Search results for: sulfuric acid attacks.
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 1045

Search results for: sulfuric acid attacks.

835 Biodiesel as an Alternative Fuel for Diesel Engines

Authors: F. Halek, A. Kavousi, M. Banifatemi

Abstract:

There is growing interest in biodiesel (fatty acid methyl ester or FAME) because of the similarity in its properties when compared to those of diesel fuels. Diesel engines operated on biodiesel have lower emissions of carbon monoxide, unburned hydrocarbons, particulate matter, and air toxics than when operated on petroleum-based diesel fuel. Production of fatty acid methyl ester (FAME) from rapeseed (nonedible oil) fatty acid distillate having high free fatty acids (FFA) was investigated in this work. Conditions for esterification process of rapeseed oil were 1.8 % H2SO4 as catalyst, MeOH/oil of molar ratio 2 : 0.1 and reaction temperature 65 °C, for a period of 3h. The yield of methyl ester was > 90 % in 1 h. The amount of FFA was reduced from 93 wt % to less than 2 wt % at the end of the esterification process. The FAME was pureed by neutralization with 1 M sodium hydroxide in water solution at a reaction temperature of 62 °C. The final FAME product met with the biodiesel quality standard, and ASTM D 6751.

Keywords: Alternative Fuels, Biodiesel, Fatty Acid, MethylEster, Seed Oil, Transesterification.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 2064
834 Underivatized Amino Acid Analyses Using Liquid Chromatography-Tandem Mass Spectrometry in Scalp Hair of Children with Autism Spectrum Disorder

Authors: Ayat Bani Rashaid, Zain Khasawneh, Mazin Alqhazo, Shreen Nusair, Mohammad El-Khateeb, Mahmoud Bashtawi

Abstract:

Autism Spectrum disorder (ASD) is a psychiatric disorder with unknown etiology that mainly affects children in the first three years of life. Alterations of amino acid levels are believed to contribute to ASD. The levels of six essential amino acids (methionine, histidine, valine, leucine, threonine, and phenylalanine), five conditional amino acids (proline, tyrosine, glutamine, cysteine, and cystine), and five non-essential amino acids (asparagine, aspartic acid, alanine, serine, and glutamic acid) in hair samples of children with ASD (n = 25) were analyzed and compared to corresponding levels in healthy age-matched controls (n = 25). The results showed that the levels of methionine, alanine, and asparagine were significantly lower in the hair samples of ASD group compared to those of the control group (p ≤ 0.05). However, the levels of glutamic acid were significantly higher in the ASD group than the control group (p ≤ 0.05). The current findings could contribute towards further understanding of ASD etiology and provide specialists with a hair amino acid profile utilized as a biomarker for early diagnosis of ASD. Such biomarkers could participate in future developments of therapies that reduce ASD-related symptoms.

Keywords: Autism spectrum disorder, amino acids, liquid chromatography-tandem mass spectrometry, human hair.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 589
833 Quality Characterization of Burger Affected by Soybean Additives (Natto & Protein Hydrolysate) and Ascorbic Acid

Authors: Marwa H. Mahmoud, Ferial M. Abu-Salem

Abstract:

Soy protein is a common ingredient added to processed meats to enhance its functional characteristics. In our study, soybean products (fermented soy Natto and protein hydrolysate) containing hydrolyzed peptides and amino acids, with or without ascorbic acid were added to burger in order to improve its quality characteristics. Results showed that soy additives significantly increased moisture and protein content and reduced (P < 0.05) fat values. Ash content did not affect with Natto additive. Color tools, lightness and yellowness were higher (P<0.05) for the samples with added soybean products (with or without ascorbic acid), while redness decreased. Both of protein hydrolysate and ascorbic acid increased the softiness while, Natto additive increased the hardness of samples. Natto & protein hydrolysate additives increased the total volatile basic nitrogen while, samples with ascorbic acid decreased TVBN values at significant levels. Also, soy additives were improved both of cooking quality and sensory evaluation of the burger in order to prove that soy products actually affect the quality characteristics of meat products.

