Search results for: sulphuric acid attack
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 3819

Search results for: sulphuric acid attack

3699 Characteristic Composition and Sensory Contributions of Acidic Aroma in Mainstream Cigarette Smoke of Cherry-Red Tobacco

Authors: Tian Yangyang, Xu Zihe, Lu Junping, Yang Jizhou, Xu Yiqun, Wang Jiansong, Chen Chao, Yang Mengmeng, Guo Jianhua, Mu Wenjun, Wang Guiyao, Xue Chaoqun, Liang Taibo, Hu Liwei

Abstract:

Cherry-red tobacco is receiving constant attention from cigarette enterprises because of its special flavor. This study aims to explore the material basis for the formation of the characteristic flavor of cherry-red tobacco and to clarify the distribution characteristics of the acidic aroma component groups in its mainstream smoke. In order to reach the aims of current study, this study employs GC/MS to examine the differences of distribution characteristics in particulate matter of mainstream cigarette smoke between cherry-red and common tobacco, meanwhile the aroma activity values (OVA) was used to compare the contribution of acidic aroma of cherry-red tobacco. The results showed that: 1) Isovaleric acid, acetic acid and butyric acid were the key acidic components in the mainstream smoke of the samples, followed by 3-methylvaleric acid, 4-methylvaleric acid and n-valeric acid. 2)Analysis of the release of these key sour fragrance components showed that the acidic aroma of "YUN 85" mainstream smoke was stronger than the leaf group, cherry-red tobacco was the weakest. In addition, aging had the effect of reducing the acidic components of cherry-red tobacco and the addition of cherry-red tobacco had little effect on the acidic components of the original leaf group. 3) For 14 acidic aroma(OAV>1) in smoke of cherry-red tobacco, 3-methylpentanoic acid, 4-methylpentanoic acid, pentanoic acid, and isovaleric acid were very prominent in contributing to acidic aroma, while pyruvic acid, 2-methylbutyric acid, hydrogenated acid, and propionic acid were less contribution.

Keywords: cherry-red tobacco, acidic aroma, GC/MS, mainstream cigarette smoke, odor activity value

Procedia PDF Downloads 92
3698 Characterization of Fatty Acid Glucose Esters as Os9BGlu31 Transglucosidase Substrates in Rice

Authors: Juthamath Komvongsa, Bancha Mahong, Kannika Phasai, Sukanya Luang, Jong-Seong Jeon, James Ketudat-Cairns

Abstract:

Os9BGlu31 is a rice transglucosidase that transfers glucosyl moieties to various acceptors such as carboxylic acids and alcohols, including phenolic acids and flavonoids, in vitro. The role of Os9BGlu31 transglucosidase in rice plant metabolism has not been reported to date. Methanolic extracts of rice bran and flag leaves were found to contain substrates to which Os9BGlu31 could transfer glucose from 4-nitrophenyl β -D-glucopyranoside donor. The semi-purified substrate from rice bran was found to contain oleic acid and linoleic acid and the pure fatty acids were found to act as acceptor substrates for Os9BGlu31 transglucosidase to form 1-O-acyl glucose esters. Os9BGlu31 showed higher activity with oleic acid (18:1) and linoleic acid (18:2) than stearic acid (18:0), and had both higher kcat and higher Km for linoleic than oleic acid in the presence of 8 mM 4NPGlc donor. This transglucosidase reaction is reversible, Os9bglu31 knockout rice lines of flag leaves were found to have higher amounts of fatty acid glucose esters than wild type control lines, these data conclude that fatty acid glucose esters act as glucosyl donor substrates for Os9BGlu31 transglucosidase in rice.

Keywords: fatty acid, fatty acid glucose ester, transglucosidase, rice flag leaf, homologous knockout lines, tandam mass spectrometry

Procedia PDF Downloads 329
3697 Optimization of Batch to Up-Scaling of Soy-Based Prepolymer Polyurethane

Authors: Flora Elvistia Firdaus

Abstract:

The chemical structure of soybean oils have to be chemically modified through its tryglyceride to attain resemblance properties with petrochemicals. Sulfur acid catalyst in peracetic acid co-reagent has good performance on modified soybean oil strucutures through its unsaturated fatty acid moiety to the desired hydroxyl functional groups. A series of screening reactions have indicated that the ratio of acetic/peroxide acid 1:7.25 (mol/mol) with temperature of 600°C for soy-epoxide synthesis are prevailed for up-scaling of bodied soybean into 10 and 20 folds from initials. A two-step process was conducted for the preparation of soy-polyol in designated temperatures.

