Search results for: seawater intrusion
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 341

Search results for: seawater intrusion

281 A Proposed Optimized and Efficient Intrusion Detection System for Wireless Sensor Network

Authors: Abdulaziz Alsadhan, Naveed Khan

Abstract:

In recent years intrusions on computer network are the major security threat. Hence, it is important to impede such intrusions. The hindrance of such intrusions entirely relies on its detection, which is primary concern of any security tool like Intrusion Detection System (IDS). Therefore, it is imperative to accurately detect network attack. Numerous intrusion detection techniques are available but the main issue is their performance. The performance of IDS can be improved by increasing the accurate detection rate and reducing false positive. The existing intrusion detection techniques have the limitation of usage of raw data set for classification. The classifier may get jumble due to redundancy, which results incorrect classification. To minimize this problem, Principle Component Analysis (PCA), Linear Discriminant Analysis (LDA), and Local Binary Pattern (LBP) can be applied to transform raw features into principle features space and select the features based on their sensitivity. Eigen values can be used to determine the sensitivity. To further classify, the selected features greedy search, back elimination, and Particle Swarm Optimization (PSO) can be used to obtain a subset of features with optimal sensitivity and highest discriminatory power. These optimal feature subset used to perform classification. For classification purpose, Support Vector Machine (SVM) and Multilayer Perceptron (MLP) used due to its proven ability in classification. The Knowledge Discovery and Data mining (KDD’99) cup dataset was considered as a benchmark for evaluating security detection mechanisms. The proposed approach can provide an optimal intrusion detection mechanism that outperforms the existing approaches and has the capability to minimize the number of features and maximize the detection rates.

Keywords: Particle Swarm Optimization (PSO), Principle Component Analysis (PCA), Linear Discriminant Analysis (LDA), Local Binary Pattern (LBP), Support Vector Machine (SVM), Multilayer Perceptron (MLP)

Procedia PDF Downloads 337
280 Conversion of Atmospheric Carbone Dioxide into Minerals at Room Conditions by Using the Sea Water Plus Various Additives

Authors: Muthana A. M. Jamel Al-Gburi

Abstract:

Elimination of carbon dioxide (CO2) gas from the atmosphere is very important but complicated since there is increasing in the amounts of carbon dioxide and other greenhouse gases in the atmosphere, which mainly caused by some of the human activities and the burning of fossil fuels. So that will lead to global warming. The global warming affects the earth temperature causing an increase to a higher level and, at the same time, creates tornadoes and storms. In this project, we are going to do a new technique for extracting carbon dioxide directly from the air and change it to useful minerals and Nano scale fibers made of carbon by using several chemical processes through chemical reactions. So, that could lead to an economical and healthy way to make some valuable building materials. Also, it may even work as a weapon against environmental change. In our device (Carbone Dioxide Domestic Extractor), we are using Ocean-seawater to dissolve the CO₂ gas and then converted it into carbonate minerals by using a number of additives like Shampoo, clay, and MgO. Note that the atmospheric air includes CO₂ gas, has circulated within the seawater by the air pump. More, that we will use a number of chemicals agents to convert the water acid into useful minerals. After we constructed the system, we did intense experiments and investigations to find the optimum chemical agent, which must be work at the environmental condition. Further to that, we will measure the solubility of CO₂ and other salts in the seawater.

Keywords: global warming, CO₂ gas, ocean-sea water, additives, solubility level

Procedia PDF Downloads 72
279 Marine Litter Dispersion in the Southern Shores of the Caspian Sea (Case Study: Mazandaran Province)

Authors: Siamak Jamshidi

Abstract:

One of the major environmental problems in the southern coasts of the Caspian Sea is that the marine and coastal debris is being deposited and accumulated due to industrial, urban and tourism activities. Study, sampling and analysis on the type, size, amount and origin of human-made (anthropogenic) waste in the coastal areas of this sea can be very effective in implementing management, cultural and informative programs to reduce marine environmental pollutants. Investigation on marine litter distribution under impact of seawater dynamics was performed for the first time in this research. The rate of entry and distribution of marine and coastal pollutants and wastes, which are mainly of urban, tourist and hospital origin, has multiplied on the southern shore of the Caspian Sea in the last decade. According to the results, the two most important sources of hospital waste in the coastal areas are Tonekabon and Mahmoudabad. In this case, the effect of dynamic parameters of seawater such as flow (with speeds of up to about 1 m/s) and waves, as well as the flow of rivers leading to the shoreline are also influential factors in the distribution of marine litter in the region. Marine litters in the southern coastal region were transported from west to east by the shallow waters of the southern Caspian Sea. In other words, the marine debris density has been observed more in the eastern part.

Keywords: southern shelf, coastal oceanography, seawater flow, vertical structure, marine environment

Procedia PDF Downloads 41
278 A Review of Security Attacks and Intrusion Detection Schemes in Wireless Sensor Networks: A Survey

Authors: Maleh Yassine, Ezzati Abdellah

Abstract:

Wireless Sensor Networks (WSNs) are currently used in different industrial and consumer applications, such as earth monitoring, health related applications, natural disaster prevention, and many other areas. Security is one of the major aspects of wireless sensor networks due to the resource limitations of sensor nodes. However, these networks are facing several threats that affect their functioning and their life. In this paper we present security attacks in wireless sensor networks, and we focus on a review and analysis of the recent Intrusion Detection schemes in WSNs.

