Search results for: sulphate attack
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 775

Search results for: sulphate attack

685 Detecting and Thwarting Interest Flooding Attack in Information Centric Network

Authors: Vimala Rani P, Narasimha Malikarjunan, Mercy Shalinie S

Abstract:

Data Networking was brought forth as an instantiation of information-centric networking. The attackers can send a colossal number of spoofs to take hold of the Pending Interest Table (PIT) named an Interest Flooding attack (IFA) since the in- interests are recorded in the PITs of the intermediate routers until they receive corresponding Data Packets are go beyond the time limit. These attacks can be detrimental to network performance. PIT expiration rate or the Interest satisfaction rate, which cannot differentiate the IFA from attacks, is the criterion Traditional IFA detection techniques are concerned with. Threshold values can casually affect Threshold-based traditional methods. This article proposes an accurate IFA detection mechanism based on a Multiple Feature-based Extreme Learning Machine (MF-ELM). Accuracy of the attack detection can be increased by presenting the entropy of Internet names, Interest satisfaction rate and PIT usage as features extracted in the MF-ELM classifier. Furthermore, we deploy a queue-based hostile Interest prefix mitigation mechanism. The inference of this real-time test bed is that the mechanism can help the network to resist IFA with higher accuracy and efficiency.

Keywords: information-centric network, pending interest table, interest flooding attack, MF-ELM classifier, queue-based mitigation strategy

Procedia PDF Downloads 177
684 Thrust Enhancement on a Two Dimensional Elliptic Airfoil in a Forward Flight

Authors: S. M. Dash, K. B. Lua, T. T. Lim

Abstract:

This paper presents results of numerical and experimental studies on a two-dimensional (2D) flapping elliptic airfoil in a forward flight condition at Reynolds number of 5000. The study is motivated from an earlier investigation which shows that the deterioration in thrust performance of a sinusoidal heaving and pitching 2D (NACA0012) airfoil at high flapping frequency can be recovered by changing the effective angle of attack profile to square wave, sawtooth, or cosine wave shape. To better understand why such modifications lead to superior thrust performance, we take a closer look at the transient aerodynamic force behavior of an airfoil when the effective angle of attack profile changes gradually from a generic smooth trapezoidal profile to a sinusoid shape by modifying the base length of the trapezoid. The choice of using a smooth trapezoidal profile is to avoid the infinite acceleration condition encountered in the square wave profile. Our results show that the enhancement in the time-averaged thrust performance at high flapping frequency can be attributed to the delay and reduction in the drag producing valley region in the transient thrust force coefficient when the effective angle of attack profile changes from sinusoidal to trapezoidal.

Keywords: two-dimensional flapping airfoil, thrust performance, effective angle of attack, CFD, experiments

Procedia PDF Downloads 327
683 Tag Impersonation Attack on Ultra-lightweight Radio Frequency Identification Authentication Scheme (ESRAS)

Authors: Reham Al-Zahrani, Noura Aleisa

Abstract:

The proliferation of Radio Frequency Identification (RFID) technology has raised concerns about system security, particularly regarding tag impersonation attacks. Regarding RFID systems, an appropriate authentication protocol must resist active and passive attacks. A tag impersonation occurs when an adversary's tag is used to fool an authenticating reader into believing it is a legitimate tag. This paper analyzed the security of the efficient, secure, and practical ultra-lightweight RFID Authentication Scheme (ESRAS). Then, the paper presents a comprehensive analysis of the Efficient, Secure, and Practical Ultra-Lightweight RFID Authentication Scheme (ESRAS) in the context of radio frequency identification (RFID) systems that employed the Scyther tool to examine the protocol's security against a tag impersonation attack.

Keywords: RFID, impersonation attack, authentication, ultra-lightweight protocols

Procedia PDF Downloads 29
682 Improving Dyeability of Cotton Fabric with Juglans regia L. Natural Dyestuff

Authors: M. Heysem Arslan, Ikilem Gocek, U. Kivanc Sahin

Abstract:

Natural dyestuff, extracted from Juglans Regia L., a kind of walnut, was used to dye 100% cotton gabardine fabric. The main goal of this study was to enhance dyeing process of cotton fabric with Juglans Regia L. dyestuff in terms of color fastness values by designing and developing a mordant application process. Within the context of this study, different mordants such as tannic acid, gallic acid, ascorbic acid, potassium sodium tartrate tetrahydrate, calcium carbonate, iron (II) sulphate heptahydrate, aluminum potassium sulphate dodecahydrate and their combinations were applied in the mordanting processes. Spectrophotometric analysis, color fastness to washing and color fastness to light tests were carried out on the fabric samples. In this study, it was shown that by using the right combination of mordants with a proper application process, it is possible to improve color fastness values of cotton fabric samples dyed with natural dyestuff.