Keywords: Burger, protein hydrolysate, fermented soy Natto, quality characterization.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1843
832 A Normalization-based Robust Watermarking Scheme Using Zernike Moments

Authors: Say Wei Foo, Qi Dong

Abstract:

Digital watermarking has become an important technique for copyright protection but its robustness against attacks remains a major problem. In this paper, we propose a normalizationbased robust image watermarking scheme. In the proposed scheme, original host image is first normalized to a standard form. Zernike transform is then applied to the normalized image to calculate Zernike moments. Dither modulation is adopted to quantize the magnitudes of Zernike moments according to the watermark bit stream. The watermark extracting method is a blind method. Security analysis and false alarm analysis are then performed. The quality degradation of watermarked image caused by the embedded watermark is visually transparent. Experimental results show that the proposed scheme has very high robustness against various image processing operations and geometric attacks.

Keywords: Image watermarking, Image normalization, Zernike moments, Robustness.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1717
831 Swelling Behavior and Cytotoxicity of Maleic Acid Grafted Chitosan

Authors: Sevil Yucel, Zafer Omer Ozdemir, Cem Kesgin, Pinar Terzioglu, Simten Unlu, Yagmur Erdogan, Kubra Pusat

Abstract:

Chitosan is an attractive polysaccharide obtained by deacetylation of an abundant natural biopolymer called chitin. Chitin and chitosan are excellent materials. To improve the potential of chitin and chitosan modification is needed. In the present study, grafting of maleic acid on to chitosan by cerium ammonium nitrate in acetic acid solution was investigated with use of a microwave and reflux system. The grafted chitosan was characterized by using a Fourier-transform infrared spectrometry. The solubility and swelling behavior of grafted chitosans were determined in acetate buffer (pH 3.6), citrophosphate buffer (pH 5.6 and pH 7.0), and boric buffer (pH 9.2) solutions. The sample obtained by microwave system with use of a chitosan/maleic anhydride/ceric ammonium nitrate 0.2/3.922/0.99 gram of raw material within 30 minute showed the maximum swelling ratio (13.6) in boric buffer solution.

Keywords: Chitosan, cytotoxicity, grafted, maleic acid, swell.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 2403
830 Taxonomy of Threats and Vulnerabilities in Smart Grid Networks

Authors: Faisal Al Yahmadi, Muhammad R. Ahmed

Abstract:

Electric power is a fundamental necessity in the 21st century. Consequently, any break in electric power is probably going to affect the general activity. To make the power supply smooth and efficient, a smart grid network is introduced which uses communication technology. In any communication network, security is essential. It has been observed from several recent incidents that adversary causes an interruption to the operation of networks. In order to resolve the issues, it is vital to understand the threats and vulnerabilities associated with the smart grid networks. In this paper, we have investigated the threats and vulnerabilities in Smart Grid Networks (SGN) and the few solutions in the literature. Proposed solutions showed developments in electricity theft countermeasures, Denial of services attacks (DoS) and malicious injection attacks detection model, as well as malicious nodes detection using watchdog like techniques and other solutions.

Keywords: Smart grid network, security, threats, vulnerabilities.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 525
829 Review of Trust Models in Wireless Sensor Networks

Authors: V. Uma Rani, K. Soma Sundaram

Abstract:

The major challenge faced by wireless sensor networks is security. Because of dynamic and collaborative nature of sensor networks the connected sensor devices makes the network unusable. To solve this issue, a trust model is required to find malicious, selfish and compromised insiders by evaluating trust worthiness sensors from the network. It supports the decision making processes in wireless sensor networks such as pre key-distribution, cluster head selection, data aggregation, routing and self reconfiguration of sensor nodes. This paper discussed the kinds of trust model, trust metrics used to address attacks by monitoring certain behavior of network. It describes the major design issues and their countermeasures of building trust model. It also discusses existing trust models used in various decision making process of wireless sensor networks.

