Search results for: sulfuric acid attacks.
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 1056

Search results for: sulfuric acid attacks.

906 Characterization of Lactose Consumption during the Biogas Production from Acid Whey by FT-IR Spectroscopy

Authors: K. Rugele, M. Gavare, M. Grube, K. Tihomirova, E. Skripsts, S. Larsson, J. Rubulis

Abstract:

The consumption of lactose in acid cheese whey anaerobic fermentation process under fed-batch conditions was studied. During fermentation for 100 hours the biogas production (CO2 and CH4) was analyzed online. Among the standard analyses FT-IR spectroscopy was used to follow the consumption of lactose by bacteria. The absorption bands at 990, 894 and 787 cm-1 in the 2nd derivative spectra were shown to be characteristic for lactose and were used to follow the lactose conversion. It was shown that acid cheese whey lactose was converted by bacteria in first 7 hours. In the spectra of 17, 18 and 95 hour fermentation samples lactose was not identified and these results correlated with the HPLC data.

Keywords: Acid whey, anaerobic digestion, biogas, FT-IR spectroscopy, lactose consumption.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 2493
905 Detection of Black Holes in MANET Using Collaborative Watchdog with Fuzzy Logic

Authors: Y. Harold Robinson, M. Rajaram, E. Golden Julie, S. Balaji

Abstract:

Mobile ad hoc network (MANET) is a self-configuring network of mobile node connected without wires. A Fuzzy Logic Based Collaborative watchdog approach is used to reduce the detection time of misbehaved nodes and increase the overall truthfulness. This methodology will increase the secure efficient routing by detecting the Black Holes attacks. The simulation results proved that this method improved the energy, reduced the delay and also improved the overall performance of the detecting black hole attacks in MANET.

Keywords: MANET, collaborative watchdog, fuzzy logic, AODV.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1351
904 Reducing Humic Acid and Disinfection By-products in Raw Water using a Bio-activated Carbon Filter

Authors: Wei-Pin Tseng, Jie-Chung Lou, Ming-Ching Wu, Huang-Ming Fang

Abstract:

For stricter drinking water regulations in the future, reducing the humic acid and disinfection byproducts in raw water, namely, trihalomethanes (THMs) and haloacetic acids (HAAs) is worthy for research. To investigate the removal of waterborne organic material using a lab-scale of bio-activated carbon filter under different EBCT, the concentrations of humic acid prepared were 0.01, 0.03, 0.06, 0.12, 0.17, 0.23, and 0.29 mg/L. Then we conducted experiments using a pilot plant with in-field of the serially connected bio-activated carbon filters and hollow fiber membrane processes employed in traditional water purification plants. Results showed under low TOC conditions of humic acid in influent (0.69 to 1.03 mg TOC/L) with an EBCT of 30 min, 40 min, and 50 min, TOC removal rates increases with greater EBCT, attaining about 39 % removal rate. The removal rate of THMs and HAAs by BACF was 54.8 % and 89.0 %, respectively.

Keywords: Bio-activated carbon filter, hollow fiber membrane, humic acid, THMs, HAAs, Water Treatment

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 2164
903 Enhancing IoT Security: A Blockchain-Based Approach for Preventing Spoofing Attacks

Authors: Salha Alshamrani, Maha Aljohni, Eman Aldhaheri

Abstract:

With the proliferation of Internet of Things (IoT) devices in various industries, there has been a concurrent rise in security vulnerabilities, particularly spoofing attacks. This study explores the potential of blockchain technology in enhancing the security of IoT systems and mitigating these attacks. Blockchain's decentralized and immutable ledger offers significant promise for improving data integrity, transaction transparency, and tamper-proofing. This research develops and implements a blockchain-based IoT architecture and a reference network to simulate real-world scenarios and evaluate a blockchain-integrated intrusion detection system. Performance measures including time delay, security, and resource utilization are used to assess the system's effectiveness, comparing it to conventional IoT networks without blockchain. The results provide valuable insights into the practicality and efficacy of employing blockchain as a security mechanism, shedding light on the trade-offs between speed and security in blockchain deployment for IoT. The study concludes that despite minor increases in time consumption, the security benefits of incorporating blockchain technology into IoT systems outweigh potential drawbacks, demonstrating a significant potential for blockchain in bolstering IoT security.