Keywords: extraction, Juglans Regia L., mordanting process, natural dyestuff

Procedia PDF Downloads 275
681 Sulfate Attack on Pastes Made with Different C3A and C4AF Contents and Stored at 5°C

Authors: Konstantinos Sotiriadis, Radosław Mróz

Abstract:

In the present work the internal sulfate attack on pastes made from pure clinker phases was studied. Two binders were produced: (a) a binder with 2% C3A and 18% C4AF content; (b) a binder with 10% C3A and C4AF content each. Gypsum was used as the sulfate bearing compound, while calcium carbonate added to differentiate the binders produced. The phases formed were identified by XRD analysis. The results showed that ettringite was the deterioration phase detected in the case of the low C3A content binder. Carbonation occurred in the specimen without calcium carbonate addition, while portlandite was observed in the one containing calcium carbonate. In the case of the high C3A content binder, traces of thaumasite were detected when calcium carbonate was not incorporated in the binder. A solid solution of thaumasite and ettringite was found when calcium carbonate was added. The amount of C3A had not fully reacted with sulfates, since its corresponding peaks were detected.

Keywords: tricalcium aluminate, calcium aluminate ferrite, sulfate attack, calcium carbonate, low temperature

Procedia PDF Downloads 303
680 Advanced Structural Analysis of Energy Storage Materials

Authors: Disha Gupta

Abstract:

The aim of this research is to conduct X-ray and e-beam characterization techniques on lithium-ion battery materials for the improvement of battery performance. The key characterization techniques employed are the synchrotron X-ray Absorption Spectroscopy (XAS) combined with X-ray diffraction (XRD), scanning electron microscopy (SEM) and transmission electron microscopy (TEM) to obtain a more holistic approach to understanding material properties. This research effort provides additional battery characterization knowledge that promotes the development of new cathodes, anodes, electrolyte and separator materials for batteries, hence, leading to better and more efficient battery performance. Both ex-situ and in-situ synchrotron experiments were performed on LiFePO₄, one of the most common cathode material, from different commercial sources and their structural analysis, were conducted using Athena/Artemis software. This analysis technique was then further extended to study other cathode materials like LiMnxFe(₁₋ₓ)PO₄ and even some sulphate systems like Li₂Mn(SO₄)₂ and Li₂Co0.5Mn₀.₅ (SO₄)₂. XAS data were collected for Fe and P K-edge for LiFePO4, and Fe, Mn and P-K-edge for LiMnxFe(₁₋ₓ)PO₄ to conduct an exhaustive study of the structure. For the sulphate system, Li₂Mn(SO₄)₂, XAS data was collected at both Mn and S K-edge. Finite Difference Method for Near Edge Structure (FDMNES) simulations were also conducted for various iron, manganese and phosphate model compounds and compared with the experimental XANES data to understand mainly the pre-edge structural information of the absorbing atoms. The Fe K-edge XAS results showed a charge compensation occurring on the Fe atom for all the differently synthesized LiFePO₄ materials as well as the LiMnxFe(₁₋ₓ)PO₄ systems. However, the Mn K-edge showed a difference in results as the Mn concentration changed in the materials. For the sulphate-based system Li₂Mn(SO₄)₂, however, no change in the Mn K-edge was observed, even though electrochemical studies showed Mn redox reactions.

Keywords: li-ion batteries, electrochemistry, X-ray absorption spectroscopy, XRD

Procedia PDF Downloads 118
679 Mechanical Strengths of Self-Compacting Mortars Prepared with the Pozzolanic Cement in Aggressive Environments

Authors: M. Saidi, I. Djefour, F. Ait Medjber, A. Melouane, A. Gacem

Abstract:

The objective of this research is to study the physical and mechanical properties and durability of self-compacting mortars prepared by substituting a part of cement up to a percentage of 30% pozzolan according to different Blaine specific surface area (SSB1=7000 cm2/g and SSB=9000 cm2/g)). Order to evaluate durability, mortars were subjected to chemical attacks in various aggressive environments, a solution of a mixture of nitric acid and ammonium nitrate (HNO3 + NH4NO3) and a magnesium sulfate salt solution (MgSO4)) with a concentration of 10%, for a period of one month. This study is complemented by a comparative study of the durability of mortars elaborated with sulphate resistant cement (SRC). The results show that these mortars develop long-term, mechanical and chemical resistance better than mortars based Portland cement with 5% gypsum (CEM 1) and SRC. We found that the mass losses are lowest in mortars elaborated with pozzolanic cement (30% substitution with SSB2) in both of chemical attack solutions (3.28% in the solution acid and 1.16% in the salt solution) and the compressive strength gains of 14.68% and 8.5% respectively in the two media. This is due to the action of pozzolan which fixes portlandite to form hydrated calcium silicate (CSH) from the hydration of tricalcic silicate (C3S).

Keywords: aggressive environments, durability, mechanical strengths, pozzolanic cement, self-compacting mortar

Procedia PDF Downloads 207
678 Detection Method of Federated Learning Backdoor Based on Weighted K-Medoids

Authors: Xun Li, Haojie Wang

Abstract:

Federated learning is a kind of distributed training and centralized training mode, which is of great value in the protection of user privacy. In order to solve the problem that the model is vulnerable to backdoor attacks in federated learning, a backdoor attack detection method based on a weighted k-medoids algorithm is proposed. First of all, this paper collates the update parameters of the client to construct a vector group, then uses the principal components analysis (PCA) algorithm to extract the corresponding feature information from the vector group, and finally uses the improved k-medoids clustering algorithm to identify the normal and backdoor update parameters. In this paper, the backdoor is implanted in the federation learning model through the model replacement attack method in the simulation experiment, and the update parameters from the attacker are effectively detected and removed by the defense method proposed in this paper.

