Search results for: sulfuric acid attacks.
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 1045

Search results for: sulfuric acid attacks.

955 A New Traffic Pattern Matching for DDoS Traceback Using Independent Component Analysis

Authors: Yuji Waizumi, Tohru Sato, Yoshiaki Nemoto

Abstract:

Recently, Denial of Service(DoS) attacks and Distributed DoS(DDoS) attacks which are stronger form of DoS attacks from plural hosts have become security threats on the Internet. It is important to identify the attack source and to block attack traffic as one of the measures against these attacks. In general, it is difficult to identify them because information about the attack source is falsified. Therefore a method of identifying the attack source by tracing the route of the attack traffic is necessary. A traceback method which uses traffic patterns, using changes in the number of packets over time as criteria for the attack traceback has been proposed. The traceback method using the traffic patterns can trace the attack by matching the shapes of input traffic patterns and the shape of output traffic pattern observed at a network branch point such as a router. The traffic pattern is a shapes of traffic and unfalsifiable information. The proposed trace methods proposed till date cannot obtain enough tracing accuracy, because they directly use traffic patterns which are influenced by non-attack traffics. In this paper, a new traffic pattern matching method using Independent Component Analysis(ICA) is proposed.

Keywords: Distributed Denial of Service, Independent Component Analysis, Traffic pattern

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1735
954 Performance Analysis of Flooding Attack Prevention Algorithm in MANETs

Authors: Revathi Venkataraman, M. Pushpalatha, T. Rama Rao

Abstract:

The lack of any centralized infrastructure in mobile ad hoc networks (MANET) is one of the greatest security concerns in the deployment of wireless networks. Thus communication in MANET functions properly only if the participating nodes cooperate in routing without any malicious intention. However, some of the nodes may be malicious in their behavior, by indulging in flooding attacks on their neighbors. Some others may act malicious by launching active security attacks like denial of service. This paper addresses few related works done on trust evaluation and establishment in ad hoc networks. Related works on flooding attack prevention are reviewed. A new trust approach based on the extent of friendship between the nodes is proposed which makes the nodes to co-operate and prevent flooding attacks in an ad hoc environment. The performance of the trust algorithm is tested in an ad hoc network implementing the Ad hoc On-demand Distance Vector (AODV) protocol.

Keywords: AODV, Flooding, MANETs, trust estimation

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 2339
953 Authentication Protocol for Wireless Sensor Networks

Authors: Sunil Gupta, Harsh Kumar Verma, AL Sangal

Abstract:

Wireless sensor networks can be used to measure and monitor many challenging problems and typically involve in monitoring, tracking and controlling areas such as battlefield monitoring, object tracking, habitat monitoring and home sentry systems. However, wireless sensor networks pose unique security challenges including forgery of sensor data, eavesdropping, denial of service attacks, and the physical compromise of sensor nodes. Node in a sensor networks may be vanished due to power exhaustion or malicious attacks. To expand the life span of the sensor network, a new node deployment is needed. In military scenarios, intruder may directly organize malicious nodes or manipulate existing nodes to set up malicious new nodes through many kinds of attacks. To avoid malicious nodes from joining the sensor network, a security is required in the design of sensor network protocols. In this paper, we proposed a security framework to provide a complete security solution against the known attacks in wireless sensor networks. Our framework accomplishes node authentication for new nodes with recognition of a malicious node. When deployed as a framework, a high degree of security is reachable compared with the conventional sensor network security solutions. A proposed framework can protect against most of the notorious attacks in sensor networks, and attain better computation and communication performance. This is different from conventional authentication methods based on the node identity. It includes identity of nodes and the node security time stamp into the authentication procedure. Hence security protocols not only see the identity of each node but also distinguish between new nodes and old nodes.

Keywords: Authentication, Key management, Wireless Sensornetwork, Elliptic curve cryptography (ECC).