Keywords: Internet of Thing, Spoofing, IoT, Access control, Blockchain, Raspberry pi.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 117
902 Analysis of Spamming Threats and Some Possible Solutions for Online Social Networking Sites (OSNS)

Authors: Dilip Singh Sisodia, Shrish Verma

Abstract:

In this paper we are presenting some spamming techniques their behaviour and possible solutions. We have analyzed how Spammers enters into online social networking sites (OSNSs) to target them and diverse techniques used by them for this purpose. Spamming is very common issue in present era of Internet especially through Online Social Networking Sites (like Facebook, Twitter, and Google+ etc.). Spam messages keep wasting Internet bandwidth and the storage space of servers. On social networking sites; spammers often disguise themselves by creating fake accounts and hijacking user’s accounts for personal gains. They behave like normal user and they continue to change their spamming strategy. Following spamming techniques are discussed in this paper like clickjacking, social engineered attacks, cross site scripting, URL shortening, and drive by download. We have used elgg framework for demonstration of some of spamming threats and respective implementation of solutions.

Keywords: Online social networking sites, spam attacks, Internet, clickjacking/likejacking, drive-by-download, URL shortening, cross site scripting, socially engineered attacks, elgg framework.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 2359
901 Relation of Optimal Pilot Offsets in the Shifted Constellation-Based Method for the Detection of Pilot Contamination Attacks

Authors: Dimitriya A. Mihaylova, Zlatka V. Valkova-Jarvis, Georgi L. Iliev

Abstract:

One possible approach for maintaining the security of communication systems relies on Physical Layer Security mechanisms. However, in wireless time division duplex systems, where uplink and downlink channels are reciprocal, the channel estimate procedure is exposed to attacks known as pilot contamination, with the aim of having an enhanced data signal sent to the malicious user. The Shifted 2-N-PSK method involves two random legitimate pilots in the training phase, each of which belongs to a constellation, shifted from the original N-PSK symbols by certain degrees. In this paper, legitimate pilots’ offset values and their influence on the detection capabilities of the Shifted 2-N-PSK method are investigated. As the implementation of the technique depends on the relation between the shift angles rather than their specific values, the optimal interconnection between the two legitimate constellations is investigated. The results show that no regularity exists in the relation between the pilot contamination attacks (PCA) detection probability and the choice of offset values. Therefore, an adversary who aims to obtain the exact offset values can only employ a brute-force attack but the large number of possible combinations for the shifted constellations makes such a type of attack difficult to successfully mount. For this reason, the number of optimal shift value pairs is also studied for both 100% and 98% probabilities of detecting pilot contamination attacks. Although the Shifted 2-N-PSK method has been broadly studied in different signal-to-noise ratio scenarios, in multi-cell systems the interference from the signals in other cells should be also taken into account. Therefore, the inter-cell interference impact on the performance of the method is investigated by means of a large number of simulations. The results show that the detection probability of the Shifted 2-N-PSK decreases inversely to the signal-to-interference-plus-noise ratio.

Keywords: Channel estimation, inter-cell interference, pilot contamination attacks, wireless communications.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 677
900 Inhibition of the Growth of Pathogenic Candida spp. by Salicylhydroxamic Acid

Authors: Shu-Ying Marissa Pang, Stephen Tristram, Simon Brown

Abstract:

Candida spp. are common and aggressive pathogens. Because of the growing resistance of Candida spp. to current antifungals, novel targets, found in Candida spp. but not in humans or other flora, have to be identified. The alternative oxidase (AOX) is one such possibility. This enzyme is insensitive to cyanide, but is sensitive to compounds such as salicylhydroxamic acid (SHAM), disulfiram and n-alkyl gallates. The growth each of six Candida spp. was inhibited significantly by ~13 mM SHAM or 2 mM cyanide, albeit to differing extents. In C. dubliniensis, C. krusei and C. tropicalis the rate of O2 uptake was inhibited by 18-36% by 25 mM SHAM, but this had little or no effect on C. glabrata, C. guilliermondii or C. parapsilosis. Although SHAM substantially inhibited the growth of Candida spp., it is unlikely that the inhibition of AOX was the cause. Salicylhydroxamic acid is used therapeutically in the treatment of urinary tract infections and urolithiasis, but it also has some potential in the treatment of Candida spp. infection.

