Search results for: sulfuric acid attacks.
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 1045

Search results for: sulfuric acid attacks.

1015 Taxonomy of Structured P2P Overlay Networks Security Attacks

Authors: Zied Trifa, Maher Khemakhem

Abstract:

The survey and classification of the different security attacks in structured peer-to-peer (P2P) overlay networks can be useful to computer system designers, programmers, administrators, and users. In this paper, we attempt to provide a taxonomy of structured P2P overlay networks security attacks. We have specially focused on the way these attacks can arise at each level of the network. Moreover, we observed that most of the existing systems such as Content Addressable Network (CAN), Chord, Pastry, Tapestry, Kademlia, and Viceroy suffer from threats and vulnerability which lead to disrupt and corrupt their functioning. We hope that our survey constitutes a good help for who-s working on this area of research.

Keywords: P2P, Structured P2P Overlay Networks, DHT, Security, classification

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1714
1014 Study on Network-Based Technology for Detecting Potentially Malicious Websites

Authors: Byung-Ik Kim, Hong-Koo Kang, Tae-Jin Lee, Hae-Ryong Park

Abstract:

Cyber terrors against specific enterprises or countries have been increasing recently. Such attacks against specific targets are called advanced persistent threat (APT), and they are giving rise to serious social problems. The malicious behaviors of APT attacks mostly affect websites and penetrate enterprise networks to perform malevolent acts. Although many enterprises invest heavily in security to defend against such APT threats, they recognize the APT attacks only after the latter are already in action. This paper discusses the characteristics of APT attacks at each step as well as the strengths and weaknesses of existing malicious code detection technologies to check their suitability for detecting APT attacks. It then proposes a network-based malicious behavior detection algorithm to protect the enterprise or national networks.

Keywords: Advanced Persistent Threat, Malware, Network Security, Network Packet, Exploit Kits.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1512
1013 Optimization of Pretreatment and Enzymatic Saccharification of Cogon Grass Prior Ethanol Production

Authors: Jhalique Jane R. Fojas, Ernesto J. Del Rosario

Abstract:

The dilute acid pretreatment and enzymatic saccharification of lignocellulosic substrate, cogon grass (Imperata cylindrical, L.) was optimized prior ethanol fermentation using simultaneous saccharification and fermentation (SSF) method. The optimum pretreatment conditions, temperature, sulfuric acid concentration, and reaction time were evaluated by determining the maximum sugar yield at constant enzyme loading. Cogon grass, at 10% w/v substrate loading, has optimum pretreatment conditions of 126°C, 0.6% v/v H2SO4, and 20min reaction time. These pretreatment conditions were used to optimize enzymatic saccharification using different enzyme combinations. The maximum saccharification yield of 36.68mg/mL (71.29% reducing sugar) was obtained using 25FPU/g-cellulose cellulase complex combined with 1.1% w/w of cellobiase, ß-glucosidase, and 0.225% w/w of hemicellulase complex, after 96 hours of saccharification. Using the optimum pretreatment and saccharification conditions, SSF of treated substrates was done at 37°C for 120 hours using industrial yeast strain HBY3, Saccharomyces cerevisiae. The ethanol yield for cogon grass at 4% w/w loading was 9.11g/L with 5.74mg/mL total residual sugar.

Keywords: Acid pretreatment, bioethanol, biomass, cogon grass, fermentation, lignocellylose, SSF.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 3845
1012 Fatty Acid and Amino Acid Composition in Mene maculata in The Sea of Maluku

Authors: Semuel Unwakoly, Reinner Puppela, Maresthy Rumalean, Healthy Kainama

Abstract:

Fish is a kind of food that contains many nutritions, one of those is the long chain of unsaturated fatty acids as omega-3 and omega-6 fatty acids and essential amino acid in enough amount for the necessity of our body. Like pelagic fish that found in the sea of Maluku. This research was done to identify fatty acids and amino acids composition in Moonfish (M. maculata) using transesterification reaction steps and Gas Chromatograph-Mass Spectrophotometer (GC-MS) and High-Performance Liquid Chromatography (HPLC). The result showed that fatty acids composition in Moonfish (M. maculata) contained tridecanoic acid (2.84%); palmitoleic acid (2.65%); palmitic acid (35.24%); oleic acid (6.2%); stearic acid (14.20%); and 5,8,11,14-eicosatetraenoic acid (1.29%) and 12 amino acids composition that consist of 7 essential amino acids, were leucine, isoleucine, valine, phenylalanine, methionine, lysine, and histidine, and also 5 non-essential amino acid, were tyrosine, glycine, alanine, glutamic acid, and arginine.Thus, these fishes can be used by the people to complete the necessity of essential fatty acid and amino acid.

Keywords: Moonfish (M. maculata), fatty acid, amino acid, GC-MS, HPLC.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 842
1011 A Study of General Attacks on Elliptic Curve Discrete Logarithm Problem over Prime Field and Binary Field

Authors: Tun Myat Aung, Ni Ni Hla

Abstract:

This paper begins by describing basic properties of finite field and elliptic curve cryptography over prime field and binary field. Then we discuss the discrete logarithm problem for elliptic curves and its properties. We study the general common attacks on elliptic curve discrete logarithm problem such as the Baby Step, Giant Step method, Pollard’s rho method and Pohlig-Hellman method, and describe in detail experiments of these attacks over prime field and binary field. The paper finishes by describing expected running time of the attacks and suggesting strong elliptic curves that are not susceptible to these attacks.c

Keywords: Discrete logarithm problem, general attacks, elliptic curves, strong curves, prime field, binary field, attack experiments.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1135
1010 Effect of Boric Acid on a-Hydroxy Acids Compounds in Thin Layer Chromatography

Authors: Elham Moniri, Homayon Ahmad Panahi, Ahmad Izadi, Mohamad Mehdi Parvin, Atyeh Rahimi

Abstract:

In this investigation Salicylic acid, Sulfosalicylic acid and Acetyl salicylic acid were chosen as a sample for thin layer chromatography (TLC) on silica gel plates. Bicarbonate buffer at different pH containing different amounts of boric acid was applied as mobile phase. Specific interaction of these substances with boric acid has effect on Rf in thin layer chromatography. Regular and similar trend was observed in variations of Rf for mentioned compounds in TLC by altering of percentages of boric acid in mobile phase in pH range of 8-10. Also effect of organic solvent, mixture of water/ organic solvent and organic solvent containing boric acid as mobile phase was studied.

Keywords: Thin layer chromatography (TLC), Aspirin, Salicylic acid, Sulfosalycylic acid, Boric acid.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 2275
1009 High Performance Liquid Chromatography Determination of Urinary Hippuric Acid and Benzoic Acid as Indices for Glue Sniffer Urine

Authors: Abdul Rahim Yacob, Mohamad Raizul Zinalibdin

Abstract:

A simple method for the simultaneous determination of hippuric acid and benzoic acid in urine using reversed-phase high performance liquid chromatography was described. Chromatography was performed on a Nova-Pak C18 (3.9 x 150 mm) column with a mobile phase of mixed solution methanol: water: acetic acid (20:80:0.2) and UV detection at 254 nm. The calibration curve was linear within concentration range at 0.125 to 6.0 mg/ml of hippuric acid and benzoic acid. The recovery, accuracy and coefficient variance of hippuric acid were 104.54%, 0.2% and 0.2% respectively and for benzoic acid were 98.48%, 1.25% and 0.60% respectively. The detection limit of this method was 0.01ng/l for hippuric acid and 0.06ng/l for benzoic acid. This method has been applied to the analysis of urine samples from the suspected of toluene abuser or glue sniffer among secondary school students at Johor Bahru.

