening strategy that maximizes the system survivability under limited defensive resources. We use operations research techniques to identify optimal strategies of each antagonist. Our results may be used as interesting starting points to develop realistic protection strategies against intentional attacks.

Keywords: CAR processes, defense/attack strategies, exponential failure, survivability

Procedia PDF Downloads 314
824 Preparation of CuAlO2 Thin Films on Si or Sapphire Substrate by Sol-Gel Method Using Metal Acetate or Nitrate

Authors: Takashi Ehara, Takayoshi Nakanishi, Kohei Sasaki, Marina Abe, Hiroshi Abe, Kiyoaki Abe, Ryo Iizaka, Takuya Sato

Abstract:

CuAlO2 thin films are prepared on Si or sapphire substrate by sol-gel method using two kinds of sols. One is combination of Cu acetate and Al acetate basic, and the other is Cu nitrate and Al nitrate. In the case of acetate sol, XRD peaks of CuAlO2 observed at annealing temperature of 800-950 ºC on both Si and sapphire substrates. In contrast, in the case of the films prepared using nitrate on Si substrate, XRD peaks of CuAlO2 have been observed only at the annealing temperature of 800-850 ºC. At annealing temperature of 850ºC, peaks of other species have been observed beside the CuAlO2 peaks, then, the CuAlO2 peaks disappeared at annealing temperature of 900 °C with increasing in intensity of the other peaks. Intensity of the other peaks decreased at annealing temperature of 950 ºC with appearance of broad SiO2 peak. In the present, we ascribe these peaks as metal silicide.

Keywords: CuAlO2, silicide, thin Films, transparent conducting oxide

Procedia PDF Downloads 303
823 Experimental Studies on the Corrosion Effects of the Concrete Made with Tannery Effluent

Authors: K. Nirmalkumar

Abstract:

An acute water scarcity is prevailing in the dry season in and around Perundurai (Erode district, Tamil Nadu, India) where there are more number of tannery units. Hence an attempt was made to use the effluent from the tannery industry for construction purpose. The mechanical properties such as compressive strength, tensile strength, flexural strength and the special properties such as chloride attack, sulphate attack and chemical attack were studied by casting various concrete specimens in form of cube, cylinders and beams, etc. It was observed that the concrete had some reduction in strength while subjected to chloride attack, sulphate attack and chemical attack. So admixtures were selected and optimized in suitable proportion to counter act the adverse effects and the results were found to be satisfactory. In this research study the corrosion results of specimens prepared by using treated and untreated tannery effluent were compared with the concrete specimens prepared by using potable water. It was observed that by the addition of admixtures, the adverse effects due to the usage of the treated and untreated tannery effluent are counteracted.

Keywords: corrosion, calcium nitrite, concrete, fly ash

Procedia PDF Downloads 201
822 Study of Biological Denitrification using Heterotrophic Bacteria and Natural Source of Carbon

Authors: Benbelkacem Ouerdia

Abstract:

Heterotrophic denitrification has been proven to be one of the most feasible processes for removing nitrate from wastewater and drinking water. In this process, heterotrophic bacteria use organic carbon for both growth and as an electron source. Underground water pollution by nitrates become alarming in Algeria. A survey carried out revealed that the nitrate concentration is in continual increase. Studies in some region revealed contamination exceeding the recommended permissible dose which is 50 mg/L. Worrying values in the regions of Mascara, Ouled saber, El Eulma, Bouira and Algiers are respectively 72 mg/L, 75 mg/L, 97 mg/L, 102 mg/L, and 158 mg/L. High concentration of nitrate in drinking water is associated with serious health risks. Research on nitrate removal technologies from municipal water supplies is increasing because of nitrate contamination. Biological denitrification enables the transformation of oxidized nitrogen compounds by a wide spectrum of heterotrophic bacteria into harmless nitrogen gas with accompanying carbon removal. Globally, denitrification is commonly employed in biological nitrogen removal processes to enhance water quality The study investigated the valorization of a vegetable residue as a carbon source (dates nodes) in water treatment using the denitrification process. Throughout the study, the effect of inoculums addition, pH, and initial concentration of nitrates was also investigated. In this research, a natural organic substance: dates nodes were investigated as a carbon source in the biological denitrification of drinking water. This material acts as a solid substrate and bio-film carrier. The experiments were carried out in batch processes. Complete denitrification was achieved varied between 80 and 100% according to the type of process used. It was found that the nitrate removal rate based on our results, we concluded that the removal of organic matter and nitrogen compounds depended mainly on the initial concentration of nitrate. The effluent pH was mainly affected by the C/N ratio, where a decrease increases pH.

Keywords: biofilm, carbon source, dates nodes, heterotrophic denitrification, nitrate, nitrite

Procedia PDF Downloads 402
821 Valorization of Dates Nodes as a Carbon Source Using Biological Denitrification

Authors: Ouerdia Benbelkacem Belouanas

Abstract:

Heterotrophic denitrification has been proven to be one of the most feasible processes for removing nitrate from waste water and drinking water. In this process, heterotrophic bacteria use organic carbon for both growth and as an electron source. Underground water pollution by nitrates become alarming in Algeria. A survey carried out revealed that the nitrate concentration is in continual increase. Studies in some region revealed contamination exceeding the recommended permissible dose which is 50 mg/L. Worrying values in the regions of Mascara, Ouled saber, El Eulma, Bouira and Algiers are respectively 72 mg/L, 75 mg/L, 97 mg/L, 102 mg/L, and 158 mg/L. High concentration of nitrate in drinking water is associated with serious health risks. Research on nitrate removal technologies from municipal water supplies is increasing because of nitrate contamination. Biological denitrification enables transformation of oxidized nitrogen compounds by a wide spectrum of heterotrophic bacteria into harmless nitrogen gas with accompanying carbon removal. Globally, denitrification is commonly employed in biological nitrogen removal processes to enhance water quality. The study investigated the valorization of a vegetable residue as a carbon source (dates nodes) in water treatment using the denitrification process. Throughout the study, the effect of inoculums addition, pH, and initial concentration of nitrates was also investigated. In this research, a natural organic substance: dates nodes were investigated as a carbon source in the biological denitrification of drinking water. This material acts as a solid substrate and bio-film carrier. The experiments were carried out in batch processes. Complete denitrification was achieved varied between 80 and 100% according to the type of process used. It was found that the nitrate removal rate based on our results, we concluded that the removal of organic matter and nitrogen compounds depended mainly on initial concentration of nitrate. The effluent pH was mainly affected by the C/N ratio, where a decrease increases pH.

Keywords: biofilm, carbon source, dates nodes, heterotrophic denitrification, nitrate, nitrite

Procedia PDF Downloads 338
820 An Aspiring Solution to the Man in the Middle Bootstrap Vulnerability

Authors: Mouad Zouina, Benaceur Outtaj

Abstract:

The proposed work falls within the context of improving data security for m-commerce systems. In this context we have placed under the light some flaws encountered in HTTPS the most used m-commerce protocol, particularly the man in the middle attack, shortly MITM. The man in the middle attack is an active listening attack. The idea of this attack is to target the handshake phase of the HTTPS protocol which is the transition from a non-secure connection to a secure connection in our case HTTP to HTTPS. This paper proposes a solution to fix those flaws based on the upgrade of HSTS standard handshake sequence using the DNSSEC standard.

Keywords: m-commerce, HTTPS, HSTS, DNSSEC, MITM bootstrap vulnerability

Procedia PDF Downloads 322
819 A Pattern Recognition Neural Network Model for Detection and Classification of SQL Injection Attacks

Authors: Naghmeh Moradpoor Sheykhkanloo

Abstract:

Structured Query Language Injection (SQLI) attack is a code injection technique in which malicious SQL statements are inserted into a given SQL database by simply using a web browser. Losing data, disclosing confidential information or even changing the value of data are the severe damages that SQLI attack can cause on a given database. SQLI attack has also been rated as the number-one attack among top ten web application threats on Open Web Application Security Project (OWASP). OWASP is an open community dedicated to enabling organisations to consider, develop, obtain, function, and preserve applications that can be trusted. In this paper, we propose an effective pattern recognition neural network model for detection and classification of SQLI attacks. The proposed model is built from three main elements of: a Uniform Resource Locator (URL) generator in order to generate thousands of malicious and benign URLs, a URL classifier in order to: 1) classify each generated URL to either a benign URL or a malicious URL and 2) classify the malicious URLs into different SQLI attack categories, and an NN model in order to: 1) detect either a given URL is a malicious URL or a benign URL and 2) identify the type of SQLI attack for each malicious URL. The model is first trained and then evaluated by employing thousands of benign and malicious URLs. The results of the experiments are presented in order to demonstrate the effectiveness of the proposed approach.

Keywords: neural networks, pattern recognition, SQL injection attacks, SQL injection attack classification, SQL injection attack detection

Procedia PDF Downloads 386
818 Growth of Struvite Crystals in Synthetic Urine Using Magnesium Nitrate

Authors: Reneiloe Seodigeng, John Kabuba, Hilary Rutto, Tumisang Seodigeng

Abstract:

Urine diversion toilets have become popular as a means of solving the challenges in sanitation. As a result, the source-separated urine must be adequately treated so that it can be disposed of safely and valuable struvite can be extracted for use as fertilizer. In this study, synthetic urine was prepared, and struvite crystallisation experiments carried out using magnesium nitrate. The effect of residence time on crystal growth was studied. At residence time of 10, 30 and 60 minutes, mean particle sizes were 17, 34 and 53 µm showing that with higher residence times, larger crystal sizes can be achieved. SEM analysis of the crystal showed that the resultant crystals had the typical morphology of struvite crystals.

Keywords: struvite, magnesium nitrate, crystallisation, urine treatment

Procedia PDF Downloads 73
817 Service Life Modelling of Concrete Deterioration Due to Biogenic Sulphuric Acid (BSA) Attack-State-of-an-Art-Review

Authors: Ankur Bansal, Shashank Bishnoi

Abstract:

Degradation of Sewage pipes, sewage pumping station and Sewage treatment plants(STP) is of major concern due to difficulty in their maintenance and the high cost of replacement. Most of these systems undergo degradation due to Biogenic sulphuric acid (BSA) attack. Since most of Waste water treatment system are underground, detection of this deterioration remains hidden. This paper presents a literature review, outlining the mechanism of this attack focusing on critical parameters of BSA attack, along with available models and software to predict the deterioration due to this attack. This paper critically examines the various steps and equation in various Models of BSA degradation, detail on assumptions and working of different softwares are also highlighted in this paper. The paper also focuses on the service life design technique available through various codes and method to integrate the servile life design with BSA degradation on concrete. In the end, various methods enhancing the resistance of concrete against Biogenic sulphuric acid attack are highlighted. It may be concluded that the effective modelling for degradation phenomena may bring positive economical and environmental impacts. With current computing capabilities integrated degradation models combining the various durability aspects can bring positive change for sustainable society.

Keywords: concrete degradation, modelling, service life, sulphuric acid attack

Procedia PDF Downloads 235