Keywords: federated learning, backdoor attack, PCA, k-medoids, backdoor defense

Procedia PDF Downloads 78
677 Quick Reference: Cyber Attacks Awareness and Prevention Method for Home Users

Authors: Haydar Teymourlouei

Abstract:

It is important to take security measures to protect your computer information, reduce identify theft, and prevent from malicious cyber-attacks. With cyber-attacks on the continuous rise, people need to understand and learn ways to prevent from these attacks. Cyber-attack is an important factor to be considered if one is to be able to protect oneself from malicious attacks. Without proper security measures, most computer technology would hinder home users more than such technologies would help. Knowledge of how cyber-attacks operate and protective steps that can be taken to reduce chances of its occurrence are key to increasing these security measures. The purpose of this paper is to inform home users on the importance of identifying and taking preventive steps to avoid cyberattacks. Throughout this paper, many aspects of cyber-attacks will be discuss: what a cyber-attack is, the affects of cyber-attack for home users, different types of cyber-attacks, methodology to prevent such attacks; home users can take to fortify security of their computer.

Keywords: cyber-attacks, home user, prevention, security, technology

Procedia PDF Downloads 363
676 Pharmaceutical Equivalence of Some Injectable Gentamicin Generics Used in Veterinary Practice in Nigeria

Authors: F. A. Gberindyer, M. O.Abatan, A. B. Saba

Abstract:

Background: Gentamicin is an aminoglycoside antibiotic used in the treatment of infections caused by Gram-negative aerobic bacteria organisms in human and animals. In Nigeria, there are arrays of multisource generic versions of injectable gentamicin sulphate in the drug markets. There is a high prevalence of counterfeit and substandard drugs in the third world countries with consequent effect on their therapeutic efficacy and safety. Aim: The aim of this study was to investigate pharmaceutical equivalence of some of these generics used in veterinary practice in Nigeria. Methodology: About 20 generics of injectable gentamicin sulphate were sampled randomly across Nigeria but 15 were analyzed for identity and potency. Identity test was done using Fourier transform infra red spectroscopy and the spectral for each product compared with that of the USP reference standard for similarity. Microbiological assay using agar diffusion method with E. coli as a test organism on nutrient agar was employed and the respective diameters of bacterial inhibition zones obtained after 24 hour incubation at 37°C. The percent potency for each product was thereafter calculated and compared with the official specification. Result And Discussion: None of the generics is produced in any African country. About 75 % of the products are imported from China whereas 60 % of the veterinary generics are manufactured in Holland. Absorption spectra for the reference and test samples were similar. Percent potencies of all test products were within the official specification of 95-115 %. Nigeria relies solely on imported injectable gentamicin sulphate products. All sampled generic versions passed both identity and potency tests. Clinicians should ensure that drugs are used rationally since the converse could be contributing to the therapeutic failures reported for most of these generics. Bioequivalence study is recommended to ascertain their interchangeability when parenteral extra venous routes are indicated.

Keywords: generics, gentamicin, identity, multisource, potency

Procedia PDF Downloads 401
675 Fabrication of Biosensor Based on Layered Double Hydroxide/Polypyrrole/Carbon Paste Electrode for Determination of Anti-Hypertensive and Prostatic Hyperplasia Drug Terazosin

Authors: Amira M. Hassanein, Nehal A. Salahuddin, Atsunori Matsuda, Toshiaki Hattori, Mona N. Elfiky

Abstract:

New insights into the design of highly sensitive, carbon-based electrochemical sensors are presented in this work. This was achieved by exploring the interesting properties of conductive (Mg/Al) layered double hydroxide- Dodecyl Sulphate/Polypyrrole nanocomposites which were synthesized by in-situ polymerization of pyrrole during the assembly of (Mg/Al) layered double hydroxide, and by employing the anionic surfactant Dodecyl sulphate as a modifier. The morphology and surface area of the nanocomposites changed with the percentage of Pyrrole. Under optimal conditions, the modified carbon paste electrode successfully achieved detection limits of 0.057 and 0.134 nmol.L-1 of Terazosin hydrochloride in pharmaceutical formulation and spiked human serum fluid, respectively. Moreover, the sensors are highly stable, reusable, and free from interference by other commonly present excipients in drug formulations.

