Search results for: pilot contamination attacks
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 674

Search results for: pilot contamination attacks

254 Distributed Detection and Optimal Traffic-blocking of Network Worms

Authors: Zoran Nikoloski, Narsingh Deo, Ludek Kucera

Abstract:

Despite the recent surge of research in control of worm propagation, currently, there is no effective defense system against such cyber attacks. We first design a distributed detection architecture called Detection via Distributed Blackholes (DDBH). Our novel detection mechanism could be implemented via virtual honeypots or honeynets. Simulation results show that a worm can be detected with virtual honeypots on only 3% of the nodes. Moreover, the worm is detected when less than 1.5% of the nodes are infected. We then develop two control strategies: (1) optimal dynamic trafficblocking, for which we determine the condition that guarantees minimum number of removed nodes when the worm is contained and (2) predictive dynamic traffic-blocking–a realistic deployment of the optimal strategy on scale-free graphs. The predictive dynamic traffic-blocking, coupled with the DDBH, ensures that more than 40% of the network is unaffected by the propagation at the time when the worm is contained.

Keywords: Network worms, distributed detection, optimaltraffic-blocking, individual-based simulation.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1394
253 Challenges of e-Government Services Adoption in Saudi Arabia from an e-Ready Citizen Perspective

Authors: Mohammed Alshehri, Steve Drew

Abstract:

More and more governments around the world are introducing e-government as a means of reducing costs, improving services, saving time and increasing effectiveness and efficiency in the public sector Therefore e-government has been identified as one of the top priorities for Saudi government and all its agencies. However, the adoption of e-government is facing many challenges and barriers such as technological, cultural, organizational, and social issues which must be considered and treated carefully by any government contemplating its adoption. This paper reports on a pilot study amongst online (e-ready) citizens to identify the challenges and barriers that affect the adoption of e-government services especially from their perspective in Saudi society. Based on the analysis of data collected from an online survey the researcher was able to identify some of the important barriers and challenges from the e-ready citizen perspective. As a result, this study has generated a list of possible strategies to move towards successful adoption of egovernment services in Saudi Arabia.

Keywords: Challenges, E-government services, adoption, SaudiArabia

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 3606
252 Blast Induced Ground Shock Effects on Pile Foundations

Authors: L. B. Jayasinghe, D. P. Thambiratnam, N. Perera, J. H. A. R. Jayasooriya

Abstract:

Due to increased number of terrorist attacks in recent years, loads induced by explosions need to be incorporated in building designs. For safer performance of a structure, its foundation should have sufficient strength and stability. Therefore, prior to any reconstruction or rehabilitation of a building subjected to blast, it is important to examine adverse effects on the foundation caused by blast induced ground shocks. This paper evaluates the effects of a buried explosion on a pile foundation. It treats the dynamic response of the pile in saturated sand, using explicit dynamic nonlinear finite element software LS-DYNA. The blast induced wave propagation in the soil and the horizontal deformation of pile are presented and the results are discussed. Further, a parametric study is carried out to evaluate the effect of varying the explosive shape on the pile response. This information can be used to evaluate the vulnerability of piled foundations to credible blast events as well as develop guidance for their design.

Keywords: Underground explosion, numerical simulation, pilefoundation, saturated soil.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 3588
251 Providing a Secure Hybrid Method for Graphical Password Authentication to Prevent Shoulder Surfing, Smudge and Brute Force Attack

Authors: Faraji Sepideh

Abstract:

Nowadays, purchase rate of the smart device is increasing and user authentication is one of the important issues in information security. Alphanumeric strong passwords are difficult to memorize and also owners write them down on papers or save them in a computer file. In addition, text password has its own flaws and is vulnerable to attacks. Graphical password can be used as an alternative to alphanumeric password that users choose images as a password. This type of password is easier to use and memorize and also more secure from pervious password types. In this paper we have designed a more secure graphical password system to prevent shoulder surfing, smudge and brute force attack. This scheme is a combination of two types of graphical passwords recognition based and Cued recall based. Evaluation the usability and security of our proposed scheme have been explained in conclusion part.