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 3777
952 Leaching Behaviour of a Low-grade South African Nickel Laterite

Authors: Catherine K. Thubakgale, Richard K.K. Mbaya, Kaby Kabongo

Abstract:

The morphology, mineralogical and chemical composition of a low-grade nickel ore from Mpumalanga, South Africa, were studied by scanning electron microscope (SEM), X-ray diffraction (XRD) and X-ray fluorescence (XRF), respectively. The ore was subjected to atmospheric agitation leaching using sulphuric acid to investigate the effects of acid concentration, leaching temperature, leaching time and particle size on extraction of nickel and cobalt. Analyses results indicated the ore to be a saprolitic nickel laterite belonging to the serpentine group of minerals. Sulphuric acid was found to be able to extract nickel from the ore. Increased acid concentration and temperature only produced low amounts of nickel but improved cobalt extraction. As high as 77.44% Ni was achieved when leaching a -106+75μm fraction with 4.0M acid concentration at 25oC. The kinetics of nickel leaching from the saprolitic ore were studied and the activation energy was determined to be 18.16kJ/mol. This indicated that nickel leaching reaction was diffusion controlled.

Keywords: Laterite, sulphuric acid, atmospheric leaching, nickel.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 3253
951 Glutamic Acid Production from Potato by Brevibacterium linens

Authors: Marzieh Moosavi-Nasab, Masoumeh Izadi, Sara Hosseinpour

Abstract:

In this study, the possibility of using potato as a substrate for glutamic acid production by Brevibacterium linens was investigated. For preparation of fermentation medium, potato was hydrolyzed by hydrochloridric acid. The medium contained potato hydrolysate, tween 80, mineral solution, glucose, and potassium hydrogen phosphate. The initial pH of the medium was adjusted to 7-7.5. For achieving the optimum time with maximum yield, the beakers containing the medium and the inoculums were incubated in a rotary water bath flask shaker for one to five days. Thin layer choromatography was used for quantitative and qualitative assay of the glutamic acid produced. The results revealed that as fermentation time increased, pH of the fermentation medium significantly decreased (P<0.05). Furthermore, glutamic acid concentration in fermentation medium increased significantly (P<0.05). The highest amount of the glutamic acid obtained was 5.6 g/l on the forth day of fermentation.

Keywords: Brevibacterium linens, Fermentation, Glutamicacid, Thin layer choromatography

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 2524
950 Langmuir–Blodgett Films of Polyaniline for Efficient Detection of Uric Acid

Authors: Kashima Arora, Monika Tomar, Vinay Gupta

Abstract:

Langmuir–Blodgett (LB) films of polyaniline (PANI) grown onto ITO coated glass substrates were utilized for the fabrication of Uric acid biosensor for efficient detection of uric acid by immobilizing Uricase via EDC–NHS coupling. The modified electrodes were characterized by atomic force microscopy (AFM). The response characteristics after immobilization of uricase were studied using cyclic voltammetry and electrochemical impedance spectroscopy techniques. The uricase/PANI/ITO/glass bioelectrode studied by CV and EIS techniques revealed detection of uric acid in a wide range of 0.05 mM to 1.0 mM, covering the physiological range in blood. A low Michaelis–Menten constant (Km) of 0.21 mM indicates the higher affinity of immobilized Uricase towards its analyte (uric acid). The fabricated uric acid biosensor based on PANI LB films exhibits excellent sensitivity of 0.21 mA/mM with a response time of 4 s, good reproducibility, long shelf life (8 weeks) and high selectivity.

Keywords: Uric acid; biosensor, PANI, Langmuir Blodgett films deposition.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 2091
949 Experimental Study of Adsorption Properties of Acid and Thermal Treated Bentonite from Tehran (Iran)

Authors: H. R. Moghadamzadeh, M. Naimi, H. Rahimzadeh, M. Ardjmand, V. M. Nansa, A. M. Ghanadi

Abstract:

The Iranian bentonite was first characterized by Scanning Electron Microscopy (SEM), Inductively Coupled Plasma mass spectrometry (ICP-MS), X-ray fluorescence (XRF), X-ray Diffraction (XRD) and BET. The bentonite was then treated thermally between 150°C-250°C at 15min, 45min and 90min and also was activated chemically with different concentration of sulphuric acid (3N, 5N and 10N). Although the results of thermal activated-bentonite didn-t show any considerable changes in specific surface area and Cation Exchange Capacity (CEC), but the results of chemical treated bentonite demonstrated that such properties have been improved by acid activation process.