Keywords: alternative oxidase, Candida spp., growth, respiration, salicylhydroxamic acid.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1505
899 Nano Composite of Clay and Modified Ketonic Resin as Fire Retardant Polyol for Polyurethane

Authors: D. Önen, N. Kızılcan, B. Yıldız, A. Akar

Abstract:

In situ modified cyclohexanone-formaldehyde resins were prepared by addition of alendronic acid during resin preparation. Clay nanocomposites in ketonic resins were achieved by adding clay into the flask at the beginning of the resin preparation. The prepared resins were used for the synthesis of fire resistant polyurethanes foam. Both phosphorous containing modifier compound alendronic acid and nanoclay increases fire resistance of the cyclohexanone-formaldehyde resin thus polyurethane produced from these resins. The effect of the concentrations of alendronic acid and clay on the fire resistance and physical properties of polyurethanes was studied.

Keywords: Alendronic acid, clay, ketonic resin, polyurethane.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 2947
898 Preliminary Study of Antimicrobial Activity against Escherichia coli and Probiotic Properties of Lactic Acid Bacteria Isolated from Thailand Fermented Foods

Authors: Phanwipa Pangsri, Yawariyah Weahayee

Abstract:

The lactic acid bacteria (LAB) were isolated from 10 samples of fermented foods (Sa-tor-dong and Bodo) in South locality of Thailand. The 23 isolates of lactic acid bacteria were selected, which were exhibited a clear zone and growth on MRS agar supplemented with CaCO3. All of lactic acid bacteria were tested on morphological and biochemical. The result showed that all isolates were Gram’s positive, non-spore forming but only 10 isolates displayed catalase negative. The 10 isolates including BD1 .1, BD 1.2, BD 2.1, BD2.2, BD 2.3, BD 3.1, BD 4.1, BD 5.2, ST 4.1 and ST 5.2 were selected for inhibition activity determination. Only 2 strains (ST 4.1 and BD 2.3) showed inhibition zone on agar, when using Escherichia coli sp. as target strain. The ST 4.1 showed highest inhibition zone on agar, which was selected for probiotic property testing. The ST4.1 isolate could grow in MRS broth containing a high concentration of sodium chloride 6%, bile salts 7%, pH 4-10 and vary temperature at 15-45°C.

Keywords: Lactic acid bacteria, Probiotic, Antimicrobial.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 2581
897 Determination of Vitamin C (Ascorbic Acid) in Orange Juices Product

Authors: Wanida Wonsawat

Abstract:

This research describes a voltammetric approach to determine amounts of vitamin C (Ascorbic acid) in orange juice sample, using three screen printed electrode. The anodic currents of vitamin C were proportional to vitamin C concentration in the range of 0 – 10.0 mM with the limit of detection of 1.36 mM. The method was successfully employed with 2 µL of the working solution dropped on the electrode surface. The proposed method was applied for the analysis of vitamin C in packed orange juice without sample purification or complexion of sample preparation step.

Keywords: Ascorbic acid, Vitamin C, Juice, Voltammetry

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 8480
896 A Comparison of Conventional and Biodegradable Chelating Agent in Different Type of Surfactant Solutions for Soap Scum Removal

Authors: Prariyada Theptat, Sumaeth Chavadej, John F. Scamehorn

Abstract:

One of the most challenges for hard surface cleaning product is to get rid of soap scum, a filmy sticky layer in the bathroom. The deposits of soap scum can be removed by using a proper surfactant solution with chelating agent. Unfortunately, the conventional chelating agent, ethylenediamine tetraacetic acid (EDTA), has low biodegradability, which can be tolerance in water resources and harmful to aquatic animal and microorganism. In this study, two biodegradable chelating agents, ethylenediamine disuccinic acid (EDDS) and glutamic acid diacetic acid (GLDA) were introduced as a replacement of EDTA. The result shows that using GLDA with amphoteric surfactant gave the highest equilibrium solubility of soap scum.

