Search results for: seawater intrusion.
56 Evaluating Performance of an Anomaly Detection Module with Artificial Neural Network Implementation
Authors: Edward Guillén, Jhordany Rodriguez, Rafael Páez
Abstract:
Anomaly detection techniques have been focused on two main components: data extraction and selection and the second one is the analysis performed over the obtained data. The goal of this paper is to analyze the influence that each of these components has over the system performance by evaluating detection over network scenarios with different setups. The independent variables are as follows: the number of system inputs, the way the inputs are codified and the complexity of the analysis techniques. For the analysis, some approaches of artificial neural networks are implemented with different number of layers. The obtained results show the influence that each of these variables has in the system performance.
Keywords: Network Intrusion Detection, Machine learning, Artificial Neural Network.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 207855 Evaluating the Feasibility of Magnetic Induction to Cross an Air-Water Boundary
Authors: Mark Watson, J.-F. Bousquet, Adam Forget
Abstract:
A magnetic induction based underwater communication link is evaluated using an analytical model and a custom Finite-Difference Time-Domain (FDTD) simulation tool. The analytical model is based on the Sommerfeld integral, and a full-wave simulation tool evaluates Maxwell’s equations using the FDTD method in cylindrical coordinates. The analytical model and FDTD simulation tool are then compared and used to predict the system performance for various transmitter depths and optimum frequencies of operation. To this end, the system bandwidth, signal to noise ratio, and the magnitude of the induced voltage are used to estimate the expected channel capacity. The models show that in seawater, a relatively low-power and small coils may be capable of obtaining a throughput of 40 to 300 kbps, for the case where a transmitter is at depths of 1 to 3 m and a receiver is at a height of 1 m.Keywords: Magnetic Induction, FDTD, Underwater Communication, Sommerfeld.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 56854 Comparative Study of Experimental and Theoretical Convective, Evaporative for Two Model Distiller
Authors: Khaoula Hidouri, Ali Benhmidene, Bechir Chouachi
Abstract:
The purification of brackish seawater becomes a necessity and not a choice against demographic and industrial growth especially in third world countries. Two models can be used in this work: simple solar still and simple solar still coupled with a heat pump. In this research, the productivity of water by Simple Solar Distiller (SSD) and Simple Solar Distiller Hybrid Heat Pump (SSDHP) was determined by the orientation, the use of heat pump, the simple or double glass cover. The productivity can exceed 1.2 L/m²h for the SSDHP and 0.5 L/m²h for SSD model. The result of the global efficiency is determined for two models SSD and SSDHP give respectively 30%, 50%. The internal efficiency attained 35% for SSD and 60% of the SSDHP models. Convective heat coefficient can be determined by attained 2.5 W/m²°C and 0.5 W/m²°C respectively for SSDHP and SSD models.
Keywords: Productivity, efficiency, convective heat coefficient, SSD model, SSDHP model.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 81053 Neural Networks Learning Improvement using the K-Means Clustering Algorithm to Detect Network Intrusions
Authors: K. M. Faraoun, A. Boukelif
Abstract:
In the present work, we propose a new technique to enhance the learning capabilities and reduce the computation intensity of a competitive learning multi-layered neural network using the K-means clustering algorithm. The proposed model use multi-layered network architecture with a back propagation learning mechanism. The K-means algorithm is first applied to the training dataset to reduce the amount of samples to be presented to the neural network, by automatically selecting an optimal set of samples. The obtained results demonstrate that the proposed technique performs exceptionally in terms of both accuracy and computation time when applied to the KDD99 dataset compared to a standard learning schema that use the full dataset.Keywords: Neural networks, Intrusion detection, learningenhancement, K-means clustering
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 360952 Securing Message in Wireless Sensor Network by using New Method of Code Conversions
Authors: Ahmed Chalak Shakir, GuXuemai, Jia Min
Abstract:
Recently, wireless sensor networks have been paid more interest, are widely used in a lot of commercial and military applications, and may be deployed in critical scenarios (e.g. when a malfunctioning network results in danger to human life or great financial loss). Such networks must be protected against human intrusion by using the secret keys to encrypt the exchange messages between communicating nodes. Both the symmetric and asymmetric methods have their own drawbacks for use in key management. Thus, we avoid the weakness of these two cryptosystems and make use of their advantages to establish a secure environment by developing the new method for encryption depending on the idea of code conversion. The code conversion-s equations are used as the key for designing the proposed system based on the basics of logic gate-s principals. Using our security architecture, we show how to reduce significant attacks on wireless sensor networks.Keywords: logic gates, code conversions, Gray-code, and clustering.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 165351 A Performance Analysis Study of an Active Solar Still Integrating Fin at the Basin Plate
Authors: O. Ansari, H. Hafs, A. Bah, M. Asbik, M. Malha, M. Bakhouya
Abstract:
Water is one of the most important and vulnerable natural resources due to human activities and climate change. Water-level continues declining year after year and it is primarily caused by sustained, extensive, and traditional usage methods. Improving water utilization becomes an urgent issue in order satisfy the increasing population needs. Desalination of seawater or brackish water could help in increasing water potential. However, a cost-effective desalination process is required. The most appropriate method for performing this desalination is solar-driven distillation, given its simplicity, low cost and especially the availability of the solar energy source. The main objective of this paper is to demonstrate the influence of coupling integrated basin plate by fins with preheating by solar collector on the performance of solar still. The energy balance equations for the various elements of the solar still are introduced. A numerical example is used to show the efficiency of the proposed solution.