Keywords: soybean, polyol, up-scaling, polyurethane

Procedia PDF Downloads 328
3696 Public Wi-Fi Security Threat Evil Twin Attack Detection Based on Signal Variant and Hop Count

Authors: Said Abdul Ahad Ahadi, Elyas Baray, Nitin Rakesh, Sudeep Varshney

Abstract:

Wi-Fi is a widely used internet source that is used to provide internet access in many areas such as Stores, Cafes, University campuses, Restaurants and so on. This technology brought more facilities in communication and networking. On the other hand, due to the transmission of data over the air, which makes the network vulnerable, so it becomes prone to various threats such as Evil Twin and etc. The Evil Twin is a kind of adversary which impersonates a legitimate access point (LAP) as it can happen by spoofing the name (SSID) and MAC address (BSSID) of a legitimate access point (LAP). And this attack can cause many threats such as MITM, Service Interruption, Access point service blocking. Various Evil Twin Attack Detection Techniques are proposed, but they require additional hardware, or they require protocol modification. In this paper, we proposed a new technique based on Access Point’s two fingerprints, Received Signal Strength Indicator (RSSI) and Hop Count, that is hard to copy by an adversary. And we implemented the technique in a system called “ETDetector,” which can detect and prevent the attack.

Keywords: evil twin, LAP, SSID, Wi-Fi security, signal variation, ETAD, kali linux, scapy, python

Procedia PDF Downloads 119
3695 Finding the Reaction Constant between Humic Acid and Aluminum Ion by Fluorescence Quenching Effect

Authors: Wen Po Cheng, Chen Zhao Feng, Ruey Fang Yu, Lin Jia Jun, Lin Ji Ye, Chen Yuan Wei

Abstract:

Humic acid was used as the removal target for evaluating the coagulation efficiency in this study. When the coagulant ions mix with a humic acid solution, a Fluorescence quenching effect may be observed conditionally. This effect can be described by Stern-Volmer linear equation which can be used for quantifying the quenching value (Kq) of the Fluorescence quenching effect. In addition, a Complex-Formation Titration (CFT) theory was conducted and the result was used to explain the electron-neutralization capability of the coagulant (AlCl₃) at different pH. The results indicated that when pH of the ACl₃ solution was between 6 and 8, fluorescence quenching effect obviously occurred. The maximum Kq value was found to be 102,524 at pH 6. It means that the higher the Kq value is, the better complex reaction between a humic acid and aluminum salts will be. Through the Kq value study, the optimum pH can be quantified when the humic acid solution is coagulated with aluminum ions.

Keywords: humic acid, fluorescence quenching effect, complex reaction, titration

Procedia PDF Downloads 540
3694 Deep Learning and Accurate Performance Measure Processes for Cyber Attack Detection among Web Logs

Authors: Noureddine Mohtaram, Jeremy Patrix, Jerome Verny

Abstract:

As an enormous number of online services have been developed into web applications, security problems based on web applications are becoming more serious now. Most intrusion detection systems rely on each request to find the cyber-attack rather than on user behavior, and these systems can only protect web applications against known vulnerabilities rather than certain zero-day attacks. In order to detect new attacks, we analyze the HTTP protocols of web servers to divide them into two categories: normal attacks and malicious attacks. On the other hand, the quality of the results obtained by deep learning (DL) in various areas of big data has given an important motivation to apply it to cybersecurity. Deep learning for attack detection in cybersecurity has the potential to be a robust tool from small transformations to new attacks due to its capability to extract more high-level features. This research aims to take a new approach, deep learning to cybersecurity, to classify these two categories to eliminate attacks and protect web servers of the defense sector which encounters different web traffic compared to other sectors (such as e-commerce, web app, etc.). The result shows that by using a machine learning method, a higher accuracy rate, and a lower false alarm detection rate can be achieved.

Keywords: anomaly detection, HTTP protocol, logs, cyber attack, deep learning

Procedia PDF Downloads 177
3693 Corrosion of Steel in Relation with Hydrogen Activity of Concentrated HClO4 Media: Realisation Sensor and Reference Electrode

Authors: B. Hammouti, H. Oudda, A. Benabdellah, A. Benayada, A. Aouniti

Abstract:

Corrosion behaviour of carbon steel was studied in various concentrated HClO4 solutions. To explain the acid attack in relation of H+ activity, new sensor was realised: two carbon paste electrodes (CPE) were constructed by incorporating ferrocene (Fc) and orthoquinone into the carbon paste matrix and crossed by weak current to stabilize potential difference. The potentiometric method at imposed weak current between these two electrodes permits the in situ determination of both concentration and acidity level of various concentrated HClO4 solutions. The different factors affecting the potential at imposed current as current intensity, temperature and H+ ion concentration are studied. The potentials measured between ferrocene and chloranil electrodes are directly linked to the acid concentration. The acidity Ri(H) function defined represents the determination of the H+ activity and constitutes the extend of pH is concentrated acid solutions. Ri(H) has been determined and compared to Strehlow Ro(H), Janata HGF and Hammett Ho functions. The collected data permit to give a scale of strength of mineral concentrated acids at a given concentration. Ri(H) is numerically equal to the thermodynamic Ro(H), but deviated from Hammett functions based on indicator determination. The CPE electrode with inserted ferrocene in presence of ferricinium (Fc+) ion in concentrated HClO4 at various concentrations is realized without junction potential and may plays the role of a practical reference electrode (FRE) in concentrated acids. Fc+ was easily prepared in biphasic medium HClO4-acid by the quantitative oxidation of ferrocene by the ortho-chloranil (oQ). Potential of FRE is stable with time. The variation of equilibrium potential of the interface Fc/ Fc+ at various concentrations of Fc+ (10-4 - 2 10-2 M) obeyed to the Nernst equation with a slope 0.059 Volt per decade. Corrosion rates obtained by weight loss and electrochemical techniques were then easily linked to acidity level.

