Search results for: SQL injection attacks
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 584

Search results for: SQL injection attacks

134 Assessment of Modern RANS Models for the C3X Vane Film Cooling Prediction

Authors: Mikhail Gritskevich, Sebastian Hohenstein

Abstract:

The paper presents the results of a detailed assessment of several modern Reynolds Averaged Navier-Stokes (RANS) turbulence models for prediction of C3X vane film cooling at various injection regimes. Three models are considered, namely the Shear Stress Transport (SST) model, the modification of the SST model accounting for the streamlines curvature (SST-CC), and the Explicit Algebraic Reynolds Stress Model (EARSM). It is shown that all the considered models face with a problem in prediction of the adiabatic effectiveness in the vicinity of the cooling holes; however, accounting for the Reynolds stress anisotropy within the EARSM model noticeably increases the solution accuracy. On the other hand, further downstream all the models provide a reasonable agreement with the experimental data for the adiabatic effectiveness and among the considered models the most accurate results are obtained with the use EARMS.

Keywords: Discrete holes film cooling, Reynolds Averaged Navier-Stokes, Reynolds stress tensor anisotropy, turbulent heat transfer.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1123
133 A Normalization-based Robust Image Watermarking Scheme Using SVD and DCT

Authors: Say Wei Foo, Qi Dong

Abstract:

Digital watermarking is one of the techniques for copyright protection. In this paper, a normalization-based robust image watermarking scheme which encompasses singular value decomposition (SVD) and discrete cosine transform (DCT) techniques is proposed. For the proposed scheme, the host image is first normalized to a standard form and divided into non-overlapping image blocks. SVD is applied to each block. By concatenating the first singular values (SV) of adjacent blocks of the normalized image, a SV block is obtained. DCT is then carried out on the SV blocks to produce SVD-DCT blocks. A watermark bit is embedded in the highfrequency band of a SVD-DCT block by imposing a particular relationship between two pseudo-randomly selected DCT coefficients. An adaptive frequency mask is used to adjust local watermark embedding strength. Watermark extraction involves mainly the inverse process. The watermark extracting method is blind and efficient. Experimental results show that the quality degradation of watermarked image caused by the embedded watermark is visually transparent. Results also show that the proposed scheme is robust against various image processing operations and geometric attacks.

Keywords: Image watermarking, Image normalization, Singularvalue decomposition, Discrete cosine transform, Robustness.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 2097
132 Influence of After Body Shape on the Performance of Blunt Shaped Bodies as Vortex Shedders

Authors: Lavish Ordia, A. Venugopal, Amit Agrawal, S. V. Prabhu

Abstract:

The present study explores flow visualization experiments with various blunt shaped bluff bodies placed inside a circular pipe. The bodies mainly comprise of modifications of trapezoidal cylinder, most widely used in practical applications, such as vortex flowmeters. The present configuration possesses the feature of both internal and external flows with low aspect ratio. The vortex dynamics of bluff bodies in such configuration is seldom reported in the literature. Dye injection technique is employed to visualize the complex vortex formation mechanism behind the bluff bodies. The influence of orientation, slit and after body shape is studied in an attempt to obtain better understanding of the vortex formation mechanism. Various wake parameters like Strouhal number, vortex formation length and wake width are documented for these shapes. Vortex formation both with and without shear layer interaction is observed for most of the shapes.

Keywords: Flow visualization, Reynolds number, Strouhal number, vortex, vortex formation length, wake width.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 2979
131 Absorbed Dose Estimation of 177Lu-DOTATOC in Adenocarcinoma Breast Cancer Bearing Mice

Authors: S. Zolghadri, M. Mousavi-Daramoroudi, H. Yousefnia, F. Abbasi-Davani

Abstract:

In this study, the absorbed dose of human organs after injection of 177Lu-DOTATOC was studied based on the biodistribution of the complex in adenocarcinoma breast cancer bearing mice. For this purpose, the biodistribution of the radiolabelled complex was studied and compartmental modeling was applied to calculate the absorbed dose with high precision. As expected, 177Lu-DOTATOC illustrated a notable specific uptake in tumor and pancreas, organs with high level of somatostatin receptor on their surface and the effectiveness of the radio-conjugate for targeting of the breast adenocarcinoma tumors was indicated. The elicited results of modeling were the exponential equations, and those are utilized for obtaining the cumulated activity data by taking their integral. The results also exemplified that non-target absorbed-doses such as the liver, spleen and pancreas were approximately 0.008, 0.004, and 0.039, respectively. While these values were so much lower than target (tumor) absorbed-dose, it seems due to this low toxicity, this complex is a good agent for therapy.