Keywords: Brute force attack, graphical password, shoulder surfing attack, smudge attack.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 863
250 Prediction of Soil Exchangeable Sodium Ratio Based on Soil Sodium Adsorption Ratio

Authors: M. Siosemarde, F. Kave, E. Pazira, H. Sedghi, S. J. Ghaderi

Abstract:

Researchers have long had trouble in measurement of Exchangeable Sodium Ratio (ESR) at salt-affected soils. this parameter are often determined using laborious and time consuming laboratory tests, but it may be more appropriate and economical to develop a method which uses a more simple soil salinity index. The aim of this study was to determine the relationship between exchangeable sodium ratio (ESR) and sodium adsorption ratio (SAR) in some salt-affected soils of Khuzestan plain. To this purpose, two experimental areas (S1, S2) of Khuzestan province-IRAN were selected and four treatments with three replications by series of double rings were applied. The treatments were included 25cm, 50cm, 75cm and 100cm water application. The statistical results of the study indicated that in order to predict soil ESR based on soil SAR the linear regression model ESR=0.2048+0.0066 SAR (R2=0.53) & ESR=0.0564+0.0171 SAR (R2=0.76) can be recommended in Pilot S1 and S2 respectively.

Keywords: exchangeable sodium ratio, Khuzestan plain, saltaffectedsoils and sodium adsorption ratio.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 3207
249 The Role of State in Combating Religious Extremism and Terrorism

Authors: Kadyrzhan Smagulov, Mukhtar Senggirbay, Sholpan Zhandossova, Lyaila Ivatova, Gulnar Nassimova

Abstract:

terrorism and extremism are among the most dangerous and difficult to forecast the phenomena of our time, which are becoming more diverse forms and rampant. Terrorist attacks often produce mass casualties, involve the destruction of material and spiritual values, beyond the recovery times, sow hatred among nations, provoke war, mistrust and hatred between the social and national groups, which sometimes can not be overcome within a generation. Currently, the countries of Central Asia are a topical issue – the threat of terrorism and religious extremism, which grow not only in our area, but throughout the world. Of course, in each of the terrorist threat is assessed differently. In our country the problem of terrorism should not be acutely. Thus, after independence and sovereignty of Kazakhstan has chosen the path of democracy, progress and free economy. With the policy of the President of Kazakhstan Nursultan Nazarbayev and well-organized political and economic reforms, there has been economic growth and rising living standards, socio-political stability, ensured civil peace and accord in society [1].

Keywords: Kazakhstan, national security, religious extremism and terrorism, ethnic conflict

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 2737
248 Awakeness, Awareness and Learning Mathematics for Arab Students: A Pilot Study

Authors: S. Rawashdi, D. Bshouty

Abstract:

This paper aimed at discussing how to urge middle and high school Arab students in Israel to be aware of the importance of and investing in learning mathematics. In the first phase of the study, three questionnaires were passed to two nine-grade classes, one on Awareness, one on Awakeness and one on Learning. One of the two classes was an outstanding class from a public school (PUBS) of 31 students, and the other a heterogeneous class from a private school (PRIS) with 31 students. The Learning questionnaire which was administrated to the Awareness and Awareness topics was passed to PRIS and the Awareness and Awareness Questionnaires were passed to the PUBS class After two months we passed the post-questionnaire to both classes to validate the long-term impact of the study. The findings of the study show that awakeness and awareness processes have an effect on the math learning process, on its context in students' daily lives and their growing interest in learning math.

Keywords: Awakeness, awareness, learning mathematics, pupils.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 576
247 Variogram Fitting Based on the Wilcoxon Norm

Authors: Hazem Al-Mofleh, John Daniels, Joseph McKean

Abstract:

Within geostatistics research, effective estimation of the variogram points has been examined, particularly in developing robust alternatives. The parametric fit of these variogram points which eventually defines the kriging weights, however, has not received the same attention from a robust perspective. This paper proposes the use of the non-linear Wilcoxon norm over weighted non-linear least squares as a robust variogram fitting alternative. First, we introduce the concept of variogram estimation and fitting. Then, as an alternative to non-linear weighted least squares, we discuss the non-linear Wilcoxon estimator. Next, the robustness properties of the non-linear Wilcoxon are demonstrated using a contaminated spatial data set. Finally, under simulated conditions, increasing levels of contaminated spatial processes have their variograms points estimated and fit. In the fitting of these variogram points, both non-linear Weighted Least Squares and non-linear Wilcoxon fits are examined for efficiency. At all levels of contamination (including 0%), using a robust estimation and robust fitting procedure, the non-weighted Wilcoxon outperforms weighted Least Squares.