Keywords: Active solar still, Brackisch water, desalination, fins, solar collector.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 80450 Evaluation of Corrosion Property of Aluminium-Zirconium Dioxide (AlZrO2) Nanocomposites
Authors: M. Ramachandra, G. Dilip Maruthi, R. Rashmi
Abstract:
This paper aims to study the corrosion property of aluminum matrix nanocomposite of an aluminum alloy (Al-6061) reinforced with zirconium dioxide (ZrO2) particles. The zirconium dioxide particles are synthesized by solution combustion method. The nanocomposite materials are prepared by mechanical stir casting method, varying the percentage of n-ZrO2 (2.5%, 5% and 7.5% by weight). The corrosion behavior of base metal (Al-6061) and Al/ZrO2 nanocomposite in seawater (3.5% NaCl solution) is measured using the potential control method. The corrosion rate is evaluated by Tafel extrapolation technique. The corrosion potential increases with the increase in wt.% of n-ZrO2 in the nanocomposite which means the decrease in corrosion rate. It is found that on addition of n-ZrO2 particles to the aluminum matrix, the corrosion rate has decreased compared to the base metal.Keywords: Al6061 alloy, corrosion, solution combustion, stir casting, Potentiostat, Zirconium Dioxide.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 221049 Malware Detection in Mobile Devices by Analyzing Sequences of System Calls
Authors: Jorge Maestre Vidal, Ana Lucila Sandoval Orozco, Luis Javier García Villalba
Abstract:
With the increase in popularity of mobile devices, new and varied forms of malware have emerged. Consequently, the organizations for cyberdefense have echoed the need to deploy more effective defensive schemes adapted to the challenges posed by these recent monitoring environments. In order to contribute to their development, this paper presents a malware detection strategy for mobile devices based on sequence alignment algorithms. Unlike the previous proposals, only the system calls performed during the startup of applications are studied. In this way, it is possible to efficiently study in depth, the sequences of system calls executed by the applications just downloaded from app stores, and initialize them in a secure and isolated environment. As demonstrated in the performed experimentation, most of the analyzed malicious activities were successfully identified in their boot processes.Keywords: Android, information security, intrusion detection systems, malware, mobile devices.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 129948 Hybrid Honeypot System for Network Security
Authors: Kyi Lin Lin Kyaw
Abstract:
Nowadays, we are facing with network threats that cause enormous damage to the Internet community day by day. In this situation, more and more people try to prevent their network security using some traditional mechanisms including firewall, Intrusion Detection System, etc. Among them honeypot is a versatile tool for a security practitioner, of course, they are tools that are meant to be attacked or interacted with to more information about attackers, their motives and tools. In this paper, we will describe usefulness of low-interaction honeypot and high-interaction honeypot and comparison between them. And then we propose hybrid honeypot architecture that combines low and high -interaction honeypot to mitigate the drawback. In this architecture, low-interaction honeypot is used as a traffic filter. Activities like port scanning can be effectively detected by low-interaction honeypot and stop there. Traffic that cannot be handled by low-interaction honeypot is handed over to high-interaction honeypot. In this case, low-interaction honeypot is used as proxy whereas high-interaction honeypot offers the optimal level realism. To prevent the high-interaction honeypot from infections, containment environment (VMware) is used.Keywords: Low-interaction honeypot, High-interactionhoneypot, VMware, Proxy
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 295147 A Reasoning Method of Cyber-Attack Attribution Based on Threat Intelligence
Authors: Li Qiang, Yang Ze-Ming, Liu Bao-Xu, Jiang Zheng-Wei
Abstract:
With the increasing complexity of cyberspace security, the cyber-attack attribution has become an important challenge of the security protection systems. The difficult points of cyber-attack attribution were forced on the problems of huge data handling and key data missing. According to this situation, this paper presented a reasoning method of cyber-attack attribution based on threat intelligence. The method utilizes the intrusion kill chain model and Bayesian network to build attack chain and evidence chain of cyber-attack on threat intelligence platform through data calculation, analysis and reasoning. Then, we used a number of cyber-attack events which we have observed and analyzed to test the reasoning method and demo system, the result of testing indicates that the reasoning method can provide certain help in cyber-attack attribution.