Keywords: wireless sensor networks, security attack, denial of service, IDS, cluster-based model, signature based IDS, hybrid IDS

Procedia PDF Downloads 346
277 Impacts Of Salinity on Co2 Turnover in Some Gefara Soils of Libya

Authors: Fathi Elyaagubi

Abstract:

Salinization is a major threat to the productivity of agricultural land. The Gefara Plain located in the northwest of Libya; comprises about 80% of the total agricultural activity. The high water requirements for the populations and agriculture are depleting the groundwater aquifer, resulting in intrusion of seawater in the first few kilometers along the coast. Due to increasing salinity in the groundwater used for irrigation, the soils of the Gefara Plain are becoming increasingly saline. This research paper investigated the sensitivity of these soils to increased salinity using Co2 evolution as an integrating measure of soil function. Soil was collected from four sites located in the Gefara Plain, Almaya, Janzur, Gargaresh and Tajura. Soil collected from Tajura had the highest background salinity, and Janzur had the highest organic matter content. All of the soils had relatively low organic matter content, ranging between 0.49-%1.25. The cumulative rate of 14CO2 of added 14C-labelled Lolium shoots (Lolium perenne L.) to soils was decreased under effects of water containing different concentrations of NaCl at 20, 50, 70, 90, 150, and 200 mM compared to the control at any time of incubation in four sites.

Keywords: soil salinity, gefara plain, organic matter, 14C-labelled lolium shoots

Procedia PDF Downloads 192
276 Evaluation of Ensemble Classifiers for Intrusion Detection

Authors: M. Govindarajan

Abstract:

One of the major developments in machine learning in the past decade is the ensemble method, which finds highly accurate classifier by combining many moderately accurate component classifiers. In this research work, new ensemble classification methods are proposed with homogeneous ensemble classifier using bagging and heterogeneous ensemble classifier using arcing and their performances are analyzed in terms of accuracy. A Classifier ensemble is designed using Radial Basis Function (RBF) and Support Vector Machine (SVM) as base classifiers. The feasibility and the benefits of the proposed approaches are demonstrated by the means of standard datasets of intrusion detection. The main originality of the proposed approach is based on three main parts: preprocessing phase, classification phase, and combining phase. A wide range of comparative experiments is conducted for standard datasets of intrusion detection. The performance of the proposed homogeneous and heterogeneous ensemble classifiers are compared to the performance of other standard homogeneous and heterogeneous ensemble methods. The standard homogeneous ensemble methods include Error correcting output codes, Dagging and heterogeneous ensemble methods include majority voting, stacking. The proposed ensemble methods provide significant improvement of accuracy compared to individual classifiers and the proposed bagged RBF and SVM performs significantly better than ECOC and Dagging and the proposed hybrid RBF-SVM performs significantly better than voting and stacking. Also heterogeneous models exhibit better results than homogeneous models for standard datasets of intrusion detection. 

Keywords: data mining, ensemble, radial basis function, support vector machine, accuracy

Procedia PDF Downloads 223
275 Bioaccumulation of Polycyclic Aromatic Hydrocarbons in Padina boryana Alga Collected from a Contaminated Site at the Red Sea, Saudi Arabia

Authors: Huda Qari, I. A. Hassan

Abstract:

The brown alga Padina boryanawas was used for bioassay of polycyclic aromatic hydrocarbons (PAHs) accumulation at the seashore of Jeddah city. PAHs were determined in the coastal water and algal tissues by GC-MS. Acenaphthene (Ace) and dibenzo (a,h) anthracene (dB(a,h)An) were the main PAHs in seawater (50.02 and 46.18) and algal tissues (64.67 and 72.45), respectively. The ratios of low molecular weight/high molecular weight hydrocarbons (1.76 – 1.44), fluoranthene/pyrene (1.57 – 1.52) and phenanthrene/anthracene (0.86 – 0.67) in seawater and algal tissues, respectively, indicated the origin of the PAHs to be mainly petrogenic. This study has demonstrated the utility of using Padina boryanawas as a biomonitor of PAH contamination and bioavailability in the coastal waters.

Keywords: polycyclic aromatic hydrocarbons, Padina boryanawas, bioaccumulation, waste water

Procedia PDF Downloads 260
274 An Immune-Inspired Web Defense Architecture

Authors: Islam Khalil, Amr El-Kadi

Abstract:

With the increased use of web technologies, microservices, and Application Programming Interface (API) for integration between systems, and with the development of containerization of services on the operating system level as a method of isolating system execution and for easing the deployment and scaling of systems, there is a growing need as well as opportunities for providing platforms that improve the security of such services. In our work, we propose an architecture for a containerization platform that utilizes various concepts derived from the human immune system. The goal of the proposed containerization platform is to introduce the concept of slowing down or throttling suspected malicious digital pathogens (intrusions) to reduce their damage footprint while providing more opportunities for forensic inspection of suspected pathogens in addition to the ability to snapshot, rollback, and recover from possible damage. The proposed platform also leverages existing intrusion detection algorithms by integrating and orchestrating their cooperative operation for more effective intrusion detection. We show how this model reduces the damage footprint of intrusions and gives a greater time window for forensic investigation. Moreover, during our experiments, our proposed platform was able to uncover unintentional system design flaws that resulted in internal DDoS-like attacks by submodules of the system itself rather than external intrusions.

Keywords: containers, human immunity, intrusion detection, security, web services

Procedia PDF Downloads 62
273 Using Vulnerability to Reduce False Positive Rate in Intrusion Detection Systems

Authors: Nadjah Chergui, Narhimene Boustia

Abstract:

Intrusion Detection Systems are an essential tool for network security infrastructure. However, IDSs have a serious problem which is the generating of massive number of alerts, most of them are false positive ones which can hide true alerts and make the analyst confused to analyze the right alerts for report the true attacks. The purpose behind this paper is to present a formalism model to perform correlation engine by the reduction of false positive alerts basing on vulnerability contextual information. For that, we propose a formalism model based on non-monotonic JClassicδє description logic augmented with a default (δ) and an exception (є) operator that allows a dynamic inference according to contextual information.