Keywords: Attacks, Security, Trust, Trust model, Wireless sensor network.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 4520
828 The Effect in vitro of Flavonoid Aglycones Extracts from Roots of Date Palm Cultivars on Fusarium oxysporum F. Sp. albedinis

Authors: T. Azouaoui – Ait Kettout, R. Gaceb – Terrak, F. Rahmania

Abstract:

Date production in North Africa is facing a worrying slowdown and a decline because of Fusarium wilt or bayoud date palm (Phoenix dactylifera L., caused by Fusarium oxysporum f. sp. albedinis (F. o. a). The objective of this work is to study the in vitro effect of flavonoid aglycones extracted from the roots of two cultivars of date palm (one sensitive to bayoud (Deglet Nour) and the other resistant (Takerboucht)) on the growth and production fusaric acid of the pathogen. Results show that during the first week of development of F. o. a on potato dextrose liquid medium, the flavonoid aglycones extracts of the susceptible cultivar roots stimulates mycelial growth as well as conidiogenesis of F.o.a, nevertheless it has no effect on the synthesis of fusaric acid. However, the flavonoid aglycones extract of resistant cultivar roots stimulates mycelial growth and decreases both the number of conidia production and fusaric acid. It therefore appears possible that the resistant cultivar aglycones have two types of action: they either inhibit the synthesis of fusaric acid, or they metabolize this toxin into hydrosoluble product, this is called detoxification.

Keywords: Flavonoid Aglycones, date palm, fusaric acid, Fusarium oxysporum f. sp. albedinis.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 2125
827 Random Oracle Model of Information Hiding System

Authors: Nan Jiang, Jian Wang

Abstract:

Random Oracle Model (ROM) is an effective method for measuring the practical security of cryptograph. In this paper, we try to use it into information hiding system (IHS). Because IHS has its own properties, the ROM must be modified if it is used into IHS. Firstly, we fully discuss why and how to modify each part of ROM respectively. The main changes include: 1) Divide the attacks that IHS may be suffered into two phases and divide the attacks of each phase into several kinds. 2) Distinguish Oracles and Black-boxes clearly. 3) Define Oracle and four Black-boxes that IHS used. 4) Propose the formalized adversary model. And 5) Give the definition of judge. Secondly, based on ROM of IHS, the security against known original cover attack (KOCA-KOCA-security) is defined. Then, we give an actual information hiding scheme and prove that it is KOCA-KOCA-secure. Finally, we conclude the paper and propose the open problems of further research.

Keywords: Attack, Information Hiding, Provable Security, Random Oracle Model.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1311
826 Extend of Self-Life of Potato Round Slices with Edible Coating, Green Tea and Ascorbic Acid

Authors: A. Spanou, P. Giannouli

Abstract:

The effects of coatings based on sodium alginate (S.A) and carboxyl methyl cellulose (CMC) on the color and moisture characteristics of potato round slices were investigated. It is the first time that this combination of polysaccharides is used as edible coating which alone had the best performance as inhibitor of potato color discoloration during the storage of 15 days at 4oC. When ascorbic acid (AA) and green tea (GT) were added in the above edible coating its effects on potato round slices changed. The mixtures of sodium alginate and carboxyl methyl cellulose with ascorbic acid or with green tea behave as a potential moisture barrier, resulting to the extent of potato samples self–life. These data suggests that both GT and AA are potential inhibitors of dehydration in potatoes and not only natural antioxidants.

Keywords: Ascorbic acid, edible coating, green tea, moisture barrier.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 3354
825 A Robust Image Watermarking Scheme using Image Moment Normalization

Authors: Latha Parameswaran, K. Anbumani

Abstract:

Multimedia security is an incredibly significant area of concern. A number of papers on robust digital watermarking have been presented, but there are no standards that have been defined so far. Thus multimedia security is still a posing problem. The aim of this paper is to design a robust image-watermarking scheme, which can withstand a different set of attacks. The proposed scheme provides a robust solution integrating image moment normalization, content dependent watermark and discrete wavelet transformation. Moment normalization is useful to recover the watermark even in case of geometrical attacks. Content dependent watermarks are a powerful means of authentication as the data is watermarked with its own features. Discrete wavelet transforms have been used as they describe image features in a better manner. The proposed scheme finds its place in validating identification cards and financial instruments.

Keywords: Watermarking, moments, wavelets, content-based, benchmarking.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1499
824 An Enhanced Associativity Based Routing with Fuzzy Based Trust to Mitigate Network Attacks

Authors: K. Geetha, P. Thangaraj

Abstract:

Mobile Ad Hoc Networks (MANETs) is a collection of mobile devices forming a communication network without infrastructure. MANET is vulnerable to security threats due to network’s limited security, dynamic topology, scalability and the lack of central management. The Quality of Service (QoS) routing in such networks is limited by network breakage caused by node mobility or nodes energy depletions. The impact of node mobility on trust establishment is considered and its use to propagate trust through a network is investigated in this paper. This work proposes an enhanced Associativity Based Routing (ABR) with Fuzzy based Trust (Fuzzy- ABR) routing protocol for MANET to improve QoS and to mitigate network attacks.

