Search results for: sulfuric acid attacks.
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 1056

Search results for: sulfuric acid attacks.

786 Treatment of Acid Mine Drainage Using Un- Activated Bentonite and Limestone

Authors: Thembelihle Nkonyane, Freeman Ntuli, Edison Muzenda

Abstract:

The use of un-activated bentonite, and un-activated bentonite blended with limestone for the treatment of acid mine drainage (AMD) was investigated. Batch experiments were conducted in a 5 L PVC reactor. Un-activated bentonite on its own did not effectively neutralize and remove heavy metals from AMD. The final pH obtained was below 4 and the metal removal efficiency was below 50% for all the metals when bentonite solid loadings of 1, 5 and 10% were used. With un-activated bentonite (1%) blended with 1% limestone, the final pH obtained was approximately 7 and metal removal efficiencies were greater than 60% for most of the metals. The Langmuir isotherm gave the best fit for the experimental data giving correlation coefficient (R2) very close to 1. Thus, it was concluded that un-activated bentonite blended with limestone is suitable for potential applications in removing heavy metals and neutralizing AMD.

Keywords: acid mine drainage, bentonite, limestone, heavy metal removal.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 2633
785 Numerical Analysis of Dynamic Responses of the Plate Subjected to Impulsive Loads

Authors: Behzad Mohammadzadeh, Huyk Chun Noh

Abstract:

Plate is one of the popular structural elements used in a wide range of industries and structures. They may be subjected to blast loads during explosion events, missile attacks or aircraft attacks. This study is to investigate dynamic responses of the rectangular plate subjected to explosive loads. The effects of material properties and plate thickness on responses of the plate are to be investigated. The compressive pressure is applied to the surface of the plate. Different amounts of thickness in the range from 1mm to 30mm are considered for the plate to evaluate the changes in responses of the plate with respect to plate thickness. Two different properties are considered for the steel. First, the analysis is performed by considering only the elastic-plastic properties for the steel plate. Later on damping is considered to investigate its effects on the responses of the plate. To do analysis, numerical method using a finite element based package ABAQUS is applied. Finally, dynamic responses and graphs showing the relation between maximum displacement of the plate and aim parameters are provided.

Keywords: Impulsive loaded plates, dynamic analysis, abaqus, material nonlinearity.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1822
784 Acetalization of Carbonyl Compounds by Using Al2 (HPO4)3 under Green Condition Mg HPO4

Authors: Fariba Jafari, Samaneh Heydarian

Abstract:

Al2(HPO4)3 was easily prepared and used as a solid acid in acetalization of carbonyl compounds at room temperature and under solvent-free conditions. The protection was done in short reaction times and in good to high isolated yields. The cheapness and availability of this reagent with easy procedure and work-up make this method attractive for the organic synthesis.

Keywords: Acetalization, acid catalysis, carbonylcompounds, green condition, protection.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1342
783 Blockchain in Saudi e-Government: A Systematic Literature Review

Authors: Haitham Assiri, Majed Eljazzar, Priyadarsi Nanda

Abstract:

The world is gradually entering the fourth industrial revolution. E-Government services are scaling government operations across the globe. However, as promising as an e-Government system would be, it is also susceptible to malicious attacks if not properly secured. In our study, we found that in Saudi Arabia, the e-Government website, Yesser, is vulnerable to external attacks. Obviously, this can lead to a breach of data integrity and privacy. In this paper, a systematic literature review (SLR) was conducted to explore possible ways the Kingdom of Saudi Arabia can take necessary measures to strengthen its e-Government system using blockchain. Blockchain is one of the emerging technologies shaping the world through its applications in finance, elections, healthcare, etc. It secures systems and brings more transparency. A total of 28 papers were selected for this SLR, and 19 of the papers significantly showed that blockchain could enhance the security and privacy of Saudi’s e-Government system. Other papers also concluded that blockchain is effective, albeit with the integration of other technologies like IoT, AI and big data. These papers have been analyzed to sieve out the findings and set the stage for future research into the subject.

Keywords: blockchain, data integrity, e-Government, security threats

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1636
782 A New Graphical Password: Combination of Recall & Recognition Based Approach

Authors: Md. Asraful Haque, Babbar Imam

Abstract:

Information Security is the most describing problem in present times. To cop up with the security of the information, the passwords were introduced. The alphanumeric passwords are the most popular authentication method and still used up to now. However, text based passwords suffer from various drawbacks such as they are easy to crack through dictionary attacks, brute force attacks, keylogger, social engineering etc. Graphical Password is a good replacement for text password. Psychological studies say that human can remember pictures better than text. So this is the fact that graphical passwords are easy to remember. But at the same time due to this reason most of the graphical passwords are prone to shoulder surfing. In this paper, we have suggested a shoulder-surfing resistant graphical password authentication method. The system is a combination of recognition and pure recall based techniques. Proposed scheme can be useful for smart hand held devices (like smart phones i.e. PDAs, iPod, iPhone, etc) which are more handy and convenient to use than traditional desktop computer systems.