Keywords: Non-Linear Wilcoxon, robust estimation, Variogram estimation.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 934
246 Phytoremediation of Cd and Pb by Four Tropical Timber Species Grown on an Ex-tin Mine in Peninsular Malaysia

Authors: Lai Hoe Ang, Lai Kuen Tang, Wai Mun Ho, Ting Fui Hui, Gary W. Theseira

Abstract:

Contamination of heavy metals in tin tailings has caused an interest in the scientific approach of their remediation. One of the approaches is through phytoremediation, which is using tree species to extract the heavy metals from the contaminated soils. Tin tailings comprise of slime and sand tailings. This paper reports only on the finding of the four timber species namely Acacia mangium, Hopea odorata, Intsia palembanica and Swietenia macrophylla on the removal of cadmium (Cd) and lead (Pb) from the slime tailings. The methods employed for sampling and soil analysis are established methods. Six trees of each species were randomly selected from a 0.25 ha plot for extraction and determination of their heavy metals. The soil samples were systematically collected according to 5 x 5 m grid from each plot. Results showed that the concentration of heavy metals in soils and trees varied according to species. Higher concentration of heavy metals was found in the stem than the primary roots of all the species. A. Mangium accumulated the highest total amount of Pb per hectare basis.

Keywords: Cd, Pb, Phytoremediation of slimetailings, timber species.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 2717
245 ERP Implementation in Iran: (A Successful Experience in DGC)

Authors: Mohammad Reza Ostad Ali Naghi Kashani

Abstract:

Nowadays, the amounts of companies which tend to have an Enterprise Resource Planning (ERP) application are increasing. Although ERP projects are expensive, time consuming, and complex, there are some successful experiences. These days, developing countries are striving to implement ERP projects successfully; however, there are many obstacles. Therefore, these projects would be failed or partially failed. This paper concerns the implementation of a successful ERP implementation, IFS, in Iran at Dana Geophysics Company (DGC). After a short review of ERP and ERP market in Iran, we propose a three phases deployment methodology (phase 1: Preparation and Business Process Management (BPM) phase 2: implementation and phase 3: testing, golive-1 (pilot) and golive-2 (final)). Then, we present five guidelines (Project Management, Change Management, Business Process Management (BPM), Training& Knowledge Management, and Technical Management), which were chose as work streams. In this case study we present lessons learned in Project management and Business process Management.

Keywords: Business Process Management, Critical Success Factors, ERP, Project Management.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 2891
244 Incineration of Sludge in a Fluidized-Bed Combustor

Authors: Chien-Song Chyang, Yu-Chi Wang

Abstract:

For sludge disposal, incineration is considered to be better than direct burial because of regulations and space limitations in Taiwan. Additionally, burial after incineration can effectively prolong the lifespan of a landfill. Therefore, it is the most satisfactory method for treating sludge at present. Of the various incineration technologies, the fluidized bed incinerator is a suitable choice due to its fuel flexibility. In this work, sludge generated from industrial plants was treated in a pilot-scale vortexing fluidized bed. The moisture content of the sludge was 48.53%, and its LHV was 454.6 kcal/kg. Primary gas and secondary gas were fixed at 3 Nm3/min and 1 Nm3/min, respectively. Diesel burners with on-off controllers were used to control the temperature; the bed temperature was set to 750±20 °C, and the freeboard temperature was 850±20 °C. The experimental data show that the NO emission increased with bed temperature. The maximum NO emission is 139 ppm, which is in agreement with the regulation. The CO emission is low than 100 ppm through the operation period. The mean particle size of fly ash collected from baghouse decreased with operating time. The ration of bottom ash to fly ash is about 3. Compared with bottom ash, the potassium in the fly ash is much higher. It implied that the potassium content is not the key factor for aggregation of bottom ash.