Keywords: Mobile Ad hoc Networks (MANET), Associativity Based Routing (ABR), Fuzzy based Computed Trust.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 2517
823 Visual Odometry and Trajectory Reconstruction for UAVs

Authors: Sandro Bartolini, Alessandro Mecocci, Alessio Medaglini

Abstract:

The growing popularity of systems based on Unmanned Aerial Vehicles (UAVs) is highlighting their vulnerability particularly in relation to the positioning system used. Typically, UAV architectures use the civilian GPS which is exposed to a number of different attacks, such as jamming or spoofing. This is why it is important to develop alternative methodologies to accurately estimate the actual UAV position without relying on GPS measurements only. In this paper we propose a position estimate method for UAVs based on monocular visual odometry. We have developed a flight control system capable of keeping track of the entire trajectory travelled, with a reduced dependency on the availability of GPS signal. Moreover, the simplicity of the developed solution makes it applicable to a wide range of commercial drones. The final goal is to allow for safer flights in all conditions, even under cyber-attacks trying to deceive the drone.

Keywords: Visual odometry, autonomous UAV, position measurement, autonomous outdoor flight.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 524
822 Functionalization of Carbon Nanotubes Using Nitric Acid Oxidation and DBD Plasma

Authors: M. Vesali Naseh, A. A. Khodadadi, Y. Mortazavi, O. Alizadeh Sahraei, F. Pourfayaz, S. Mosadegh Sedghi

Abstract:

In this study, multiwall carbon nanotubes (MWNTs) were modified with nitric acid chemically and by dielectric barrier discharge (DBD) plasma in an oxygen-based atmosphere. Used carbon nanotubes (CNTs) were prepared by chemical vapour deposition (CVD) floating catalyst method. For removing amorphous carbon and metal catalyst, MWNTs were exposed to dry air and washed with hydrochloric acid. Heating purified CNTs under helium atmosphere caused elimination of acidic functional groups. Fourier transformed infrared spectroscopy (FTIR) shows formation of oxygen containing groups such as C=O and COOH. Brunauer, Emmett, Teller (BET) analysis revealed that functionalization causes generation of defects on the sidewalls and opening of the ends of CNTs. Results of temperature-programmed desorption (TPD) and gas chromatography(GC) indicate that nitric acid treatment create more acidic groups than plasma treatment.

Keywords: Carbon nanotubes (CNTs), chemical treatment, functionalization, plasma.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 5717
821 Current Situation and Possible Solutions of Acid Rain in South Korea

Authors: Dhongkyu Yoon

Abstract:

Environmental statistics reveals that the pollution of acid rain in South Korea is a serious issue. Yet the awareness of people is low. Even after a gradual decrease of pollutant emission in Korea, the acidity has not been reduced. There no boundaries in the atmosphere are set and the influence of the neighboring countries such as China is apparent. Governmental efforts among China, Japan and Korea have been made on this issue. However, not much progress has been observed. Along with the governmental activities, therefore, an active monitoring of the pollution among the countries and the promotion of environmental awareness at the civil level including especially the middle and high schools are highly recommended. It will be this young generation who will face damaged country as inheritance not the current generation.

Keywords: acid rain, international collaboration, pollution, South Korea

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 6353
820 Cybersecurity Awareness through Laboratories and Cyber Competitions in the Education System: Practices to Promote Student Success

Authors: Haydar Teymourlouei

Abstract:

Cybersecurity is one of the greatest challenges society faces in an age revolving around technological development. With cyber-attacks on the continuous rise, the nation needs to understand and learn ways that can prevent such attacks. A major contribution that can change the education system is to implement laboratories and competitions into academia. This method can improve and educate students with more hands-on exercises in a highly motivating setting. Considering the fact that students are the next generation of the nation’s workforce, it is important for students to understand concepts not only through books, but also through actual hands-on experiences in order for them to be prepared for the workforce. An effective cybersecurity education system is critical for creating a strong cyber secure workforce today and for the future. This paper emphasizes the need for awareness and the need for competitions and cybersecurity laboratories to be implemented into the education system.