Keywords: Authentication, Graphical Password, Text Password, Information Security, Shoulder-surfing.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 4146
781 Effect of Indole-3-Acetic Acid on Arsenic Translocation in Agricultural Crops

Authors: Ye. V. Lyubun

Abstract:

The problem of agricultural-soil pollution is closely linked to the production of ecologically pure foodstuffs and to human health. An important task, therefore, is to rehabilitate agricultural soils with the help of state-of-the-art biotechnologies, based on the use of metal-accumulating plants. In this work, on the basis of literature data and the results of prior research from this laboratory, plants were selected for which the growing technology is well developed and which are widespread locally: sugar sorghum (Sorghum saccharatum), sudangrass (Sorghum sudanense (Piper.) Stapf.), and sunflower (Helianthus annuus L.). I report on laboratory experiments designed to study the influence of synthetic indole-3- acetic acid and the extracellular indole-3-acetic acid released by the plant-growth-promoting rhizobacterium Azospirillum brasilense Sp245 on growth of and arsenic accumulation by these plants.

Keywords: Arsenic, bioaccumulation, plant-growth-promoting rhizobacteria, phytohormones.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1713
780 Gasification of Trans-4-Hydroxycinnamic Acid with Ethanol at Elevated Temperatures

Authors: Shyh-Ming Chern, Wei-Ling Lin

Abstract:

Lignin is a major constituent of woody biomass, and exists abundantly in nature. It is the major byproducts from the paper industry and bioethanol production processes. The byproducts are mainly used for low-valued applications. Instead, lignin can be converted into higher-valued gaseous fuel, thereby helping to curtail the ever-growing price of oil and to slow down the trend of global warming. Although biochemical treatment is capable of converting cellulose into liquid ethanol fuel, it cannot be applied to the conversion of lignin. Alternatively, it is possible to convert lignin into gaseous fuel thermochemically. In the present work, trans-4-hydroxycinnamic acid, a model compound for lignin, which closely resembles the basic building blocks of lignin, is gasified in an autoclave with ethanol at elevated temperatures and pressures, that are above the critical point of ethanol. Ethanol, instead of water, is chosen, because ethanol dissolves trans-4-hydroxycinnamic acid easily and helps to convert it into lighter gaseous species relatively well. The major operating parameters for the gasification reaction include temperature (673-873 K), reaction pressure (5-25 MPa) and feed concentration (0.05-0.3 M). Generally, more than 80% of the reactant, including trans-4-hydroxycinnamic acid and ethanol, were converted into gaseous products at an operating condition of 873 K and 5 MPa.

Keywords: Ethanol, gasification, lignin, supercritical.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1081
779 Amino Acid Based Biodegradable Amphiphilic Polymers and Micelles as Drug Delivery Systems: Synthesis and Study

Authors: Sophio Kobauri, Vladimir P. Torchilin, David Tugushi, Ramaz Katsarava

Abstract:

Nanotherapy is an actual newest mode of treatment numerous diseases using nanoparticles (NPs) loading with different pharmaceuticals. NPs of biodegradable polymeric micelles (PMs) are gaining increased attention for their numerous and attractive abilities to be used in a variety of applications in the various fields of medicine. The present paper deals with the synthesis of a class of biodegradable micelle-forming polymers, namely ABA triblock-copolymer in which A-blocks represent amino-poly(ethylene glycol) (H2N-PEG) and B-block is biodegradable amino acid-based poly(ester amide) constituted of α-amino acid – L-phenylalanine. The obtained copolymer formed micelles of 70±4 nm size at 10 mg/mL concentration.

Keywords: Amino acids, biodegradable poly(ester amide), amphiphilic triblock-copolymer, micelles.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 817
778 Development of a New Polymeric Material with Controlled Surface Micro-Morphology Aimed for Biosensors Applications

Authors: Elham Farahmand, Fatimah Ibrahim, Samira Hosseini, Ivan Djordjevic, Leo. H. Koole

Abstract:

Compositions of different molar ratios of polymethylmethacrylate-co-methacrylic acid (PMMA-co-MAA) were synthesized via free-radical polymerization. Polymer coated surfaces have been produced on silicon wafers. Coated samples were analyzed by atomic force microscopy (AFM). The results have shown that the roughness of the surfaces have increased by increasing the molar ratio of monomer methacrylic acid (MAA). This study reveals that the gradual increase in surface roughness is due to the fact that carboxylic functional groups have been generated by MAA segments. Such surfaces can be desirable platforms for fabrication of the biosensors for detection of the viruses and diseases.