Keywords: Sludge incineration, fluidized bed combustion, fly ash, bottom ash.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 897
243 A Socio-Technical Approach to Cyber-Risk Assessment

Authors: Kitty Kioskli, Nineta Polemi

Abstract:

Evaluating the levels of cyber-security risks within an enterprise is most important in protecting its information system, services and all its digital assets against security incidents (e.g. accidents, malicious acts, massive cyber-attacks). The existing risk assessment methodologies (e.g. eBIOS, OCTAVE, CRAMM, NIST-800) adopt a technical approach considering as attack factors only the capability, intention and target of the attacker, and not paying attention to the attacker’s psychological profile and personality traits. In this paper, a socio-technical approach is proposed in cyber risk assessment, in order to achieve more realistic risk estimates by considering the personality traits of the attackers. In particular, based upon principles from investigative psychology and behavioural science, a multi-dimensional, extended, quantifiable model for an attacker’s profile is developed, which becomes an additional factor in the cyber risk level calculation.

Keywords: Attacker, behavioural models, cyber risk assessment, cyber-security, human factors, investigative psychology, ISO27001, ISO27005.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 901
242 Operative Public Space for Rural Brazil Strategies for Starting Up Economic, Social and Environmental Development of Rural Communities in Emerging Countries: The Goiabeira Case

Authors: Alessandra Battisti, Silvia Cimini

Abstract:

This article stands in the context of rural communities in Brazil, where, like many others emerging countries, the overwhelming increasing markets and the overcrowded cities are leaving behind informal settlements based on obsolete agricultural economies and techniques. The pilot project for the community of Goiabeira reflects the attempt to imagine a development model that privileges the actual improvement of living conditions, the education and training, the social inclusion and participation of the dwellers of rural communities. Through the inclusion of operative public space, the aim is for them to become self-sustaining, encouraging the use of local resources for appropriate architectural, ecological and energy technologies and devices, that are efficient, affordable and foster community participation, in the respect of the surrounding environment.

Keywords: Economical development, environment conservation, local resources, participation and social inclusion.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 2126
241 A Study of DSRC Radio Testbed under Heavy Channel Load

Authors: Chih-Neng Liang, Bo-Chiuan Chen, C. W. Hsu

Abstract:

Dedicated Short Range Communication (DSRC) is a key enabling technology for the next generation of communication-based safety applications. One of the important problems for DSRC deployment is maintaining high performance under heavy channel load. Many studies focus on congestion control mechanisms for simulating hundreds of physical radios deployed on vehicles. The U.S. department of transportation-s (DOT) Intelligent Transportation Systems (ITS) division has a plan to chosen prototype on-board devices capable of transmitting basic “Here I am" safety messages to other vehicles. The devices will be used in an IntelliDrive safety pilot deployment of up to 3,000 vehicles. It is hard to log the information of 3,000 vehicles. In this paper we present the designs and issues related to the DSRC Radio Testbed under heavy channel load. The details not only include the architecture of DSRC Radio Testbed, but also describe how the Radio Interfere System is used to help for emulating the congestion radio environment.

Keywords: DSRC, UDP, WAVE, Radio Testbed

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1765
240 Unsupervised Clustering Methods for Identifying Rare Events in Anomaly Detection

Authors: Witcha Chimphlee, Abdul Hanan Abdullah, Mohd Noor Md Sap, Siriporn Chimphlee, Surat Srinoy

Abstract:

It is important problems to increase the detection rates and reduce false positive rates in Intrusion Detection System (IDS). Although preventative techniques such as access control and authentication attempt to prevent intruders, these can fail, and as a second line of defence, intrusion detection has been introduced. Rare events are events that occur very infrequently, detection of rare events is a common problem in many domains. In this paper we propose an intrusion detection method that combines Rough set and Fuzzy Clustering. Rough set has to decrease the amount of data and get rid of redundancy. Fuzzy c-means clustering allow objects to belong to several clusters simultaneously, with different degrees of membership. Our approach allows us to recognize not only known attacks but also to detect suspicious activity that may be the result of a new, unknown attack. The experimental results on Knowledge Discovery and Data Mining-(KDDCup 1999) Dataset show that the method is efficient and practical for intrusion detection systems.