Keywords: Reasoning, Bayesian networks, cyber-attack attribution, kill chain, threat intelligence.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 267246 Effect of Evaporator Temperature on the Performance of Water Desalination/Refrigeration Adsorption System Using AQSOA-ZO2
Authors: Peter G. Youssef, Saad M. Mahmoud, Raya K. Al-Dadah
Abstract:
Many water desalination technologies have been developed but in general they are energy intensive and have high cost and adverse environmental impact. Recently, adsorption technology for water desalination has been investigated showing the potential of using low temperature waste heat (50-85oC) thus reducing energy consumption and CO2 emissions. This work mathematically compares the performance of an adsorption cycle that produces two useful effects namely, fresh water and cooling using two different adsorbents, silica-gel and an advanced zeolite material AQSOA-ZO2, produced by Mitsubishi plastics. It was found that at low chilled water temperatures, typically below 20oC, the AQSOA-Z02 is more efficient than silica-gel as the cycle can produce 5.8 m3 of fresh water per day and 50.1 Rton of cooling per tonne of AQSOA-ZO2. Above 20oC silica-gel is still better as the cycle production reaches 8.4 m3 per day and 62.4 Rton per tonne of silica-gel. These results show the potential of using the AQSOA-Z02 at low chilled water temperature for water desalination and cooling applications.Keywords: Adsorption, desalination, refrigeration, seawater.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 248145 Semi-Supervised Outlier Detection Using a Generative and Adversary Framework
Authors: Jindong Gu, Matthias Schubert, Volker Tresp
Abstract:
In many outlier detection tasks, only training data belonging to one class, i.e., the positive class, is available. The task is then to predict a new data point as belonging either to the positive class or to the negative class, in which case the data point is considered an outlier. For this task, we propose a novel corrupted Generative Adversarial Network (CorGAN). In the adversarial process of training CorGAN, the Generator generates outlier samples for the negative class, and the Discriminator is trained to distinguish the positive training data from the generated negative data. The proposed framework is evaluated using an image dataset and a real-world network intrusion dataset. Our outlier-detection method achieves state-of-the-art performance on both tasks.Keywords: Outlier detection, generative adversary networks, semi-supervised learning.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 107444 Investigating what Effects Aviation Fluids Have on the Flatwise Compressive Strength of Nomex® Honeycomb Core Material
Authors: G. Kim, R. Sterkenburg
Abstract:
One of the disadvantages of honeycomb sandwich structure is that they are prone to fluid intrusion. The purpose of this study is to determine if the structural properties of honeycomb core are affected by contact with a fluid. The test specimens were manufactured of fiberglass prepreg for the facesheets and Nomex® honeycomb core for the core material in accordance with ASTM C-365/365M. Test specimens were soaked in several different kinds of fluids, such as aircraft fuel, turbine engine oil, hydraulic fluid, and water for a period of 60 days. A flatwise compressive test was performed, and the test results were analyzed to determine how the contact with aircraft fluids affected the compressive strength of the Nomex® honeycomb core and how the strength was recovered when the specimens were dry. In addition, the investigation of de-bonding between facesheet and core material after soaking were performed to support the study.