Keywords: Awareness, competition, cybersecurity, laboratories, workforce.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1454
819 Enhancement of Essential Oil from Agarwood by Subcritical Water Extraction and Pretreatments on Hydrodistillation

Authors: Nuttawan Yoswathana, M. N. Eshiaghi, K. Jaturapornpanich

Abstract:

The traditional method for essential oil extraction from agarwood (Aquilaria Crassna) is to soak it in water and follow with hydrodistillation. The effect of various agarwood pretreatments: ethanol, acid, alkaline, enzymes, and ultrasound, and the effect of subcritical water extraction(SWE) was studied to compare with the traditional method. The major compositions of agarwood oil from hydrodistillation were aroma compounds as follow: aristol-9-en-8- one (21.53%), selina-3, 7(11)-diene (12.96%), τ-himachalene (9.28%), β-guaiene (5.79%), hexadecanoic acid (4.90%) and guaia- 3,9-diene (4.21%). Whereas agarwood oil from pretreatments with ethanol and ultrasound, and SWE got fatty acid compounds. Extraction of agarwood oil using these pretreatments could improve the agarwood oil yields up to 2 times that of the traditional method. The components of the pretreated sample with diluted acid (H2SO4) at pH 4 gave quite similar results as the traditional method. Therefore, the enhancement of essential oil from agarwood depends on requirement of type of extracted oil that involved extraction methods.

Keywords: Agarwood, aquilaria crassna, hydrodistillation, subcritical water extraction.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 4481
818 Optimization of Acid Treatments by Assessing Diversion Strategies in Carbonate and Sandstone Formations

Authors: Ragi Poyyara, Vijaya Patnana, Mohammed Alam

Abstract:

When acid is pumped into damaged reservoirs for damage removal/stimulation, distorted inflow of acid into the formation occurs caused by acid preferentially traveling into highly permeable regions over low permeable regions, or (in general) into the path of least resistance. This can lead to poor zonal coverage and hence warrants diversion to carry out an effective placement of acid. Diversion is desirably a reversible technique of temporarily reducing the permeability of high perm zones, thereby forcing the acid into lower perm zones. The uniqueness of each reservoir can pose several challenges to engineers attempting to devise optimum and effective diversion strategies. Diversion techniques include mechanical placement and/or chemical diversion of treatment fluids, further sub-classified into ball sealers, bridge plugs, packers, particulate diverters, viscous gels, crosslinked gels, relative permeability modifiers (RPMs), foams, and/or the use of placement techniques, such as coiled tubing (CT) and the maximum pressure difference and injection rate (MAPDIR) methodology. It is not always realized that the effectiveness of diverters greatly depends on reservoir properties, such as formation type, temperature, reservoir permeability, heterogeneity, and physical well characteristics (e.g., completion type, well deviation, length of treatment interval, multiple intervals, etc.). This paper reviews the mechanisms by which each variety of diverter functions and discusses the effect of various reservoir properties on the efficiency of diversion techniques. Guidelines are recommended to help enhance productivity from zones of interest by choosing the best methods of diversion while pumping an optimized amount of treatment fluid. The success of an overall acid treatment often depends on the effectiveness of the diverting agents.

Keywords: Acid treatment, carbonate, diversion, sandstone.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 4008
817 Uranium Adsorption Using a Composite Material Based on Platelet SBA-15 Supported Tin Salt Tungstomolybdophosphoric Acid

Authors: H. Aghayan, F. A. Hashemi, R. Yavari, S. Zolghadri

Abstract:

In this work, a new composite adsorbent based on a mesoporous silica SBA-15 with platelet morphology and tin salt of tungstomolybdophosphoric (TWMP) acid was synthesized and applied for uranium adsorption from aqueous solution. The sample was characterized by X-ray diffraction, Fourier transfer infra-red, and N2 adsorption-desorption analysis, and then, effect of various parameters such as concentration of metal ions and contact time on adsorption behavior was examined. The experimental result showed that the adsorption process was explained by the Langmuir isotherm model very well, and predominant reaction mechanism is physisorption. Kinetic data of adsorption suggest that the adsorption process can be described by the pseudo second-order reaction rate model.