Keywords: layered double hydroxide, polypyrrole, terazosin hydrochloride, square-wave adsorptive anodic stripping voltammetry

Procedia PDF Downloads 191
674 The Effects of Lipid Emulsion, Magnesium Sulphate and Metoprolol in Amitryptiline-Induced Cardiovascular Toxicity in Rats

Authors: Saylav Ejder Bora, Arife Erdogan, Mumin Alper Erdogan, Oytun Erbas, Ismet Parlak

Abstract:

Objective: The aim of this study was to evaluate histological, electrical and biochemical effects of metoprolol, lipid emulsion and magnesium sulphate as an alternative method to be used in preventing long QT emergence, that is among the lethal consequences of amitryptiline toxicity. Methods: Thirty Sprague- Dawley male rats were included. Rats were randomly separated into 5 groups. First group was administered saline only while the rest had received amitryptiline 100 mg/kg + saline, 5 mg/kg metoprolol, 20 ml/kg lipid emulsion and 75 mg/kg magnesium sulphate (MgSO4) intraperitoneally. ECG at DI lead, biochemical tests following euthanasia were performed in all groups after 1 hour of administration. Cardiac tissues were removed, sections were prepared and examined. Results: QTc values were significantly shorter in the rest when compared to amitryptiline+ saline group. While lipid emulsion did not affect proBNP and troponin values biochemically as compared to that of the control group, histologically, it was with reduced caspase 3 expression. Though statistically insignificant in the context of biochemical changes, pro-BNP and urea levels were lower in the metoprolol group when compared to controls. Similarly, metoprolol had no statistically significant effect on histological caspase 3 expression in the group that was treated with amitryptiline+metoprolol. On the other hand, there was a statistically significant decrease in Troponin, pro-BNP and urea levels as well as significant decline in histological caspase 3 expression within the MgSO4 group when compared to controls. Conclusion: As still a frequent cause of mortality in emergency units, administration of MgSO4, lipid emulsion and metoprolol might be beneficial in alternative treatment of cardiovascular toxicity caused by tricyclic antidepressant overdose, whether intake would be intentional or accidental.

Keywords: amitryptiline, cardiovascular toxicity, long QT, Rat Model

Procedia PDF Downloads 150
673 Dietary Gluten and the Balance of Gut Microbiota in the Dextran Sulphate Sodium Induced Colitis Model

Authors: Austin Belfiori, Kevin Rinek, Zach Barcroft, Jennifer Berglind

Abstract:

Diet influences the composition of the gut microbiota and host's health. Disruption of the balance among the microbiota, epithelial cells, and resident immune cells in the intestine is involved in the pathogenesis of inflammatory bowel disease (IBD). To study the role of gut microbiota in intestinal inflammation, the microbiome of control mice (C57BL6) given a gluten-containing standard diet versus C57BL6 mice given the gluten-free (GF) feed (n=10 in each group) was examined. All mice received the 3% DSS for 5 days. Throughout the study, feces were collected and processed for DNA extraction and MiSeq Illumina sequencing of V4 region of bacterial 16S rRNA gene. Alpha and beta diversities and compositional differences at phylum and genus levels were determined in intestinal microbiota. The mice receiving the GF diet showed a significantly increased abundance of Firmicutes and a decrease of Bacteroides and Lactobacillus at phylum level. Therefore, the gluten free diet led to reductions in beneficial gut bacteria populations. These findings indicate a role of wheat gluten in dysbiosis of the intestinal microbiota.

Keywords: gluten, colitis, microbiota, DSS, dextran sulphate sodium

Procedia PDF Downloads 179
672 Eco-Friendly Natural Dyes from Butea monosperma and Their Application on Cotton Fabric

Authors: Archna Mall, Neelam Agrawal, Hari O. Saxena, Bhavana Sharma

Abstract:

Butea monosperma occurs widely throughout central Indian states. Eco-friendly natural dyes were isolated in aqueous medium from leaves, bark and flowers of this plant. These dyes were used for dyeing on cotton fabric using various chemical (potassium aluminium sulphate, potassium dichromate, ferrous sulphate, stannous chloride & tannic acid) and natural mordants (rinds of Terminallia bellerica & Terminalia chebula fruits and shells of Prunus dulcis & Juglans regia nuts). Dyeing was carried out using the pre-mordanting technique. Large range of beautiful shades in terms of hue and darkness were recorded because of varying mordant concentrations and combinations. More importantly dyed fabrics registered varying the degree of colour fastness properties to washing (1-3, colour change and 4-5, colour staining), light (2-4), rubbing (4-5, dry and 3-5, wet) and perspiration (1-4, colour change and 4-5, colour staining). Thus, along with flowers which are traditionally known for natural dyes, the leaves and bark may also find their place in textile industries.

Keywords: Butea monosperma, cotton, mordants, natural dyes

Procedia PDF Downloads 312
671 Minimization of Denial of Services Attacks in Vehicular Adhoc Networking by Applying Different Constraints

Authors: Amjad Khan

Abstract:

The security of Vehicular ad hoc networking is of great importance as it involves serious life threats. Thus to provide secure communication amongst Vehicles on road, the conventional security system is not enough. It is necessary to prevent the network resources from wastage and give them protection against malicious nodes so that to ensure the data bandwidth availability to the legitimate nodes of the network. This work is related to provide a non conventional security system by introducing some constraints to minimize the DoS (Denial of services) especially data and bandwidth. The data packets received by a node in the network will pass through a number of tests and if any of the test fails, the node will drop those data packets and will not forward it anymore. Also if a node claims to be the nearest node for forwarding emergency messages then the sender can effectively identify the true or false status of the claim by using these constraints. Consequently the DoS(Denial of Services) attack is minimized by the instant availability of data without wasting the network resources.