Keywords: Network and security, intrusion detection, fuzzy cmeans, rough set.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 2808
239 Environmental Sanitation and Health Risks in Tropical Urban Settings: Case Study of Household Refuse and Diarrhea in Yaoundé-Cameroon

Authors: H. B. Nguendo Yongsi, Thora M. Herrmann, A. Lutumba Ntetu, Rémy Sietchiping, Christopher Bryant

Abstract:

Health problems linked to urban growth are current major concerns of developing countries. In 2002 and 2005, an interdisciplinary program “Populations et Espaces ├á Risques SANitaires" (PERSAN) was set up under the patronage of the Development and Research Institute. Centered on health in Cameroon-s urban environment, the program mainly sought to (i) identify diarrhoea risk factors in Yaoundé, (ii) to measure their prevalence and apprehend their spatial distribution. The crosssectional epidemiological study that was carried out revealed a diarrheic prevalence of 14.4% (437 cases of diarrhoea on the 3,034 children examined). Also, among risk factors studied, household refuse management methods used by city dwellers were statistically associated to these diarrhoeas. Moreover, it happened that levels of diarrhoeal attacks varied consistently from one neighbourhood to another because of the discrepancy urbanization process of the Yaoundé metropolis.

Keywords: Diarrhea, health risk, household refuses handling, sanitation, Yaoundé.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 3633
238 An Improved Method to Watermark Images Sensitive to Blocking Artifacts

Authors: Afzel Noore

Abstract:

A new digital watermarking technique for images that are sensitive to blocking artifacts is presented. Experimental results show that the proposed MDCT based approach produces highly imperceptible watermarked images and is robust to attacks such as compression, noise, filtering and geometric transformations. The proposed MDCT watermarking technique is applied to fingerprints for ensuring security. The face image and demographic text data of an individual are used as multiple watermarks. An AFIS system was used to quantitatively evaluate the matching performance of the MDCT-based watermarked fingerprint. The high fingerprint matching scores show that the MDCT approach is resilient to blocking artifacts. The quality of the extracted face and extracted text images was computed using two human visual system metrics and the results show that the image quality was high.

Keywords: Digital watermarking, data hiding, modified discretecosine transformation (MDCT).

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1570
237 A Signature-Based Secure Authentication Framework for Vehicular Ad Hoc Networks

Authors: J. Jenefa, E. A. Mary Anita

Abstract:

Vehicular Ad hoc NETwork (VANET) is a kind of Mobile Ad hoc NETwork (MANET). It allows the vehicles to communicate with one another as well as with nearby Road Side Units (RSU) and Regional Trusted Authorities (RTA). Vehicles communicate through On-Board Units (OBU) in which privacy has to be assured which will avoid the misuse of private data. A secure authentication framework for VANETs is proposed in which Public Key Cryptography (PKC) based adaptive pseudonym scheme is used to generate self-generated pseudonyms. Self-generated pseudonyms are used instead of real IDs for privacy preservation and non-repudiation. The ID-Based Signature (IBS) and ID-Based Online/Offline Signature (IBOOS) schemes are used for authentication. IBS is used to authenticate between vehicle and RSU whereas IBOOS provides authentication among vehicles. Security attacks like impersonation attack in the network are resolved and the attacking nodes are rejected from the network, thereby ensuring secure communication among the vehicles in the network. Simulation results shows that the proposed system provides better authentication in VANET environment.