Keywords: Polymethylmethacrylate-co-methacrylic acid (PMMA-co-MAA), Polymeric material, Atomic Force Microscopy, roughness, carboxylic functional groups.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 2127
777 Is Curcumine Effect Comparable to 5- Aminosalicylic Acid or Budesonide on a Rat Model of Ulcerative Colitis Induced by Trinitrobenzene Sulfonic Acid?

Authors: Inas E. Darwish, Alia M. Arab, Tarek A. Azeim, Teshreen M. Zeitoun, Wafaa A. Hewedy, Moemen A. Heiba, Iman S. Emara

Abstract:

Inflammatory bowel disease (IBD) is a chronic relapsing-remitting condition that afflicts millions of people throughout the world and impairs their daily functions and quality of life. Treatment of IBD depends largely on 5-aminosalicylic acid (5- ASA) and corticosteroids. The present study aimed to clarify the effects of 5-aminosalicylic acid, budesonide and currcumin on 90 male albino rats against trinitrobenzene sulfonic acid (TNB) induced colitis. TNB was injected intrarectally to 50 rats. The other 40 rats served as control groups. Both 5-ASA (in a dose of 120 mg/kg) and budesonide (in a dose of 0.1 mg/kg) were administered daily for one week whereas currcumin was injected intraperitonially (in a dose of 30 mg/kg daily) for 14 days after injection of either TNB in the colitis rats (group B) or saline in control groups (group A). The study included estimation of macroscopic score index, histological examination of H&E stained sections of the colonic tissue, biochemical estimation of myeloperoxidase (MPO), nitric oxide (NO), and caspase-3 levels, in addition to studying the effect of tested drugs on colonic motility. It was found that budesonide and curcumin improved mucosal healing, reduced both NO production and caspase- 3 level. They had the best impact on the disturbed colonic motility in TNBS-model of colitis.

Keywords: Colitis, curcumin, nitric oxide.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1671
776 Structural Characterization and Physical Properties of Antimicrobial (AM) Starch-Based Films

Authors: Eraricar Salleh, Ida Idayu Muhamad, Nozieanna Khairuddin

Abstract:

Antimicrobial (AM) starch-based films were developed by incorporating chitosan and lauric acid as antimicrobial agent into starch-based film. Chitosan has wide range of applications as a biomaterial, but barriers still exist to its broader use due to its physical and chemical limitations. In this work, a series of starch/chitosan (SC) blend films containing 8% of lauric acid was prepared by casting method. The structure of the film was characterized by Fourier transform infrared spectroscopy (FTIR), Xray diffraction (XRD), and scanning electron microscopy (SEM). The results indicated that there were strong interactions were present between the hydroxyl groups of starch and the amino groups of chitosan resulting in a good miscibility between starch and chitosan in the blend films. Physical properties and optical properties of the AM starch-based film were evaluated. The AM starch-based films incorporated with chitosan and lauric acid showed an improvement in water vapour transmission rate (WVTR) and addition of starch content provided more transparent films while the yellowness of the film attributed to the higher chitosan content. The improvement in water barrier properties was mainly attributed to the hydrophobicity of lauric acid and optimum chitosan or starch content. AM starch based film also showed excellent oxygen barrier. Obtaining films with good oxygen permeability would be an indication of the potential use of these antimicrobial packaging as a natural packaging and an alternative packaging to the synthetic polymer to protect food from oxidation reactions

Keywords: Antimicrobial starch-based films, chitosan, lauric acid, starch.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 2808
775 Secure Distance Bounding Protocol on Ultra-WideBand Based Mapping Code

Authors: Jamel Miri, Bechir Nsiri, Ridha Bouallegue

Abstract:

Ultra WidBand-IR physical layer technology has seen a great development during the last decade which makes it a promising candidate for short range wireless communications, as they bring considerable benefits in terms of connectivity and mobility. However, like all wireless communication they suffer from vulnerabilities in terms of security because of the open nature of the radio channel. To face these attacks, distance bounding protocols are the most popular counter measures. In this paper, we presented a protocol based on distance bounding to thread the most popular attacks: Distance Fraud, Mafia Fraud and Terrorist fraud. In our work, we study the way to adapt the best secure distance bounding protocols to mapping code of ultra-wideband (TH-UWB) radios. Indeed, to ameliorate the performances of the protocol in terms of security communication in TH-UWB, we combine the modified protocol to ultra-wideband impulse radio technology (IR-UWB). The security and the different merits of the protocols are analyzed.