Keywords: Acid activation, Bentonite, CEC, Thermal activation.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 2798
948 Utilization of Wheat Bran as Bed Material in Solid State Bacterial Production of Lactic Acid with Various Nitrogen Sources

Authors: U.K.Ghosh, M.K.Ghosh

Abstract:

The present experimental investigation brings about a comparative study of lactic acid production by pure strains of Lactobacilli (1) L. delbreuckii (NCIM2025), (2) L. pentosus (NCIM 2912), (3) Lactobacillus sp.(NCIM 2734, (4) Lactobacillus sp. (NCIM2084) and coculture of strain-1 and Stain-2 in solid bed of wheat bran, under the influence of different nitrogen sources such as baker-s yeast, meat extract and proteose peptone. Among the pure cultures, strain-3 attained lowest pH value of 3.44, hence highest acid formation 46.41 g/L, while the coculture attained an overall maximum value 47.56 g/L lactic acid (pH 3.38) at 15 g/L and 20 g/L level of baker-s yeast, respectively.

Keywords: Eco-friendly, lactic acid, lactobacilli, wheat bran

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 2026
947 Watermark-based Counter for Restricting Digital Audio Consumption

Authors: Mikko Löytynoja, Nedeljko Cvejic, Tapio Seppänen

Abstract:

In this paper we introduce three watermarking methods that can be used to count the number of times that a user has played some content. The proposed methods are tested with audio content in our experimental system using the most common signal processing attacks. The test results show that the watermarking methods used enable the watermark to be extracted under the most common attacks with a low bit error rate.

Keywords: Digital rights management, restricted usage, content protection, spread spectrum, audio watermarking.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1424
946 Inventory and Characterization of Selected Deep Sea Fish Species as an Alternative Food Source from Southern Java Ocean and Western Sumatra Ocean, Indonesia

Authors: S.H. Suseno, T.A.Yang, W.N. Abdullah , N.A. Febrianto, W.N. Asti, B. Bahtiar, Hamidah, A. Suman, Desniar, A. Hartoyo

Abstract:

Sixteen selected deep-sea fish obtained from Southern Java Ocean and Western Sumatra Ocean was analyzed to determine its proximate, fatty acid and mineral composition. The moisture content was ranged from 64.38 to 86.04 %, ash from 0.17 to 0.69 %, the fat content was 1.54 – 13.30 % while the protein content varied from 15.84 to 23.60%. Among the fatty acids, oleic acid and palmitic acid was the dominant MUFA and SFA. Linoleic acid was the highest PUFA found at the selected deep-sea fish. Phospor was the highest macroelement concentration on selected deep-sea fish, followed by K, Ca, Mg and Iod, Fe and Zn among microelement. The trace concentration was found at Se microelement.

Keywords: deep-sea fish, fatty acid, microelement, macroelement, monounsaturated fatty acid, proximate, polyunsaturated fatty acids.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1800
945 Fatty Acid Composition of Muscle Lipids of Cyprinus carpio L. Living in Different Dam Lake, Turkey

Authors: O. B. Citil, V. Sariyel, M. Akoz

Abstract:

In this study, total fatty acid composition of muscle lipids of Cyprinus carpio L. living in Suğla Dam Lake, Altinapa Dam Lake, Eğirdir Lake and Burdur Lake were determined using GC. During this study, for the summer season of July was taken from each region of the land and they were stored in deep-freeze set to -20 degrees until the analysis date. At the end of the analyses, 30 different fatty acids were found in the composition of Cyprinus carpio L. which lives in different lakes. Cyprinus carpio Suğla Dam Lake of polyunsaturated fatty acids (PUFAs), were higher than other lakes. Cyprinus carpio L. was the highest in the major SFA palmitic acid. Polyunsaturated fatty acids (PUFA) of carp, the most abundant fish species in all lakes, were found to be higher than those of saturated fatty acids (SFA) in all lakes. Palmitic acid was the major SFA in all lakes. Oleic acid was identified as the major MUFA. Docosahexaenoic acid (DHA) was the most abundant in all lakes. ω3 fatty acid composition was higher than the percentage of the percentage ω6 fatty acids in all lake. ω3/ω6 rates of Cyprinus carpio L. Suğla Dam Lake, Altinapa Dam Lake, Eğirdir Lake and Burdur Lake, 2.12, 1.19, 2.15, 2.87, and 2.82, respectively. Docosahexaenoic acid (DHA) was the major PUFA in Eğirdir and Burdur lakes, whereas linoleic acid (LA) was the major PUFA in Altinapa and Suğla Dam Lakes. It was shown that the fatty acid composition in the muscle of carp was significantly influenced by different lakes.