Keywords: Glue sniffer, High Performance LiquidChromatography, Hippuric Acid, Toluene, Urine.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 3317
1008 A Taxonomy of Internal Attacks in Wireless Sensor Network

Authors: Muhammad R Ahmed, Xu Huang, Dharmendra Sharma

Abstract:

Developments in communication technologies especially in wireless have enabled the progress of low-cost and lowpower wireless sensor networks (WSNs). The features of such WSN are holding minimal energy, weak computational capabilities, wireless communication and an open-medium nature where sensors are deployed. WSN is underpinned by application driven such as military applications, the health sector, etc. Due to the intrinsic nature of the network and application scenario, WSNs are vulnerable to many attacks externally and internally. In this paper we have focused on the types of internal attacks of WSNs based on OSI model and discussed some security requirements, characterizers and challenges of WSNs, by which to contribute to the WSN-s security research.

Keywords: Wireless sensor network, internal attacks, security, OSI model.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 2980
1007 WebAppShield: An Approach Exploiting Machine Learning to Detect SQLi Attacks in an Application Layer in Run-Time

Authors: Ahmed Abdulla Ashlam, Atta Badii, Frederic Stahl

Abstract:

In recent years, SQL injection attacks have been identified as being prevalent against web applications. They affect network security and user data, which leads to a considerable loss of money and data every year. This paper presents the use of classification algorithms in machine learning using a method to classify the login data filtering inputs into "SQLi" or "Non-SQLi,” thus increasing the reliability and accuracy of results in terms of deciding whether an operation is an attack or a valid operation. A method as a Web-App is developed for auto-generated data replication to provide a twin of the targeted data structure. Shielding against SQLi attacks (WebAppShield) that verifies all users and prevents attackers (SQLi attacks) from entering and or accessing the database, which the machine learning module predicts as "Non-SQLi", has been developed. A special login form has been developed with a special instance of the data validation; this verification process secures the web application from its early stages. The system has been tested and validated, and up to 99% of SQLi attacks have been prevented.

Keywords: SQL injection, attacks, web application, accuracy, database, WebAppShield.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 350
1006 Mathematical Simulation of Acid Concentration Effects during Acid Nitric Leaching of Cobalt from a Mixed Cobalt-Copper Oxide

Authors: Ek Ngoy, A F Mulaba-Bafubiandi

Abstract:

Cobalt was acid nitric leached from a mixed cobaltcopper oxide with variable acid concentration. Resulting experimental data were used to analyze effects of increase in acid concentration, based on a shrinking core model of the process. The mathematical simulation demonstrated that the time rate of the dissolution mechanism is an increasing function of acid concentration. It was also shown that the magnitude of the acid concentration effect is time dependent and the increase in acid concentration is more effective at earlier stage of the dissolution than at later stage. The remaining process parameters are comprehensively affected by acid concentration and their interaction is synergetic.

Keywords: Acid effect, Cobalt, Cobalt-copper oxide, Leaching, Simulation

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1809
1005 Status and Requirements of Counter-Cyberterrorism

Authors: Jeong-Tae Kim, Tchanghee Hyun

Abstract:

The number of intrusions and attacks against critical infrastructures and other information networks is increasing rapidly. While there is no identified evidence that terrorist organizations are currently planning a coordinated attack against the vulnerabilities of computer systems and network connected to critical infrastructure, and origins of the indiscriminate cyber attacks that infect computers on network remain largely unknown. The growing trend toward the use of more automated and menacing attack tools has also overwhelmed some of the current methodologies used for tracking cyber attacks. There is an ample possibility that this kind of cyber attacks can be transform to cyberterrorism caused by illegal purposes. Cyberterrorism is a matter of vital importance to national welfare. Therefore, each countries and organizations have to take a proper measure to meet the situation and consider effective legislation about cyberterrorism.

Keywords: Cyberterrorism, cyber attack, information security, legislation

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 2736
1004 Deradicalization of Former Terrorists through an Entrepreneurship Program

Authors: Jamal Wiwoho, Pujiyono, Triyanto

Abstract:

Terrorism is a real enemy for all countries, including Indonesia. Bomb attacks in some parts of Indonesia are proof that Indonesia has serious problems with terrorism. Perpetrators of terror are arrested and imprisoned, and some of them were executed. However, this method did not succeed in stopping the terrorist attacks. Former terrorists continue to carry out bomb attacks. Therefore, this paper proposes a program towards deradicalization efforts of former terrorists through entrepreneurship. This is necessary because it is impossible to change their radical ideology. The program is also motivated by understanding that terrorists generally come from poor families. This program aims to occupy their time with business activities so there is no time to plan and carry out bomb attacks. This research is an empirical law study. Data were collected by literature study, observation, and in-depth interviews. Data were analyzed with the Miles and Huberman interactive model. The results show that the entrepreneurship program is effective to prevent terrorist attack. Former terrorists are busy with their business. Therefore, they have no time to carry out bomb attacks.