Keywords: Platelet SBA-15, tungstomolybdophosphoric acid, adsorption, uranium ion.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 795
816 Secure Internet Connectivity for Dynamic Source Routing (DSR) based Mobile Ad hoc Networks

Authors: Ramanarayana Kandikattu, Lillykutty Jacob

Abstract:

'Secure routing in Mobile Ad hoc networks' and 'Internet connectivity to Mobile Ad hoc networks' have been dealt separately in the past research. This paper proposes a light weight solution for secure routing in integrated Mobile Ad hoc Network (MANET)-Internet. The proposed framework ensures mutual authentication of Mobile Node (MN), Foreign Agent (FA) and Home Agent (HA) to avoid various attacks on global connectivity and employs light weight hop-by-hop authentication and end-to-end integrity to protect the network from most of the potential security attacks. The framework also uses dynamic security monitoring mechanism to monitor the misbehavior of internal nodes. Security and performance analysis show that our proposed framework achieves good security while keeping the overhead and latency minimal.

Keywords: Internet, Mobile Ad hoc Networks, Secure routing.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1393
815 Biorecognizable Nanoparticles Based On Hyaluronic Acid/Poly(ε-Caprolactone) Block Copolymer

Authors: Jong Ho Hwang, Dae Hwan Kang, Young-IL Jeong

Abstract:

Since hyaluronic acid (HA) receptor such as CD44 is over-expressed at sites of cancer cells, HA can be used as a targeting vehicles for anti-cancer drugs. The aim of this study is to synthesize block copolymer composed of hyaluronic acid and poly(ε-caprolactone) (HAPCL) and to fabricate polymeric micelles for anticancer drug targeting against CD44 receptor of tumor cells. Chemical composition of HAPCL was confirmed using 1H NMR spectroscopy. Doxorubicin (DOX) was incorporated into polymeric micelles of HAPCL. The diameters of HAPHS polymeric micelles were changed around 80nm and have spherical shapes. Targeting potential was investigated using CD44-overexpressing. When DOX-incorporated polymeric micelles was added to KB cells, they revealed strong red fluorescence color while blocking of CD44 receptor by pretreatment of free HA resulted in reduced intensity, indicating that HAPCL polymeric micelles have targetability against CD44 receptor.

Keywords: Hyaluronic acid, CD44 receptor, biorecognizable nanoparticles, block copolymer.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 5961
814 Enhanced Mycophenolic Acid Production by Penicillium brevicompactum with Enzymatically Hydrolyzed Casein

Authors: F. Ardestani, S. S. A. Fatemi, B. Yakhchali

Abstract:

Mycophenolic acid (MPA) is a secondary metabolite produced by Penicillium brevicompactum, which has antibiotic and immunosuppressive properties. In this study, the first, mycophenolic acid was produced in a fermentation process by Penicillium brevicompactum MUCL 19011 in shake flask using a base medium. The maximum MPA production, product yield and productivity of process were 1.379 g/L, 18.6 mg/g glucose and 4.9 mg/L. h, respectively. Also the glucose consumption, biomass and MPA production profiles were investigated during batch cultivation. Obtained results showed that MPA production starts approximately after 180 hours and reaches to a maximum at 280 h. In the next step, the effects of some various concentrations of enzymatically hydrolyzed casein on MPA production were evaluated. Maximum MPA production, product yield and productivity as 3.63 g/L, 49 mg/g glucose and 12.96 mg/L.h, respectively were obtained with using 30 g/L enzymatically hydrolyzed casein in culture medium. These values show an enhanced MPA production, product yield and process productivity pr as 116.8%, 132.8% and 163.2%, respectively.

Keywords: Penicillium brevicompactum, Enzymatically hydrolyzed casein, Mycophenolic acid, Submerged culture

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 2328
813 The Using of Mixing Amines in an Industrial Gas Sweetening Plant

Authors: B. Sohbi, M. Meakaff, M. Emtir, M. Elgarni

Abstract:

Natural gas is defined as gas obtained from a natural underground reservoir. It generally contains a large quantity of methane along with heavier hydrocarbons such as ethane, propane, isobutene, normal butane; also in the raw state it often contains a considerable amount of non hydrocarbons, such as nitrogen and the acid gases (carbon dioxide and hydrogen sulfide). The acid gases must be removed from natural gas before use. One of the processes witch are use in the industry to remove the acid gases from natural gas is the use of alkanolamine process. In this present paper, a simulation study for an industrial gas sweetening plant has been investigated. The aim of the study is to investigate the effect of using mixing amines as solvent on the gas treatment process using the software Hysys.