Keywords: Chromatography, Cyprinus carpio L., fatty acid composition.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1347
944 Effective Photodegradation of Tetracycline by a Heteropoly Acid/Graphene Oxide Nanocomposite Based on Uio-66

Authors: Anasheh Maridiroosi, Ali Reza Mahjoub, Hanieh Fakhri

Abstract:

Heteropoly acid nanoparticles anchored on graphene oxide based on UiO-66 were synthesized via in-situ growth hydrothermal method and tested for photodegradation of a tetracycline as critical pollutant. Results showed that presence of graphene oxide and UiO-66 with high specific surface area, great electron mobility and various functional groups make an excellent support for heteropoly acid and improve photocatalytic efficiency up to 95% for tetracycline. Furthermore, total organic carbon (TOC) analysis verified 79% mineralization of this pollutant under optimum condition.

Keywords: Heteropoly acid, graphene oxide, MOF, tetracycline.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 701
943 Towards a Security Model against Denial of Service Attacks for SIP Traffic

Authors: Arellano Karina, Diego Avila-Pesántez, Leticia Vaca-Cárdenas, Alberto Arellano, Carmen Mantilla

Abstract:

Nowadays, security threats in Voice over IP (VoIP) systems are an essential and latent concern for people in charge of security in a corporate network, because, every day, new Denial-of-Service (DoS) attacks are developed. These affect the business continuity of an organization, regarding confidentiality, availability, and integrity of services, causing frequent losses of both information and money. The purpose of this study is to establish the necessary measures to mitigate DoS threats, which affect the availability of VoIP systems, based on the Session Initiation Protocol (SIP). A Security Model called MS-DoS-SIP is proposed, which is based on two approaches. The first one analyzes the recommendations of international security standards. The second approach takes into account weaknesses and threats. The implementation of this model in a VoIP simulated system allowed to minimize the present vulnerabilities in 92% and increase the availability time of the VoIP service into an organization.

Keywords: Denial-of-service SIP attacks, MS-DoS-SIP, security model, VoIP-SIP vulnerabilities.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 940
942 The Thermochemical Conversion of Lactic Acid in Subcritical and Supercritical Water

Authors: Shyh-Ming Chern, Hung-Chi Tu

Abstract:

One way to utilize biomass is to thermochemically convert it into gases and chemicals. For conversion of biomass, glucose is a particularly popular model compound for cellulose, or more generally for biomass. The present study takes a different approach by employing lactic acid as the model compound for cellulose. Since lactic acid and glucose have identical elemental composition, they are expected to produce similar results as they go through the conversion process. In the current study, lactic acid was thermochemically converted to assess its reactivity and reaction mechanism in subcritical and supercritical water, by using a 16-ml autoclave reactor. The major operating parameters investigated include: The reaction temperature, from 673 to 873 K, the reaction pressure, 10 and 25 MPa, the dosage of oxidizing agent, 0 and 0.5 chemical oxygen demand, and the concentration of lactic acid in the feed, 0.5 and 1.0 M. Gaseous products from the conversion were generally found to be comparable to those derived from the conversion of glucose.

Keywords: Lactic acid, subcritical water, supercritical water, thermochemical conversion.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1034
941 Synthesis and Characterization of Chromium (III) Complexes with L-Glutamic Acid, Glycine and LCysteine

Authors: Kun Sri Budiasih, Chairil Anwar, Sri Juari Santosa, Hilda Ismail

Abstract:

Some Chromium (III) complexes were synthesized with three amino acids: L Glutamic Acid, Glycine, and L-cysteine as the ligands, in order to provide a new supplement containing Cr(III) for patients with type 2 diabetes mellitus. The complexes have been prepared by refluxing a mixture of Chromium(III) chloride in aqueous solution with L-glutamic acid, Glycine, and L-cysteine after pH adjustment by sodium hydroxide. These complexes were characterized by Infrared and Uv-Vis spectrophotometer and Elemental analyzer. The product yields of four products were 87.50 and 56.76% for Cr-Glu complexes, 46.70% for Cr-Gly complex and 40.08% for Cr-Cys complex respectively. The predicted structure of the complexes are [Cr(glu)2(H2O)2].xH2O, Cr(gly)3..xH2O and Cr(cys)3.xH2O., respectively.