Keywords: ferrocene, strehlow, concentrated acid, corrosion, Generalised pH, sensor carbon paste electrode

Procedia PDF Downloads 332
3692 Evaluation of Esters Production by Oleic Acid Epoxidation Reaction

Authors: Flavio A. F. Da Ponte, Jackson Q. Malveira, Monica C. G. Albuquerque

Abstract:

In recent years a worldwide interest in renewable resources from the biomass has spurred the industry. In this work the chemical structure of oleic acid chains was modified by homogeneous and heterogeneous catalysis in order to produce esters. The homogeneous epoxidation was carried out at H2O2 to oleic acid unsaturation molar ratio of 20:1. The reaction temperature was 338 K and reaction time 16 h. Formic acid was used as catalyst. For heterogeneous catalysis reaction temperature was 343 K and reaction time 24 h. The esters production was carried out by heterogeneous catalysis of the epoxidized oleic acid and butanol using Mg/SBA-15 as catalyst. The resulting products were confirmed by NMR (1H and 13C) and FTIR spectroscopy. The products were characterized before and after each reaction. The catalysts were characterized by X-ray diffraction, X-ray fluorescence, thermogravimetric analysis (TGA) and BET surface areas. The results were satisfactory for the bioproducts formed.

Keywords: acid oleic, bioproduct, esters, epoxidation

Procedia PDF Downloads 321
3691 Current Drainage Attack Correction via Adjusting the Attacking Saw-Function Asymmetry

Authors: Yuri Boiko, Iluju Kiringa, Tet Yeap

Abstract:

Current drainage attack suggested previously is further studied in regular settings of closed-loop controlled Brushless DC (BLDC) motor with Kalman filter in the feedback loop. Modeling and simulation experiments are conducted in a Matlab environment, implementing the closed-loop control model of BLDC motor operation in position sensorless mode under Kalman filter drive. The current increase in the motor windings is caused by the controller (p-controller in our case) affected by false data injection of substitution of the angular velocity estimates with distorted values. Operation of multiplication to distortion coefficient, values of which are taken from the distortion function synchronized in its periodicity with the rotor’s position change. A saw function with a triangular tooth shape is studied herewith for the purpose of carrying out the bias injection with current drainage consequences. The specific focus here is on how the asymmetry of the tooth in the saw function affects the flow of current drainage. The purpose is two-fold: (i) to produce and collect the signature of an asymmetric saw in the attack for further pattern recognition process, and (ii) to determine conditions of improving stealthiness of such attack via regulating asymmetry in saw function used. It is found that modification of the symmetry in the saw tooth affects the periodicity of current drainage modulation. Specifically, the modulation frequency of the drained current for a fully asymmetric tooth shape coincides with the saw function modulation frequency itself. Increasing the symmetry parameter for the triangle tooth shape leads to an increase in the modulation frequency for the drained current. Moreover, such frequency reaches the switching frequency of the motor windings for fully symmetric triangular shapes, thus becoming undetectable and improving the stealthiness of the attack. Therefore, the collected signatures of the attack can serve for attack parameter identification via the pattern recognition route.

Keywords: bias injection attack, Kalman filter, BLDC motor, control system, closed loop, P-controller, PID-controller, current drainage, saw-function, asymmetry

Procedia PDF Downloads 51
3690 Synergistic Extraction Study of Cobalt (II) from Sulfate Medium by Mixtures of Capric Acid and Tri-N-Octylphosphine Oxide in Chloroform

Authors: F. Adjel, S. Almi, D. Barkat

Abstract:

The synergistic solvent extraction of cobalt (II) from 0.33 mol dm-3 Na2SO4 aqueous solutions with capric acid (HL) in the absence and presence of tri-n-octylphosphine oxide (TOPO) in chloroform at 25°C, has been studied. The extracted species when the capric acid compound was used alone, is CoL2(HL)2. In the presence of TOPO, a remarkable enhancement on the extraction of nickel (II) with 0.02 mol dm-3 capric acid was observed upon the addition of 0.0025 to 0.01 mol dm-3 TOPO in chloroform. From an synergistic extraction- equilibrium study, the synergistic enhancement was ascribed to the adduct formation CoL2(HL)2 n(TOPO). The TOPO-HL interaction strongly influences the synergistic extraction efficiency. The synergistic extraction stoichiometry of cobalt (II) with capric acid and TOPO is studied with the methods of slope analysis. The equilibrium constants were determined.