Keywords: context, default, exception, vulnerability

Procedia PDF Downloads 236
272 Alternative Water Resources and Brominated Byproducts

Authors: Nora Kuiper, Candace Rowell, Hugues Preud'Homme, Basem Shomar

Abstract:

As the global dependence on seawater desalination as a primary drinking water resource increases, a unique class of secondary pollutants is emerging. The presence of bromide salts in seawater may result in increased levels of bromine and brominated byproducts in drinking water. The State of Qatar offers a unique setting to study these pollutants and their impacts on consumers as the country is 100% dependent on seawater desalination to supply municipal tap water and locally produced bottled water. Tap water (n=115) and bottled water (n=62) samples were collected throughout the State of Qatar and analyzed for a suite of inorganic and organic compounds, including 54 volatile organic compounds (VOCs), with an emphasis on brominated byproducts. All VOC identification and quantification was completed using a Bruker Scion GCMSMS with static headspace technologies. A risk survey tool was used to collect information regarding local consumption habits, health outcomes and perception of water sources for adults and children. This study is the first of its kind in the country. Dibromomethane, bromoform, and bromobenzene were detected in 61%, 88% and 2%, of the drinking water samples analyzed. The levels of dibromomethane ranged from approximately 100-500 ng/L and the concentrations of bromoform ranged from approximately 5-50 µg/L. Additionally, bromobenzene concentrations were 60 ng/L. The presence of brominated compounds in drinking water is a public health concern specific to populations using seawater as a feed water source and may pose unique risks that have not been previously studied. Risk assessments are ongoing to quantify the risks associated with prolonged consumption of disinfection byproducts; specifically the risks of brominated trihalomethanes as the levels of bromoform found in Qatar’s drinking water reach more than 60% of the US EPA’s Maximum Contaminant Level of all THMs.

Keywords: brominated byproducts, desalination, trihalomethanes, risk assessment

Procedia PDF Downloads 401
271 Efficiency of Membrane Distillation to Produce Fresh Water

Authors: Sabri Mrayed, David Maccioni, Greg Leslie

Abstract:

Seawater desalination has been accepted as one of the most effective solutions to the growing problem of a diminishing clean drinking water supply. Currently, two desalination technologies dominate the market – the thermally driven multi-stage flash distillation (MSF) and the membrane based reverse osmosis (RO). However, in recent years membrane distillation (MD) has emerged as a potential alternative to the established means of desalination. This research project intended to determine the viability of MD as an alternative process to MSF and RO for seawater desalination. Specifically the project involves conducting a thermodynamic analysis of the process based on the second law of thermodynamics to determine the efficiency of the MD. Data was obtained from experiments carried out on a laboratory rig. In order to determine exergy values required for the exergy analysis, two separate models were built in Engineering Equation Solver – the ’Minimum Separation Work Model’ and the ‘Stream Exergy Model’. The efficiency of MD process was found to be 17.3 %, and the energy consumption was determined to be 4.5 kWh to produce one cubic meter of fresh water. The results indicate MD has potential as a technique for seawater desalination compared to RO and MSF. However, it was shown that this was only the case if an alternate energy source such as green or waste energy was available to provide the thermal energy input to the process. If the process was required to power itself, it was shown to be highly inefficient and in no way thermodynamically viable as a commercial desalination process.

Keywords: desalination, exergy, membrane distillation, second law efficiency

Procedia PDF Downloads 334
270 A Conceptual Design of Freeze Desalination Using Low Cost Refrigeration

Authors: Parul Sahu

Abstract:

In recent years, seawater desalination has been emerged as a potential resource to circumvent water scarcity, especially in coastal regions. Among the various methods, thermal evaporation or distillation and membrane operations like Reverse Osmosis (RO) has been exploited at commercial scale. However, the energy cost and maintenance expenses associated with these processes remain high. In this context Freeze Desalination (FD), subjected to the availability of low cost refrigeration, offers an exciting alternative. Liquefied Natural Gas (LNG) regasification terminals provide an opportunity to utilize the refrigeration available with regasification of LNG. This work presents the conceptualization and development of a process scheme integrating the ice and hydrate based FD to the LNG regasification process. This integration overcomes the high energy demand associated with FD processes by utilizing the refrigeration associated with LNG regasification. An optimal process scheme was obtained by performing process simulation using ASPEN PLUS simulator. The results indicated the new proposed process requires only 1 kWh/m³ of energy with the utilization of maximum refrigeration. In addition, a sensitivity analysis was also performed to study the effect of various process parameters on water recovery and energy consumption for the proposed process. The results show that the energy consumption decreases by 30% with an increase in water recovery from 30% to 60%. However, due to operational limitations associated with ice and hydrate handling in seawater, the water recovery cannot be maximized but optimized. The proposed process can be potentially used to desalinate seawater in integration with LNG regasification terminal.