Keywords: Deradicalization, terrorists, entrepreneurship.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1258
1003 A Highly Sensitive Dip Strip for Detection of Phosphate in Water

Authors: Hojat Heidari-Bafroui, Amer Charbaji, Constantine Anagnostopoulos, Mohammad Faghri

Abstract:

Phosphorus is an essential nutrient for plant life which is most frequently found as phosphate in water. Once phosphate is found in abundance in surface water, a series of adverse effects on an ecosystem can be initiated. Therefore, a portable and reliable method is needed to monitor the phosphate concentrations in the field. In this paper, an inexpensive dip strip device with the ascorbic acid/antimony reagent dried on blotting paper along with wet chemistry is developed for the detection of low concentrations of phosphate in water. Ammonium molybdate and sulfuric acid are separately stored in liquid form so as to improve significantly the lifetime of the device and enhance the reproducibility of the device’s performance. The limit of detection and quantification for the optimized device are 0.134 ppm and 0.472 ppm for phosphate in water, respectively. The device’s shelf life, storage conditions, and limit of detection are superior to what has been previously reported for the paper-based phosphate detection devices.

Keywords: Phosphate detection, paper-based device, molybdenum blue method, colorimetric assay.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 434
1002 Mechanisms of Internet Security Attacks

Authors: J. Dubois, P. Jreije

Abstract:

Internet security attack could endanger the privacy of World Wide Web users and the integrity of their data. The attack can be carried out on today's most secure systems- browsers, including Netscape Navigator and Microsoft Internet Explorer. There are too many types, methods and mechanisms of attack where new attack techniques and exploits are constantly being developed and discovered. In this paper, various types of internet security attack mechanisms are explored and it is pointed out that when different types of attacks are combined together, network security can suffer disastrous consequences.

Keywords: DoS, internet attacks, router attack, security, trojan, virus, worm, XSS.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 2063
1001 Web Application Security, Attacks and Mitigation

Authors: Ayush Chugh, Gaurav Gupta

Abstract:

Today’s technology is heavily dependent on web applications. Web applications are being accepted by users at a very rapid pace. These have made our work efficient. These include webmail, online retail sale, online gaming, wikis, departure and arrival of trains and flights and list is very long. These are developed in different languages like PHP, Python, C#, ASP.NET and many more by using scripts such as HTML and JavaScript. Attackers develop tools and techniques to exploit web applications and legitimate websites. This has led to rise of web application security; which can be broadly classified into Declarative Security and Program Security. The most common attacks on the applications are by SQL Injection and XSS which give access to unauthorized users who totally damage or destroy the system. This paper presents a detailed literature description and analysis on Web Application Security, examples of attacks and steps to mitigate the vulnerabilities.

Keywords: Attacks, Injection, JavaScript, SQL, Vulnerability, XSS.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 4918
1000 Evaluation of SSR Markers Associated with High Oleic Acid in Sunflower

Authors: Atitaya Singchai, Nooduan Muangsan, Thitiporn Machikowa

Abstract:

Sunflower oil with high oleic acid content is most desirable because of its high oxidative stability. Screening sunflower of high oleic acid using conventional method is laborious and time consuming. Therefore, the use of molecular markers as a screening tool is promising. The objective of this research was to evaluate SSR primers for high oleic acid content in sunflower. Two sunflower lines, 5A and PI 649855 were used as the representative of low and high oleic acid sunflowers, respectively, and thirty seven SSR markers were used to identify oleic acid content trait. The results revealing 10 SSR primers showed polymorphic between high and low oleic acid lines and thus were informative. With these primers, therefore, it is possible to identify the genetic markers associated with high oleic acid trait in sunflower genotypes. 