Keywords: Debonding, environmental degradation, honeycomb sandwich structure.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 65443 A Model Predicting the Microbiological Qualityof Aquacultured Sea Bream (Sparus aurata) According to Physicochemical Data: An Application in Western Greece Fish Aquaculture
Authors: Joan Iliopoulou-Georgudaki, Chris Theodoropoulos, Danae Venieri, Maria Lagkadinou
Abstract:
Monitoring of microbial flora in aquacultured sea bream, in relation to the physicochemical parameters of the rearing seawater, ended to a model describing the influence of the last to the quality of the fisheries. Fishes were sampled during eight months from four aqua farms in Western Greece and analyzed for psychrotrophic, H2S producing bacteria, Salmonella sp., heterotrophic plate count (PCA), with simultaneous physical evaluation. Temperature, dissolved oxygen, pH, conductivity, TDS, salinity, NO3 - and NH4 + ions were recorded. Temperature, dissolved oxygen and conductivity were correlated, respectively, to PCA, Pseudomonas sp. and Shewanella sp. counts. These parameters were the inputs of the model, which was driving, as outputs, to the prediction of PCA, Vibrio sp., Pseudomonas sp. and Shewanella sp. counts, and fish microbiological quality. The present study provides, for the first time, a ready-to-use predictive model of fisheries hygiene, leading to an effective management system for the optimization of aquaculture fisheries quality.
Keywords: Microbiological, model, physicochemical, Seabream.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 174842 Using Social Network Analysis for Cyber Threat Intelligence
Authors: Vasileios Anastopoulos
Abstract:
Cyber threat intelligence assists organisations in understanding the threats they face and helps them make educated decisions on preparing their defences. Sharing of threat intelligence and threat information is increasingly leveraged by organisations and enterprises, and various software solutions are already available, with the open-source malware information sharing platform (MISP) being a popular one. In this work, a methodology for the production of cyber threat intelligence using the threat information stored in MISP is proposed. The methodology leverages the discipline of social network analysis and the diamond model, a model used for intrusion analysis, to produce cyber threat intelligence. The workings of the proposed methodology are demonstrated with a case study on a production MISP instance of a real organisation. The paper concludes with a discussion on the proposed methodology and possible directions for further research.
Keywords: Cyber threat intelligence, diamond model, malware information sharing platform, social network analysis.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 51341 Design, Implementation and Testing of Mobile Agent Protection Mechanism for MANETS
Authors: Khaled E. A. Negm
Abstract:
In the current research, we present an operation framework and protection mechanism to facilitate secure environment to protect mobile agents against tampering. The system depends on the presence of an authentication authority. The advantage of the proposed system is that security measures is an integral part of the design, thus common security retrofitting problems do not arise. This is due to the presence of AlGamal encryption mechanism to protect its confidential content and any collected data by the agent from the visited host . So that eavesdropping on information from the agent is no longer possible to reveal any confidential information. Also the inherent security constraints within the framework allow the system to operate as an intrusion detection system for any mobile agent environment. The mechanism is tested for most of the well known severe attacks against agents and networked systems. The scheme proved a promising performance that makes it very much recommended for the types of transactions that needs highly secure environments, e. g., business to business.
Keywords: Mobile agent security, mobile accesses, agent encryption.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 203740 Effect of Inhibitors on Weld Corrosion under Sweet Conditions Using Flow Channel
Authors: Khaled Alawadhi, Abdulkareem Aloraier, Suraj Joshi, Jalal Alsarraf
Abstract:
The aim of this paper is to compare the effectiveness and electrochemical behavior of typical oilfield corrosion inhibitors with previous oilfield corrosion inhibitors under the same electrochemical techniques to control preferential weld corrosion of X65 pipeline steel in artificial seawater saturated with carbon dioxide at a pressure of one bar. A secondary aim is to investigate the conditions under which current reversal takes place. A flow channel apparatus was used in the laboratory to simulate the actual condition that occurs in marine pipelines. Different samples from the parent metal, the weld metal and the heat affected zone in the pipeline steel were galvanically coupled. The galvanic currents flowing between the weld regions were recorded using zero-resistance ammeters and tested under static and flowing conditions in both inhibited and uninhibited media. The results show that a current reversal took place when 30ppm of both green oilfield inhibitors were present, resulting in accelerated weld corrosion.