Keywords: Distance bounding, mapping code ultra-wideband, Terrorist Fraud.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1035
774 A Watermarking System Using the Wavelet Technique for Satellite Images

Authors: I. R. Farah, I. B. Ismail, M. B. Ahmed

Abstract:

The huge development of new technologies and the apparition of open communication system more and more sophisticated create a new challenge to protect digital content from piracy. Digital watermarking is a recent research axis and a new technique suggested as a solution to these problems. This technique consists in inserting identification information (watermark) into digital data (audio, video, image, databases...) in an invisible and indelible manner and in such a way not to degrade original medium-s quality. Moreover, we must be able to correctly extract the watermark despite the deterioration of the watermarked medium (i.e attacks). In this paper we propose a system for watermarking satellite images. We chose to embed the watermark into frequency domain, precisely the discrete wavelet transform (DWT). We applied our algorithm on satellite images of Tunisian center. The experiments show satisfying results. In addition, our algorithm showed an important resistance facing different attacks, notably the compression (JEPG, JPEG2000), the filtering, the histogram-s manipulation and geometric distortions such as rotation, cropping, scaling.

Keywords: Digital data watermarking, Spatial Database, Satellite images, Discrete Wavelets Transform (DWT).

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1677
773 A Second Look at Gesture-Based Passwords: Usability and Vulnerability to Shoulder-Surfing Attacks

Authors: Lakshmidevi Sreeramareddy, Komalpreet Kaur, Nane Pothier

Abstract:

For security purposes, it is important to detect passwords entered by unauthorized users. With traditional alphanumeric passwords, if the content of a password is acquired and correctly entered by an intruder, it is impossible to differentiate the password entered by the intruder from those entered by the authorized user because the password entries contain precisely the same character set. However, no two entries for the gesture-based passwords, even those entered by the person who created the password, will be identical. There are always variations between entries, such as the shape and length of each stroke, the location of each stroke, and the speed of drawing. It is possible that passwords entered by the unauthorized user contain higher levels of variations when compared with those entered by the authorized user (the creator). The difference in the levels of variations may provide cues to detect unauthorized entries. To test this hypothesis, we designed an empirical study, collected and analyzed the data with the help of machine-learning algorithms. The results of the study are significant.

Keywords: Authentication, gesture-based passwords, machine learning algorithms, shoulder-surfing attacks, usability.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 617
772 Influence of Chelators, Zn Sulphate and Silicic Acid on Productivity and Meat Quality of Fattening Pigs

Authors: A. Raceviciute-Stupeliene, V. Sasyte, V. Viliene, V. Slausgalvis, J. Al-Saifi, R. Gruzauskas

Abstract:

The objective of this study was to investigate the influence of special additives such as chelators, zinc sulphate and silicic acid on productivity parameters, carcass characteristics and meat quality of fattening pigs. The test started with 40 days old fattening pigs (mongrel (mother) and Yorkshire (father)) and lasted up to 156 days of age. During the fattening period, 32 pigs were divided into 2 groups (control and experimental) with 4 replicates (total of 8 pens).  The pigs were fed for 16 weeks’ ad libitum with a standard wheat-barley-soybean meal compound (Control group) supplemented with chelators, zinc sulphate and silicic acid (dosage 2 kg/t of feed, Experimental group). Meat traits in live pigs were measured by ultrasonic equipment Piglog 105. The results obtained throughout the experimental period suggest that supplementation of chelators, zinc sulphate and silicic acid tend to positively affect average daily gain and feed conversion ratio of pigs for fattening (p < 0.05). Pigs’ evaluation with Piglog 105 showed that thickness of fat in the first and second point was by 4% and 3% respectively higher in comparison to the control group (p < 0.05). Carcass weight, yield, and length, also thickness of fat showed no significant difference among the groups. The water holding capacity of meat in Experimental group was lower by 5.28%, and tenderness – lower by 12% compared with that of the pigs in the Control group (p < 0.05). Regarding pigs’ meat chemical composition of the experimental group, a statistically significant difference comparing with the data of the control group was not determined. Cholesterol concentration in muscles of pigs fed diets supplemented with chelators, zinc sulphate and silicic acid was lower by 7.93 mg/100 g of muscle in comparison to that of the control group. These results suggest that supplementation of chelators, zinc sulphate and silicic acid in the feed for fattening pigs had significant effect on pigs growing performance and meat quality.