Keywords: Biodegradable chelating agent, EDDS, GLDA, Soap scum.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 5041
895 Intrusion Detection System Based On The Integrity of TCP Packet

Authors: Moad Alhamaty , Ali Yazdian , Fathi Al-qadasi

Abstract:

A common way to elude the signature-based Network Intrusion Detection System is based upon changing a recognizable attack to an unrecognizable one via the IDS. For example, in order to evade sign accommodation with intrusion detection system markers, a hacker spilt the payload packet into many small pieces or hides them within messages. In this paper we try to model the main fragmentation attack and create a new module in the intrusion detection architecture system which recognizes the main fragmentation attacks through verification of integrity checking of TCP packet in order to prevent elusion of the system and also to announce the necessary alert to the system administrator.

Keywords: Intrusion detection system, Evasion techniques, Fragmentation attacks, TCP Packet integrity.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1848
894 Response Surface Modeling of Lactic Acid Extraction by Emulsion Liquid Membrane: Box-Behnken Experimental Design

Authors: A. Thakur, P. S. Panesar, M. S. Saini

Abstract:

Extraction of lactic acid by emulsion liquid membrane technology (ELM) using n-trioctyl amine (TOA) in n-heptane as carrier within the organic membrane along with sodium carbonate as acceptor phase was optimized by using response surface methodology (RSM). A three level Box-Behnken design was employed for experimental design, analysis of the results and to depict the combined effect of five independent variables, vizlactic acid concentration in aqueous phase (cl), sodium carbonate concentration in stripping phase (cs), carrier concentration in membrane phase (ψ), treat ratio, and batch extraction time (τ)  with equal volume of organic and external aqueous phase on lactic acid extraction efficiency. The maximum lactic acid extraction efficiency (ηext) of 98.21%from aqueous phase in a batch reactor using ELM was found at the optimized values for test variables, cl, cs, ψ, and τ as 0.06 [M], 0.18 [M], 4.72 (%,v/v), 1.98 (v/v) and 13.36 min respectively. 

Keywords: Emulsion liquid membrane, extraction, lactic acid, n-trioctylamine, response surface methodology.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 2323
893 Efficacy of Anti-phishing Measures and Strategies - A Research Analysis

Authors: Gundeep Singh Bindra

Abstract:

Statistics indicate that more than 1000 phishing attacks are launched every month. With 57 million people hit by the fraud so far in America alone, how do we combat phishing?This publication aims to discuss strategies in the war against Phishing. This study is an examination of the analysis and critique found in the ways adopted at various levels to counter the crescendo of phishing attacks and new techniques being adopted for the same. An analysis of the measures taken up by the varied popular Mail servers and popular browsers is done under this study. This work intends to increase the understanding and awareness of the internet user across the globe and even discusses plausible countermeasures at the users as well as the developers end. This conceptual paper will contribute to future research on similar topics.

Keywords: Anti-phishing, countermeasures, effectiveness, fake pages, security analysis.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 2766
892 A Novel Digital Watermarking Technique Basedon ISB (Intermediate Significant Bit)

Authors: Akram M. Zeki, Azizah A. Manaf

Abstract:

Least Significant Bit (LSB) technique is the earliest developed technique in watermarking and it is also the most simple, direct and common technique. It essentially involves embedding the watermark by replacing the least significant bit of the image data with a bit of the watermark data. The disadvantage of LSB is that it is not robust against attacks. In this study intermediate significant bit (ISB) has been used in order to improve the robustness of the watermarking system. The aim of this model is to replace the watermarked image pixels by new pixels that can protect the watermark data against attacks and at the same time keeping the new pixels very close to the original pixels in order to protect the quality of watermarked image. The technique is based on testing the value of the watermark pixel according to the range of each bit-plane.

Keywords: Watermarking, LSB, ISB, Robustness.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1707
891 Wormhole Attack Detection in Wireless Sensor Networks

Authors: Zaw Tun, Aung Htein Maw

Abstract:

The nature of wireless ad hoc and sensor networks make them very attractive to attackers. One of the most popular and serious attacks in wireless ad hoc networks is wormhole attack and most proposed protocols to defend against this attack used positioning devices, synchronized clocks, or directional antennas. This paper analyzes the nature of wormhole attack and existing methods of defending mechanism and then proposes round trip time (RTT) and neighbor numbers based wormhole detection mechanism. The consideration of proposed mechanism is the RTT between two successive nodes and those nodes- neighbor number which is needed to compare those values of other successive nodes. The identification of wormhole attacks is based on the two faces. The first consideration is that the transmission time between two wormhole attack affected nodes is considerable higher than that between two normal neighbor nodes. The second detection mechanism is based on the fact that by introducing new links into the network, the adversary increases the number of neighbors of the nodes within its radius. This system does not require any specific hardware, has good performance and little overhead and also does not consume extra energy. The proposed system is designed in ad hoc on-demand distance vector (AODV) routing protocol and analysis and simulations of the proposed system are performed in network simulator (ns-2).