Keywords: Breast cancer, compartmental modeling, 177Lu, dosimetry.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 749
130 Pathological Truth: The Use of Forensic Science in Kenya’s Criminal Justice System

Authors: Peter Ndichu Muriuki

Abstract:

Assassination of politicians, school mass murders, purported suicides, aircraft crash, mass shootings by police, sinking of sea ferries, mysterious car accidents, mass fire deaths and horrificterror attacks are some of the cases that bring forth scientific and legal conflicts. Questions about truth, justice and human rights are raised by both victims and perpetrators/offenders as they seek to understand why and how it happened to them. This kind of questioning manifests itself in medical-criminological-legalpsychological and scientific realms. An agreement towards truthinvestigations for possible legal-political-psychological transitory issues such as prosecution, victim-offender mediation, healing, reconciliation, amnesty, reparation, restitution, and policy formulations is seen as one way of transforming these conflicts. Forensic scientists and pathologists in particular have formed professional groups where the complexities between legal truth and scientific truth are dramatized and elucidated within the anatomy of courtrooms. This paper focuses on how pathological truth and legal truth interact with each other in Kenya’s criminal justice system. 

Keywords: Forensic pathology, forensic science, pathological truth, truth investigations.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 4891
129 Mechanical Characterization of Mango Peel Flour and Biopolypropylene Composites Compatibilized with PP-g-IA

Authors: J. Gomez-Caturla, L. Quiles-Carrillo, J. Ivorra-Martinez, D. Garcia-Garcia, R. Balart

Abstract:

The present work reports on the development of wood plastic composites based on biopolypropylene (BioPP) and mango peel flour (MPF) by extrusion and injection molding processes. PP-g-IA and dicumyl peroxide (DCP) have been used as a compatibilizer and as a free radical initiator for reactive extrusion, respectively. Mechanical and morphological properties have been characterized in order to study the compatibility of the blends. The obtained results showed that DCP and PP-g-IA improved the stiffness of BioPP in terms of elastic modulus. Moreover, they positively increased the tensile strength and elongation at break of the blends in comparison with the sample that only had BioPP and MPF on its composition, improving the affinity between both compounds. DCP and PP-g-IA even seem to have certain synergy, which was corroborated through Field Emission Scanning Electron Microscopy (FESEM) analysis. Images showed that the MPF particles had greater adhesion to the polymer matrix when PP-g-IA and DCP were added. This effect was more intense when both elements were added, observing an almost inexistent gap between MPF particles and the BioPP matrix.

Keywords: Biopolypropylene, compatibilization, mango peel flour, wood plastic composite.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 398
128 Hybrid Intelligent Intrusion Detection System

Authors: Norbik Bashah, Idris Bharanidharan Shanmugam, Abdul Manan Ahmed

Abstract:

Intrusion Detection Systems are increasingly a key part of systems defense. Various approaches to Intrusion Detection are currently being used, but they are relatively ineffective. Artificial Intelligence plays a driving role in security services. This paper proposes a dynamic model Intelligent Intrusion Detection System, based on specific AI approach for intrusion detection. The techniques that are being investigated includes neural networks and fuzzy logic with network profiling, that uses simple data mining techniques to process the network data. The proposed system is a hybrid system that combines anomaly, misuse and host based detection. Simple Fuzzy rules allow us to construct if-then rules that reflect common ways of describing security attacks. For host based intrusion detection we use neural-networks along with self organizing maps. Suspicious intrusions can be traced back to its original source path and any traffic from that particular source will be redirected back to them in future. Both network traffic and system audit data are used as inputs for both.

Keywords: Intrusion Detection, Network Security, Data mining, Fuzzy Logic.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 2133
127 Preliminary Dosimetric Evaluation of a New Therapeutic 177Lu Complex for Human Based on Biodistribution Data in Rats

Authors: H. Yousefnia, S. Zolghadri, A. Golabi Dezfuli

Abstract:

Abstract—[Tris (1,10-phenanthroline) lanthanum(III)] trithiocyanate is a new compound that has shown high ability for stopping the synthesis of DNA and also acting as a photosensitizer. Nowadays, the radiation dose assessment resource (RADAR) method is known as the most common method for absorbed dose calculation. 177Lu was produced by (n, gamma) reaction in a research reactor. 177Lu-PL3 was prepared in the optimized condition. The radiochemical yield was checked by ITLC method. The biodistribution of the complex was investigated by intravenously injection to wild-type rats via their tail veins. In this study, the absorbed dose of 177Lu-PL3 to human organs was estimated by RADAR method. 177Lu was prepared with a specific activity of 2.6-3 GBq.mg-1 and radionuclide purity of 99.98 %. Final preparation of the radiolabelled complex showed high radiochemical purity of > 99%. The results show that liver and spleen have received the highest absorbed dose of 1.051 and 0.441 mSv/MBq, respectively. The absorbed dose values for these two dose-limiting tissues suggest more biological studies special in tumor-bearing animals.