Keywords: Non-repudiation, privacy preservation, public key cryptography, self- generated pseudonym.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1412
236 A Novel Method for Non-Invasive Diagnosis of Hepatitis C Virus Using Electromagnetic Signal Detection: A Multicenter International Study

Authors: Gamal Shiha, Waleed Samir, Zahid Azam, Premashis Kar, Saeed Hamid, Shiv Sarin

Abstract:

A simple, rapid and non-invasive electromagnetic sensor (C-FAST device) was- patented; for diagnosis of HCV RNA. Aim: To test the validity of the device compared to standard HCV PCR. Subjects and Methods: The first phase was done as pilot in Egypt on 79 participants; the second phase was done in five centers: one center from Egypt, two centers from Pakistan and two centers from India (800, 92 and 113 subjects respectively). The third phase was done nationally as multicenter study on (1600) participants for ensuring its representativeness. Results: When compared to PCR technique, C-FAST device revealed sensitivity 95% to 100%, specificity 95.5% to 100%, PPV 89.5% to 100%, NPV 95% to 100% and positive likelihood ratios 21.8% to 38.5%. Conclusion: It is practical evidence that HCV nucleotides emit electromagnetic signals that can be used for its identification. As compared to PCR, C-FAST is an accurate, valid and non-invasive device.

Keywords: C-FAST- a valid and reliable device, Distant cellular interaction, Electromagnetic signal detection, Non-invasive diagnosis of HCV.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 17984
235 School Design and Energy Efficiency

Authors: B. Su

Abstract:

Auckland has a temperate climate with comfortable warm, dry summers and mild, wet winters. An Auckland school normally does not need air conditioning for cooling during the summer and only need heating during the winter. The space hating energy is the major portion of winter school energy consumption and the winter energy consumption is major portion of annual school energy consumption. School building thermal design should focus on the winter thermal performance for reducing the space heating energy. A number of Auckland schools- design data and energy consumption data are used for this study. This pilot study investigates the relationships between their energy consumption data and school building design data to improve future school design for energy efficiency.

Keywords: Building energy efficiency, building thermal performance, school building design, school energy consumption

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1837
234 Mean Shift-based Preprocessing Methodology for Improved 3D Buildings Reconstruction

Authors: Nikolaos Vassilas, Theocharis Tsenoglou, Djamchid Ghazanfarpour

Abstract:

In this work, we explore the capability of the mean shift algorithm as a powerful preprocessing tool for improving the quality of spatial data, acquired from airborne scanners, from densely built urban areas. On one hand, high resolution image data corrupted by noise caused by lossy compression techniques are appropriately smoothed while at the same time preserving the optical edges and, on the other, low resolution LiDAR data in the form of normalized Digital Surface Map (nDSM) is upsampled through the joint mean shift algorithm. Experiments on both the edge-preserving smoothing and upsampling capabilities using synthetic RGB-z data show that the mean shift algorithm is superior to bilateral filtering as well as to other classical smoothing and upsampling algorithms. Application of the proposed methodology for 3D reconstruction of buildings of a pilot region of Athens, Greece results in a significant visual improvement of the 3D building block model.

Keywords: 3D buildings reconstruction, data fusion, data upsampling, mean shift.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1952
233 Fuzzy based Security Threshold Determining for the Statistical En-Route Filtering in Sensor Networks

Authors: Hae Young Lee, Tae Ho Cho

Abstract:

In many sensor network applications, sensor nodes are deployed in open environments, and hence are vulnerable to physical attacks, potentially compromising the node's cryptographic keys. False sensing report can be injected through compromised nodes, which can lead to not only false alarms but also the depletion of limited energy resource in battery powered networks. Ye et al. proposed a statistical en-route filtering scheme (SEF) to detect such false reports during the forwarding process. In this scheme, the choice of a security threshold value is important since it trades off detection power and overhead. In this paper, we propose a fuzzy logic for determining a security threshold value in the SEF based sensor networks. The fuzzy logic determines a security threshold by considering the number of partitions in a global key pool, the number of compromised partitions, and the energy level of nodes. The fuzzy based threshold value can conserve energy, while it provides sufficient detection power.

Keywords: Fuzzy logic, security, sensor network.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1536
232 Comparative Studies on Dissimilar Metals thin Sheets Using Laser Beam Welding - A Review

Authors: K. Kalaiselvan, A. Elango, N. M. Nagarajan

Abstract:

Laser beam welding for the dissimilar Titanium and Aluminium thin sheets is an emerging area which is having wider applications in aerospace, aircraft, automotive, electronics and in other industries due to its high speed, non-contact, precision with low heat effects, least welding distortion, low labor costs and convenient operation. Laser beam welding of dissimilar metal combinations are increasingly demanded due to high energy densities with small fusion and heat affected zones. Furthermore, no filler or electrode material is required and contamination of weld is also very small. The present study is to reviews the influence of different parameters like laser power, welding speed, power density, beam diameter, focusing distance and type of shielding gas on the mechanical properties of dissimilar metal combinations like SS/Al, Cu/Al and Ti/Al focusing on aluminum to other materials. Research findings reveal that Ti/Al combination gives better metallurgical and mechanical properties than other combinations such as SS/Al and Cu/Al.