Keywords: Carbon dioxide, carbon steel, current reversal, inhibitor, weld corrosion.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 295339 Reliability Verification of the Performance Evaluation of Multiphase Pump
Authors: Joon-Hyung Kim, Him-Chan Lee, Jin-Hyuk Kim, Yong-Kab Lee, Young-Seok Choi
Abstract:
The crude oil in an oil well exists in various phases such as gas, seawater, and sand, as well as oil. Therefore, a phase separator is needed at the front of a single-phase pump for pressurization and transfer. On the other hand, the application of a multiphase pump can provide such advantages as simplification of the equipment structure and cost savings, because there is no need for a phase separation process. Therefore, the crude oil transfer method using a multiphase pump is being applied to recently developed oil wells. Due to this increase in demand, technical demands for the development of multiphase pumps are sharply increasing, but the progress of research into related technologies is insufficient, due to the nature of multiphase pumps that require high levels of skills. This study was conducted to verify the reliability of pump performance evaluation using numerical analysis, which is the basis of the development of a multiphase pump. For this study, a model was designed by selecting the specifications of this study. The performance of the designed model was evaluated through numerical analysis and experiment. The results of the performance evaluation were compared to verify the reliability of the result using numerical analysis.
Keywords: Multiphase pump, Numerical analysis, Experiment, Performance evaluation, Reliability verification.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 313338 The Journey of a Malicious HTTP Request
Authors: M. Mansouri, P. Jaklitsch, E. Teiniker
Abstract:
SQL injection on web applications is a very popular kind of attack. There are mechanisms such as intrusion detection systems in order to detect this attack. These strategies often rely on techniques implemented at high layers of the application but do not consider the low level of system calls. The problem of only considering the high level perspective is that an attacker can circumvent the detection tools using certain techniques such as URL encoding. One technique currently used for detecting low-level attacks on privileged processes is the tracing of system calls. System calls act as a single gate to the Operating System (OS) kernel; they allow catching the critical data at an appropriate level of detail. Our basic assumption is that any type of application, be it a system service, utility program or Web application, “speaks” the language of system calls when having a conversation with the OS kernel. At this level we can see the actual attack while it is happening. We conduct an experiment in order to demonstrate the suitability of system call analysis for detecting SQL injection. We are able to detect the attack. Therefore we conclude that system calls are not only powerful in detecting low-level attacks but that they also enable us to detect highlevel attacks such as SQL injection.
Keywords: Linux system calls, Web attack detection, Interception.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 200737 UDCA: An Energy Efficient Clustering Algorithm for Wireless Sensor Network
Authors: Boregowda S.B., Hemanth Kumar A.R. Babu N.V, Puttamadappa C., And H.S Mruthyunjaya
Abstract:
In the past few years, the use of wireless sensor networks (WSNs) potentially increased in applications such as intrusion detection, forest fire detection, disaster management and battle field. Sensor nodes are generally battery operated low cost devices. The key challenge in the design and operation of WSNs is to prolong the network life time by reducing the energy consumption among sensor nodes. Node clustering is one of the most promising techniques for energy conservation. This paper presents a novel clustering algorithm which maximizes the network lifetime by reducing the number of communication among sensor nodes. This approach also includes new distributed cluster formation technique that enables self-organization of large number of nodes, algorithm for maintaining constant number of clusters by prior selection of cluster head and rotating the role of cluster head to evenly distribute the energy load among all sensor nodes.