Keywords: black hole attack, grey hole attack, intransient traffic tempering, networking

Procedia PDF Downloads 258
670 Compatibility of Sulphate Resisting Cement with Super and Hyper-Plasticizer

Authors: Alper Cumhur, Hasan Baylavlı, Eren Gödek

Abstract:

Use of superplasticity chemical admixtures in concrete production is widespread all over the world and has become almost inevitable. Super-plasticizers (SPA), extend the setting time of concrete by adsorbing onto cement particles and provide concrete to preserve its fresh state workability properties. Hyper-plasticizers (HPA), as a special type of superplasticizer, provide the production of qualified concretes by increasing the workability properties of concrete, effectively. However, compatibility of cement with super and hyper-plasticizers is quite important for achieving efficient workability in order to produce qualified concretes. In 2011, the EN 197-1 standard is edited and cement classifications were updated. In this study, the compatibility of hyper-plasticizer and CEM I SR0 type sulphate resisting cement (SRC) that firstly classified in EN 197-1 is investigated. Within the scope of the experimental studies, a reference cement mortar was designed with a water/cement ratio of 0.50 confirming to EN 196-1. Fresh unit density of mortar was measured and spread diameters (at 0, 60, 120 min after mix preparation) and setting time of reference mortar were determined with flow table and Vicat tests, respectively. Three mortars are being re-prepared with using both super and hyper-plasticizer confirming to ASTM C494 by 0.50, 0.75 and 1.00% of cement weight. Fresh unit densities, spread diameters and setting times of super and hyper plasticizer added mortars (SPM, HPM) will be determined. Theoretical air-entrainment values of both SPMs and HPMs will be calculated by taking the differences between the densities of plasticizer added mortars and reference mortar. The flow table and Vicat tests are going to be repeated to these mortars and results will be compared. In conclusion, compatibility of SRC with SPA and HPA will be investigated. It is expected that optimum dosages of SPA and HPA will be determined for providing the required workability and setting conditions of SRC mortars, and the advantages/disadvantages of both SPA and HPA will be discussed.

Keywords: CEM I SR0, hyper-plasticizer, setting time, sulphate resisting cement, super-plasticizer, workability

Procedia PDF Downloads 181
669 Politicizing Literature: Henry Fielding’s the Authors Farce and George II’s Policies of Nonsense and Ignorance

Authors: Samia Al-Shayban

Abstract:

Conventionally, Fielding Author’s Farce is read as an attack on literary and theatrical establishment. This paper attempt to read it as a disguised scathing political attack upon, King George II, his court and administration. Fielding achieves his design through complex dramatization based on implicit connections between King George II and the poor poet Luckless who shifts his stand from defending the liberties of the authors into becoming one of their oppressors. Through the same connection, the king is accused of being the originator and protector of literary corruption. To strengthen the attack against the king, the court of nonsense which appeared in Luckless’ play is connected to George II’s court through the presence of opera and ignorance. Thus, Fielding’s literary dramatization is used as a medium to expose the corrupting influence of the ruling elite. The King, his court and administration are all complacent in devaluing the English theatre and turning it into a circus that generate nothing but ignorance and poverty. This practice is deliberately designed to keep people ignorant and authors poor so they remain unable to challenge their corrupt politics.

Keywords: fielding, King George II, ignorance, theatre, plays

Procedia PDF Downloads 544
668 Secure Network Coding against Content Pollution Attacks in Named Data Network

Authors: Tao Feng, Xiaomei Ma, Xian Guo, Jing Wang

Abstract:

Named Data Network (NDN) is one of the future Internet architecture, all nodes (i.e., hosts, routers) are allowed to have a local cache, used to satisfy incoming requests for content. However, depending on caching allows an adversary to perform attacks that are very effective and relatively easy to implement, such as content pollution attack. In this paper, we use a method of secure network coding based on homomorphic signature system to solve this problem. Firstly ,we use a dynamic public key technique, our scheme for each generation authentication without updating the initial secret key used. Secondly, employing the homomorphism of hash function, intermediate node and destination node verify the signature of the received message. In addition, when the network topology of NDN is simple and fixed, the code coefficients in our scheme are generated in a pseudorandom number generator in each node, so the distribution of the coefficients is also avoided. In short, our scheme not only can efficiently prevent against Intra/Inter-GPAs, but also can against the content poisoning attack in NDN.