Keywords: Chelators, meat quality, pigs, silicic acid, zinc sulphate.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 958
771 Reducing Sugar Production from Durian Peel by Hydrochloric Acid Hydrolysis

Authors: Matura Unhasirikul, Nuanphan Naranong, Woatthichai Narkrugsa

Abstract:

Agricultural waste is mainly composed of cellulose and hemicelluloses which can be converted to sugars. The inexpensive reducing sugar from durian peel was obtained by hydrolysis with HCl concentration at 0.5-2.0% (v/v). The hydrolysis range of time was for 15-60 min when the mixture was autoclaved at 121 °C. The result showed that acid hydrolysis efficiency (AHE) highest to 80.99% at condition is 2.0%concentration for 15 min. Reducing sugar highest to 56.07 g/litre at condition is 2.0% concentration for 45min. Total sugar highest to 59.83 g/litre at condition is 2.0%concentration for 45min, which was not significant (p < 0.05) with condition 2.0% concentration for 30 min and 1.5 % concentration for 45 and 60 min. The increase in concentration increased AHE, reducing sugar and total sugar. The hydrolysis time had no effect on AHE, reducing sugar and total sugar. The maximum reducing sugars of each concentration were at hydrolysis time 45 min .The hydrolysated were analysis by HPLC, the results revealed that the principle of sugar were glucose, fructose and xylose.

Keywords: acid hydrolysis efficiency (AHE), reducing sugar, total sugar

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 3260
770 Detecting and Locating Wormhole Attacks in Wireless Sensor Networks Using Beacon Nodes

Authors: He Ronghui, Ma Guoqing, Wang Chunlei, Fang Lan

Abstract:

This paper focuses on wormhole attacks detection in wireless sensor networks. The wormhole attack is particularly challenging to deal with since the adversary does not need to compromise any nodes and can use laptops or other wireless devices to send the packets on a low latency channel. This paper introduces an easy and effective method to detect and locate the wormholes: Since beacon nodes are assumed to know their coordinates, the straight line distance between each pair of them can be calculated and then compared with the corresponding hop distance, which in this paper equals hop counts × node-s transmission range R. Dramatic difference may emerge because of an existing wormhole. Our detection mechanism is based on this. The approximate location of the wormhole can also be derived in further steps based on this information. To the best of our knowledge, our method is much easier than other wormhole detecting schemes which also use beacon nodes, and to those have special requirements on each nodes (e.g., GPS receivers or tightly synchronized clocks or directional antennas), ours is more economical. Simulation results show that the algorithm is successful in detecting and locating wormholes when the density of beacon nodes reaches 0.008 per m2.

Keywords: Beacon node, wireless sensor network, worm hole attack.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1879
769 Isolation and Characterization of Collagen from Chicken Feet

Authors: P. Hashim, M. S. Mohd Ridzwan, J. Bakar

Abstract:

Collagen was isolated from chicken feet by using papain and pepsin enzymes in acetic acid solution at 4°C for 24h with a yield of 18.16% and 22.94% by dry weight, respectively. Chemical composition and characteristics of chicken feet collagen such as amino acid composition, SDS-PAGE patterns, FTIR spectra and thermal properties were evaluated. The chicken feet collagen is rich in the amino acids glycine, glutamic acid, proline and hydroxyproline. Electrophoresis pattern demonstrated two distinct α-chains (α1 and α2) and β chain, indicating that type I collagen is a major component of chicken feet collagen. The thermal stability of collagen isolated by papain and pepsin revealed stable denaturation temperatures of 48.40 and 53.35°C, respectively. The FTIR spectra of both collagens were similar with amide regions in A, B, I, II and III. The study demonstrated that chicken feet collagen using papain isolation method is possible as commercial alternative ingredient. 

Keywords: Chicken feet, collagen, papain, pepsin.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 8382
768 Potential of γ-Polyglutamic Acid for Cadmium Toxicity Alleviation in Rice

Authors: N. Kotabin, Y. Tahara, K. Issakul, O. Chunhachart

Abstract:

Cadmium (II) (Cd) is one of the major toxic elemental pollutants, which is hazardous for humans, animals and plants. γ- Polyglutamic acid (γ-PGA) is an extracellular biopolymer produced by several species of Bacillus which has been reported to be an effective biosorbent for metal ions. The effect of γ-PGA on growth of rice grown under laboratory conditions was investigated. Rice seeds were germinated and then grown at 30±1°C on filter paper soaked with Cd solution and γ-PGA for 7 days. The result showed that Cd significantly inhibited the growth of roots, shoots by reducing root, and shoot lengths. Fresh and dry weights also decreased compared with control; however, the addition of 500 mg·L-1 γ-PGA alleviated rice seedlings from the adverse effects of Cd. The analysis of physiological traits revealed that Cd caused a decrease in the total chlorophyll and soluble protein contents and amylase activities in all treatments. The Cd content in seedling tissues increased for the Cd 250 μM treatment (P<0.05) but the addition of 500 mg·L-1 γ-PGA resulted in a noticeable decrease in Cd (P<0.05).