Keywords: Natural gas, alkanolamine process, gas sweetening plant, simulation, mixing amines.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 3754
812 Identify Features and Parameters to Devise an Accurate Intrusion Detection System Using Artificial Neural Network

Authors: Saman M. Abdulla, Najla B. Al-Dabagh, Omar Zakaria

Abstract:

The aim of this article is to explain how features of attacks could be extracted from the packets. It also explains how vectors could be built and then applied to the input of any analysis stage. For analyzing, the work deploys the Feedforward-Back propagation neural network to act as misuse intrusion detection system. It uses ten types if attacks as example for training and testing the neural network. It explains how the packets are analyzed to extract features. The work shows how selecting the right features, building correct vectors and how correct identification of the training methods with nodes- number in hidden layer of any neural network affecting the accuracy of system. In addition, the work shows how to get values of optimal weights and use them to initialize the Artificial Neural Network.

Keywords: Artificial Neural Network, Attack Features, MisuseIntrusion Detection System, Training Parameters.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 2248
811 DWT-SATS Based Detection of Image Region Cloning

Authors: Michael Zimba

Abstract:

A duplicated image region may be subjected to a number of attacks such as noise addition, compression, reflection, rotation, and scaling with the intention of either merely mating it to its targeted neighborhood or preventing its detection. In this paper, we present an effective and robust method of detecting duplicated regions inclusive of those affected by the various attacks. In order to reduce the dimension of the image, the proposed algorithm firstly performs discrete wavelet transform, DWT, of a suspicious image. However, unlike most existing copy move image forgery (CMIF) detection algorithms operating in the DWT domain which extract only the low frequency subband of the DWT of the suspicious image thereby leaving valuable information in the other three subbands, the proposed algorithm simultaneously extracts features from all the four subbands. The extracted features are not only more accurate representation of image regions but also robust to additive noise, JPEG compression, and affine transformation. Furthermore, principal component analysis-eigenvalue decomposition, PCA-EVD, is applied to reduce the dimension of the features. The extracted features are then sorted using the more computationally efficient Radix Sort algorithm. Finally, same affine transformation selection, SATS, a duplication verification method, is applied to detect duplicated regions. The proposed algorithm is not only fast but also more robust to attacks compared to the related CMIF detection algorithms. The experimental results show high detection rates. 

Keywords: Affine Transformation, Discrete Wavelet Transform, Radix Sort, SATS.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1866
810 Efficient and Timely Mutual Authentication Scheme for RFID Systems

Authors: Hesham A. El Zouka, Mustafa M. Hosni

Abstract:

The Radio Frequency Identification (RFID) technology has a diverse base of applications, but it is also prone to security threats. There are different types of security attacks which limit the range of the RFID applications. For example, deploying the RFID networks in insecure environments could make the RFID system vulnerable to many types of attacks such as spoofing attack, location traceability attack, physical attack and many more. Therefore, security is often an important requirement for RFID systems. In this paper, RFID mutual authentication protocol is implemented based on mobile agent technology and timestamp, which are used to provide strong authentication and integrity assurances to both the RFID readers and their corresponding RFID tags. The integration of mobile agent technology and timestamp provides promising results towards achieving this goal and towards reducing the security threats in RFID systems.

Keywords: RFID, security, authentication protocols, privacy, agent-based architecture, time-stamp, digital signature.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1749
809 The Effects of Methionine and Acetate Concentrations on Mycophenolic Acid Production by Penicillium bervicompactum MUCL 19011 in Submerged Culture

Authors: F. Ardestani, S.A. Fatemi, B. Yakhchali, M. Hosseyni, G. Najafpour

Abstract:

Mycophenolic acid “MPA" is a secondary metabolite of Penicillium bervicompactum with antibiotic and immunosuppressive properties. In this study, fermentation process was established for production of mycophenolic acid by Penicillium bervicompactum MUCL 19011 in shake flask. The maximum MPA production, product yield and productivity were 1.379 g/L, 18.6 mg/g glucose and 4.9 mg/L.h respectively. Glucose consumption, biomass and MPA production profiles were investigated during fermentation time. It was found that MPA production starts approximately after 180 hours and reaches to a maximum at 280 h. In the next step, the effects of methionine and acetate concentrations on MPA production were evaluated. Maximum MPA production, product yield and productivity (1.763 g/L, 23.8 mg/g glucose and 6.30 mg/L. h respectively) were obtained with using 2.5 g/L methionine in culture medium. Further addition of methionine had not more positive effect on MPA production. Finally, results showed that the addition of acetate to the culture medium had not any observable effect on MPA production.