Keywords: named data networking, content polloution attack, network coding signature, internet architecture

Procedia PDF Downloads 302
667 Synthesis of Nano Iron Copper Core-Shell by Using K-M Reactor

Authors: Mohamed Ahmed AbdelKawy, A. H. El-Shazly

Abstract:

In this study, Nano iron-copper core-shell was synthesized by using Kinetic energy micro reactor ( K-M reactor). The reaction between nano-pure iron with copper sulphate pentahydrate (CuSO4.5H2O) beside NaCMC as a stabilizer at K-M reactor gives many advantages in comparison with the traditional chemical method for production of nano iron-Copper core-shell in batch reactor. Many factors were investigated for its effect on the process performance such as initial concentrations of nano iron and copper sulphate pentahydrate solution. Different techniques were used for investigation and characterization of the produced nano iron particles such as SEM, XRD, UV-Vis, XPS, TEM and PSD. The produced Nano iron-copper core-shell particle using micro mixer showed better characteristics than those produced using batch reactor in different aspects such as homogeneity of the produced particles, particle size distribution and size, as core diameter 10nm particle size were obtained. The results showed that 10 nm core diameter were obtained using Micro mixer as compared to 80 nm core diameter in one-fourth the time required by using traditional batch reactor and high thickness of copper shell and good stability.

Keywords: nano iron, core-shell, reduction reaction, K-M reactor

Procedia PDF Downloads 276
666 Influence of Pulverized Granite on the Mechanical and Durability Properties of Concrete

Authors: Kwabena A. Boakye, Eugene Atiemo, Trinity A. Tagbor, Delali Adjei

Abstract:

The use of mineral admixtures such as metakaolin, GGBS, fly ash, etc., in concrete is a common practice in the world. However, the only admixture available for use in the Ghanaian construction industry is calcined clay pozzolan. This research, therefore, studies the alternate use of granite dust, a by-product from stone quarrying, as a mineral admixture in concrete. Granite dust, which is usually damped as waste or as an erosion control material, was collected and pulverized to about 75µm. Some physical, chemical, and mineralogical tests were conducted on the granite dust. 5%-25% ordinary Portland cement of Class 42.5N was replaced with granite dust which was used as the main binder in the preparation of 150mm×150mm×150mm concrete cubes according to methods prescribed by BS EN 12390-2:2000. Properties such as workability, compressive strength, flexural strength, water absorption, and durability were determined. Compressive and flexural strength results indicate that granite dust could be used to replace ordinary Portland cement up to an optimum of 15% to achieve C25. Water permeability increased as the granite dust admixture content increased from 5% - 25%. Durability studies after 90 days proved that even though strength decreased as granite dust content increased, the concrete containing granite dust had better resistance to sulphate attack comparable to the reference cement. Pulverized granite can be used to partially replace ordinary Portland cement in concrete.

Keywords: admixture, granite dust, permeability, pozzolans

Procedia PDF Downloads 126
665 DOS and DDOS Attacks

Authors: Amin Hamrahi, Niloofar Moghaddam

Abstract:

Denial of Service is for denial-of-service attack, a type of attack on a network that is designed to bring the network to its knees by flooding it with useless traffic. Denial of Service (DoS) attacks have become a major threat to current computer networks. Many recent DoS attacks were launched via a large number of distributed attacking hosts in the Internet. These attacks are called distributed denial of service (DDoS) attacks. To have a better understanding on DoS attacks, this article provides an overview on existing DoS and DDoS attacks and major defense technologies in the Internet.

Keywords: denial of service, distributed denial of service, traffic, flooding

Procedia PDF Downloads 362
664 Effect of Adverse Pressure Gradient on a Fluctuating Velocity over the Co-Flow Jet Airfoil

Authors: Morteza Mirhosseini, Amir B. Khoshnevis

Abstract:

The boundary layer separation and new active flow control of a NACA 0025 airfoil were studied experimentally. This new flow control is sometimes known as a co-flow jet (cfj) airfoil. This paper presents the fluctuating velocity in a wall jet over the co-flow jet airfoil subjected to an adverse pressure gradient and a curved surface. In these results, the fluctuating velocity at the inner part increasing by increased the angle of attack up to 12o and this has due to the jet energized, while the angle of attack 20o has different. The airfoil cord based Reynolds number has 105.

Keywords: adverse pressure gradient, fluctuating velocity, wall jet, co-flow jet airfoil

Procedia PDF Downloads 459
663 Physico-Chemical and Phytoplankton Analyses of Kazaure Dam, Jigawa State, Nigeria

Authors: Aminu Musa Muhammad, Muhammad Kabiru Abubakar

Abstract:

Monthly changes in Phytoplankton periodicity, nutrient levels, temperature, pH, suspended solids, dissolved solids, conductivity, dissolved oxygen and biochemical oxygen demand of Kazaure Dam, Jigawa State, Nigeria were studied for a period of six months (July-Dec.-2011). Physico-chemical result showed that temperature and pH ranged between17-25˚C and 5.5-7.5, while dissolved solids and suspended solids ranged between 95-155 mg/L and 0.13-112 mg/L respectively. Dissolved oxygen (DO), Biochemical oxygen demand (BOD), Chemical oxygen demand (COD), conductivity, nitrate, phosphate and sulphate ion concentrations were within the ranges of 3.5-3.6 mg/L, 4.8-7.2 mg/L, 8.10-12.30 mg/L, 21-58µΩ/cm, 0.2-8.1 mg/L, 2.4-18.1 mg/L, and 1.22-15.60 mg/L respectively. A total of 4514 Org/L phytoplankton were recorded, of which four classes of algae were identified. These comprised of Chlorophyta (44.1%), Cyanophyta(30.62%), Bacillariophyta(3.2%), Euglenophyta (32.1%). Descriptive statistics of the result showed that phytoplankton count varied with variation of physico-chemical parameters at 5% level during the study period. The abundance and distribution of the algae varied with the variation in the physico-chemical parameters. Pearson correlation showed that temperature and nutrients were significantly correlated with phytoplankton, while DO, sulphate and pH were insignificantly correlated, while there was no significant correlation with COD and phytoplankton.