Keywords: freeze desalination, liquefied natural gas regasification, process simulation, refrigeration

Procedia PDF Downloads 105
269 Durability Study of Pultruded CFRP Plates under Sustained Bending in Distilled Water and Seawater Immersions: Effects on the Visco-Elastic Properties

Authors: Innocent Kafodya, Guijun Xian

Abstract:

This paper presents effects of distilled water, seawater and sustained bending strains of 30% and 50% ultimate strain at room temperature, on the durability of unidirectional pultruded carbon fiber reinforced polymer (CFRP) plates. In this study, dynamic mechanical analyzer (DMA) was used to investigate the synergic effects of the immersions and bending strains on the visco-elastic properties of (CFRP) such as storage modulus, tan delta and glass transition temperature. The study reveals that the storage modulus and glass transition temperature increase while tan delta peak decreases in the initial stage of both immersions due to the progression of curing. The storage modulus and Tg subsequently decrease and tan delta increases due to the matrix plasticization. The blister induced damages in the unstrained seawater samples enhance water uptake and cause more serious degradation of Tg and storage modulus than in water immersion. Increasing sustained bending decreases Tg and storage modulus in a long run for both immersions due to resin matrix cracking and debonding. The combined effects of immersions and strains are not clearly reflected due to the statistical effects of DMA sample sizes and competing processes of molecular reorientation and postcuring.

Keywords: pultruded CFRP plate, bending strain, glass transition temperature, storage modulus, tan delta

Procedia PDF Downloads 252
268 Performance Analysis of Traffic Classification with Machine Learning

Authors: Htay Htay Yi, Zin May Aye

Abstract:

Network security is role of the ICT environment because malicious users are continually growing that realm of education, business, and then related with ICT. The network security contravention is typically described and examined centrally based on a security event management system. The firewalls, Intrusion Detection System (IDS), and Intrusion Prevention System are becoming essential to monitor or prevent of potential violations, incidents attack, and imminent threats. In this system, the firewall rules are set only for where the system policies are needed. Dataset deployed in this system are derived from the testbed environment. The traffic as in DoS and PortScan traffics are applied in the testbed with firewall and IDS implementation. The network traffics are classified as normal or attacks in the existing testbed environment based on six machine learning classification methods applied in the system. It is required to be tested to get datasets and applied for DoS and PortScan. The dataset is based on CICIDS2017 and some features have been added. This system tested 26 features from the applied dataset. The system is to reduce false positive rates and to improve accuracy in the implemented testbed design. The system also proves good performance by selecting important features and comparing existing a dataset by machine learning classifiers.

Keywords: false negative rate, intrusion detection system, machine learning methods, performance

Procedia PDF Downloads 96
267 Detecting Venomous Files in IDS Using an Approach Based on Data Mining Algorithm

Authors: Sukhleen Kaur

Abstract:

In security groundwork, Intrusion Detection System (IDS) has become an important component. The IDS has received increasing attention in recent years. IDS is one of the effective way to detect different kinds of attacks and malicious codes in a network and help us to secure the network. Data mining techniques can be implemented to IDS, which analyses the large amount of data and gives better results. Data mining can contribute to improving intrusion detection by adding a level of focus to anomaly detection. So far the study has been carried out on finding the attacks but this paper detects the malicious files. Some intruders do not attack directly, but they hide some harmful code inside the files or may corrupt those file and attack the system. These files are detected according to some defined parameters which will form two lists of files as normal files and harmful files. After that data mining will be performed. In this paper a hybrid classifier has been used via Naive Bayes and Ripper classification methods. The results show how the uploaded file in the database will be tested against the parameters and then it is characterised as either normal or harmful file and after that the mining is performed. Moreover, when a user tries to mine on harmful file it will generate an exception that mining cannot be made on corrupted or harmful files.

Keywords: data mining, association, classification, clustering, decision tree, intrusion detection system, misuse detection, anomaly detection, naive Bayes, ripper

Procedia PDF Downloads 391
266 Climate Change Effects on Western Coastal Groundwater in Yemen (1981-2020)

Authors: Afrah S. M. Al-Mahfadi

Abstract:

Climate change is a global issue that has significant impacts on water resources, resulting in environmental, economic, and political consequences. Groundwater reserves, particularly in coastal areas, are facing depletion, leading to serious problems in regions such as Yemen. This study focuses on the western coastal region of Yemen, which already faces risks such as water crises, food insecurity, and widespread poverty. Climate change exacerbates these risks by causing high temperatures, sea level rise, inadequate sea level rise, and inadequate environmental policies. Research Aim: The aim of this research is to provide a comprehensive overview of the impact of climate change on the western coastal region of Yemen. Specifically, the study aims to analyze the relationship between climate change and the loss of fresh groundwater resources in this area. Methodology: The research utilizes a combination of a literature review and three case studies conducted through site visits. Arch-GIS mapping is employed to analyze and visualize the relationship between climate change and the depletion of fresh groundwater resources. Additionally, data on precipitation from 1981 to 2020 and scenarios of projected sea level rise (SLR) are considered. Findings: The study reveals several future issues resulting from climate change. It is projected that the annual temperature will increase while the rainfall rate will decrease. Furthermore, the sea level is expected to rise by approximately 0.30 to 0.72 meters by 2100. These factors contribute to the loss of wetlands, the retreat of shorelines and estuaries, and the intrusion of seawater into the coastal aquifer, rendering drinking water from wells increasingly saline. Data Collection and Analysis Procedures: Data for this research are collected through a literature review, including studies on climate change impacts in coastal areas and the hydrogeology of the study region. Furthermore, three case studies are conducted through site visits. Arch-GIS mapping techniques are utilized to analyze the relationship between climate change and the loss of fresh groundwater resources. Historical precipitation data from 1981 to 2020 and scenarios of projected sea level rise are also analyzed. Questions Addressed: (1) What is the impact of climate change on the western coastal region of Yemen? (2) How does climate change affect the availability of fresh groundwater resources in this area? Conclusion: The study concludes that the western coastal region of Yemen is facing significant challenges due to climate change. The projected increase in temperature, decrease in rainfall, and rise in sea levels have severe implications, such as the loss of wetlands, shorelines, and estuaries. Additionally, the intrusion of seawater into the coastal aquifer further exacerbates the issue of saline drinking water. Urgent measures are needed to address climate change, including improving water management, implementing integrated coastal zone planning, raising awareness among stakeholders, and implementing emergency projects to mitigate the impacts. Recommendations: To mitigate the adverse effects of climate change, several recommendations are provided. These include improving water management practices, developing integrated coastal zone planning strategies, raising awareness among all stakeholders, improving health and education, and implementing emergency projects to combat climate change. These measures aim to enhance adaptive capacity and resilience in the face of future climate change impacts.