Keywords: AODV, Wormhole attacks, Wireless ad hoc andsensor networks

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 3468
890 Predicting Application Layer DDoS Attacks Using Machine Learning Algorithms

Authors: S. Umarani, D. Sharmila

Abstract:

A Distributed Denial of Service (DDoS) attack is a major threat to cyber security. It originates from the network layer or the application layer of compromised/attacker systems which are connected to the network. The impact of this attack ranges from the simple inconvenience to use a particular service to causing major failures at the targeted server. When there is heavy traffic flow to a target server, it is necessary to classify the legitimate access and attacks. In this paper, a novel method is proposed to detect DDoS attacks from the traces of traffic flow. An access matrix is created from the traces. As the access matrix is multi dimensional, Principle Component Analysis (PCA) is used to reduce the attributes used for detection. Two classifiers Naive Bayes and K-Nearest neighborhood are used to classify the traffic as normal or abnormal. The performance of the classifier with PCA selected attributes and actual attributes of access matrix is compared by the detection rate and False Positive Rate (FPR).

Keywords: Distributed Denial of Service (DDoS) attack, Application layer DDoS, DDoS Detection, K- Nearest neighborhood classifier, Naive Bayes Classifier, Principle Component Analysis.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 5279
889 A Thermodynamic Study of Parameters That Affect the Nitration of Glycerol with Nitric Acid

Authors: Erna Astuti, Supranto, Rochmadi, Agus Prasetya

Abstract:

Biodiesel production from vegetable oil will produce glycerol as by-product about 10% of the biodiesel production. The amount of glycerol that was produced needed alternative way to handling immediately so as to not become the waste that polluted environment. One of the solutions was to process glycerol to polyglycidyl nitrate (PGN). PGN is synthesized from glycerol by three-step reactions i.e. nitration of glycerol, cyclization of 13- dinitroglycerine and polymerization of glycosyl nitrate. Optimum condition of nitration of glycerol with nitric acid has not been known. Thermodynamic feasibility should be done before run experiments in the laboratory. The aim of this study was to determine the parameters those affect nitration of glycerol and nitric acid and chose the operation condition. Many parameters were simulated to verify its possibility to experiment under conditions which would get the highest conversion of 1, 3-dinitroglycerine and which was the ideal condition to get it. The parameters that need to be studied to obtain the highest conversion of 1, 3-dinitroglycerine were mol ratio of nitric acid/glycerol, reaction temperature, mol ratio of glycerol/dichloromethane and pressure. The highest conversion was obtained in the range of mol ratio of nitric acid /glycerol between 2/1 – 5/1, reaction temperature of 5-25oC and pressure of 1 atm. The parameters that need to be studied further to obtain the highest conversion of 1.3 DNG are mol ratio of nitric acid/glycerol and reaction temperature.

Keywords: Nitration, glycerol, thermodynamic, optimum condition.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 3220
888 Using Secure-Image Mechanism to Protect Mobile Agent Against Malicious Hosts

Authors: Tarig Mohamed Ahmed

Abstract:

The usage of internet is rapidly increasing and the usage of mobile agent technology in internet environment has a great demand. The security issue one of main obstacles that restrict the mobile agent technology to spread. This paper proposes Secure-Image Mechanism (SIM) as a new mechanism to protect mobile agents against malicious hosts. . SIM aims to protect mobile agent by using the symmetric encryption and hash function in cryptography science. This mechanism can prevent the eavesdropping and alteration attacks. It assists the mobile agents to continue their journey normally incase attacks occurred.