Keywords: solvent extraction, cobalt (II), capric acid, TOPO, synergism

Procedia PDF Downloads 498
3689 Searching for Forensic Evidence in a Compromised Virtual Web Server against SQL Injection Attacks and PHP Web Shell

Authors: Gigih Supriyatno

Abstract:

SQL injection is one of the most common types of attacks and has a very critical impact on web servers. In the worst case, an attacker can perform post-exploitation after a successful SQL injection attack. In the case of forensics web servers, web server analysis is closely related to log file analysis. But sometimes large file sizes and different log types make it difficult for investigators to look for traces of attackers on the server. The purpose of this paper is to help investigator take appropriate steps to investigate when the web server gets attacked. We use attack scenarios using SQL injection attacks including PHP backdoor injection as post-exploitation. We perform post-mortem analysis of web server logs based on Hypertext Transfer Protocol (HTTP) POST and HTTP GET method approaches that are characteristic of SQL injection attacks. In addition, we also propose structured analysis method between the web server application log file, database application, and other additional logs that exist on the webserver. This method makes the investigator more structured to analyze the log file so as to produce evidence of attack with acceptable time. There is also the possibility that other attack techniques can be detected with this method. On the other side, it can help web administrators to prepare their systems for the forensic readiness.

Keywords: web forensic, SQL injection, investigation, web shell

Procedia PDF Downloads 120
3688 Effect of the Addition of Additives on the Improvement of the Performances of Lead–Acid Batteries

Authors: Malika Foudia, Larbi Zerroual

Abstract:

The objective of this work is to improve the electrical proprieties of lead-acid battery with the addition of additives in electrolyte and in the cured plates before oxidation. The results showed that the addition of surfactant in sulfuric acid and 3% mineral additive in the cured plates change the morphology and the crystallite size of PAM after oxidation. The discharge capacity increases with the decrease of the crystallite size and the resistance of the active mass. This shows that the addition of mineral additive and the surfactant additive to the PAM, the electrical performance and the cycle life of lead- acid battery are significantly increases.

Keywords: lead-acid battery, additives, positive plate, impedance (EIS).

Procedia PDF Downloads 391
3687 Cellulose Nanocrystals from Melon Plant Residues: A Sustainable and Renewable Source

Authors: Asiya Rezzouq, Mehdi El Bouchti, Omar Cherkaoui, Sanaa Majid, Souad Zyade

Abstract:

In recent years, there has been a steady increase in the exploration of new renewable and non-conventional sources for the production of biodegradable nanomaterials. Nature harbours valuable cellulose-rich materials that have so far been under-exploited and can be used to create cellulose derivatives such as cellulose microfibres (CMFs) and cellulose nanocrystals (CNCs). These unconventional sources have considerable potential as alternatives to conventional sources such as wood and cotton. By using agricultural waste to produce these cellulose derivatives, we are responding to the global call for sustainable solutions to environmental and economic challenges. Responsible management of agricultural waste is increasingly crucial to reducing the environmental consequences of its disposal, including soil and water pollution, while making efficient use of these untapped resources. In this study, the main objective was to extract cellulose nanocrystals (CNC) from melon plant residues using methods that are both efficient and sustainable. To achieve this high-quality extraction, we followed a well-defined protocol involving several key steps: pre-treatment of the residues by grinding, filtration and chemical purification to obtain high-quality (CMF) with a yield of 52% relative to the initial mass of the melon plant residue. Acid hydrolysis was then carried out using phosphoric acid and sulphuric acid to convert (CMF) into cellulose nanocrystals. The extracted cellulose nanocrystals were subjected to in-depth characterization using advanced techniques such as transmission electron microscopy (TEM), thermogravimetric analysis (TGA), Fourier transform infrared spectroscopy (FTIR) and X-ray diffraction. The resulting cellulose nanocrystals have exceptional properties, including a large specific surface area, high thermal stability and high mechanical strength, making them suitable for a variety of applications, including as reinforcements for composite materials. In summary, the study highlights the potential for recovering agricultural melon waste to produce high-quality cellulose nanocrystals with promising applications in industry, nanotechnology, and biotechnology, thereby contributing to environmental and economic sustainability.

Keywords: cellulose, melon plant residues, cellulose nanocrystals, properties, applications, composite materials

Procedia PDF Downloads 21
3686 Synergistic Extraction of Cobalt (II) from Sulfate Medium by Mixtures of Capric Acid and Methyl Isobutyl Cétone in Chloroform

Authors: F. Adjel, C. Bensmail, S. Almi, D. Barkat

Abstract:

The synergistic solvent extraction of cobalt (II) from 0.33 mol dm^-3 Na2SO4 aqueous solutions with capric acid (HL) in the absence and presence of methyl isobutyl cétone (MIBK) in chloroform at 25°C, has been studied. The extracted species when the capric acid compound was used alone, is CoL2(HL)2. In the presence of MIBK, a remarkable enhancement on the extraction of nickel (II) with 0.02 mol dm^-3 capric acid was observed upon the addition of 0.0025 to 0.01 mol dm^-3 MIBK in chloroform. From a synergistic extraction-equilibrium study, the synergistic enhancement was ascribed to the adduct formation CoL2(HL)2 n(MIBK). The MIBK-HL interaction strongly influences the synergistic extraction efficiency. The synergistic extraction stoichiometry of cobalt (II) with capric acid and MIBK is studied with the methods of slope analysis. The equilibrium constants were determined.