Keywords: Microsatellite, Helianthus annuus L., fatty acid composition, molecular markers.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 2542
999 Enhancing Privacy-Preserving Cloud Database Querying by Preventing Brute Force Attacks

Authors: Ambika Vishal Pawar, Ajay Dani

Abstract:

Considering the complexities involved in Cloud computing, there are still plenty of issues that affect the privacy of data in cloud environment. Unless these problems get solved, we think that the problem of preserving privacy in cloud databases is still open. In tokenization and homomorphic cryptography based solutions for privacy preserving cloud database querying, there is possibility that by colluding with service provider adversary may run brute force attacks that will reveal the attribute values.

In this paper we propose a solution by defining the variant of K –means clustering algorithm that effectively detects such brute force attacks and enhances privacy of cloud database querying by preventing this attacks.

Keywords: Privacy, Database, Cloud Computing, Clustering, K-means, Cryptography.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 2511
998 Proactive Detection of DDoS Attacks Utilizing k-NN Classifier in an Anti-DDos Framework

Authors: Hoai-Vu Nguyen, Yongsun Choi

Abstract:

Distributed denial-of-service (DDoS) attacks pose a serious threat to network security. There have been a lot of methodologies and tools devised to detect DDoS attacks and reduce the damage they cause. Still, most of the methods cannot simultaneously achieve (1) efficient detection with a small number of false alarms and (2) real-time transfer of packets. Here, we introduce a method for proactive detection of DDoS attacks, by classifying the network status, to be utilized in the detection stage of the proposed anti-DDoS framework. Initially, we analyse the DDoS architecture and obtain details of its phases. Then, we investigate the procedures of DDoS attacks and select variables based on these features. Finally, we apply the k-nearest neighbour (k-NN) method to classify the network status into each phase of DDoS attack. The simulation result showed that each phase of the attack scenario is classified well and we could detect DDoS attack in the early stage.

Keywords: distributed denial-of-service (DDoS), k-nearestneighbor classifier (k-NN), anti-DDoS framework, DDoS detection.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 3292
997 Machine Learning Methods for Network Intrusion Detection

Authors: Mouhammad Alkasassbeh, Mohammad Almseidin

Abstract:

Network security engineers work to keep services available all the time by handling intruder attacks. Intrusion Detection System (IDS) is one of the obtainable mechanisms that is used to sense and classify any abnormal actions. Therefore, the IDS must be always up to date with the latest intruder attacks signatures to preserve confidentiality, integrity, and availability of the services. The speed of the IDS is a very important issue as well learning the new attacks. This research work illustrates how the Knowledge Discovery and Data Mining (or Knowledge Discovery in Databases) KDD dataset is very handy for testing and evaluating different Machine Learning Techniques. It mainly focuses on the KDD preprocess part in order to prepare a decent and fair experimental data set. The J48, MLP, and Bayes Network classifiers have been chosen for this study. It has been proven that the J48 classifier has achieved the highest accuracy rate for detecting and classifying all KDD dataset attacks, which are of type DOS, R2L, U2R, and PROBE.

Keywords: IDS, DDoS, MLP, KDD.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 681
996 User’s Susceptibility Factors to Malware Attacks: A Systemic Literature Review

Authors: Awad A. Younis, Elise Stronberg, Shifa Noor

Abstract:

Users’ susceptibility to malware attacks have been noticed in the past few years. Investigating the factors that make a user vulnerable to those attacks is critical because they can be utilized to set up proactive strategies such as awareness and education to mitigate the impacts of those attacks. Demographic, behavioral, and cultural vulnerabilities are the main factors that make users susceptible to malware attacks. It is challenging, however, to draw more general conclusions based on those factors due to the varieties in the type of users and different types of malware. Therefore, we conducted a systematic literature review (SLR) of the existing research for user susceptibility factors to malware attacks. The results showed that all demographic factors are consistently associated with malware infection regardless of the users' type except for age and gender. Besides, the association of culture and personality factors with malware infection is consistent in most of the selected studies and for all types of users. Moreover, malware infection varies based on age, geographic location, and host types. We propose that future studies should carefully take into consideration the type of users because different users may be exposed to different threats or targeted based on their user domains’ characteristics. Additionally, as different types of malware use different tactics to trick users, taking the malware types into consideration is important.