Keywords: correlation, phytoplankton, physico chemical, kazaure dam

Procedia PDF Downloads 518
662 An Efficient Clustering Technique for Copy-Paste Attack Detection

Authors: N. Chaitawittanun, M. Munlin

Abstract:

Due to rapid advancement of powerful image processing software, digital images are easy to manipulate and modify by ordinary people. Lots of digital images are edited for a specific purpose and more difficult to distinguish form their original ones. We propose a clustering method to detect a copy-move image forgery of JPEG, BMP, TIFF, and PNG. The process starts with reducing the color of the photos. Then, we use the clustering technique to divide information of measuring data by Hausdorff Distance. The result shows that the purposed methods is capable of inspecting the image file and correctly identify the forgery.

Keywords: image detection, forgery image, copy-paste, attack detection

Procedia PDF Downloads 306
661 Efficient Signcryption Scheme with Provable Security for Smart Card

Authors: Jayaprakash Kar, Daniyal M. Alghazzawi

Abstract:

The article proposes a novel construction of signcryption scheme with provable security which is most suited to implement on smart card. It is secure in random oracle model and the security relies on Decisional Bilinear Diffie-Hellmann Problem. The proposed scheme is secure against adaptive chosen ciphertext attack (indistiguishbility) and adaptive chosen message attack (unforgebility). Also, it is inspired by zero-knowledge proof. The two most important security goals for smart card are Confidentiality and authenticity. These functions are performed in one logical step in low computational cost.

Keywords: random oracle, provable security, unforgebility, smart card

Procedia PDF Downloads 567
660 Measurement of Susceptibility Users Using Email Phishing Attack

Authors: Cindy Sahera, Sarwono Sutikno

Abstract:

Rapid technological developments also have negative impacts, namely the increasing criminal cases based on technology or cybercrime. One technique that can be used to conduct cybercrime attacks are phishing email. The issue is whether the user is aware that email can be misused by others so that it can harm the user's own? This research was conducted to measure the susceptibility of selected targets against email abuse. The objectives of this research are measurement of targets’ susceptibility and find vulnerability in email recipient. There are three steps being taken in this research, (1) the information gathering phase, (2) the design phase, and (3) the execution phase. The first step includes the collection of the information necessary to carry out an attack on a target. The next step is to make the design of an attack against a target. The last step is to send phishing emails to the target. The levels of susceptibility are three: level 1, level 2 and level 3. Level 1 indicates a low level of targets’ susceptibility, level 2 indicates the intermediate level of targets’ susceptibility, and level 3 indicates a high level of targets’ susceptibility. The results showed that users who are on level 1 and level 2 more that level 3, which means the user is not too careless. However, it does not mean the user to be safe. There are still vulnerabilities that may occur, such as automatic location detection when opening emails and automatic downloaded malware as user clicks a link in the email.

Keywords: cybercrime, email phishing, susceptibility, vulnerability

Procedia PDF Downloads 251
659 Sono- and Photocatalytic Degradation of Indigocarmine in Water Using ZnO

Authors: V. Veena, Suguna Yesodharan, E. P. Yesodharan

Abstract:

Two Advanced Oxidation Processes (AOP) i.e., sono- and photo-catalysis mediated by semiconductor oxide catalyst, ZnO has been found effective for the removal of trace amounts of the toxic dye pollutant Indigocarmine (IC) from water. The effect of various reaction parameters such as concentration of the dye, catalyst dosage, temperature, pH, dissolved oxygen etc. as well as the addition of oxidisers and presence of salts in water on the rate of degradation has been evaluated and optimised. The degradation follows variable kinetics depending on the concentration of the substrate, the order of reaction varying from 1 to 0 with increase in concentration. The reaction proceeds through a number of intermediates and many of them have been identified using GCMS technique. The intermediates do not affect the rate of degradation significantly. The influence of anions such as chloride, sulphate, fluoride, carbonate, bicarbonate, phosphate etc. on the degradation of IC is not consistent and does not follow any predictable pattern. Phosphates and fluorides inhibit the degradation while chloride, sulphate, carbonate and bicarbonate enhance. Adsorption studies of the dye in the absence as well as presence of these anions show that there may not be any direct correlation between the adsorption of the dye on the catalyst and the degradation. Oxidants such as hydrogen peroxide and persulphate enhance the degradation though the combined effect and it is less than the cumulative effect of individual components. COD measurements show that the degradation proceeds to complete mineralisation. The results will be presented and probable mechanism for the degradation will be discussed.