Keywords: Internal dosimetry, Lutetium-177, radar.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 2048
126 A Simulation Study of Direct Injection Compressed Natural Gas Spark Ignition Engine Performance Utilizing Turbulent Jet Ignition with Controlled Air Charge

Authors: Siyamak Ziyaei, Siti Khalijah Mazlan, Petros Lappas

Abstract:

Compressed natural gas (CNG) is primarily composed of methane (CH4), and has a lower carbon to hydrogen ratio than other hydrocarbon fuels such as gasoline (C8H18) and diesel (C12H23). Consequently, it has the potential to reduce CO2 emissions compared to conventional fuels. Although Natural Gas (NG) has environmental advantages compared to other hydrocarbon fuels, its main component, CH4, burns at a slower rate compared to the conventional fuels. A higher pressure and leaner cylinder environment will unravel the slow burn characteristic of CH4. Lean combustion and high compression ratios are well-known methods for increasing the efficiency of internal combustion engines. In order to achieve successful a CNG lean combustion in Spark Ignition (SI) engines, a strong ignition system is essential to avoid engine misfires, especially in ultra-lean conditions. Turbulent Jet Ignition (TJI) is an ignition system that employs a pre-combustion chamber to ignite the lean fuel mixture in the main combustion chamber using a fraction of the total fuel per cycle. TJI enables ultra-lean combustion by providing distributed ignition sites through orifices. The fast burn rate provided by TJI enables the ordinary SI engine to be comparable to other combustion systems such as Homogeneous Charge Compression Ignition (HCCI) or Controlled Auto-Ignition (CAI) in terms of thermal efficiency, through the increased levels of dilution without the need of sophisticated control systems. Due to the physical geometry of TJI, which contains small orifices that connect the pre-chamber to the main chamber, providing the right mixture of fuel and air has been identified as a key challenge due to the insufficient amount of air that is pushed into the pre-chamber during each compression stroke. There is also the problem of scavenging which contributed to the factors that reduces the TJI performance. Combustion residual gases such as CO2, CO and NOx from the previous combustion cycle dilute the pre-chamber fuel-air mixture preventing rapid combustion in the pre-chamber. An air-controlled active TJI is presented in this paper in order to address these issues. By supplying air into the pre-chamber at a sufficient pressure, residual gases are exhausted, and the air-fuel ratio is controlled within the pre-chamber, thereby improving the quality of the combustion. An investigation of the 3D combustion characteristics of a CNG-fueled SI engine using a direct injection fuelling strategy employing an air channel in the prechamber is presented in this paper. Experiments and simulations were performed at the Worldwide Mapping Point (WWMP) at 1500 revolutions per minute (rpm), 3.3 bar Indicated Mean Effective Pressure (IMEP), using only conventional spark plugs as a baseline. With a validated baseline engine simulation, the settings were set for all simulation scenarios at λ=1. Following that, the pre-chambers with and without an auxiliary fuel supply were simulated. In the study of (DI-CNG) SI engine, active TJI was observed to perform better than passive TJI and conventional  spark plug ignition. In conclusion, the active pre-chamber with an air channel demonstrated an improved thermal efficiency (ηth) over other counterparts and conventional spark ignition systems.

Keywords: Turbulent Jet Ignition, Active Air Control Turbulent Jet Ignition, Pre-chamber ignition system, Active and Passive Pre-chamber, thermal efficiency, methane combustion, internal combustion engine combustion emissions.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 177
125 Enzymes Activity in Bovine Cervical Mucus Related to the Time of Ovulation And Insemination

Authors: S. Benbia, A.Kalla, M. Yahia, K. Belhadi, A. Zidani

Abstract:

Forty-five dairy cows were used to compare the enzyme activity of alkaline phosphatase (ALP), lactate dehydrogenase (LDH), α -amylase in the cervical mucus of cows during spontaneous and induced estrus using progestagen or PGF2 α and to determine whether these enzymes affect the fertility in cows with induced estrus, at the time of Al. The animals were assigned to 3 groups (no treatment, a Crestar® for 12 days, a double im injection of PGF2 α). The cows were artificially inseminated (AI). Cervical mucus samples were collected from all cows 3 to 5 min before the AI. The results are summarized as follows: ALP and α -amylase activity for spontaneous estrus were similar to those for induced estrus (P>0.05) . LDH activity levels during spontaneous and PGF2 α induced estrus was significantly lower (P < 0.001) than that in progestagene induced estrus groups. While no difference was found between the first and the third groups. Our result showed a significant difference in LDH activity levels between cows conceived with 2 or more AI and those conceived with 1 AI. The result of this study showed that the enzyme activity in cervical mucus is helpful for detection of ovulation and time of AI.