Keywords: Clustering algorithms, Cluster head, Energy consumption, Sensor nodes, and Wireless sensor networks.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 239036 The Effect of Variable Incubation Temperatures on Hatchability and Survival of Goldlined Seabream, Rhabdosargus sarba (Forsskål,1775) Larvae
Authors: Fahad S. Ibrahim, Ewen Mclean, Mohammad M. Al Wahaibi, Ghazi .A. Al Shagaa, Adel H. Al Balushi
Abstract:
The effect of varying holding temperature on hatching success, occurrence of deformities and mortality rates were investigated for goldlined seabream eggs. Wild broodstock (600 g) were stocked at a 2:1 male-female ratio in a 2 m3 fiberglass tank supplied with filtered seawater (37 g L-1 salinity, temp. range 24±0.5 oC [day] and 22±1 oC [night], DO2 in excess of 5.0mg L-1). Females were injected with 200 IU kg-1 HCG between 08.00 and 10.00 h and returned to tanks to spawn following which eggs were collected by hand using a 100μm net. Fertilized eggs at the gastrulation stage (120 L-1) were randomly placed into one of 12 experimental 6 L aerated (DO2 5 mg L-1) plastic containers with water temperatures maintained at 24±0.5 oC (ambient), 26±0.5 oC, 28± 0.5 oC and 30±0.5 oC using thermostats. Each treatment was undertaken in triplicate using a 12:12 photophase:scotophase photoperiod. No differences were recorded between eggs reared at 24 and 26 oC with respect to viability, deformity, mortality or unhatched egg rates. Increasing temperature reduced the number of viable eggs with those at 30 oC returning poorest performance (P < 0.05). Mortality levels were lowest for eggs incubated at 24 and 26 oC. The greatest level of deformities recorded was that for eggs reared at 28 oC.
Keywords: Goldlined seabream, Oman, R. sarba, deformities.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 395435 Mechanisms Involved In Organic Solvent Resistance in Gram-Negative Bacteria
Authors: M. M. Lâzâroaie
Abstract:
The high world interest given to the researches concerning the study of moderately halophilic solvent-tolerant bacteria isolated from marine polluted environments is due to their high biotechnological potential, and also to the perspective of their application in different remediation technologies. Using enrichment procedures, I isolated two moderately halophilic Gram-negative bacterial strains from seawater sample, which are tolerant to organic solvents. Cell tolerance, adhesion and cells viability of Aeromonas salmonicida IBBCt2 and Pseudomonas aeruginosa IBBCt3 in the presence of organic solvents depends not only on its physicochemical properties and its concentration, but also on the specific response of the cells, and the cellular response is not the same for these bacterial strains. n-hexane, n-heptane, propylbenzene, with log POW between 3.69 and 4.39, were less toxic for Aeromonas salmonicida IBBCt2 and Pseudomonas aeruginosa IBBCt3, compared with toluene, styrene, xylene isomers and ethylbenzene, with log POW between 2.64 and 3.17. The results indicated that Aeromonas salmonicida IBBCt2 is more susceptible to organic solvents than Pseudomonas aeruginosa IBBCt3. The mechanisms underlying solvent tolerance (e.g., the existance of the efflux pumps) in Aeromonas salmonicida IBBCt2 and Pseudomonas aeruginosa IBBCt3 it was also studied.
Keywords: bacteria, mechanisms, organic solvent, resistance.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 197734 Exergetic Analysis of Steam Turbine Power Plant Operated in Chemical Industry
Authors: F. Hafdhi, T. Khir, A. Ben Yahia, A. Ben Brahim
Abstract:
An Energetic and exergetic analysis is conducted on a Steam Turbine Power Plant of an existing Phosphoric Acid Factory. The heat recovery systems used in different parts of the plant are also considered in the analysis. Mass, thermal and exergy balances are established on the main compounds of the factory. A numerical code is established using EES software to perform the calculations required for the thermal and exergy plant analysis. The effects of the key operating parameters such as steam pressure and temperature, mass flow rate as well as seawater temperature, on the cycle performances are investigated. A maximum Exergy Loss Rate of about 72% is obtained for the melters, followed by the condensers, heat exchangers and the pumps. The heat exchangers used in the phosphoric acid unit present exergetic efficiencies around 33% while 60% to 72% are obtained for steam turbines and blower. For the explored ranges of HP steam temperature and pressure, the exergy efficiencies of steam turbine generators STGI and STGII increase of about 2.5% and 5.4% respectively. In the same way optimum HP steam flow rate values, leading to the maximum exergy efficiencies are defined.