Keywords: Polyglutamic acid, Cadmium, Rice, Bacillus subtilis.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 5763
767 Improving Cryptographically Generated Address Algorithm in IPv6 Secure Neighbor Discovery Protocol through Trust Management

Authors: M. Moslehpour, S. Khorsandi

Abstract:

As transition to widespread use of IPv6 addresses has gained momentum, it has been shown to be vulnerable to certain security attacks such as those targeting Neighbor Discovery Protocol (NDP) which provides the address resolution functionality in IPv6. To protect this protocol, Secure Neighbor Discovery (SEND) is introduced. This protocol uses Cryptographically Generated Address (CGA) and asymmetric cryptography as a defense against threats on integrity and identity of NDP. Although SEND protects NDP against attacks, it is computationally intensive due to Hash2 condition in CGA. To improve the CGA computation speed, we parallelized CGA generation process and used the available resources in a trusted network. Furthermore, we focused on the influence of the existence of malicious nodes on the overall load of un-malicious ones in the network. According to the evaluation results, malicious nodes have adverse impacts on the average CGA generation time and on the average number of tries. We utilized a Trust Management that is capable of detecting and isolating the malicious node to remove possible incentives for malicious behavior. We have demonstrated the effectiveness of the Trust Management System in detecting the malicious nodes and hence improving the overall system performance.

Keywords: NDP, SEND, CGA, modifier, malicious node.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1206
766 Secure Hashing Algorithm and Advance Encryption Algorithm in Cloud Computing

Authors: Jaimin Patel

Abstract:

Cloud computing is one of the most sharp and important movement in various computing technologies. It provides flexibility to users, cost effectiveness, location independence, easy maintenance, enables multitenancy, drastic performance improvements, and increased productivity. On the other hand, there are also major issues like security. Being a common server, security for a cloud is a major issue; it is important to provide security to protect user’s private data, and it is especially important in e-commerce and social networks. In this paper, encryption algorithms such as Advanced Encryption Standard algorithms, their vulnerabilities, risk of attacks, optimal time and complexity management and comparison with other algorithms based on software implementation is proposed. Encryption techniques to improve the performance of AES algorithms and to reduce risk management are given. Secure Hash Algorithms, their vulnerabilities, software implementations, risk of attacks and comparison with other hashing algorithms as well as the advantages and disadvantages between hashing techniques and encryption are given.

Keywords: Cloud computing, encryption algorithm, secure hashing algorithm, brute force attack, birthday attack, plaintext attack, man-in-the-middle attack.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1748
765 Advanced Geolocation of IP Addresses

Authors: Robert Koch, Mario Golling, Gabi Dreo Rodosek

Abstract:

Tracing and locating the geographical location of users (Geolocation) is used extensively in todays Internet. Whenever we, e.g., request a page from google we are - unless there was a specific configuration made - automatically forwarded to the page with the relevant language and amongst others, dependent on our location identified, specific commercials are presented. Especially within the area of Network Security, Geolocation has a significant impact. Because of the way the Internet works, attacks can be executed from almost everywhere. Therefore, for an attribution, knowledge of the origination of an attack - and thus Geolocation - is mandatory in order to be able to trace back an attacker. In addition, Geolocation can also be used very successfully to increase the security of a network during operation (i.e. before an intrusion actually has taken place). Similar to greylisting in emails, Geolocation allows to (i) correlate attacks detected with new connections and (ii) as a consequence to classify traffic a priori as more suspicious (thus particularly allowing to inspect this traffic in more detail). Although numerous techniques for Geolocation are existing, each strategy is subject to certain restrictions. Following the ideas of Endo et al., this publication tries to overcome these shortcomings with a combined solution of different methods to allow improved and optimized Geolocation. Thus, we present our architecture for improved Geolocation, by designing a new algorithm, which combines several Geolocation techniques to increase the accuracy.

Keywords: IP geolocation, prosecution of computer fraud, attack attribution, target-analysis

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 4727
764 Secure Power Systems Against Malicious Cyber-Physical Data Attacks: Protection and Identification

Authors: Morteza Talebi, Jianan Wang, Zhihua Qu

Abstract:

The security of power systems against malicious cyberphysical data attacks becomes an important issue. The adversary always attempts to manipulate the information structure of the power system and inject malicious data to deviate state variables while evading the existing detection techniques based on residual test. The solutions proposed in the literature are capable of immunizing the power system against false data injection but they might be too costly and physically not practical in the expansive distribution network. To this end, we define an algebraic condition for trustworthy power system to evade malicious data injection. The proposed protection scheme secures the power system by deterministically reconfiguring the information structure and corresponding residual test. More importantly, it does not require any physical effort in either microgrid or network level. The identification scheme of finding meters being attacked is proposed as well. Eventually, a well-known IEEE 30-bus system is adopted to demonstrate the effectiveness of the proposed schemes.