Keywords: cervical mucus, dairy cow, enzyme, induced, estrus, ovulation, AI

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 2103
124 Copy-Move Image Forgery Detection in Virtual Electrostatic Field

Authors: Michael Zimba, Darlison Nyirenda

Abstract:

A novel copy-move image forgery, CMIF, detection method is proposed. The proposed method presents a new approach which relies on electrostatic field theory, EFT. Solely for the purpose of reducing the dimension of a suspicious image, the proposed algorithm firstly performs discrete wavelet transform, DWT, of the suspicious image and extracts only the approximation subband. The extracted subband is then bijectively mapped onto a virtual electrostatic field where concepts of EFT are utilized to extract robust features. The extracted features are invariant to additive noise, JPEG compression, and affine transformation. Finally, same affine transformation selection, SATS, a duplication verification method, is applied to detect duplicated regions. SATS is a better option than the common shift vector method because SATS is insensitive to affine transformation. Consequently, the proposed CMIF algorithm is not only fast but also more robust to attacks compared to the existing related CMIF algorithms. The experimental results show high detection rates, as high as 100% in some cases.

Keywords: Affine transformation, Radix sort, SATS, Virtual electrostatic field.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1816
123 Attenuation of Pancreatic Histology, Hematology and Biochemical Parameters in Type 2 Diabetic Rats Treated with Azadirachta excelsa

Authors: S. Nurdiana, A. S. Nor Haziqah, M. K. Nur Ezwa Khairunnisa, S. Nurul `Izzati, Y. Siti Amna M. J. Norashirene, I. Nur Hilwani

Abstract:

Azadirachta excelsa or locally known as sentang are frequently used as a traditional medicine by diabetes patients in Malaysia. However, less attention has been given to their toxicity effect. Thus, the study is an attempt to examine the protective effect of A. excelsa on the pancreas and to determine possible toxicity mediated by the extract. Diabetes was induced experimentally in rats by high-fat-diet for 16 weeks followed by intraperitoneal injection of streptozotocin at dosage of 35 mg/kg of body weight. Declination of the fasting blood glucose level was observed after continuous administration of A. excelsa for 14 days twice daily. This is due to the refining structure of the pancreas. However, surprisingly, the plant extract reduced the leukocytes, erythrocytes, hemoglobin, MCHC and lymphocytes. In addition, the rat treated with the plant extract exhibited increment in AST and eosinocytes level. Overall, the finding shows that A. excelsa possesses antidiabetic activity by improving the structure of pancreatic islet of Langerhans but involved in ameliorating of hematology and biochemical parameters.

Keywords: Azadirachta excelsa, diabetes, pancreas, hematobiochemical parameters.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 2294
122 A Copyright Protection Scheme for Color Images using Secret Sharing and Wavelet Transform

Authors: Shang-Lin Hsieh, Lung-Yao Hsu, I-Ju Tsai

Abstract:

This paper proposes a copyright protection scheme for color images using secret sharing and wavelet transform. The scheme contains two phases: the share image generation phase and the watermark retrieval phase. In the generation phase, the proposed scheme first converts the image into the YCbCr color space and creates a special sampling plane from the color space. Next, the scheme extracts the features from the sampling plane using the discrete wavelet transform. Then, the scheme employs the features and the watermark to generate a principal share image. In the retrieval phase, an expanded watermark is first reconstructed using the features of the suspect image and the principal share image. Next, the scheme reduces the additional noise to obtain the recovered watermark, which is then verified against the original watermark to examine the copyright. The experimental results show that the proposed scheme can resist several attacks such as JPEG compression, blurring, sharpening, noise addition, and cropping. The accuracy rates are all higher than 97%.

Keywords: Color image, copyright protection, discrete wavelet transform, secret sharing, watermarking.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1847
121 Mixed Convection in a 2D-channel with a Co- Flowing Fluid Injection: Influence of the Jet Position

Authors: Ameni Mokni, Hatem Mhiri, Georges Le Palec, Philippe Bournot

Abstract:

Numerical study of a plane jet occurring in a vertical heated channel is carried out. The aim is to explore the influence of the forced flow, issued from a flat nozzle located in the entry section of a channel, on the up-going fluid along the channel walls. The Reynolds number based on the nozzle width and the jet velocity ranges between 3 103 and 2.104; whereas, the Grashof number based on the channel length and the wall temperature difference is 2.57 1010. Computations are established for a symmetrically heated channel and various nozzle positions. The system of governing equations is solved with a finite volumes method. The obtained results show that the jet-wall interactions activate the heat transfer, the position variation modifies the heat transfer especially for low Reynolds numbers: the heat transfer is enhanced for the adjacent wall; however it is decreased for the opposite one. The numerical velocity and temperature fields are post-processed to compute the quantities of engineering interest such as the induced mass flow rate, and the Nusselt number along the plates.

Keywords: Channel, Heat flux, Jet, Mixed convection.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1756
120 Understanding Charge Dynamics in Elastomers Adopting Pulsed Electro Acoustic (PEA) Technique

Authors: R. Sarathi, M. G. Danikas, Y. Chen, T. Tanaka

Abstract:

In the present work, Pulsed Electro Acoustic (PEA) technique was adopted to understand the space charge dynamics in elastomeric material. It is observed that the polarity of the applied DC voltage voltage and its magnitude alters the space charge dynamics in insulation structure. It is also noticed that any addition of compound to the base material/processing technique have characteristic variation in the space charge injection process. It could be concluded based on the present work that the plasticizer could inject heterocharges into the insulation medium. Also it is realized that space charge magnitude is less with the addition of plasticizer. In the PEA studies, it is observed that local electric field in the insulating material can be much more than applied electric field due to space charge formation. One of the important conclusions arrived at based on PEA technique is that one could understand the safe operating electric field of an insulation material and the charge trap sites.