Keywords: Laser Beam Welding, dissimilar metals, SS/Al, Cu/Al and Ti/Al sheets.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 2643
231 Robust Minutiae Watermarking in Wavelet Domain for Fingerprint Security

Authors: Rajlaxmi Chouhan, Pritee Khanna

Abstract:

In this manuscript, a wavelet-based blind watermarking scheme has been proposed as a means to provide security to authenticity of a fingerprint. The information used for identification or verification of a fingerprint mainly lies in its minutiae. By robust watermarking of the minutiae in the fingerprint image itself, the useful information can be extracted accurately even if the fingerprint is severely degraded. The minutiae are converted in a binary watermark and embedding these watermarks in the detail regions increases the robustness of watermarking, at little to no additional impact on image quality. It has been experimentally shown that when the minutiae is embedded into wavelet detail coefficients of a fingerprint image in spread spectrum fashion using a pseudorandom sequence, the robustness is observed to have a proportional response while perceptual invisibility has an inversely proportional response to amplification factor “K". The DWT-based technique has been found to be very robust against noises, geometrical distortions filtering and JPEG compression attacks and is also found to give remarkably better performance than DCT-based technique in terms of correlation coefficient and number of erroneous minutiae.

Keywords: Fingerprint watermarking, minutiae, discrete wavelet transform, PN sequence

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1968
230 Risk of Plastic Shrinkage Cracking in Recycled Aggregate Concrete

Authors: M. Eckert, M. Oliveira

Abstract:

The intensive use of natural aggregates, near cities and towns, associated to the increase of the global population, leads to its depletion and increases the transport distances. The uncontrolled deposition of construction and demolition waste in landfills and city outskirts, causes pollution and takes up space. The use of recycled aggregates in concrete preparation would contribute to mitigate the problem. However, it arises the problem that the high water absorption of recycled aggregate decreases the bleeding rate of concrete, and when this gets lower than the evaporation rate, plastic shrinkage cracking occurs. This phenomenon can be particularly problematic in hot and windy curing environments. Cracking facilitates the flow of liquid and gas into concrete which attacks the reinforcement and degrades the concrete. These factors reduce the durability of concrete structures and consequently the lifetime of buildings. A ring test was used, cured in a wind tunnel, to evaluate the plastic shrinkage cracking sensitivity of recycled aggregate concrete, in order to implement preventive means to control this phenomenon. The role of several aggregate properties on the concrete segregation and cracking mechanisms were also discussed.

Keywords: Recycled Aggregate, Plastic Shrinkage Cracking; Wind Tunnel, Durability.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 994
229 Possibilities, Challenges and the State of the Art of Automatic Speech Recognition in Air Traffic Control

Authors: Van Nhan Nguyen, Harald Holone

Abstract:

Over the past few years, a lot of research has been conducted to bring Automatic Speech Recognition (ASR) into various areas of Air Traffic Control (ATC), such as air traffic control simulation and training, monitoring live operators for with the aim of safety improvements, air traffic controller workload measurement and conducting analysis on large quantities controller-pilot speech. Due to the high accuracy requirements of the ATC context and its unique challenges, automatic speech recognition has not been widely adopted in this field. With the aim of providing a good starting point for researchers who are interested bringing automatic speech recognition into ATC, this paper gives an overview of possibilities and challenges of applying automatic speech recognition in air traffic control. To provide this overview, we present an updated literature review of speech recognition technologies in general, as well as specific approaches relevant to the ATC context. Based on this literature review, criteria for selecting speech recognition approaches for the ATC domain are presented, and remaining challenges and possible solutions are discussed.