Keywords: cybersecurity, malware, users, demographics, personality, culture, systematic literature review

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 579
995 The Catalytic Properties of PtSn/Al2O3 for Acetic Acid Hydrogenation

Authors: Mingchuan Zhou, Haitao Zhang, Hongfang Ma, Weiyong Ying

Abstract:

Alumina supported platinum and tin catalysts with different loadings of Pt and Sn were prepared and characterized by low temperature N2 adsorption/desorption, H2-temperature programed reduction and CO pulse chemisorption. Pt and Sn below 1% loading were suitable for acetic acid hydrogenation. The best performance over 0.75Pt1Sn/Al2O3 can reach 87.55% conversion of acetic acid and 47.39% selectivity of ethanol. The operating conditions of acetic acid hydrogenation over 1Pt1Sn/Al2O3 were investigated. High reaction temperature can enhance the conversion of acetic acid, but it decreased total selectivity of ethanol and acetyl acetate. High pressure and low weight hourly space velocity were beneficial to both conversion of acetic acid and selectivity to ethanol.

Keywords: Acetic acid, hydrogenation, PtSn, operating condition.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1203
994 Denial of Service (DOS) Attack and Its Possible Solutions in VANET

Authors: Halabi Hasbullah, Irshad Ahmed Soomro, Jamalul-lail Ab Manan

Abstract:

Vehicular Ad-hoc Network (VANET) is taking more attention in automotive industry due to the safety concern of human lives on roads. Security is one of the safety aspects in VANET. To be secure, network availability must be obtained at all times since availability of the network is critically needed when a node sends any life critical information to other nodes. However, it can be expected that security attacks are likely to increase in the coming future due to more and more wireless applications being developed and deployed onto the well-known expose nature of the wireless medium. In this respect, the network availability is exposed to many types of attacks. In this paper, Denial of Service (DOS) attack on network availability is presented and its severity level in VANET environment is elaborated. A model to secure the VANET from the DOS attacks has been developed and some possible solutions to overcome the attacks have been discussed.

Keywords: Vehicular Ad hoc Network (VANET); security;availability; security attack; Denial of Service (DOS).

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 5999
993 Optimization of Diluted Organic Acid Pretreatment on Rice Straw Using Response Surface Methodology

Authors: Rotchanaphan Hengaroonprasan, Malinee Sriariyanun, Prapakorn Tantayotai, Supacharee Roddecha, Kraipat Cheenkachorn

Abstract:

Lignocellolusic material is a substance that is resistant to be degraded by microorganisms or hydrolysis enzymes. To be used as materials for biofuel production, it needs pretreatment process to improve efficiency of hydrolysis. In this work, chemical pretreatments on rice straw using three diluted organic acids, including acetic acid, citric acid, oxalic acid, were optimized. Using Response Surface Methodology (RSM), the effect of three pretreatment parameters, acid concentration, treatment time, and reaction temperature, on pretreatment efficiency were statistically evaluated. The results indicated that dilute oxalic acid pretreatment led to the highest enhancement of enzymatic saccharification by commercial cellulase and yielded sugar up to 10.67 mg/ml when using 5.04% oxalic acid at 137.11 oC for 30.01 min. Compared to other acid pretreatment by acetic acid, citric acid, and hydrochloric acid, the maximum sugar yields are 7.07, 6.30, and 8.53 mg/ml, respectively. Here, it was demonstrated that organic acids can be used for pretreatment of lignocellulosic materials to enhance of hydrolysis process, which could be integrated to other applications for various biorefinery processes. 