Keywords: solvent extraction, cobalt (II), capric acid, MIBK, synergism

Procedia PDF Downloads 457
3685 Synthesis and Characterization of Lactic Acid Grafted TiO2 Nanocomposites

Authors: Qasar Saleem

Abstract:

The aim of this project was to synthesize and analyze Polylactic acid-grafted TiO2 nanocomposite. When dispersed at the nanoscale TiO2 can behave as see through transparent UV filters and thermomechanical materials. The synthesis plan involved three stages. First, dispersion of TiO2 white powder in water/ethanol solvent system. Second grafting TiO2 surface by oligomers of lactic acid aimed at changing its surface features. Third polymerization of lactic acid monomer with grafted TiO2 in the presence of anhydrous stannous chloride as a catalyst. Polylactic acid grafted-TiO2 nanocomposite was synthesized by melt polycondensation in situ of lactic acid onto titanium oxide (TiO2) nanoparticles surface. The product was characterized by TGA, DSC, FTIR, and UV analysis and degradation observation. An idea regarding bonds between the grafting polymer and surface modified titanium oxide nanoparticles. Characteristics peaks of Ti–carbonyl bond, the related intensities of the Fourier transmission absorption peaks of graft composite, the melt and decomposition behavior stages of Polylactic acid-grafted TiO2 nanocomposite convinced that oligomers of polylactic acid were chemically bonded on the surface of TiO2 nanoparticles. Through grafting polylactic acid, the Polylactic acid grafted -TiO2 sample shown good absorption in UV region and degradation behavior under normal atmospheric conditions. Regaining transparency of degraded white opaque Polylactic acid-grafted TiO2 nanocomposite on heating was another character. Polylactic acid-grafted TiO2 nanocomposite will be a potential candidate in future for biomedical, UV shielding and environment friendly material.

Keywords: condensation, nanocomposites, oligomers, polylactic

Procedia PDF Downloads 180
3684 Experimental Investigation of S822 and S823 Wind Turbine Airfoils Wake

Authors: Amir B. Khoshnevis, Morteza Mirhosseini

Abstract:

The paper deals with a sub-part of an extensive research program on the wake survey method in various Reynolds numbers and angles of attack. This research experimentally investigates the wake flow characteristics behind S823 and S822 airfoils in which designed for small wind turbines. Velocity measurements determined by using hot-wire anemometer. Data acquired in the wake of the airfoil at locations(c is the chord length): 0.01c - 3c. Reynolds number increased due to increase of free stream velocity. Results showed that mean velocity profiles depend on the angle of attack and location of data collections. Data acquired at the low Reynolds numbers (smaller than 10^5). Effects of Reynolds numbers on the mean velocity profiles are more significant in near locations the trailing edge and these effects decrease by taking distance from trailing edge toward downstream. Mean velocity profiles region increased by increasing the angle of attack, except for 7°, and also the maximum velocity deficit (velocity defect) increased. The difference of mean velocity in and out of the wake decreased by taking distance from trailing edge, and mean velocity profile become wider and more uniform.

Keywords: angle of attack, Reynolds number, velocity deficit, separation

Procedia PDF Downloads 350
3683 New Practical and Non-Malleable Elgamal Encryption for E-Voting Protoco

Authors: Karima Djebaili, Lamine Melkemi

Abstract:

Elgamal encryption is a fundamental public-key encryption in cryptography, which is based on the difficulty of discrete logarithm problem and the Diffie-Hellman problem. Supposing the Diffie–Hellman problem is computationally infeasible then Elgamal is secure under a chosen plaintext attack, where security indicates it is difficult for the attacker, given the ciphertext, to restore the whole of the plaintext. However, although it is secure against chosen plaintext attack, Elgamal is absolutely malleable i.e. is not secure against an adaptive chosen ciphertext attack, where the attacker can recover the plaintext. We present a extension on Elgamal encryption which result in non-malleability against adaptive chosen plaintext attack using concatenation and a cryptographic hash function, our evidence utilizes the device of plaintext aware. The algorithm proposed can be used in cryptography voting protocol given its level security. Our protocol protects the confidentiality of voters because each voter encrypts their choice before casting their vote, offers public verifiability using a signing algorithm, the final result is correctly computed using homomorphic property, and works even in the presence of an adversary due to the propriety of non-malleability. Moreover, the protocol prevents some parties colluding to fix the vote results.

Keywords: Elgamal encryption, non-malleability, plaintext aware, e-voting

Procedia PDF Downloads 422
3682 Study of Individual Parameters on the Enzymatic Glycosidation of Betulinic Acid by Novozyme-435

Authors: A. U. Adamu, Hamisu Abdu, A. A. Saidu

Abstract:

The enzymatic synthesis of 3-O-β-D-glucopyranoside-betulinic acid using Novozyme-435 as a catalyst was studied. The effect of various parameters such as substrate molar ratio, reaction temperature, reaction time, re-used enzymes and amount of enzymes were investigated. The optimum rection conditions for the enzymatic glycosidation of betulinic acid in an organic solvent using Novozym-435 was found to be at 1:1.2 substrate molar ratio, 55oC, 24 h and 180 mg of enzymes with percentage conversion of 88.69 %.