Keywords: climate change, groundwater, coastal wetlands, Yemen

Procedia PDF Downloads 42
265 A Survey in Techniques for Imbalanced Intrusion Detection System Datasets

Authors: Najmeh Abedzadeh, Matthew Jacobs

Abstract:

An intrusion detection system (IDS) is a software application that monitors malicious activities and generates alerts if any are detected. However, most network activities in IDS datasets are normal, and the relatively few numbers of attacks make the available data imbalanced. Consequently, cyber-attacks can hide inside a large number of normal activities, and machine learning algorithms have difficulty learning and classifying the data correctly. In this paper, a comprehensive literature review is conducted on different types of algorithms for both implementing the IDS and methods in correcting the imbalanced IDS dataset. The most famous algorithms are machine learning (ML), deep learning (DL), synthetic minority over-sampling technique (SMOTE), and reinforcement learning (RL). Most of the research use the CSE-CIC-IDS2017, CSE-CIC-IDS2018, and NSL-KDD datasets for evaluating their algorithms.

Keywords: IDS, imbalanced datasets, sampling algorithms, big data

Procedia PDF Downloads 277
264 Investigating Al₂O₃ Nanofluid Based on Seawater and Effluent Water Mix for Water Injection Application; Sandstone

Authors: Meshal Al-Samhan, Abdullah Al-Marshed

Abstract:

Recently, there has been a tremendous increase in interest in nanotechnology applications and nanomaterials in the oilfield. In the last decade, the global increase in oil production resulted in large amounts of produced water, causing a significant problem for all producing countries and companies. This produced water deserves special attention and a study of its characteristics to understand and determine how it can be treated and later used for suitable applications such as water injection for Enhance Oil Recovery (EOR) without harming the environment. This work aims to investigate the prepared compatible mixed water (seawater and effluent water) response to nanoparticles for EOR water injection. The evaluation of different mix seawater/effluent water ratios (60/40,70/30) for their characteristics prior to nanofluid preparation using Inductive Couple Plasma (ICP) analysis, potential zeta test, and OLI software (the OLI Systems is a recognised leader in aqueous chemistry). This step of the work revealed the suitability of the water mix with a lower effluent-water ratio. Also, OLI predicted that the 60:40 mix needs to be balanced around temperatures of 70 ºC to avoid the mass accumulation of calcium sulfate and strontium sulfate. Later the prepared nanofluid was tested for interfacial tension (IFT) and wettability restoration in the sandstone rock; the Al2O3 nanofluid at 0.06 wt% concentration reduced the IFT by more than 16% with moderate water wet contact angle. The study concluded that the selected nanoparticle Al2O3 had demonstrated excellent performance in decreasing the interfacial tension with respect to the selected water mix type (60/40) at low nanoparticles wt%.

Keywords: nano AL2O3, sanstone, nanofluid, IFT, wettability

Procedia PDF Downloads 59
263 Filtering Intrusion Detection Alarms Using Ant Clustering Approach

Authors: Ghodhbani Salah, Jemili Farah

Abstract:

With the growth of cyber attacks, information safety has become an important issue all over the world. Many firms rely on security technologies such as intrusion detection systems (IDSs) to manage information technology security risks. IDSs are considered to be the last line of defense to secure a network and play a very important role in detecting large number of attacks. However the main problem with today’s most popular commercial IDSs is generating high volume of alerts and huge number of false positives. This drawback has become the main motivation for many research papers in IDS area. Hence, in this paper we present a data mining technique to assist network administrators to analyze and reduce false positive alarms that are produced by an IDS and increase detection accuracy. Our data mining technique is unsupervised clustering method based on hybrid ANT algorithm. This algorithm discovers clusters of intruders’ behavior without prior knowledge of a possible number of classes, then we apply K-means algorithm to improve the convergence of the ANT clustering. Experimental results on real dataset show that our proposed approach is efficient with high detection rate and low false alarm rate.

Keywords: intrusion detection system, alarm filtering, ANT class, ant clustering, intruders’ behaviors, false alarms

Procedia PDF Downloads 379
262 Lake Bardawil Water Quality

Authors: Mohamed Elkashouty, Mohamed Elkammar, Mohamed Gomma, Menal Elminiami

Abstract:

Lake Bardawil is considered as one of the major morphological features of northern Sinai. It represents the largest fish production lake for export in Egypt. Nineteen and thirty one samples were collected from lake water during winter and summer (2005). TDS, cations, anions, Cd, Cu, Fe, Mn, Zn, Ni, Co and Pb concentrations were measured within winter and summer seasons. During summer, in the eastern sector of the lake, TDS concentration is decreased due northeastern part (38000 ppm), it is attributed to dilution from seawater through Boughaz II. The TDS concentration increased generally in the central and southern parts of the lake (44000 and 42000 ppm, respectively). It is caused by they are far from dilution from seawater, disconnected water body, shallow depth (mean 2 m), and high evaporation rate. In the western sector, the TDS content ranged from low (38000 ppm) in the northeastern part to high (50000 ppm) in the western part. Generally, the TDS concentration in the western sector is higher than those in the eastern. It is attributed to low volume of water body for the former, high evaporation rate, and therefore increase in TDS content in the lake water.During winter season, in the eastern sector, the wind velocity is high which enhance the water current to inflow into the lake through Boughaz I and II. The resultant water lake is diluted by seawater and rainfall in the winter season. The TDS concentration increased due southern part of the lake (42000 ppm) and declined in the northern part (36000 ppm). The concentration of Co, Ni, Pb, Fe, Cd, Zn, Cu, Mn and Pb within winter and summery seasons, in lake water are low, which considered as background concentrations with respect to seawater. Therefore, there are no industrial, agricultural and sanitary wastewaters dump into the lake. This confirms the statement that has been written at the entrance of Lake Bardawil at El-Telool area "Lake Bardawil, one of the purest lakes in the world". It indicate that the Lake Bardawil is excellent area for fish production for export (current state) and is the second main fish source in Egypt after the Mediterranean Sea after the illness of Lake Manzala.

Keywords: lake Bardawil, water quality, major ions, toxic metals

Procedia PDF Downloads 481
261 Valorization of Waste Reverse Osmosis Desalination Brine and Crystallization Sequence Approach for Kainite Recovery

Authors: Ayoub Bouazza, Ali Faddouli, Said Amal, Rachid Benhida, Khaoula Khaless

Abstract:

Brine waste generated from reverse osmosis (RO) desalination plants contains various valuable compounds, mainly salts, trace elements, and organic matter. These wastes are up to two times saltier than standard seawater. Therefore, there is a strong economic interest in recovering these salts. The current practice in desalination plants is to reject the brine back to the sea, which affects the marine ecosystem and the environment. Our study aims to bring forth a reliable management solution for the valorisation of waste brines. Natural evaporation, isothermal evaporation at 25°C and 50°C, and evaporation using continuous heating were used to crystallize valuable salts from a reverse osmosis desalination plant brine located on the Moroccan Atlantic coast. The crystallization sequence of the brine was studied in comparison with standard seawater. The X-Ray Diffraction (XRD) of the precipitated solid phases showed similar results, where halite was the main solid phase precipitated from both the brine and seawater. However, Jänecke diagram prediction, along with FREZCHEM simulations, showed that Kainite should crystallize before Epsomite and Carnallite. As the absence of kainite formation in many experiments in the literature has been related to the metastability of kainite and the critical relative humidity conditions, and the precipitation of K–Mg salts is very sensitive to climatic conditions. An evaporation process is proposed as a solution to achieve the predicted crystallization path and to affirm the recovery of Kainite.

Keywords: salts crystallization, reverse osmosis, solar evaporation, frezchem, ZLD

Procedia PDF Downloads 68
260 Participation in IAEA Proficiency Test to Analyse Cobalt, Strontium and Caesium in Seawater Using Direct Counting and Radiochemical Techniques

Authors: S. Visetpotjanakit, C. Khrautongkieo

Abstract:

Radiation monitoring in the environment and foodstuffs is one of the main responsibilities of Office of Atoms for Peace (OAP) as the nuclear regulatory body of Thailand. The main goal of the OAP is to assure the safety of the Thai people and environment from any radiological incidents. Various radioanalytical methods have been developed to monitor radiation and radionuclides in the environmental and foodstuff samples. To validate our analytical performance, several proficiency test exercises from the International Atomic Energy Agency (IAEA) have been performed. Here, the results of a proficiency test exercise referred to as the Proficiency Test for Tritium, Cobalt, Strontium and Caesium Isotopes in Seawater 2017 (IAEA-RML-2017-01) are presented. All radionuclides excepting ³H were analysed using various radioanalytical methods, i.e. direct gamma-ray counting for determining ⁶⁰Co, ¹³⁴Cs and ¹³⁷Cs and developed radiochemical techniques for analysing ¹³⁴Cs, ¹³⁷Cs using AMP pre-concentration technique and 90Sr using di-(2-ethylhexyl) phosphoric acid (HDEHP) liquid extraction technique. The analysis results were submitted to IAEA. All results passed IAEA criteria, i.e. accuracy, precision and trueness and obtained ‘Accepted’ statuses. These confirm the data quality from the OAP environmental radiation laboratory to monitor radiation in the environment.

Keywords: international atomic energy agency, proficiency test, radiation monitoring, seawater

Procedia PDF Downloads 151
259 Modeling of Reverse Osmosis Water Desalination Powered by Photovoltaic Solar Energy

Authors: Salma El Aimani

Abstract:

Freshwater is an essential material in our daily life; its availability is on the decline due to population growth and climate change. To meet the demand for fresh water in regions where reserves are insufficient, several countries have adopted seawater desalination. Several physical methods allow the production of fresh water from seawater; among these methods are distillation and reverse osmosis, and there is great potential to use renewable energy sources such as solar Photovoltaics. The work presented in this paper consists of three parts. First, the generalities of desalination technologies will be presented. The second part is devoted to the presentation of different water desalination systems combined with renewable energy and their benefits and drawbacks on different sides. In the third part, we will perform a modeling of a PV water desalination system under Matlab Simulink software. Then, according to the obtained simulation results, we conclude this paper with the prospects of the presented work.