Keywords: Lignocellolusic biomass, pretreatment, organic acid response surface methodology, biorefinery.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 2356
992 A Simulated Environment Approach to Investigate the Effect of Adversarial Perturbations on Traffic Sign for Automotive Software-in-Loop Testing

Authors: Sunil Patel, Pallab Maji

Abstract:

To study the effect of adversarial attack environment must be controlled. Autonomous driving includes mainly 5 phases sense, perceive, map, plan, and drive. Autonomous vehicles sense their surrounding with the help of different sensors like cameras, radars, and lidars. Deep learning techniques are considered Blackbox and found to be vulnerable to adversarial attacks. In this research, we study the effect of the various known adversarial attacks with the help of the Unreal Engine-based, high-fidelity, real-time raytraced simulated environment. The goal of this experiment is to find out if adversarial attacks work in moving vehicles and if an unknown network may be targeted. We discovered that the existing Blackbox and Whitebox attacks have varying effects on different traffic signs. We observed that attacks that impair detection in static scenarios do not have the same effect on moving vehicles. It was found that some adversarial attacks with hardly noticeable perturbations entirely blocked the recognition of certain traffic signs. We observed that the daylight condition has a substantial impact on the model's performance by simulating the interplay of light on traffic signs. Our findings have been found to closely resemble outcomes encountered in the real world.

Keywords: Adversarial attack simulation, computer simulation, ray-traced environment, realistic simulation, unreal engine.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 360
991 Utilization of Sugarcane Bagasses for Lactic Acid Production by acid Hydrolysis and Fermentation using Lactobacillus sp

Authors: Woranart Jonglertjunya, Nattawadee Pranrawang, Nuanyai Phookongka, Thanasak Sridangtip, Watthana Sawedrungreang, Chularat Krongtaew

Abstract:

Sugarcane bagasses are one of the most extensively used agricultural residues. Using acid hydrolysis and fermentation, conversion of sugarcane bagasses to lactic acid was technically and economically feasible. This research was concerned with the solubility of lignin in ammonium hydroxide, acid hydrolysis and lactic acid fermentation by Lactococcus lactis, Lactobacillus delbrueckii, Lactobacillus plantarum, and Lactobacillus casei. The lignin extraction results for different ammonium hydroxide concentrations showed that 10 % (v/v) NH4OH was favorable to lignin dissolution. Acid hydrolysis can be enhanced with increasing acid concentration and reaction temperature. The optimum glucose and xylose concentrations occurred at 121 ○C for 1 hour hydrolysis time in 10% sulphuric acid solution were 32 and 11 g/l, respectively. In order to investigate the significance of medium composition on lactic acid production, experiments were undertaken whereby a culture of Lactococcus lactis was grown under various glucose, peptone, yeast extract and xylose concentrations. The optimum medium was composed of 5 g/l glucose, 2.5 g/l xylose, 10 g/l peptone and 5 g/l yeast extract. Lactococcus lactis represents the most efficient for lactic acid production amongst those considered. The lactic acid fermentation by Lactococcus lactis after 72 hours gave the highest yield of 1.4 (g lactic acid per g reducing sugar).

Keywords: sugarcane bagasses, acid hydrolysis, lactic acid, fermentation

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 3474
990 Two Undetectable On-line Dictionary Attacks on Debiao et al.’s S-3PAKE Protocol

Authors: Sung-Bae Choi, Sang-Yoon Yoon, Eun-Jun Yoon

Abstract:

In 2011, Debiao et al. pointed out that S-3PAKE protocol proposed by Lu and Cao for password-authenticated key exchange in the three-party setting is vulnerable to an off-line dictionary attack. Then, they proposed some countermeasures to eliminate the security vulnerability of the S-3PAKE. Nevertheless, this paper points out their enhanced S-3PAKE protocol is still vulnerable to undetectable on-line dictionary attacks unlike their claim.