Keywords: betulinic acid, glycosidation, novozyme-435, optimization

Procedia PDF Downloads 395
3681 Investigation of Flow Structure over X-45 Type Non-Slender Delta Wing Planform

Authors: B. Yanıktepe, C. Özalp, B. Şahin

Abstract:

Delta wing planform is an essential aerodynamic configuration, which could be effectively used at relatively high angles of attack than conventional wings in subsonic flow conditions. The flow over delta wings can be characterized by a pair of leading edge vortices emanating from wing apex. Boundary layer separation causes these vortical structures formed by rolling up of viscous flow sheet. This flow separation mechanism is occurred due to angle of attack and sharp leading edges of the delta wing. Therefore, complexity and variety in planform designs rise to catch the best under abnormal flow conditions. The present experimental study investigates the near surface flow structure and aerodynamic flow characteristics of X-45 type non-slender delta wing planform using dye visualization, Stereoscopic Particle Image Velocimetry (stereo-PIV). The instantaneous images are acquired on the plan-view plane within 5o≤α≤20o to calculate the time-averaged flow data. It can be concluded that vortical flow with a pair of well-defined LEVs over X-45 develop at very low angles of attack, secondary vortex are also evident and form close to the wing surface similar to delta and lambda planforms. The stall occurs at an angle of attack α=32o.

Keywords: aerodynamic, delta wing, PIV, vortex breakdown

Procedia PDF Downloads 386
3680 Low Probability of Intercept (LPI) Signal Detection and Analysis Using Choi-Williams Distribution

Authors: V. S. S. Kumar, V. Ramya

Abstract:

In the modern electronic warfare, the signal scenario is changing at a rapid pace with the introduction of Low Probability of Intercept (LPI) radars. In the modern battlefield, radar system faces serious threats from passive intercept receivers such as Electronic Attack (EA) and Anti-Radiation Missiles (ARMs). To perform necessary target detection and tracking and simultaneously hide themselves from enemy attack, radar systems should be LPI. These LPI radars use a variety of complex signal modulation schemes together with pulse compression with the aid of advancement in signal processing capabilities of the radar such that the radar performs target detection and tracking while simultaneously hiding enemy from attack such as EA etc., thus posing a major challenge to the ES/ELINT receivers. Today an increasing number of LPI radars are being introduced into the modern platforms and weapon systems so these LPI radars created a requirement for the armed forces to develop new techniques, strategies and equipment to counter them. This paper presents various modulation techniques used in generation of LPI signals and development of Time Frequency Algorithms to analyse those signals.

Keywords: anti-radiation missiles, cross terms, electronic attack, electronic intelligence, electronic warfare, intercept receiver, low probability of intercept

Procedia PDF Downloads 409
3679 The Potential of Ursolic Acid Acetate as an Agent for Malarial Chemotherapy

Authors: Mthokozisi B. C. Simelane

Abstract:

Despite the various efforts by governmental and non-governmental organizations aimed at eradicating the disease, malaria is said to kill a child every 30 seconds. Traditional healers use different concoctions prepared from medicinal plants to treat malaria. In the quest to bio-prospect plant-derived triterpenes for anti-malaria activity, we report here the in vivo antiplasmodial activity of ursolic acid acetate (ursolic acid isolated from dichloromethane extract of Mimusops caffra was chemically modified to its acetate derivative). The transdermal administration of ursolic acid acetate (UAA) dose dependently showed complete inhibition of the parasites’ growth at the highest concentration of 400 mg/kg after 15 days of Plasmodium berghei infection. UAA prevented the in vitro aggregation of MDH but did not prevent the expression of PfHsp 70 in E. coli XL1 blue cells. It, however, enhanced PfHsp70 ATPase activity with the specific activity of 65 units (amount of phosphate released 73.83 nmolPi/min.mg). Ursolic acid acetate prevented the formation of hemozoin (60 ± 0.02% at 6 mg/ml). The results suggest that Ursolic acid acetate possesses potential anti-malaria properties.

Keywords: Mimusops caffra, ursolic acid acetate, hemozoin, Malaria

Procedia PDF Downloads 395
3678 Determination of the Risks of Heart Attack at the First Stage as Well as Their Control and Resource Planning with the Method of Data Mining

Authors: İbrahi̇m Kara, Seher Arslankaya

Abstract:

Frequently preferred in the field of engineering in particular, data mining has now begun to be used in the field of health as well since the data in the health sector have reached great dimensions. With data mining, it is aimed to reveal models from the great amounts of raw data in agreement with the purpose and to search for the rules and relationships which will enable one to make predictions about the future from the large amount of data set. It helps the decision-maker to find the relationships among the data which form at the stage of decision-making. In this study, it is aimed to determine the risk of heart attack at the first stage, to control it, and to make its resource planning with the method of data mining. Through the early and correct diagnosis of heart attacks, it is aimed to reveal the factors which affect the diseases, to protect health and choose the right treatment methods, to reduce the costs in health expenditures, and to shorten the durations of patients’ stay at hospitals. In this way, the diagnosis and treatment costs of a heart attack will be scrutinized, which will be useful to determine the risk of the disease at the first stage, to control it, and to make its resource planning.