Keywords: Cr(III), L-Cysteine L-glutamic Acid, Glycine, complexation.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 5103
940 Poly(Lactic Acid) Based Flexible Films

Authors: Fathilah binti Ali, Jamarosliza Jamaluddin, Arun Kumar Upadhyay

Abstract:

Poly(lactic acid) (PLA) is a biodegradable polymer which has good mechanical properties, however, its brittleness limits its usage especially in packaging materials. Therefore, in this work, PLA based polyurethane films were prepared by synthesizing with different types of isocyanates; methylene diisocyanate (MDI) and hexamethylene diisocyanates (HDI). For this purpose, PLA based polyurethane must have good strength and flexibility. Therefore, polycaprolactone which has better flexibility were prepared with PLA. An effective way to endow polylactic acid with toughness is through chain-extension reaction of the polylactic acid pre-polymer with polycaprolactone used as chain extender. Polyurethane prepared from MDI showed brittle behaviour, while, polyurethane prepared from HDI showed flexibility at same concentrations.

Keywords: Biodegradable polymer, flexible, poly(lactic acid), polyurethane.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 3084
939 n-Butanol as an Extractant for Lactic Acid Recovery

Authors: Kanungnit Chawong, Panarat Rattanaphanee

Abstract:

Extraction of lactic acid from aqueous solution using n-butanol as an extractant was studied. Effect of mixing time, pH of the aqueous solution, initial lactic acid concentration, and volume ratio between the organic and the aqueous phase were investigated. Distribution coefficient and degree of lactic acid extraction was found to increase when the pH of aqueous solution was decreased. The pH Effect was substantially pronounced at pH of the aqueous solution less than 1. Initial lactic acid concentration and organic-toaqueous volume ratio appeared to have positive effect on the distribution coefficient and the degree of extraction. Due to the nature of n-butanol that is partially miscible in water, incorporation of aqueous solution into organic phase was observed in the extraction with large organic-to-aqueous volume ratio.

Keywords: Lactic acid, liquid-liquid extraction, n-Butanol, Solvating extractant.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 3117
938 Prediction of the Solubility of Benzoic Acid in Supercritical CO2 Using the PC-SAFT EoS

Authors: Hamidreza Bagheri, Alireza Shariati

Abstract:

There are many difficulties in the purification of raw components and products. However, researchers are seeking better ways for purification. One of the recent methods is extraction using supercritical fluids. In this study, the phase equilibria of benzoic acid -supercritical carbon dioxide system were investigated. Regarding the phase equilibria of this system, the modeling of solid-supercritical fluid behavior was performed using the Perturbed-Chain Statistical Association Fluid Theory (PC-SAFT) and Peng-Robinson equations of state (PR EoS). For this purpose, five PC-SAFT EoS parameters for pure benzoic acid were obtained using its experimental vapor pressure. Benzoic acid has association sites and the behavior of the benzoic acid-supercritical fluid system was well predicted using both equations of state, while the binary interaction parameter values for PR EoS were negative. Genetic algorithm, which is one of the most accurate global optimization algorithms, was also used to optimize the pure benzoic acid parameters and the binary interaction parameters. The AAD% value for the PC-SAFT EoS, were 0.22 for the carbon dioxide-benzoic acid system.

Keywords: Supercritical fluids, Solubility, Solid, PC-SAFT EoS, Genetic algorithm.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 2616
937 Microalgal Lipid Production by Microalgae Chlorella sp. KKU-S2

Authors: Ratanaporn Leesing, Supaporn Kookkhunthod, Ngarmnit Nontaso

Abstract:

The objective of this work is to produce heterotrophic microalgal lipid in flask-batch fermentation. Chlorella sp. KKU-S2 supported maximum values of 0.374 g/L/d, 0.478 g lipid/g cells, and 0.112 g/L/d for volumetric lipid production rate, and specific yield of lipid, and specific rate of lipid production, respectively when culture was performed on BG-11 medium supplemented with 50g/L glucose. Among the carbon sources tested, maximum cell yield coefficient (YX/S, g/L), maximum specific yield of lipid (YP/X, g lipid/g cells) and volumetric lipid production rate (QP, g/L/d) were found of 0.728, 0.237, and 0.619, respectively, using sugarcane molasses as carbon source. The main components of fatty acid from extracted lipid were palmitic acid, stearic acid, oleic acid and linoleic acid which similar to vegetable oils and suitable for biodiesel production.