Keywords: Algebraic Criterion, Malicious Cyber-Physical Data Injection, Protection and Identification, Trustworthy Power System.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1993
763 Efficacy of Polyfluoroalkyl Substances Filtration with Low-Cost Organic Fiber Filter

Authors: Gautham Das, Edward Morrone, Erik Treble, Clinton Binder

Abstract:

The purpose of this study was to evaluate the efficacy of a low-cost filter regarding per- and polyfluoroalkyl substances (PFAS). PFAS is a commonly used man-made chemical that can be found in a variety of household and industrial products with deleterious effects on humans. The filter consists of a combination of low-cost materials which could be locally procured. Water testing results for 4 different PFAS contaminants indicated that for Perfluorooctane sulfonic acid (PFOS), the Agency for Toxic Substances and Disease Registry (ATSDR) regulation is 7 ppt, the initial concentration was 15 ppt, and the final concentration was 3.9 ppt. For Perfluorononanoic acid (PFNA), the ATSDR regulation is 10.5 ppt, the initial concentration was 15 ppt, and the final concentration was 3.9 ppt. For Perfluorooctanoic acid (PFOA), the ATSDR regulation is 11 ppt, the initial concentration was 15 ppt, and the final concentration was 3.9 ppt. For Perfluorohexane sulfonic acid (PFHxS), the ATSDR regulation is 70 ppt, the initial concentration was 15 ppt, and the final concentration was 3.9 ppt. The results indicated a 74% reduction in PFAS concentration in filtered samples. Statistical data through regression analysis showed 0.9 validity of the sample data. Initial tests show the efficiency of the proposed filter described could be far greater if tested at a greater scale. It is highly recommended further testing to be conducted to validate the data for an innovative solution to a ubiquitous problem.

Keywords: PFAS, PFOS, PFOA, PFHxS, low-cost filter.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 654
762 Mathematical Modeling for Continuous Reactive Extrusion of Poly Lactic Acid formation by Ring Opening Polymerization Considering Metal/Organic Catalyst and Alternative Energies

Authors: Satya P. Dubey, Hrushikesh A. Abhyankar, Veronica Marchante, James L. Brighton, Björn Bergmann

Abstract:

PLA emerged as a promising polymer because of its property as a compostable, biodegradable thermoplastic made from renewable sources. PLA can be polymerized from monomers (Lactide or Lactic acid) obtained by fermentation processes from renewable sources such as corn starch or sugarcane. For PLA synthesis, ring opening polymerization (ROP) of Lactide monomer is one of the preferred methods. In the literature, the technique mainly developed for ROP of PLA is based on metal/bimetallic catalyst (Sn, Zn and Al) or other organic catalysts in suitable solvent. However, the PLA synthesized using such catalysts may contain trace elements of the catalyst which may cause toxicity. This work estimated the usefulness and drawbacks of using different catalysts as well as effect of alternative energies and future aspects for PLA production.

Keywords: Alternative energy, bio-degradable, metal catalyst, poly lactic acid (PLA), ring opening polymerization (ROP).

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 2798
761 Using Malolactic Fermentation with Acid- And Ethanol- Adapted Oenococcus Oeni Strain to Improve the Quality of Wine from Champs Bourcin Grape in Sapa - Lao Cai

Authors: Pham Thu Thuy, Nguyen Lan Huong, Chu Ky Son

Abstract:

Champs Bourcin black grape originated from Aquitaine, France and planted in Sapa, Lao cai provice, exhibited high total acidity (11.72 g/L). After 9 days of alcoholic fermentation at 25oC using Saccharomyces cerevisiae UP3OY5 strain, the ethanol concentration of wine was 11.5% v/v, however the sharp sour taste of wine has been found. The malolactic fermentation (MLF) was carried out by Oenococcus oeni ATCCBAA-1163 strain which had been preadapted to acid (pH 3-4) and ethanol (8-12%v/v) conditions. We obtained the highest vivability (83.2%) upon malolactic fermentation after 5 days at 22oC with early stationary phase O. oeni cells preadapted to pH 3.5 and 8% v/v ethanol in MRS medium. The malic acid content in wine was decreased from 5.82 g/L to 0.02 g/L after MLF (21 days at 22oC). The sensory quality of wine was significantly improved.