Keywords: reverse-osmosis, desalination, modelling, ‎irradiation, Matlab

Procedia PDF Downloads 53
258 Machine Learning Methods for Network Intrusion Detection

Authors: Mouhammad Alkasassbeh, Mohammad Almseidin

Abstract:

Network security engineers work to keep services available all the time by handling intruder attacks. Intrusion Detection System (IDS) is one of the obtainable mechanisms that is used to sense and classify any abnormal actions. Therefore, the IDS must be always up to date with the latest intruder attacks signatures to preserve confidentiality, integrity, and availability of the services. The speed of the IDS is a very important issue as well learning the new attacks. This research work illustrates how the Knowledge Discovery and Data Mining (or Knowledge Discovery in Databases) KDD dataset is very handy for testing and evaluating different Machine Learning Techniques. It mainly focuses on the KDD preprocess part in order to prepare a decent and fair experimental data set. The J48, MLP, and Bayes Network classifiers have been chosen for this study. It has been proven that the J48 classifier has achieved the highest accuracy rate for detecting and classifying all KDD dataset attacks, which are of type DOS, R2L, U2R, and PROBE.

Keywords: IDS, DDoS, MLP, KDD

Procedia PDF Downloads 203
257 Variability of Physico-Chemical and Carbonate Chemistry of Seawater in Selected Portions of the Central Atlantic Coastline of Ghana

Authors: Robert Kwame Kpaliba, Dennis Kpakpor Adotey, Yaw Serfor-Armah

Abstract:

Increase in the oceanic carbon dioxide absorbance from the atmosphere due to climate change has led to appreciable change in the chemistry of the oceans. The change in oceanic pH referred to as ocean acidification poses multiple threats and stresses on marine species, biodiversity, goods and services, and livelihoods. Marine ecosystems are continuously threatened by plethora of natural and anthropogenic stressors including carbon dioxide (CO₂) emissions causing a lot of changes which has not been experienced for approximately 60 years. Little has been done in Africa as a whole and Ghana in particular to improve the understanding of the variations of the carbonate chemistry of seawater and the biophysical impacts of ocean acidification on security of seafood, nutrition, climate and environmental change. There is, therefore, the need for regular monitoring of carbonate chemistry of seawater along Ghana’s coastline to generate reliable data to aid marine policy formulation. Samples of seawater were collected thrice every month for a one-year period from five study sites for the various parameters to be analyzed. Analysis of the measured physico-chemical and the carbonate chemistry parameters was done using simple statistics. Correlation test and ANOVA were run on both of the physico-chemical and carbonate chemistry parameters. The carbonate chemistry parameters were measured using computer software programme (CO₂cal v4.0.9) except total alkalinity and pH. The study assessed the variability of seawater carbonate chemistry in selected portions of the Central Atlantic Coastline of Ghana (Tsokomey/Bortianor, Kokrobitey, Gomoa Nyanyanor, Gomoa Fetteh, and Senya Breku landing beaches) over a 1-year period (June 2016–May 2017). For physico-chemical parameters, there was insignificant variation in nitrate (NO₃⁻) (1.62 - 2.3 mg/L), ammonia (NH₃) (1.52 - 2.05 mg/L), and salinity (sal) (34.50 - 34.74 ppt). Carbonate chemistry parameters for all the five study sites showed significant variation: partial pressure of carbon dioxide (pCO₂) (414.08-715.5 µmol/kg), carbonate ion (CO₃²⁻) (115-157.92 µmol/kg), pH (7.9-8.12), total alkalinity (TA) (1711.8-1986 µmol/kg), total carbon dioxide (TCO₂) (1512.1 - 1792 µmol/kg), dissolved carbon dioxide (CO₂aq) (10.97-18.92 µmol/kg), Revelle Factor (RF) (9.62-11.84), aragonite (ΩAr) (0.75-1.48) and calcite (ΩCa) (1.08-2.14). The study revealed that the partial pressure of carbon dioxide and temperature did not have a significant effect on each other (r² = 0.31) (p-value = 0.0717). There was an appreciable effect of pH on dissolved carbon dioxide (r² = 0.921) (p-value = 0.0000). The variation between total alkalinity and dissolved carbon dioxide was appreciable (r² = 0.731) (p-value = 0.0008). There was a significant correlation between total carbon dioxide and dissolved carbon dioxide (r² = 0.852) (p-value = 0.0000). Revelle factor correlated strongly with dissolved carbon dioxide (r² = 0.982) (p-value = 0.0000). Partial pressure of carbon dioxide corresponds strongly with atmospheric carbon dioxide (r² = 0.9999) (p-value = 0.00000).

Keywords: carbonate chemistry, seawater, central atlantic coastline, Ghana, ocean acidification

Procedia PDF Downloads 527
256 Microbial Effects of Iron Elution from Hematite into Seawater Mediated via Dissolved Organic Matter

Authors: Apichaya Aneksampant, Xuefei Tu, Masami Fukushima, Mitsuo Yamamoto

Abstract:

The restoration of seaweed beds recovery has been developed using a fertilization technique for supplying dissolved iron to barren coastal areas. The fertilizer is composed of iron oxides as a source of iron and compost as humic substance (HS) source, which can serve as chelator of iron to stabilize the dissolved species under oxic seawater condition. However, elution mechanisms of iron from iron oxide surfaces have not sufficiently elucidated. In particular, roles of microbial activities in the elution of iron from the fertilizer are not sufficiently understood. In the present study, a fertilizer (iron oxide/compost = 1/1, v/v) was incubated in a water tank at Mashike coast, Hokkaido Japan. Microorganisms in the 6-month fertilizer were isolated and identified as Exiguobacterium oxidotolerans sp. (T-2-2). The identified bacteria were inoculated to perform iron elution test in a postgate B medium, prepared in artificial seawater. Hematite was used as a model iron oxide and anthraquinone-2,7-disolfonate (AQDS) as a model for HSs. The elution test performed in presence and absence of bacteria inoculation. ICP-AES was used to analyze total iron and a colorimetric technique using ferrozine employed for the determination of ferrous ion. During the incubation period, sample contained hematite and T-2-2 in both presence and absence of AQDS continuously showed the iron elution and reached at the highest concentration after 9 days of incubation and then slightly decrease to stabilize within 20 days. Comparison to the sample without T-2-2, trace amount of iron was observed, suggesting that iron elution to seawater can be attributed to bacterial activities. The levels of total organic carbon (TOC) in the culture solution with hematite decreased. This may be to the adsorption of organic compound, AQDS, to hematite surfaces. The decrease in UV-vis absorption of AQDS in the culture solution also support the results of TOC that AQDS was adsorbed to hematite surfaces. AQDS can enhance the iron elution, while the adsorption of organic matter suppresses the iron elution from hematite.