Keywords: Microalgal lipid, Chlorella sp. KKU-S2, kineticparameters, biodiesel.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 2666
936 Applying the Regression Technique for Prediction of the Acute Heart Attack

Authors: Paria Soleimani, Arezoo Neshati

Abstract:

Myocardial infarction is one of the leading causes of death in the world. Some of these deaths occur even before the patient reaches the hospital. Myocardial infarction occurs as a result of impaired blood supply. Because the most of these deaths are due to coronary artery disease, hence the awareness of the warning signs of a heart attack is essential. Some heart attacks are sudden and intense, but most of them start slowly, with mild pain or discomfort, then early detection and successful treatment of these symptoms is vital to save them. Therefore, importance and usefulness of a system designing to assist physicians in early diagnosis of the acute heart attacks is obvious. The main purpose of this study would be to enable patients to become better informed about their condition and to encourage them to seek professional care at an earlier stage in the appropriate situations. For this purpose, the data were collected on 711 heart patients in Iran hospitals. 28 attributes of clinical factors can be reported by patients; were studied. Three logistic regression models were made on the basis of the 28 features to predict the risk of heart attacks. The best logistic regression model in terms of performance had a C-index of 0.955 and with an accuracy of 94.9%. The variables, severe chest pain, back pain, cold sweats, shortness of breath, nausea and vomiting, were selected as the main features.

Keywords: Coronary heart disease, acute heart attacks, prediction, logistic regression.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 2384
935 Phishing Attacks Facilitated by Open-Source Intelligence

Authors: Urva Maryam

Abstract:

Private data are more often breached by clever social engineering rather than exploiting technical vulnerabilities in the systems. Complete information security requires good data safety practices to go along with technical solutions. Hackers often begin their operation by simply sending spoofed emails or fraudulent URLs to their targets and trick them into providing sensitive information such as passwords or bank account details. This technique is called phishing. Phishing attacks can be launched on email addresses, open ports and unsecured web browsers. This study uses quantitative method of research to execute phishing experiments on the participants to test their response to the phishing emails. These experiments were run on Kali Linux distribution which came bundled with multiple open-source intelligence (OSINT) tools that were used in the study. The aim of this research is to see how successful phishing attacks can be launched using OSINT and to test the response of people to spoofed emails.

Keywords: OSINT, phishing, spear phishing, email spoofing, theHarvester, Maltego.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 128
934 Comparison of Physico-Chemical Properties And Fatty Acid Compostion of Elateriospermum Tapos (Buah Perah), Palm Oil And Soybean Oil

Authors: Siti Hamidah, Lee Nian Yian, Azizi Mohd

Abstract:

Elateriospermum tapos seed (buah perah) is the one of the rich sources of polyunsaturated fatty acids. It contains high percentage of oleic acid which is the important component to develop nervous system and also α-linolenic acid (ALA) which is the precursor of omega-3 fatty acids series to synthesize eicosapentaenoic acid (EPA) and docosahexaenoic acid (DHA). However, there is less study about this valuable oilseed and exploit its potential. Therefore, this paper is to assess the comparison of physico-chemical properties and fatty composition of perah oil to palm oil and soybean oil. From the comparison, perah oil shows low peroxide value means it has good oxidative stability and also high iodine values shows that it can be used in paint industry. The study shown that perah oil is comparable to palm oil and soybean oil, so it has high potential to be exploited in the oleochemical, pharmaceutical, cosmetics and paint industries.