Keywords: Champs Bourcin grape, malolactic fermentation, pre-adaptation, Oenococcus oeni

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1712
760 5-Aminolevulinic Acid-Loaded Gel, Sponge Collagen to Enhance the Delivery Ability to Skin

Authors: Yi-Ping Fang, Hsien-Ting Cheng

Abstract:

Topical photodynamic therapy (PDT) with 5-aminolevulinic acid (ALA) is an alternative therapy for treating superficial cancer, especially for skin or oral cancer. ALA, a precursor of the photosensitizer protoporphyrin IX (PpIX), is present as zwitterions and hydrophilic property which make the low permeability through the cell membrane. Collagen is a traditional carrier; its molecular composed various amino acids which bear positive charge and negative charge. In order to utilize the ion-pairs with ALA and collagen, the study employed various pH values adjusting the net charge. The aim of this study was to compare a series collagen form, including solution, gel and sponge to investigate the topical delivery behavior of ALA. The in vivo confocal laser scanning microscopy (CLSM) study demonstrated that PpIX generation ability was different pattern after apply for 6 h. Gel type could generate high PpIX, and archived more deep of skin depth.

Keywords: 5-Aminolevulinic acid (ALA), Collagen, Ion-pairs, Penetration behavior

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1739
759 Effect of Rearing Systems on Fatty Acid Composition and Cholesterol Content of Thai Indigenous Chicken Meat

Authors: W. Molee, P. Puttaraksa, S. Khempaka

Abstract:

The experiment was conducted to study the effect of rearing systems on fatty acid composition and cholesterol content of Thai indigenous chicken meat. Three hundred and sixty chicks were allocated to 2 different rearing systems: conventional, housing in an indoor pen (5 birds/m2); free-range, housing in an indoor pen (5 birds/m2) with access to a grass paddock (1 bird/m2) from 8 wk of age until slaughter. All birds were provided with the same diet during the experimental period. At 16 wk of age, 24 birds per group were slaughtered to evaluate the fatty acid composition and cholesterol content of breast and thigh meat. The results showed that the proportion of SFA, MUFA and PUFA in breast and thigh meat were not different among groups (P>0.05). However, the proportion of n-3 fatty acids was higher and the ratio of n-6 to n-3 fatty acids was lower in free-range system than in conventional system (P<0.05). There was no difference between groups in cholesterol content in breast and thigh meat (P>0.05). The data indicated that the free-range system could increase the proportion of n-3 fatty acids, but no effect on cholesterol content in Thai indigenous chicken meat.

Keywords: Cholesterol, fatty acid composition, free-range, Thai indigenous chicken

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 2019
758 Hydrogen Storage In Single-Walled Carbon Nanotubes Purified By Microwave Digestion Method

Authors: Neslihan Yuca, Nilgün Karatepe

Abstract:

The aim of this study was to synthesize the single walled carbon nanotubes (SWCNTs) and determine their hydrogen storage capacities. SWCNTs were firstly synthesized by chemical vapor deposition (CVD) of acetylene (C2H2) on a magnesium oxide (MgO) powder impregnated with an iron nitrate (Fe(NO3)3·9H2O) solution. The synthesis parameters were selected as: the synthesis temperature of 800°C, the iron content in the precursor of 5% and the synthesis time of 30 min. Purification process of SWCNTs was fulfilled by microwave digestion at three different temperatures (120, 150 and 200 °C), three different acid concentrations (0.5, 1 and 1.5 M) and for three different time intervals (15, 30 and 60 min). Nitric acid (HNO3) was used in the removal of the metal catalysts. The hydrogen storage capacities of the purified materials were measured using volumetric method at the liquid nitrogen temperature and gas pressure up to 100 bar. The effects of the purification conditions such as temperature, time and acid concentration on hydrogen adsorption were investigated.

Keywords: Carbon nanotubes, purification, microwavedigestion, hydrogen storage

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 2246
757 Identification Characterization and Production of Phytase from Endophytic Fungi

Authors: Yetti Marlida , Rina Delfita , Neni Gusmanizar, Gita Ciptaan

Abstract:

Phytases are acid phosphatase enzymes, which efficiently cleave phosphate moieties from phytic acid, thereby generating myo-inositol and inorganic phosphate. Thirty four isolates of endophytic fungi to produce of phytases were isolated from leaf, stem and root fragments of soybean. Screening of 34 isolates of endophytic fungi identified the phytases produced by Rhizoctonia sp. and Fusarium verticillioides . The phytase production were the best induced by phytic acid and rice bran compared the others inducer in submerged fermentation medium used. The phytase produced by both Rhizoctonia sp. and F. verticillioides have pH optimum at 4.0 and 5.0 respectively. The characterization of phytase from Fusarium verticillioides showed that temperature optimum was 500C and stability until 600C, the pH optimum 5.0 and pH stability was 2.5 – 6.0, and substrate specificity were rice bran>soybean meal>corn> coconut cake, respectively.

Keywords: endophytic fungus, phytase, soybean, Rhizoctoniasp., Fusarium verticillioides,

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 2598