Keywords: Authentication, 3PAKE, password, three-party key exchange, network security, dictionary attacks.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1601
989 Behavioral Signature Generation using Shadow Honeypot

Authors: Maros Barabas, Michal Drozd, Petr Hanacek

Abstract:

A novel behavioral detection framework is proposed to detect zero day buffer overflow vulnerabilities (based on network behavioral signatures) using zero-day exploits, instead of the signature-based or anomaly-based detection solutions currently available for IDPS techniques. At first we present the detection model that uses shadow honeypot. Our system is used for the online processing of network attacks and generating a behavior detection profile. The detection profile represents the dataset of 112 types of metrics describing the exact behavior of malware in the network. In this paper we present the examples of generating behavioral signatures for two attacks – a buffer overflow exploit on FTP server and well known Conficker worm. We demonstrated the visualization of important aspects by showing the differences between valid behavior and the attacks. Based on these metrics we can detect attacks with a very high probability of success, the process of detection is however very expensive.

Keywords: behavioral signatures, metrics, network, security design

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1997
988 Hydrolytic Properties of Ellagic Acid in Commercial Pomegranate Juices

Authors: Sibel Uzuner, Jale Acar

Abstract:

Pomegranate and pomegranate juices (PJs) have taken great attention for their health benefits in the last years. As there is an increasing concern about potential health benefits of ellagic acid, it is of great interest to evaluate alterations in ellagic acid concentration of commercial PJs. The purpose of this study is to analyze total phenolic, free and total ellagic acid content of six commercial PJs sold in Turkish markets using HPLC. The results showed that some commercial PJs had markedly high total phenolic and ellagic acid content. Total phenolic substances of commercial PJs range from 796.71 to 4608.91 mg GAE/l. Free amount of ellagic acid in commercial PJs range from 27.64 to 111.78 mg/l. Samples are hydrolyzed with concentrated HCl at 93oC for 2 and 24 hour and influences of temperature and time parameters on hydrolization were investigated. Thermal processing for pasteurization increased ellagic acid via ellagitannins hydrolysis.

Keywords: Ellagic acid, ellagitannin, pomegranate juice, total phenolic compounds

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 2143
987 The Effect of Unburned Carbon on Coal Fly Ash toward its Adsorption Capacity for Methyl Violet

Authors: Widi Astuti, Agus Prasetya, Endang Tri Wahyuni, I Made Bendiyasa

Abstract:

Coal fly ash (CFA) generated by coal-based thermal power plants is mainly composed of quartz, mullite, and unburned carbon. In this study, the effect of unburned carbon on CFA toward its adsorption capacity was investigated. CFA with various carbon content was obtained by refluxing it with sulfuric acid having various concentration at various temperature and reflux time, by heating at 400-800°C, and by sieving into 100-mesh in particle size. To evaluate the effect of unburned carbon on CFA toward its adsorption capacity, adsorption of methyl violet solution with treated CFA was carried out. The research shows that unburned carbon leads to adsorption capacity decrease. The highest adsorption capacity of treated CFA was found 5.73 x 10-4mol.g-1.

Keywords: CFA, carbon, methyl violet, adsorption capacity.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 2135
986 Inhibitory Effect of Lactic Acid and Nisin on Bacterial Spoilage of Chilled Shrimp

Authors: A. R. Shirazinejad, I. Noryati, A. Rosma, I. Darah

Abstract:

Lactic acid alone and its combined application with nisin were evaluated for reducing population of naturally occurring microorganisms on chilled shrimp. Fresh shrimps were dipped in 0, 1.0% and 2.0% (v/v) lactic acid alone and their combined application with 0.04 (g/L/kg) nisin solution for 10 min. Total plate counts of aerobic bacteria (TPCs), Psychrotrophic counts, population of Pseudomonas spp., H2S producing bacteria and Lactic acid bacteria (LAB) on shrimps were determined during storage at 4 °C. The results indicated that total plate counts were 2.91 and 2.63 log CFU/g higher on untreated shrimps after 7 and 14 days of storage, respectively, than on shrimps treated with 2.0% lactic acid combined with 0.04 (g/L/kg) nisin. Both concentrations of lactic acid indicated significant reduction on Pseudomonas counts during storage, while 2.0% lactic acid combined with nisin indicated the highest reduction. In addition, H2S producing bacteria were more sensitive to high concentration of lactic acid combined with nisin during storage.

Keywords: Shrimp, lactic acid, nisin, spoilage bacteria

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 2409