Keywords: α-linolenic acid, palm oil, perah oil, soybean oil

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 2400
933 Mechanical Strengths of Self-Compacting Mortars Prepared with the Pozzolanic Cement in Aggressive Environments

Authors: M. Saidi, I. Djefour, F. Ait Medjber, A. Melouane, A. Gacem

Abstract:

The objective of this research is to study the physical and mechanical properties and durability of self-compacting mortars prepared by substituting a part of cement up to a percentage of 30% pozzolan according to different Blaine specific surface area (SSB1=7000 cm2/g and SSB=9000 cm2/g)). Order to evaluate durability, mortars were subjected to chemical attacks in various aggressive environments, a solution of a mixture of nitric acid and ammonium nitrate (HNO3 + NH4NO3) and a magnesium sulfate salt solution (MgSO4)) with a concentration of 10%, for a period of one month. This study is complemented by a comparative study of the durability of mortars elaborated with sulphate resistant cement (SRC). The results show that these mortars develop long-term, mechanical and chemical resistance better than mortars based Portland cement with 5% gypsum (CEM 1) and SRC. We found that the mass losses are lowest in mortars elaborated with pozzolanic cement (30% substitution with SSB2) in both of chemical attack solutions (3.28% in the solution acid and 1.16% in the salt solution) and the compressive strength gains of 14.68% and 8.5% respectively in the two media. This is due to the action of pozzolan which fixes portlandite to form hydrated calcium silicate (CSH) from the hydration of tricalcic silicate (C3S).

Keywords: Aggressive environments, durability, mechanical strengths, pozzolanic cement, self-compacting mortar.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 924
932 Carbon Disulfide Production via Hydrogen Sulfide Methane Reformation

Authors: H. Hosseini, M. Javadi, M. Moghiman, M. H. Ghodsi Rad

Abstract:

Carbon disulfide is widely used for the production of viscose rayon, rubber, and other organic materials and it is a feedstock for the synthesis of sulfuric acid. The objective of this paper is to analyze possibilities for efficient production of CS2 from sour natural gas reformation (H2SMR) (2H2S+CH4 =CS2 +4H2) . Also, the effect of H2S to CH4 feed ratio and reaction temperature on carbon disulfide production is investigated numerically in a reforming reactor. The chemical reaction model is based on an assumed Probability Density Function (PDF) parameterized by the mean and variance of mixture fraction and β-PDF shape. The results show that the major factors influencing CS2 production are reactor temperature. The yield of carbon disulfide increases with increasing H2S to CH4 feed gas ratio (H2S/CH4≤4). Also the yield of C(s) increases with increasing temperature until the temperature reaches to 1000°K, and then due to increase of CS2 production and consumption of C(s), yield of C(s) drops with further increase in the temperature. The predicted CH4 and H2S conversion and yield of carbon disulfide are in good agreement with result of Huang and TRaissi.

Keywords: Carbon disulfide, sour natural gas, H2SMR, probability density function.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 5203
931 An Elaborate Survey on Node Replication Attack in Static Wireless Sensor Networks

Authors: N. S. Usha, E. A. Mary Anita

Abstract:

Recent innovations in the field of technology led to the use of   wireless sensor networks in various applications, which consists of a number of small, very tiny, low-cost, non-tamper proof and resource constrained sensor nodes. These nodes are often distributed and deployed in an unattended environment, so as to collaborate with each other to share data or information. Amidst various applications, wireless sensor network finds a major role in monitoring battle field in military applications. As these non-tamperproof nodes are deployed in an unattended location, they are vulnerable to many security attacks. Amongst many security attacks, the node replication attack seems to be more threatening to the network users. Node Replication attack is caused by an attacker, who catches one true node, duplicates the first certification and cryptographic materials, makes at least one or more copies of the caught node and spots them at certain key positions in the system to screen or disturb the network operations. Preventing the occurrence of such node replication attacks in network is a challenging task. In this survey article, we provide the classification of detection schemes and also explore the various schemes proposed in each category. Also, we compare the various detection schemes against certain evaluation parameters and also its limitations. Finally, we provide some suggestions for carrying out future research work against such attacks.

Keywords: Clone node, data security, detection schemes, node replication attack, wireless sensor networks.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 750
930 Hydrogenation of Acetic Acid on Alumina-Supported Pt-Sn Catalysts

Authors: Ke Zhang, Fang Li, Haitao Zhang, Hongfang Ma, Weiyong Ying, Dingye Fang

Abstract:

Three alumina-supported Pt-Sn catalysts have been prepared by means of co-impregnation and characterized by XRD and N2 adsorption. The influence of catalyst composition and reaction conditions on the conversion and selectivity were investigated in the hydrogenation of acetic acid in an isothermal integral fixed bed reactor. The experiments were performed on the temperature interval 468-548 K, liquid hourly space velocity (LHSV) of 0.3-0.7h-1, pressures between 1.0 and 5.0Mpa. A good compromise of 0.75%Pt-1.5%Sn can act as an optimized acetic acid hydrogenation catalyst, and the conversion and selectivity can be tuned through the variation of reaction conditions.