Keywords: Pulsed electro acoustic technique, space charge, DCvoltage, elastomers, Electric field, high voltage.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1447
119 Web Page Watermarking: XML files using Synonyms and Acronyms

Authors: Nighat Mir, Sayed Afaq Hussain

Abstract:

Advent enhancements in the field of computing have increased massive use of web based electronic documents. Current Copyright protection laws are inadequate to prove the ownership for electronic documents and do not provide strong features against copying and manipulating information from the web. This has opened many channels for securing information and significant evolutions have been made in the area of information security. Digital Watermarking has developed into a very dynamic area of research and has addressed challenging issues for digital content. Watermarking can be visible (logos or signatures) and invisible (encoding and decoding). Many visible watermarking techniques have been studied for text documents but there are very few for web based text. XML files are used to trade information on the internet and contain important information. In this paper, two invisible watermarking techniques using Synonyms and Acronyms are proposed for XML files to prove the intellectual ownership and to achieve the security. Analysis is made for different attacks and amount of capacity to be embedded in the XML file is also noticed. A comparative analysis for capacity is also made for both methods. The system has been implemented using C# language and all tests are made practically to get the results.

Keywords: Watermarking, Extensible Markup Language (XML), Synonyms, Acronyms, Copyright protection.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 2284
118 Support Vector Machine based Intelligent Watermark Decoding for Anticipated Attack

Authors: Syed Fahad Tahir, Asifullah Khan, Abdul Majid, Anwar M. Mirza

Abstract:

In this paper, we present an innovative scheme of blindly extracting message bits from an image distorted by an attack. Support Vector Machine (SVM) is used to nonlinearly classify the bits of the embedded message. Traditionally, a hard decoder is used with the assumption that the underlying modeling of the Discrete Cosine Transform (DCT) coefficients does not appreciably change. In case of an attack, the distribution of the image coefficients is heavily altered. The distribution of the sufficient statistics at the receiving end corresponding to the antipodal signals overlap and a simple hard decoder fails to classify them properly. We are considering message retrieval of antipodal signal as a binary classification problem. Machine learning techniques like SVM is used to retrieve the message, when certain specific class of attacks is most probable. In order to validate SVM based decoding scheme, we have taken Gaussian noise as a test case. We generate a data set using 125 images and 25 different keys. Polynomial kernel of SVM has achieved 100 percent accuracy on test data.

Keywords: Bit Correct Ratio (BCR), Grid Search, Intelligent Decoding, Jackknife Technique, Support Vector Machine (SVM), Watermarking.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1671
117 Mechanical Strengths of Self-Compacting Mortars Prepared with the Pozzolanic Cement in Aggressive Environments

Authors: M. Saidi, I. Djefour, F. Ait Medjber, A. Melouane, A. Gacem

Abstract:

The objective of this research is to study the physical and mechanical properties and durability of self-compacting mortars prepared by substituting a part of cement up to a percentage of 30% pozzolan according to different Blaine specific surface area (SSB1=7000 cm2/g and SSB=9000 cm2/g)). Order to evaluate durability, mortars were subjected to chemical attacks in various aggressive environments, a solution of a mixture of nitric acid and ammonium nitrate (HNO3 + NH4NO3) and a magnesium sulfate salt solution (MgSO4)) with a concentration of 10%, for a period of one month. This study is complemented by a comparative study of the durability of mortars elaborated with sulphate resistant cement (SRC). The results show that these mortars develop long-term, mechanical and chemical resistance better than mortars based Portland cement with 5% gypsum (CEM 1) and SRC. We found that the mass losses are lowest in mortars elaborated with pozzolanic cement (30% substitution with SSB2) in both of chemical attack solutions (3.28% in the solution acid and 1.16% in the salt solution) and the compressive strength gains of 14.68% and 8.5% respectively in the two media. This is due to the action of pozzolan which fixes portlandite to form hydrated calcium silicate (CSH) from the hydration of tricalcic silicate (C3S).