Keywords: AOP, COD, indigocarmine, photocatalysis, sonocatalysis

Procedia PDF Downloads 300
658 The Impact of Undisturbed Flow Speed on the Correlation of Aerodynamic Coefficients as a Function of the Angle of Attack for the Gyroplane Body

Authors: Zbigniew Czyz, Krzysztof Skiba, Miroslaw Wendeker

Abstract:

This paper discusses the results of aerodynamic investigation of the Tajfun gyroplane body designed by a Polish company, Aviation Artur Trendak. This gyroplane has been studied as a 1:8 scale model. Scaling objects for aerodynamic investigation is an inherent procedure in any kind of designing. If scaling, the criteria of similarity need to be satisfied. The basic criteria of similarity are geometric, kinematic and dynamic. Despite the results of aerodynamic research are often reduced to aerodynamic coefficients, one should pay attention to how values of coefficients behave if certain criteria are to be satisfied. To satisfy the dynamic criterion, for example, the Reynolds number should be focused on. This is the correlation of inertial to viscous forces. With the multiplied flow speed by the specific dimension as a numerator (with a constant kinematic viscosity coefficient), flow speed in a wind tunnel research should be increased as many times as an object is decreased. The aerodynamic coefficients specified in this research depend on the real forces that act on an object, its specific dimension, medium speed and variations in its density. Rapid prototyping with a 3D printer was applied to create the research object. The research was performed with a T-1 low-speed wind tunnel (its diameter of the measurement volume is 1.5 m) and a six-element aerodynamic internal scales, WDP1, at the Institute of Aviation in Warsaw. This T-1 wind tunnel is low-speed continuous operation with open space measurement. The research covered a number of the selected speeds of undisturbed flow, i.e. V = 20, 30 and 40 m/s, corresponding to the Reynolds numbers (as referred to 1 m) Re = 1.31∙106, 1.96∙106, 2.62∙106 for the angles of attack ranging -15° ≤ α ≤ 20°. Our research resulted in basic aerodynamic characteristics and observing the impact of undisturbed flow speed on the correlation of aerodynamic coefficients as a function of the angle of attack of the gyroplane body. If the speed of undisturbed flow in the wind tunnel changes, the aerodynamic coefficients are significantly impacted. At speed from 20 m/s to 30 m/s, drag coefficient, Cx, changes by 2.4% up to 9.9%, whereas lift coefficient, Cz, changes by -25.5% up to 15.7% if the angle of attack of 0° excluded or by -25.5% up to 236.9% if the angle of attack of 0° included. Within the same speed range, the coefficient of a pitching moment, Cmy, changes by -21.1% up to 7.3% if the angles of attack -15° and -10° excluded or by -142.8% up to 618.4% if the angle of attack -15° and -10° included. These discrepancies in the coefficients of aerodynamic forces definitely need to consider while designing the aircraft. For example, if load of certain aircraft surfaces is calculated, additional correction factors definitely need to be applied. This study allows us to estimate the discrepancies in the aerodynamic forces while scaling the aircraft. This work has been financed by the Polish Ministry of Science and Higher Education.

Keywords: aerodynamics, criteria of similarity, gyroplane, research tunnel

Procedia PDF Downloads 366
657 Intelligent Prediction System for Diagnosis of Heart Attack

Authors: Oluwaponmile David Alao

Abstract:

Due to an increase in the death rate as a result of heart attack. There is need to develop a system that can be useful in the diagnosis of the disease at the medical centre. This system will help in preventing misdiagnosis that may occur from the medical practitioner or the physicians. In this research work, heart disease dataset obtained from UCI repository has been used to develop an intelligent prediction diagnosis system. The system is modeled on a feedforwad neural network and trained with back propagation neural network. A recognition rate of 86% is obtained from the testing of the network.

Keywords: heart disease, artificial neural network, diagnosis, prediction system

Procedia PDF Downloads 421
656 An Entropy Based Novel Algorithm for Internal Attack Detection in Wireless Sensor Network

Authors: Muhammad R. Ahmed, Mohammed Aseeri

Abstract:

Wireless Sensor Network (WSN) consists of low-cost and multi functional resources constrain nodes that communicate at short distances through wireless links. It is open media and underpinned by an application driven technology for information gathering and processing. It can be used for many different applications range from military implementation in the battlefield, environmental monitoring, health sector as well as emergency response of surveillance. With its nature and application scenario, security of WSN had drawn a great attention. It is known to be valuable to variety of attacks for the construction of nodes and distributed network infrastructure. In order to ensure its functionality especially in malicious environments, security mechanisms are essential. Malicious or internal attacker has gained prominence and poses the most challenging attacks to WSN. Many works have been done to secure WSN from internal attacks but most of it relay on either training data set or predefined threshold. Without a fixed security infrastructure a WSN needs to find the internal attacks is a challenge. In this paper we present an internal attack detection method based on maximum entropy model. The final experimental works showed that the proposed algorithm does work well at the designed level.

Keywords: internal attack, wireless sensor network, network security, entropy

Procedia PDF Downloads 429