Keywords: Agent protection, cryptography, mobile agent security.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1915
887 Artificial Neural Network based Web Application Firewall for SQL Injection

Authors: Asaad Moosa

Abstract:

In recent years with the rapid development of Internet and the Web, more and more web applications have been deployed in many fields and organizations such as finance, military, and government. Together with that, hackers have found more subtle ways to attack web applications. According to international statistics, SQL Injection is one of the most popular vulnerabilities of web applications. The consequences of this type of attacks are quite dangerous, such as sensitive information could be stolen or authentication systems might be by-passed. To mitigate the situation, several techniques have been adopted. In this research, a security solution is proposed using Artificial Neural Network to protect web applications against this type of attacks. The solution has been experimented on sample datasets and has given promising result. The solution has also been developed in a prototypic web application firewall called ANNbWAF.

Keywords: Artificial Neural Networks ANN, SQL Injection, Web Application Firewall WAF, Web Application Scanner WAS.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 5664
886 Synthesis and Application of Tamarind Hydroxypropane Sulphonic Acid Resin for Removal of Heavy Metal Ions from Industrial Wastewater

Authors: Aresh Vikram Singh, Sarika Nagar

Abstract:

The tamarind based resin containing hydroxypropane sulphonic acid groups has been synthesized and their adsorption behavior for heavy metal ions has been investigated using batch and column experiments. The hydroxypropane sulphonic acid group has been incorporated onto tamarind by a modified Porath's method of functionalisation of polysaccharides. The tamarind hydroxypropane sulphonic acid (THPSA) resin can selectively remove of heavy metal ions, which are contained in industrial wastewater. The THPSA resin was characterized by FTIR and thermogravimetric analysis. The effects of various adsorption conditions, such as pH, treatment time and adsorbent dose were also investigated. The optimum adsorption condition was found at pH 6, 120 minutes of equilibrium time and 0.1 gram of resin dose. The orders of distribution coefficient values were determined.

Keywords: Distribution coefficient, industrial wastewater, polysaccharides, tamarind hydroxypropane sulphonic acid resin, thermogravimetric analysis.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 967
885 Survey Based Data Security Evaluation in Pakistan Financial Institutions against Malicious Attacks

Authors: Naveed Ghani, Samreen Javed

Abstract:

In today’s heterogeneous network environment, there is a growing demand for distrust clients to jointly execute secure network to prevent from malicious attacks as the defining task of propagating malicious code is to locate new targets to attack. Residual risk is always there no matter what solutions are implemented or whet so ever security methodology or standards being adapted. Security is the first and crucial phase in the field of Computer Science. The main aim of the Computer Security is gathering of information with secure network. No one need wonder what all that malware is trying to do: It's trying to steal money through data theft, bank transfers, stolen passwords, or swiped identities. From there, with the help of our survey we learn about the importance of white listing, antimalware programs, security patches, log files, honey pots, and more used in banks for financial data protection but there’s also a need of implementing the IPV6 tunneling with Crypto data transformation according to the requirements of new technology to prevent the organization from new Malware attacks and crafting of its own messages and sending them to the target. In this paper the writer has given the idea of implementing IPV6 Tunneling Secessions on private data transmission from financial organizations whose secrecy needed to be safeguarded.

Keywords: Network worms, malware infection propagating malicious code, virus, security, VPN.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 2811
884 Application of Tocopherol as Antioxidant to Reduce Decomposition Process on Palm Oil Biodiesel

Authors: Supriyono, Sumardiyono, Rendy J. Pramono

Abstract:

Biodiesel is one of the alternative fuels promising for substituting petrodiesel as energy source which has an advantage as it is sustainable and eco-friendly. Due to the raw material that tends to decompose during storage, biodiesel also has the same characteristic that tends to decompose during storage. Biodiesel decomposition will form higher acid value as the result of oxidation to double bond on a fatty acid compound on biodiesel. Thus, free fatty acid value could be used to evaluate degradation of biodiesel due to the oxidation process. High free fatty acid on biodiesel could impact on the engine performance. Decomposition of biodiesel due to oxidation reaction could prevent by introducing a small amount of antioxidant. The origin of raw materials and the process for producing biodiesel will determine the effectiveness of antioxidant. Biodiesel made from high free fatty acid (FFA) crude palm oil (CPO) by using two steps esterification is vulnerable to oxidation process which is resulted in increasing on the FFA value. Tocopherol also known as vitamin E is one of the antioxidant that could improve the stability of biodiesel due to decomposition by the oxidation process. Tocopherol 0.5% concentration on palm oil biodiesel could reduce 13% of increasing FFA under temperature 80 °C and exposing time 180 minute.