Keywords: Aggressive environments, durability, mechanical strengths, pozzolanic cement, self-compacting mortar.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 979
116 Biodistribution Studies of 177Lu-DOTATOC in Mouse Tumor Model: Possible Utilization in Adenocarcinoma Breast Cancer Treatment

Authors: M. Mousavi-Daramoroudi, H. Yousefnia, F. Abbasi-Davani, S. Zolghadri, S. Kakaei

Abstract:

Despite the appropriate characteristics of 177Lu and DOTATOC, to our best knowledge, the therapeutic benefit of 177Lu-DOTATOC complex in breast cancer has not been reported until now. In this study, biodistribution of 177Lu-DOTA-TOC in mouse tumor model for evaluation of possible utilization of this complex in breast cancer treatment was investigated.177Lu was prepared with the specific activity of 2.6-3 GBq.mg-1 and radionuclidic purity higher than 99%. The radiolabeled complex was prepared in the optimized conditions with the radiochemical purity higher than 99%. The final solution was injected to the BALB/c mice with adenocarcinoma breast cancer. The biodistribution results showed major accumulation in the kidneys as the major excretion route and the somatostatin receptor-positive tissues such as pancreas compared with the other tissues. Also, significant uptake was observed in tumor even in longer time after injection. According to the results obtained in this research study, somatostatin receptors expressed in breast cancers can be targeted with DOTATOC analogues especially with 177Lu-DOTATOC as an ideal therapeutic agent.

Keywords: 177Lu, DOTATOC, adenocarcinoma, breast cancer, BALB/c mice.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 849
115 A Computational Study of the Effect of Intake Design on Volumetric Efficiency for Best Performance in Motorsport

Authors: Dominic Wentworth-Linton, Shian Gao

Abstract:

This project was aimed at investigating the effect of velocity stacks on the intakes of internal combustion engines for motorsport applications. The intake systems in motorsport are predominantly fuel injection with a plate mounted for the stacks. Using Computational Fluid Dynamics software, the relationship between the stack length and power and torque delivery across the engine’s rev range was investigated and the results were used to choose the best option for its intended motorsport discipline. The test results are expected to vary with engine geometry and its natural manufacturer characteristics. The test was also relevant in bridging between computational data and real simulation as the results show flow, pressure and velocity readings but the behaviour of the engine is inferred from the nature of each test. The results of the data analysis were tested in a real-life simulation on a dynamometer to prove the theory of stack length on power and torque delivery, which helps determine the most suitable stack for the Vauxhall engine for rallying in the Caribbean.

Keywords: CFD simulation, internal combustion engine, intake system, dynamometer test.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 2248
114 Examination of the Reasons for the Formation of Red Oil in Spent Caustic from Olefin Plant

Authors: Mehdi Seifollahi, Ashkan Forootan, Sajjad Bahrami Reyhan

Abstract:

Due to the complexity of olefinic plants, various environmental pollutants exist such as NOx, CO2, Tar Water, and most importantly Spent Caustic. In this paper, instead of investigating ways of treating this pollutant, we evaluated the production in relation to plant’s variable items. We primarily discussed the factors affecting the quality of the output spent caustic such as impurities in the feed of olefin plant, the amount of injected dimethyl disulfide (DMDS) in furnaces, variation in feed composition, differences among gas temperatures and the concentration of caustic solution at the bottom of the tower. The results of the laboratory proved that in the formation of Red Oil, 1,3butadiene and acetaldehyde followed free radical and aldol condensation mechanism respectively. By increasing the injection rate of DMDS, Mercaptide amount increases in the effluent. In addition, pyrolysis gasoline accumulation is directly related to caustic concentration in the tower. Increasing naphtenes in the liquid feed augments the amount of 1,3butadiene, as one of the sources of Red Oil formation. By increasing the oxygenated compound in the feed, the rate of acetaldehyde formation, as the main source of Red Oil formation, increases.

Keywords: Olefin, spent caustic, red oil, caustic wash tower.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 2229
113 RUPSec: An Extension on RUP for Developing Secure Systems - Requirements Discipline

Authors: Mohammad Reza Ayatollahzadeh Shirazi, Pooya Jaferian, Golnaz Elahi, Hamid Baghi, Babak Sadeghian

Abstract:

The world is moving rapidly toward the deployment of information and communication systems. Nowadays, computing systems with their fast growth are found everywhere and one of the main challenges for these systems is increasing attacks and security threats against them. Thus, capturing, analyzing and verifying security requirements becomes a very important activity in development process of computing systems, specially in developing systems such as banking, military and e-business systems. For developing every system, a process model which includes a process, methods and tools is chosen. The Rational Unified Process (RUP) is one of the most popular and complete process models which is used by developers in recent years. This process model should be extended to be used in developing secure software systems. In this paper, the Requirement Discipline of RUP is extended to improve RUP for developing secure software systems. These proposed extensions are adding and integrating a number of Activities, Roles, and Artifacts to RUP in order to capture, document and model threats and security requirements of system. These extensions introduce a group of clear and stepwise activities to developers. By following these activities, developers assure that security requirements are captured and modeled. These models are used in design, implementation and test activitie

Keywords:

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 2812
112 Bioengineering for Customized Orthodontic Applications- Implant, Bracket and Dental Vibrator

Authors: Rajashekar Patil, S. Mohan Kumar, Shreya Ajmera

Abstract:

To understand complex living system an effort has made by mechanical engineers and dentists to deliver prompt products and services to patients concerned about their aesthetic look. Since two decades various bracket systems have designed involving techniques like milling, injection molding which are technically not flexible for the customized dental product development. The aim of this paper to design, develop a customized system which is economical and mainly emphasizes the expertise design and integration of engineering and dental fields. A custom made selfadjustable lingual bracket and customized implants are designed and developed using computer aided design (CAD) and rapid prototyping technology (RPT) to improve the smiles and to overcome the difficulties associated with conventional ones. Lengthy orthodontic treatment usually not accepted by the patients because the patient compliance is lost. Patient-s compliance can be improved by facilitating faster tooth movements by designing a localized dental vibrator using advanced engineering principles.