Keywords: Steam turbine generator, energy efficiency, exergy efficiency, phosphoric acid plant.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 259533 Anomaly Detection using Neuro Fuzzy system
Authors: Fatemeh Amiri, Caro Lucas, Nasser Yazdani
Abstract:
As the network based technologies become omnipresent, demands to secure networks/systems against threat increase. One of the effective ways to achieve higher security is through the use of intrusion detection systems (IDS), which are a software tool to detect anomalous in the computer or network. In this paper, an IDS has been developed using an improved machine learning based algorithm, Locally Linear Neuro Fuzzy Model (LLNF) for classification whereas this model is originally used for system identification. A key technical challenge in IDS and LLNF learning is the curse of high dimensionality. Therefore a feature selection phase is proposed which is applicable to any IDS. While investigating the use of three feature selection algorithms, in this model, it is shown that adding feature selection phase reduces computational complexity of our model. Feature selection algorithms require the use of a feature goodness measure. The use of both a linear and a non-linear measure - linear correlation coefficient and mutual information- is investigated respectivelyKeywords: anomaly Detection, feature selection, Locally Linear Neuro Fuzzy (LLNF), Mutual Information (MI), liner correlation coefficient.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 218332 Advanced Geolocation of IP Addresses
Authors: Robert Koch, Mario Golling, Gabi Dreo Rodosek
Abstract:
Tracing and locating the geographical location of users (Geolocation) is used extensively in todays Internet. Whenever we, e.g., request a page from google we are - unless there was a specific configuration made - automatically forwarded to the page with the relevant language and amongst others, dependent on our location identified, specific commercials are presented. Especially within the area of Network Security, Geolocation has a significant impact. Because of the way the Internet works, attacks can be executed from almost everywhere. Therefore, for an attribution, knowledge of the origination of an attack - and thus Geolocation - is mandatory in order to be able to trace back an attacker. In addition, Geolocation can also be used very successfully to increase the security of a network during operation (i.e. before an intrusion actually has taken place). Similar to greylisting in emails, Geolocation allows to (i) correlate attacks detected with new connections and (ii) as a consequence to classify traffic a priori as more suspicious (thus particularly allowing to inspect this traffic in more detail). Although numerous techniques for Geolocation are existing, each strategy is subject to certain restrictions. Following the ideas of Endo et al., this publication tries to overcome these shortcomings with a combined solution of different methods to allow improved and optimized Geolocation. Thus, we present our architecture for improved Geolocation, by designing a new algorithm, which combines several Geolocation techniques to increase the accuracy.
Keywords: IP geolocation, prosecution of computer fraud, attack attribution, target-analysis
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 472531 Experimental and Theoretical Study on Hygrothermal Aging Effect on Mechanical Behavior of Fiber Reinforced Plastic Laminates
Authors: S. Larbi, R. Bensaada, S. Djebali, A. Bilek
Abstract:
The manufacture of composite parts is a major issue in many industrial domains. Polymer composite materials are ideal for structural applications where high strength-to-weight and stiffness-to-weight ratios are required. However, exposition to extreme environment conditions (temperature, humidity) affects mechanical properties of organic composite materials and lead to an undesirable degradation. Aging mechanisms in organic matrix are very diverse and vary according to the polymer and the aging conditions such as temperature, humidity etc. This paper studies the hygrothermal aging effect on the mechanical properties of fiber reinforced plastics laminates at 40 °C in different environment exposure. Two composite materials are used to conduct the study (carbon fiber/epoxy and glass fiber/vinyl ester with two stratifications for both the materials [904/04] and [454/04]). The experimental procedure includes a mechanical characterization of the materials in a virgin state and exposition of specimens to two environments (seawater and demineralized water). Absorption kinetics for the two materials and both the stratifications are determined. Three-point bending test is performed on the aged materials in order to determine the hygrothermal effect on the mechanical properties of the materials.