Keywords: Antioxidant, biodiesel, decomposition, oxidation, tocopherol.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1630
883 Application of Tocopherol as Antioxidant to Reduce Decomposition Process on Palm Oil Biodiesel

Authors: Supriyono, Sumardiyono, Rendy J. Pramono

Abstract:

Biodiesel is one of the alternative fuels promising for substituting petrodiesel as energy source which has an advantage as it is sustainable and eco-friendly. Due to the raw material that tends to decompose during storage, biodiesel also has the same characteristic that tends to decompose during storage. Biodiesel decomposition will form higher acid value as the result of oxidation to double bond on a fatty acid compound on biodiesel. Thus, free fatty acid value could be used to evaluate degradation of biodiesel due to the oxidation process. High free fatty acid on biodiesel could impact on the engine performance. Decomposition of biodiesel due to oxidation reaction could prevent by introducing a small amount of antioxidant. The origin of raw materials and the process for producing biodiesel will determine the effectiveness of antioxidant. Biodiesel made from high free fatty acid (FFA) crude palm oil (CPO) by using two steps esterification is vulnerable to oxidation process which is resulted in increasing on the FFA value. Tocopherol also known as vitamin E is one of the antioxidant that could improve the stability of biodiesel due to decomposition by the oxidation process. Tocopherol 0.5% concentration on palm oil biodiesel could reduce 13% of increasing FFA under temperature 80 °C and exposing time 180 minute.

Keywords: Antioxidant, biodiesel, decomposition, oxidation, tocopherol.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1702
882 Property of Polyurethane: from Soy-derived Phosphate Ester

Authors: Flora Elvistia Firdaus

Abstract:

Polyurethane foams (PUF) were formed by a chemical reaction of polyol and isocyanate. The polyol was manufactured by ring-opening hydrolysis of epoxidized soybean oil in the presence of phosphoric acid under varying experimental conditions. Other factors in the foam formulation such as water content and surfactant were kept constant. The effect of the amount of solvents, phosphoric acid, and their derivates in the foam formulation on the properties of polyurethane foams were studied. The properties of the material were measured via a number of parameters, which are water content of prepared polyol, polymer density and cellular structures.

Keywords: soy, polyurethane, phosporic acid

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1795
881 The Performance of PtSn/Al₂O₃ with Cylindrical Particles for Acetic Acid Hydrogenation

Authors: Mingchuan Zhou, Haitao Zhang, Hongfang Ma, Weiyong Ying

Abstract:

Alumina supported PtSn catalysts with cylindrical particles were prepared and characterized by using low temperature N2 adsorption/desorption and X-ray diffraction. Low temperature N2 adsorption/desorption demonstrate that the tableting changed the texture properties of catalysts. XRD pattern indicate that the crystal structure of supports had no change after reaction. The performances over particles of PtSn/Al2O3 catalysts were investigated with regards to reaction temperature, pressure, and H2/AcOH mole ratio. After tableting, the conversion of acetic acid and selectivity of ethanol and acetyl acetate decreased. High reaction temperature and pressure can improve conversion of acetic acid. H2/AcOH mole ratio of 9.36 showed the best performance on acetic acid hydrogenation. High pressure had benefits for the selectivity of ethanol and other two parameters had no obvious effect on selectivity.  