Keywords: data mining, decision support systems, heart attack, health sector

Procedia PDF Downloads 329
3677 Aerodynamic Coefficients Prediction from Minimum Computation Combinations Using OpenVSP Software

Authors: Marine Segui, Ruxandra Mihaela Botez

Abstract:

OpenVSP is an aerodynamic solver developed by National Aeronautics and Space Administration (NASA) that allows building a reliable model of an aircraft. This software performs an aerodynamic simulation according to the angle of attack of the aircraft makes between the incoming airstream, and its speed. A reliable aerodynamic model of the Cessna Citation X was designed but it required a lot of computation time. As a consequence, a prediction method was established that allowed predicting lift and drag coefficients for all Mach numbers and for all angles of attack, exclusively for stall conditions, from a computation of three angles of attack and only one Mach number. Aerodynamic coefficients given by the prediction method for a Cessna Citation X model were finally compared with aerodynamics coefficients obtained using a complete OpenVSP study.

Keywords: aerodynamic, coefficient, cruise, improving, longitudinal, openVSP, solver, time

Procedia PDF Downloads 202
3676 Characteristic Components in Cornusofficinalis to AGEs Injury Protective Effect and Mechanism of HUVEC

Authors: Yu-Han Tao, Hui-Qin Xu

Abstract:

The present study aimed to explain the protective effect of Cornus officinalis characteristic components, under AGEs damage to HUVEC. After cultured HUVEC adhered, Cornus officinalis characteristic components such as loganin, morroniside, oleanolic acid, ursolic acid and aminoguanidine (positive control dug) hatched, after 1h the AGEs (200 mg/L) were added. After 24h, LDH, SOD, MDA, NO, ET, and AngⅡ, TGF-β, IL-1β, ROS in the supernatant were determined. The results showed the Cornus officinalis characteristic compounds could improve vitality of SOD, NO, reduce the MDA, ET, AngⅡ, TGF-β, IL-1β, ROS significantly when compared with the model groug. Loganin, oleanic acid, ursolic acid, had significant protective effect on AGEs injured HUVEC. As a conclusion, characteristic components in Cornus officinalis had a positive effect after HUVEC injured by AGEs.

Keywords: Cornus officinalis, morroniside, oganin, oleanolic acid, ursolic acid

Procedia PDF Downloads 345
3675 A Grey-Box Text Attack Framework Using Explainable AI

Authors: Esther Chiramal, Kelvin Soh Boon Kai

Abstract:

Explainable AI is a strong strategy implemented to understand complex black-box model predictions in a human-interpretable language. It provides the evidence required to execute the use of trustworthy and reliable AI systems. On the other hand, however, it also opens the door to locating possible vulnerabilities in an AI model. Traditional adversarial text attack uses word substitution, data augmentation techniques, and gradient-based attacks on powerful pre-trained Bidirectional Encoder Representations from Transformers (BERT) variants to generate adversarial sentences. These attacks are generally white-box in nature and not practical as they can be easily detected by humans e.g., Changing the word from “Poor” to “Rich”. We proposed a simple yet effective Grey-box cum Black-box approach that does not require the knowledge of the model while using a set of surrogate Transformer/BERT models to perform the attack using Explainable AI techniques. As Transformers are the current state-of-the-art models for almost all Natural Language Processing (NLP) tasks, an attack generated from BERT1 is transferable to BERT2. This transferability is made possible due to the attention mechanism in the transformer that allows the model to capture long-range dependencies in a sequence. Using the power of BERT generalisation via attention, we attempt to exploit how transformers learn by attacking a few surrogate transformer variants which are all based on a different architecture. We demonstrate that this approach is highly effective to generate semantically good sentences by changing as little as one word that is not detectable by humans while still fooling other BERT models.

Keywords: BERT, explainable AI, Grey-box text attack, transformer

Procedia PDF Downloads 111
3674 Real Time Detection of Application Layer DDos Attack Using Log Based Collaborative Intrusion Detection System

Authors: Farheen Tabassum, Shoab Ahmed Khan

Abstract:

The brutality of attacks on networks and decisive infrastructures are on the climb over recent years and appears to continue to do so. Distributed Denial of service attack is the most prevalent and easy attack on the availability of a service due to the easy availability of large botnet computers at cheap price and the general lack of protection against these attacks. Application layer DDoS attack is DDoS attack that is targeted on wed server, application server or database server. These types of attacks are much more sophisticated and challenging as they get around most conventional network security devices because attack traffic often impersonate normal traffic and cannot be recognized by network layer anomalies. Conventional techniques of single-hosted security systems are becoming gradually less effective in the face of such complicated and synchronized multi-front attacks. In order to protect from such attacks and intrusion, corporation among all network devices is essential. To overcome this issue, a collaborative intrusion detection system (CIDS) is proposed in which multiple network devices share valuable information to identify attacks, as a single device might not be capable to sense any malevolent action on its own. So it helps us to take decision after analyzing the information collected from different sources. This novel attack detection technique helps to detect seemingly benign packets that target the availability of the critical infrastructure, and the proposed solution methodology shall enable the incident response teams to detect and react to DDoS attacks at the earliest stage to ensure that the uptime of the service remain unaffected. Experimental evaluation shows that the proposed collaborative detection approach is much more effective and efficient than the previous approaches.