Keywords: Penicillium bervicompactum, Methionine, Mycophenolic acid, Submerged culture

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1447
808 Distortion Estimation in Digital Image Watermarking using Genetic Programming

Authors: Labiba Gilani, Asifullah Khan, Anwar M. Mirza

Abstract:

This paper introduces a technique of distortion estimation in image watermarking using Genetic Programming (GP). The distortion is estimated by considering the problem of obtaining a distorted watermarked signal from the original watermarked signal as a function regression problem. This function regression problem is solved using GP, where the original watermarked signal is considered as an independent variable. GP-based distortion estimation scheme is checked for Gaussian attack and Jpeg compression attack. We have used Gaussian attacks of different strengths by changing the standard deviation. JPEG compression attack is also varied by adding various distortions. Experimental results demonstrate that the proposed technique is able to detect the watermark even in the case of strong distortions and is more robust against attacks.

Keywords: Blind Watermarking, Genetic Programming (GP), Fitness Function, Discrete Cosine Transform (DCT).

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1667
807 An Earth Mover’s Distance Algorithm Based DDoS Detection Mechanism in SDN

Authors: Yang Zhou, Kangfeng Zheng, Wei Ni, Ren Ping Liu

Abstract:

Software-defined networking (SDN) provides a solution for scalable network framework with decoupled control and data plane. However, this architecture also induces a particular distributed denial-of-service (DDoS) attack that can affect or even overwhelm the SDN network. DDoS attack detection problem has to date been mostly researched as entropy comparison problem. However, this problem lacks the utilization of SDN, and the results are not accurate. In this paper, we propose a DDoS attack detection method, which interprets DDoS detection as a signature matching problem and is formulated as Earth Mover’s Distance (EMD) model. Considering the feasibility and accuracy, we further propose to define the cost function of EMD to be a generalized Kullback-Leibler divergence. Simulation results show that our proposed method can detect DDoS attacks by comparing EMD values with the ones computed in the case without attacks. Moreover, our method can significantly increase the true positive rate of detection.

Keywords: DDoS detection, EMD, relative entropy, SDN.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 711
806 Carbothermic Reduction of Phosphoric Acid Extracted from Dephosphorization Slags to Produce Yellow Phosphorus

Authors: Ryoko Yoshida, Jyunpei Yoshida, Hua Fang Yu, Yasushi Sasaki, Tetsuya Nagasaka

Abstract:

Phosphorous is an important element for agriculture and industry and is a non-renewable resource. Especially, yellow phosphorus is an essential material in advanced industrial technology, but phosphorus resources were not produced in Japan at all, and all depend on imports. It has been suggested, however, that the remaining accessible reserves of phosphate ore will be depleted within 50 years. Therefore, alternative resources for phosphate ore must be found. In this research, we have developed a process that enables the production of high-purity yellow phosphorus from domestic unused phosphorus resources such as steelmaking slags. The process consists of two parts: (1) the production of crude phosphoric acid from wastes such as steelmaking slag; (2) producing high-purity yellow phosphorus by low-temperature carbothermic reduction of phosphoric acid (H3PO4). The details of the carbothermic reduction of phosphoric acid are presented in this paper. Yellow phosphorus is commercially produced by carbothermic reduction of phosphate ore in an electric arc furnace at more than 1673K. In the newly developed system, gaseous P4O10 evaporated from H3PO4 is successfully reduced to yellow phosphorus by using carbon packed bed at less than 1273K. To meet the depletion of phosphate ore, the proposed process in this study to produce yellow phosphorus by carbothermic reduction of H3PO4 that are extracted from dephosphorization slags will be one of the effective and economical solutions.

Keywords: Carbothermic reduction, dephosphorization slags, phosphoric acid, yellow phosphorus.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 904