Keywords: FRP laminates, hygrothermal aging, mechanical properties, theory of laminates.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 123230 Network Based Intrusion Detection and Prevention Systems in IP-Level Security Protocols
Authors: R. Kabila
Abstract:
IPsec has now become a standard information security technology throughout the Internet society. It provides a well-defined architecture that takes into account confidentiality, authentication, integrity, secure key exchange and protection mechanism against replay attack also. For the connectionless security services on packet basis, IETF IPsec Working Group has standardized two extension headers (AH&ESP), key exchange and authentication protocols. It is also working on lightweight key exchange protocol and MIB's for security management. IPsec technology has been implemented on various platforms in IPv4 and IPv6, gradually replacing old application-specific security mechanisms. IPv4 and IPv6 are not directly compatible, so programs and systems designed to one standard can not communicate with those designed to the other. We propose the design and implementation of controlled Internet security system, which is IPsec-based Internet information security system in IPv4/IPv6 network and also we show the data of performance measurement. With the features like improved scalability and routing, security, ease-of-configuration, and higher performance of IPv6, the controlled Internet security system provides consistent security policy and integrated security management on IPsec-based Internet security system.Keywords: IDS, IPS, IP-Sec, IPv6, IPv4, VPN.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 454029 Bioconcentration Analysis of Iodine Species in Seaweed (Eucheuma cottonii) from Maluku Marine as Alternative Food Source
Authors: Yeanchon H. Dulanlebit, Nikmans Hattu, Gloria Bora
Abstract:
Seaweed is a type of macro algae which are good source of iodine and have been widely used as food and nutrition supplement. One of iodine species that found in ocean plant is iodate. Analysis of iodate in seaweed (Eucheuma cottonii) from coastal area of Maluku has been done. The determination is done by using spectrophotometric method. Iodate in sample is reduced in excess of potassium iodide in the presence of acid solution, and then is reacted with starch to form blue complex. The study found out that the highest wavelength on determination of iodate species using spectrophotometer analysis method is 570 nm. Optimum value to yield maximum absorption is used in this research. Contents of iodate in seawater from coastal area of Ambon Island, Western Seram and Southeast Maluku are 0.2655, 0.2719 and 0.1760 mg/L, respectively. While in seaweeds from Ambon Island, Western Seram, Southeast Maluku-Taar, Ohoidertawun and Wab are 6.3122, 6.3293, 6.2333, 3.7406 and 4.4207 mg/kg in dry weight. Bioconcentration (enrichment) factor of iodate in seaweed (Eucheuma cottonii) from the three samples (cluster) is different; in Coastal area of Ambon Island, Western Seram and Southeast Maluku respectively are 23.78, 23.28 and 27.26.
Keywords: Bioconcentration, Eucheuma cottonii, iodate, iodine, seaweed.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 94228 Strategies for Securing Safety Messages with Fixed Key Infrastructure in Vehicular Network
Authors: Nasser Mozayani, Maryam Barzegar, Hoda Madani
Abstract:
Vehicular communications play a substantial role in providing safety in transportation by means of safety message exchange. Researchers have proposed several solutions for securing safety messages. Protocols based on a fixed key infrastructure are more efficient in implementation and maintain stronger security in comparison with dynamic structures. These protocols utilize zone partitioning to establish distinct key infrastructure under Certificate Authority (CA) supervision in different regions. Secure anonymous broadcasting (SAB) is one of these protocols that preserves most of security aspects but it has some deficiencies in practice. A very important issue is region change of a vehicle for its mobility. Changing regions leads to change of CA and necessity of having new key set to resume communication. In this paper, we propose solutions for informing vehicles about region change to obtain new key set before entering next region. This hinders attackers- intrusion, packet loss and lessons time delay. We also make key request messages secure by confirming old CA-s public key to the message, hence stronger security for safety message broadcasting is attained.
Keywords: Secure broadcasting, Certificate authority (CA), Key exchange, Vehicular network.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 153827 Improve of Evaluation Method for Information Security Levels of CIIP (Critical Information Infrastructure Protection)
Authors: Dong-Young Yoo, Jong-Whoi Shin, Gang Shin Lee, Jae-Il Lee
Abstract:
As the disfunctions of the information society and social development progress, intrusion problems such as malicious replies, spam mail, private information leakage, phishing, and pharming, and side effects such as the spread of unwholesome information and privacy invasion are becoming serious social problems. Illegal access to information is also becoming a problem as the exchange and sharing of information increases on the basis of the extension of the communication network. On the other hand, as the communication network has been constructed as an international, global system, the legal response against invasion and cyber-attack from abroad is facing its limit. In addition, in an environment where the important infrastructures are managed and controlled on the basis of the information communication network, such problems pose a threat to national security. Countermeasures to such threats are developed and implemented on a yearly basis to protect the major infrastructures of information communication. As a part of such measures, we have developed a methodology for assessing the information protection level which can be used to establish the quantitative object setting method required for the improvement of the information protection level.Keywords: Information Security Evaluation Methodology, Critical Information Infrastructure Protection.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1659