Keywords: Automatic Speech Recognition, ASR, Air Traffic Control, ATC.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 3991
228 Seasonal Water Quality Trends in the Feitsui Reservoir Watershed, Taiwan

Authors: Pei-Te Chiueh, Hsiao-Ting Wu, Shang-Lien Lo

Abstract:

Protecting is the sources of drinking water is the first barrier of contamination of drinking water. The Feitsui Reservoir watershed of Taiwan supplies domestic water for around 5 million people in the Taipei metropolitan area. Understanding the spatial patterns of water quality trends in this watershed is an important agenda for management authorities. This study examined 7 sites in the watershed for water quality parameters regulated in the standard for drinking water source. The non-parametric seasonal Mann-Kendall-s test was used to determine significant trends for each parameter. Significant trends of increasing pH occurred at the sampling station in the uppermost stream watershed, and in total phosphorus at 4 sampling stations in the middle and downstream watershed. Additionally, the multi-scale land cover assessment and average land slope were used to explore the influence on the water quality in the watershed. Regression models for predicting water quality were also developed.

Keywords: Seasonal Mann-Kendall's test, Flow-adjusted concentrations, Water quality trends, Land-use

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1562
227 A Study of Flow and Sedimentation at the Basins of Khoozestan Province Rivers: A Case Study of Boneh Basht Pumping Station

Authors: Emad Hazbkhah. Abdolreza zahiri, Hossein ghorbanizade kharazi

Abstract:

The present paper is a case study about exploitation of Kheir Abad river (Khoozestan, Iran) water resources and the problems caused by river sediments around the pumping stations. The weak points and strong points of Boneh Basht pumping station have been studied by experienced experts, work teams, and consulting engineers and technical and executive solutions have been suggested. Therefore, the suggestions of this article are based on the performed studies and are proposed in order to evaluate the logical solutions. Rather complicated processes resulting from the interaction of water flows and sediments observed at Boneh Basht pumping station occur at other pumping stations in almost the same way. Therefore, Boneh Basht pumping station can be selected as a sample (pilot) and up-to-date theories and experiences can be applied to this station and the results can be offered to other stations.

Keywords: Boneh Basht , Iran , Pumping Station, Sedimentation

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1250
226 An Intelligent System for Phish Detection, using Dynamic Analysis and Template Matching

Authors: Chinmay Soman, Hrishikesh Pathak, Vishal Shah, Aniket Padhye, Amey Inamdar

Abstract:

Phishing, or stealing of sensitive information on the web, has dealt a major blow to Internet Security in recent times. Most of the existing anti-phishing solutions fail to handle the fuzziness involved in phish detection, thus leading to a large number of false positives. This fuzziness is attributed to the use of highly flexible and at the same time, highly ambiguous HTML language. We introduce a new perspective against phishing, that tries to systematically prove, whether a given page is phished or not, using the corresponding original page as the basis of the comparison. It analyzes the layout of the pages under consideration to determine the percentage distortion between them, indicative of any form of malicious alteration. The system design represents an intelligent system, employing dynamic assessment which accurately identifies brand new phishing attacks and will prove effective in reducing the number of false positives. This framework could potentially be used as a knowledge base, in educating the internet users against phishing.

Keywords: World Wide Web, Phishing, Internet security, data mining.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1794
225 Combined Beamforming and Channel Estimation in WCDMA Communication Systems

Authors: Nermin A. Mohamed, Mohamed F. Madkour

Abstract:

We address the problem of joint beamforming and multipath channel parameters estimation in Wideband Code Division Multiple Access (WCDMA) communication systems that employ Multiple-Access Interference (MAI) suppression techniques in the uplink (from mobile to base station). Most of the existing schemes rely on time multiplex a training sequence with the user data. In WCDMA, the channel parameters can also be estimated from a code multiplexed common pilot channel (CPICH) that could be corrupted by strong interference resulting in a bad estimate. In this paper, we present new methods to combine interference suppression together with channel estimation when using multiple receiving antennas by using adaptive signal processing techniques. Computer simulation is used to compare between the proposed methods and the existing conventional estimation techniques.

Keywords: Adaptive arrays, channel estimation, interferencecancellation, wideband code division multiple access (WCDMA).

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 2278