Keywords: Acetic acid hydrogenation, ethanol, PtSn, cylindrical particles.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 2198
880 Serum Nitric Oxide and Sialic Acid: Possible Biochemical Markers for Progression of Diabetic Nephropathy

Authors: Syed M. Shahid, Rozeena Shaikh, Syeda N. Nawab, Shah A. Qader, Abid Azhar, Tabassum Mahboob

Abstract:

This study was designed to investigate the role of serum nitric oxide and sialic acid in the development of diabetic nephropathy as disease marker. Total 210 diabetic patients (age and sex matched) were selected followed by informed consent and divided into four groups (70 each) as I: control; II: diabetic; III: diabetic hypertensive; IV: diabetic nephropathy. The blood samples of all subjects were collected and analyzed for serum nitric oxide, sialic acid, fasting blood glucose, serum urea, creatinine, HbA1c and GFR. The BMI, systolic and diastolic blood pressures, blood glucose, HbA1c and serum sialic acid levels were high (p<0.01) in group II as compared to control subjects. The higher levels (p<0.01) of BMI, systolic and diastolic blood pressures, blood glucose, HbA1c, serum urea, creatinine and sialic acid were observed in group III and IV as compared to controls. Significantly low levels of GFR and serum nitric oxide (p<0.01) were observed in group III and IV as compared to controls. Results indicated that serum nitric oxide and sialic acid are the major biochemical indicators for micro and macrovascular complications of diabetes such as hypertension and nephropathy. These should be taken into account during screening procedures regarding identifications of the diabetic patients to get them rid of progressive renal impairment to ESRD.

Keywords: Diabetic nephropathy, hypertension, nitric oxide, sialic acid.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1690
879 Identifying Common Behavioural Traits of Lone-Wolves in Recent Terrorist Attacks in Europe

Authors: Khaled M. Khan, Armstrong Nhlabatsi

Abstract:

This article attempts to analyse behavioural traits of lone-wolves who struck and killed innocents in six different attacks in Europe in last nine months. The main objective of this study is to develop a profiling template in order to capture commonality of characteristics of these attackers. This study tries to understand the homogeneity of lone-wolves in terms of their social background and state of mind. The commonality among them can possibly be used to build a profiling template that could help detecting vulnerable persons who are prone to be self-radicalised or radicalised by someone else. The result of this study provides us an understanding of their commonality in terms of their state of mind and social characteristics.

Keywords: Behavioral pattern, terrorism, profiling, commonality.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1635
878 Liquid-Liquid Equilibria for Ternary Mixtures of (Water + Carboxylic Acid+ MIBK), Experimental, Simulation, and Optimization

Authors: D. Laiadi, A. Hasseine, A. Merzougui

Abstract:

In this work, Experimental tie-line results and solubility (binodal) curves were obtained for the ternary systems (water + acetic acid + methyl isobutyl ketone (MIBK)), (water + lactic acid+ methyl isobutyl ketone) at T = 294.15K and atmospheric pressure. The consistency of the values of the experimental tie-lines was determined through the Othmer-Tobias and Hands correlations. For the extraction effectiveness of solvents, the distribution and selectivity curves were plotted. In addition, these experimental tieline data were also correlated with NRTL model. The interaction parameters for the NRTL model were retrieved from the obtained experimental results by means of a combination of the homotopy method and the genetic algorithms.

Keywords: Liquid-liquid equilibria, homotopy methods, carboxylic acid, NRTL.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 5623
877 Characterization of Biodegradable Nanocomposites with Poly (Lactic Acid) and Multi-Walled Carbon Nanotubes

Authors: Md F. Mina, Mohammad D.H. Beg, Muhammad R. Islam, Abu K. M. M. Alam A. Nizam, Rosli M. Younus

Abstract:

In this study, structural, mechanical, thermal and electrical properties of poly (lactic acid) (PLA) nanocomposites with low-loaded (0-1.5 wt%) untreated, heat and nitric acid treated multiwalled carbon nanotubes (MWCNTs) were studied. Among the composites, untreated 0.5 wt % MWCNTs and acid-treated 1.0 wt% MWCNTs reinforced PLA show the tensile strength and modulus values higher than the others. These two samples along with pure PLA exhibit the stable orthorhombic α-form, whilst other samples reveal the less stable orthorhombic β-form, as demonstrated by X-ray diffraction study. Differential scanning calorimetry reveals the evolution of the mentioned different phases by controlled cooling and discloses an enhancement of PLA crystallization by nanotubes incorporation. Thermogravimetric analysis shows that the MWCNTs loaded sample degraded faster than PLA. Surface resistivity of the nanocomposites is found to be dropped drastically by a factor of 1013 with a low loading of MWCNTs (1.5 wt%).

Keywords: Crystallization, multi-walled carbon nanotubes, nanocomposites, Poly (lactic acid).

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 2603