Keywords: anthraquinone-2, 7-disolfonate, barren ground, E.oxidotolerans sp., hematite, humic substances, iron elution

Procedia PDF Downloads 353
255 Study of the Behavior of an Organic Coating Applied on Algerian Oil Tanker in Seawater

Authors: N. Hammouda, K. Belmokre

Abstract:

The paints are used extensively today in the industry to protect the metallic structures of the aggressive environments. This work is devoted to the study of corrosion resistance and aging behavior of a paint coating providing external protection for oil tankers. To avoid problems related to corrosion of these vessels, two protection modes are provided: An electro chemical active protection (cathodic protection of the hull). A passive protection by external painting. Investigations are conducted using stationary and non-stationary electro chemical tools such as electro chemical impedance spectroscopy has allowed us to characterize the protective qualities of these films. The application of the EIS on our damaged in-situ painting shows the existence of several capacitive loops which is an indicator of the failure of our tested paint. Microscopic analysis (micrograph) helped bring essential elements in understanding the degradation of our paint condition and immersion training corrosion products.

Keywords: epoxy paints, electrochemical impedance spectroscopy, corrosion mechanisms, seawater

Procedia PDF Downloads 364
254 Real Time Detection of Application Layer DDos Attack Using Log Based Collaborative Intrusion Detection System

Authors: Farheen Tabassum, Shoab Ahmed Khan

Abstract:

The brutality of attacks on networks and decisive infrastructures are on the climb over recent years and appears to continue to do so. Distributed Denial of service attack is the most prevalent and easy attack on the availability of a service due to the easy availability of large botnet computers at cheap price and the general lack of protection against these attacks. Application layer DDoS attack is DDoS attack that is targeted on wed server, application server or database server. These types of attacks are much more sophisticated and challenging as they get around most conventional network security devices because attack traffic often impersonate normal traffic and cannot be recognized by network layer anomalies. Conventional techniques of single-hosted security systems are becoming gradually less effective in the face of such complicated and synchronized multi-front attacks. In order to protect from such attacks and intrusion, corporation among all network devices is essential. To overcome this issue, a collaborative intrusion detection system (CIDS) is proposed in which multiple network devices share valuable information to identify attacks, as a single device might not be capable to sense any malevolent action on its own. So it helps us to take decision after analyzing the information collected from different sources. This novel attack detection technique helps to detect seemingly benign packets that target the availability of the critical infrastructure, and the proposed solution methodology shall enable the incident response teams to detect and react to DDoS attacks at the earliest stage to ensure that the uptime of the service remain unaffected. Experimental evaluation shows that the proposed collaborative detection approach is much more effective and efficient than the previous approaches.

Keywords: Distributed Denial-of-Service (DDoS), Collaborative Intrusion Detection System (CIDS), Slowloris, OSSIM (Open Source Security Information Management tool), OSSEC HIDS

Procedia PDF Downloads 336
253 Increase of Sensitivity in 3D Suspended Polymeric Microfluidic Platform through Lateral Misalignment

Authors: Ehsan Yazdanpanah Moghadam, Muthukumaran Packirisamy

Abstract:

In the present study, a design of the suspended polymeric microfluidic platform is introduced that is fabricated with three polymeric layers. Changing the microchannel plane to be perpendicular to microcantilever plane, drastically decreases moment of inertia in that direction. In addition, the platform is made of polymer (around five orders of magnitude less compared to silicon). It causes significant increase in the sensitivity of the cantilever deflection. Next, although the dimensions of this platform are constant, by misaligning the embedded microchannels laterally in the suspended microfluidic platform, the sensitivity can be highly increased. The investigation is studied on four fluids including water, seawater, milk, and blood for flow ranges from low rate of 5 to 70 µl/min to obtain the best design with the highest sensitivity. The best design in this study shows the sensitivity increases around 50% for water, seawater, milk, and blood at the flow rate of 70 µl/min by just misaligning the embedded microchannels in the suspended polymeric microfluidic platform.

Keywords: microfluidic, MEMS, biosensor, microresonator

Procedia PDF Downloads 193
252 Four Phase Methodology for Developing Secure Software

Authors: Carlos Gonzalez-Flores, Ernesto Liñan-García

Abstract:

A simple and robust approach for developing secure software. A Four Phase methodology consists in developing the non-secure software in phase one, and for the next three phases, one phase for each of the secure developing types (i.e. self-protected software, secure code transformation, and the secure shield). Our methodology requires first the determination and understanding of the type of security level needed for the software. The methodology proposes the use of several teams to accomplish this task. One Software Engineering Developing Team, a Compiler Team, a Specification and Requirements Testing Team, and for each of the secure software developing types: three teams of Secure Software Developing, three teams of Code Breakers, and three teams of Intrusion Analysis. These teams will interact among each other and make decisions to provide a secure software code protected against a required level of intruder.

Keywords: secure software, four phases methodology, software engineering, code breakers, intrusion analysis

Procedia PDF Downloads 371