Keywords: Orthodontics, Prosthodontics, Lingual bracket, Implants, Dental vibrator, Computer aided design, Rapid prototyping technology.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 3150
111 Secure Block-Based Video Authentication with Localization and Self-Recovery

Authors: Ammar M. Hassan, Ayoub Al-Hamadi, Yassin M. Y. Hasan, Mohamed A. A. Wahab, Bernd Michaelis

Abstract:

Because of the great advance in multimedia technology, digital multimedia is vulnerable to malicious manipulations. In this paper, a public key self-recovery block-based video authentication technique is proposed which can not only precisely localize the alteration detection but also recover the missing data with high reliability. In the proposed block-based technique, multiple description coding MDC is used to generate two codes (two descriptions) for each block. Although one block code (one description) is enough to rebuild the altered block, the altered block is rebuilt with better quality by the two block descriptions. So using MDC increases the ratability of recovering data. A block signature is computed using a cryptographic hash function and a doubly linked chain is utilized to embed the block signature copies and the block descriptions into the LSBs of distant blocks and the block itself. The doubly linked chain scheme gives the proposed technique the capability to thwart vector quantization attacks. In our proposed technique , anyone can check the authenticity of a given video using the public key. The experimental results show that the proposed technique is reliable for detecting, localizing and recovering the alterations.

Keywords: Authentication, hash function, multiple descriptioncoding, public key encryption, watermarking.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1941
110 Effect of Recycle Gas on Activity and Selectivity of Co-Ru/Al2O3 Catalyst in Fischer- Tropsch Synthesis

Authors: A.A.Rohani, B.Hatami, L.Jokar, F.khorasheh, A.A.Safekordi

Abstract:

In industrial scale of Gas to Liquid (GTL) process in Fischer-Tropsch (FT) synthesis, a part of reactor outlet gases such as CO2 and CH4 as side reaction products, is usually recycled. In this study, the influence of CO2 and CH4 on the performance and selectivity of Co-Ru/Al2O3 catalyst is investigated by injection of these gases (0-20 vol. % of feed) to the feed stream. The effect of temperature and feed flow rate, are also inspected. The results show that low amounts of CO2 in the feed stream, doesn`t change the catalyst activity significantly but increasing the amount of CO2 (more than 10 vol. %) cause the CO conversion to decrease and the selectivity of heavy components to increase. Methane acts as an inert gas and doesn`t affect the catalyst performance. Increasing feed flow rate has negative effect on both CO conversion and heavy component selectivity. By raising the temperature, CO conversion will increase but there are more volatile components in the product. The effect of CO2 on the catalyst deactivation is also investigated carefully and a mechanism is suggested to explain the negative influence of CO2 on catalyst deactivation.

Keywords: Alumina, Carbon dioxide, Cobalt catalyst, Conversion, Fischer Tropsch, Selectivity

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1979
109 Real-time Network Anomaly Detection Systems Based on Machine-Learning Algorithms

Authors: Zahra Ramezanpanah, Joachim Carvallo, Aurelien Rodriguez

Abstract:

This paper aims to detect anomalies in streaming data using machine learning algorithms. In this regard, we designed two separate pipelines and evaluated the effectiveness of each separately. The first pipeline, based on supervised machine learning methods, consists of two phases. In the first phase, we trained several supervised models using the UNSW-NB15 data set. We measured the efficiency of each using different performance metrics and selected the best model for the second phase. At the beginning of the second phase, we first, using Argus Server, sniffed a local area network. Several types of attacks were simulated and then sent the sniffed data to a running algorithm at short intervals. This algorithm can display the results of each packet of received data in real-time using the trained model. The second pipeline presented in this paper is based on unsupervised algorithms, in which a Temporal Graph Network (TGN) is used to monitor a local network. The TGN is trained to predict the probability of future states of the network based on its past behavior. Our contribution in this section is introducing an indicator to identify anomalies from these predicted probabilities.