Keywords: Distributed Denial-of-Service (DDoS), Collaborative Intrusion Detection System (CIDS), Slowloris, OSSIM (Open Source Security Information Management tool), OSSEC HIDS

Procedia PDF Downloads 335
3673 Synergistic Extraction Study of Nickel (II) from Sulfate Medium by Mixtures of Capric Acid and Tri-N-Octylphosphine Oxide in Chloroform

Authors: F. Adjel, S. Almi, D. Barkat

Abstract:

The synergistic solvent extraction of nickel ion from 0.33 mol dm^-3 Na2SO4 aqueous solutions with capric acid (HL) in the absence and presence of Tri-n-octylphosphine oxide (TOPO) in chloroform at 25°C, has been studied. The extracted species when the capric acid compound was used alone, is NiL2 and NiL2(HL). In the presence of TOPO, a remarkable enhancement on the extraction of nickel (II) with 0.02 mol dm^-3 capric acid was observed upon the addition of 0.00125 and 0.0025 mol dm^-3 TOPO in chloroform. From a synergistic extraction- equilibrium study, the synergistic enhancement was ascribed to the adduct formation NiL2(TOPO) and NiL2(HL)(TOPO). The TOPO-HL interaction strongly influences the synergistic extraction efficiency. The synergistic extraction stoichiometry of nickel (II) with capric acid and TOPO is studied with the methods of slope analysis. The equilibrium constants were determined.

Keywords: solvent extraction, nickel(II), capric acid, TOPO, synergism

Procedia PDF Downloads 555
3672 Efficient and Timely Mutual Authentication Scheme for RFID Systems

Authors: Hesham A. El Zouka, Mustafa M. Hosni ka

Abstract:

The Radio Frequency Identification (RFID) technology has a diverse base of applications, but it is also prone to security threats. There are different types of security attacks that limit the range of the RFID applications. For example, deploying the RFID networks in insecure environments could make the RFID system vulnerable to many types of attacks such as spoofing attack, location traceability attack, physical attack and many more. Therefore, security is often an important requirement for RFID systems. In this paper, RFID mutual authentication protocol is implemented based on mobile agent technology and timestamp, which are used to provide strong authentication and integrity assurances to both the RFID readers and their corresponding RFID tags. The integration of mobile agent technology and timestamp provides promising results towards achieving this goal and towards reducing the security threats in RFID systems.

Keywords: RFID, security, authentication protocols, privacy, agent-based architecture, time-stamp, digital signature

Procedia PDF Downloads 228
3671 Phosphorous Acid: An Efficient and Recyclable Liquid Catalyst for the Synthesis of α-Aminophosphonates

Authors: Hellal Abdelkader, Chafaa Salah, Touafri Lasnouni

Abstract:

A simple, efficient and general method has been developed for the high diastereoselective synthesis of diethyl α-aminophosphonates in water through “one-pot” three-component reaction of aromatic aldehydes, aminophenols and dialkyl phosphites in the presence of a low catalytic amount (10mol%) of phosphorous acid as highly stable catalyst is described.

Keywords: DFT, HOMO-LUMO, phosphonic acid, aminophenols

Procedia PDF Downloads 338
3670 Effect of Acetic Acid Fermentation on Bioactive Components and Anti-Xanthine Oxidase Activities in Vinegar Brewed from Monascus-Fermented Soybeans

Authors: Kyung-Soon Choi, Ji-Young Hwang, Young-Hee Pyo

Abstract:

Vinegars have been used as an alternative remedy for treating gout, but the scientific basis remains to be elucidated. In this study, acetic acid fermentation was applied for the first time to Monascus-fermented soybeans to examine its effect on the bioactive components together with the xanthine oxidase inhibitory (XOI) activity of the soy vinegar. The content of total phenols (0.47~0.97 mg gallic acid equivalents/mL) and flavonoids (0.18~0.39 mg quercetin equivallents/mL) were spectrophotometrically determined, and the content of organic acid (10.22~59.76 mg/mL) and isoflavones (6.79~7.46 mg/mL) were determined using HPLC-UV. The analytical method for ubiquinones (0.079~0.276 μg/mL) employed saponification before solvent extraction and quantification using LC-MS. Soy vinegar also showed significant XOI (95.3%) after 20 days of acetic acid fermentation at 30 °C. The results suggest that soy vinegar has potential as a novel medicinal food.

Keywords: acetic acid fermentation, bioactive component, soy vinegar, xanthine oxidase inhibitory activity

Procedia PDF Downloads 357