Keywords: Acetic acid, hydrogenation, Pt-Sn catalysts, ethanol.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 3119
929 Effect of Humic Acid on Physical and Engineering Properties of Lime-Treated Organic Clay

Authors: N. Z. Mohd Yunus, D. Wanatowski, L. R. Stace

Abstract:

The present work deals with the stabilisation of organic clay using hydrated lime. Artificial organic clays were prepared by adding kaolin and different humic acid contents. Results given by physical testing show that the presence of humic acid has a drawback effect on the untreated organic clay. The decrease in specific gravity value was accompanied by a decrease in dry density and plasticity of clay at higher humic acid contents. Significant increase in shear strength at 7 days of curing period is observed in the lime-treated samples up to 5% lime content. However shear strength of lime-treated organic clay decreases at longer curing periods. The results given by laboratory testing is further verified by microstructure analysis. Based on the results obtained in this study, it can be concluded that the presence of more than 1.5% humic acid reduces significantly the efficiency of lime stabilization in organic clays.

Keywords: Humic acid, kaolin, lime, organic clay

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 2693
928 Effect of Different Treatments on Heavy Metal Concentration in Sugar Cane Molasses

Authors: Gomaa N. Abdel-Rahman, Nadia R. A. Nassar, Yehia A. Heikal, Mahmoud A. M. Abou-Donia, Mohamed M. Naguib, Mohamed Fadel

Abstract:

Cane molasses is used as a raw material for the production of baker’s yeast (Saccharomyces cerevisiae) in Egypt. The high levels of heavy metals in molasses cause a critical problem during fermentation and cause various kinds of technological difficulties (yield and quality of yeast become lower). The aim of the present study was to determine heavy metal concentrations (cadmium, nickel, lead, and copper) in crude and treated molasses obtained from the storage tanks of the baker’s yeast factory through four seasons. Also, the effect of crude molasses treatment by different methods (at laboratory scale) on heavy metals reduction and its comparison with factory treated molasses were conducted. The molasses samples obtained at autumn season had the highest values of all the studied heavy metals. The molasses treated by cation exchange resin then sulfuric acid had the lowest concentrations of heavy metals compared with other treatments.

Keywords: Molasses, baker’s yeast, heavy metals, treatment.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 2418
927 A Genetic-Algorithm-Based Approach for Audio Steganography

Authors: Mazdak Zamani , Azizah A. Manaf , Rabiah B. Ahmad , Akram M. Zeki , Shahidan Abdullah

Abstract:

In this paper, we present a novel, principled approach to resolve the remained problems of substitution technique of audio steganography. Using the proposed genetic algorithm, message bits are embedded into multiple, vague and higher LSB layers, resulting in increased robustness. The robustness specially would be increased against those intentional attacks which try to reveal the hidden message and also some unintentional attacks like noise addition as well.

Keywords: Artificial Intelligence, Audio Steganography, DataHiding, Genetic Algorithm, Substitution Techniques.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 3080
926 The Journey of a Malicious HTTP Request

Authors: M. Mansouri, P. Jaklitsch, E. Teiniker

Abstract:

SQL injection on web applications is a very popular kind of attack. There are mechanisms such as intrusion detection systems in order to detect this attack. These strategies often rely on techniques implemented at high layers of the application but do not consider the low level of system calls. The problem of only considering the high level perspective is that an attacker can circumvent the detection tools using certain techniques such as URL encoding. One technique currently used for detecting low-level attacks on privileged processes is the tracing of system calls. System calls act as a single gate to the Operating System (OS) kernel; they allow catching the critical data at an appropriate level of detail. Our basic assumption is that any type of application, be it a system service, utility program or Web application, “speaks” the language of system calls when having a conversation with the OS kernel. At this level we can see the actual attack while it is happening. We conduct an experiment in order to demonstrate the suitability of system call analysis for detecting SQL injection. We are able to detect the attack. Therefore we conclude that system calls are not only powerful in detecting low-level attacks but that they also enable us to detect highlevel attacks such as SQL injection.

Keywords: Linux system calls, Web attack detection, Interception.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1959