Keywords: Cyber-security, Intrusion Detection Systems, Temporal Graph Network, Anomaly Detection.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 508
108 Detecting HCC Tumor in Three Phasic CT Liver Images with Optimization of Neural Network

Authors: Mahdieh Khalilinezhad, Silvana Dellepiane, Gianni Vernazza

Abstract:

The aim of this work is to build a model based on tissue characterization that is able to discriminate pathological and non-pathological regions from three-phasic CT images. With our research and based on a feature selection in different phases, we are trying to design a neural network system with an optimal neuron number in a hidden layer. Our approach consists of three steps: feature selection, feature reduction, and classification. For each region of interest (ROI), 6 distinct sets of texture features are extracted such as: first order histogram parameters, absolute gradient, run-length matrix, co-occurrence matrix, autoregressive model, and wavelet, for a total of 270 texture features. When analyzing more phases, we show that the injection of liquid cause changes to the high relevant features in each region. Our results demonstrate that for detecting HCC tumor phase 3 is the best one in most of the features that we apply to the classification algorithm. The percentage of detection between pathology and healthy classes, according to our method, relates to first order histogram parameters with accuracy of 85% in phase 1, 95% in phase 2, and 95% in phase 3.

Keywords: Feature selection, Multi-phasic liver images, Neural network, Texture analysis.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 2536
107 The Influence of Swirl Burner Geometry on the Sugar-Cane Bagasse Injection and Burning

Authors: Juan H. Sosa-Arnao, Daniel J. O. Ferreira, Caice G. Santos, Justo E. Alvarez, Leonardo P. Rangel, Song W. Park

Abstract:

A comprehensive CFD model is developed to represent heterogeneous combustion and two burner designs of supply sugar-cane bagasse into a furnace. The objective of this work is to compare the insertion and burning of a Brazilian south-eastern sugar-cane bagasse using a new swirl burner design against an actual geometry under operation. The new design allows control the particles penetration and scattering inside furnace by adjustment of axial/tangential contributions of air feed without change their mass flow. The model considers turbulence using RNG k-, combustion using EDM, radiation heat transfer using DTM with 16 ray directions and bagasse particle tracking represented by Schiller-Naumann model. The obtained results are favorable to use of new design swirl burner because its axial/tangential control promotes more penetration or more scattering than actual design and allows reproduce the actual design operation without change the overall mass flow supply.

Keywords: Comprehensive CFD model, sugar-cane bagasse combustion, swirl burner.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 2434
106 Dexamethasone: Impact on Testicular Activity

Authors: H. Sadi-Guettaf, F. Hadj Bekkouche

Abstract:

Dexamethasone (Dex) is a synthetic glucocorticoid that is used in therapy. However prolonged treatments with high doses are often required. This causes side effects that interfere with the activity of several endocrine systems, including the gonadotropic axis. The aim of our study is to determine the effect of Dex on testicular function in prepubertal Wistar rats. Newborn Wistar rats are submitted to intraperitoneal injection of Dex (1μg of Dex dissolved in NaCl 0.9% / 5g bw) for 20 days and then sacrificed at the age of 40days. A control group received NaCl 0.9%. The rat is weighed daily. The plasmatic levels of testosterone, LH and FSH were measured by radioimmunoassay. A histomorphometric study was performed on sections of testis. Treated groups showed a significant decrease in body weight (p < 0.05), testis weight (p < 0.05) and plasma levels of testosterone (p < 0.05), of LH (P < .05) and FSH (p> 0.05). There is a reduction of seminiferous tubules average diameter and also of the seminiferous epithelium thickness with an increasing of lumen tubular. The diameter of the Leydig cells and Sertoli cell nucleus is also significantly reduced. Spermatogenesis is blocked at the stage round spermatid unlike witnesses or elongated spermatid stage is found. These results suggest that Dex administered during neonatal life influences testicular activity in the long term.

Keywords: Dexamethasone, FSH, LH, rat, testis, testosterone.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 2013
105 Detection of Cyberattacks on the Metaverse Based on First-Order Logic

Authors: Sulaiman Al Amro

Abstract:

There are currently considerable challenges concerning data security and privacy, particularly in relation to modern technologies. This includes the virtual world known as the Metaverse, which consists of a virtual space that integrates various technologies, and therefore susceptible to cyber threats such as malware, phishing, and identity theft. This has led recent studies to propose the development of Metaverse forensic frameworks and the integration of advanced technologies, including machine learning for intrusion detection and security. In this context, the application of first-order logic offers a formal and systematic approach to defining the conditions of cyberattacks, thereby contributing to the development of effective detection mechanisms. In addition, formalizing the rules and patterns of cyber threats has the potential to enhance the overall security posture of the Metaverse and thus the integrity and safety of this virtual environment. The current paper focuses on the primary actions employed by avatars for potential attacks, including Interval Temporal Logic (ITL) and behavior-based detection to detect an avatar’s abnormal activities within the Metaverse. The research established that the proposed framework attained an accuracy of 92.307%, resulting in the experimental results demonstrating the efficacy of ITL, including its superior performance in addressing the threats posed by avatars within the Metaverse domain.

Keywords: Cyberattacks, detection, first-order logic, Metaverse, privacy, security.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 73