WorldWideScience

Sample records for attack wastewater utilities

  1. Protecting water and wastewater infrastructure from cyber attacks

    Science.gov (United States)

    Panguluri, Srinivas; Phillips, William; Cusimano, John

    2011-12-01

    Multiple organizations over the years have collected and analyzed data on cyber attacks and they all agree on one conclusion: cyber attacks are real and can cause significant damages. This paper presents some recent statistics on cyber attacks and resulting damages. Water and wastewater utilities must adopt countermeasures to prevent or minimize the damage in case of such attacks. Many unique challenges are faced by the water and wastewater industry while selecting and implementing security countermeasures; the key challenges are: 1) the increasing interconnection of their business and control system networks, 2) large variation of proprietary industrial control equipment utilized, 3) multitude of cross-sector cyber-security standards, and 4) the differences in the equipment vendor's approaches to meet these security standards. The utilities can meet these challenges by voluntarily selecting and adopting security standards, conducting a gap analysis, performing vulnerability/risk analysis, and undertaking countermeasures that best meets their security and organizational requirements. Utilities should optimally utilize their limited resources to prepare and implement necessary programs that are designed to increase cyber-security over the years. Implementing cyber security does not necessarily have to be expensive, substantial improvements can be accomplished through policy, procedure, training and awareness. Utilities can also get creative and allocate more funding through annual budgets and reduce dependence upon capital improvement programs to achieve improvements in cyber-security.

  2. Protecting water and wastewater infrastructure from cyber attacks

    Institute of Scientific and Technical Information of China (English)

    Srinivas Panguluri; William Phillips; John Cusimano

    2011-01-01

    Multiple organizations over the years have collected and analyzed data on cyber attacks and they all agree on one conclusion:cyber attacks are real and can cause significant damages.This paper presents some recent statistics on cyber attacks and resulting damages.Water and wastewater utilities must adopt countermeasures to prevent or minimize the damage in case of such attacks.Many unique challenges are faced by the water and wastewater industry while selecting and implementing security countermeasures; the key challenges are:1) the increasing interconnection of their business and control system networks,2) large variation of proprietary industrial control equipment utilized,3) multitude of cross-sector cyber-security standards,and 4) the differences in the equipment vendor's approaches to meet these security standards.The utilities can meet these challenges by voluntarily selecting and adopting security standards,conducting a gap analysis,performing vulnerability/risk analysis,and undertaking countermeasures that best meets their security and organizational requirements.Utilities should optimally utilize their limited resources to prepare and implement necessary programs that are designed to increase cyber-security over the years.Implementing cyber security does not necessarily have to be expensive,substantial improvements can be accomplished through policy,procedure,training and awareness.Utilities can also get creative and allocate more funding through annual budgets and reduce dependence upon capital improvement programs to achieve improvements in cyber-security.

  3. Reducing the Risks. In the aftermath of a terrorist attack, wastewater utilities may have to contend with decontamination water containing chemical, biological, or radiological substances

    International Nuclear Information System (INIS)

    Warren, Linda P.; Hornback, Chris; Strom, Daniel J.

    2006-01-01

    In the aftermath of a chemical, biological, or radiological (CBR) attack, decontamination of people and infrastructure will be needed. Decontamination inevitably produces wastewater, and wastewater treatment plants (WTPs) need to know how to handle decontamination wastewater. This article describes CBR substances; planning, coordinating, and communicating responses across agencies; planning within a utility; coordination with local emergency managers and first responders; mitigating effects of decontamination wastewater; and mitigating effects on utility personnel. Planning for Decontamination Wastewater: A Guide for Utilities, the document on which this article is based, was developed under a cooperative agreement from the U.S. Environmental Protection Agency by the National Association of Clean Water Agencies (NACWA) and its contractor, CH2MHILL, Inc.

  4. Utility Bill Insert for Wastewater Services

    Science.gov (United States)

    Intended for use by wastewater and water supply utilities, one side of the utility bill insert has information for customers that discharge to sanitary sewer systems; the other side is for customers with septic systems.

  5. Utilization of portable effluent wastewater in brick manufacturing

    International Nuclear Information System (INIS)

    EI-Mahllawy, M.S.; El-Sokkary, T.M.

    2005-01-01

    Portable wastewater is produced from sedimentation and filtration tanks in portable water treatment plants. Usually, this useless wastewater is drained into River Nile Canal and not to the sewer system causing a potential pollution. Wastewater has been taken from Portable Treatment Plant located at Qalubia Province, Delta, Egypt. Evaluation of raw materials was carried out by using X-ray diffraction (XRD), X-ray fluorescence (XRF), thermal analyses (DTA and TGA) as well as plasticity and drying sensitivity coefficient (DSC) measurements. Technological properties of fired bricks were investigated according to Egyptian and American Specifications. The obtained experimental results encourage substitution of the drained portable wastewater for the tap water in bricks manufacturing. Thus, utilization of the studied portable effluent wastewater in such industry is possible and fulfills the double target of saving drinking water used in clay bricks manufacturing, rather than its environmental pollution prevention. Keywords: Portable wastewater, tap water, clay building bricks, physicomechanical properties

  6. Production of Spirulina sp by utilization of wastewater from the powder type energy drinks

    Science.gov (United States)

    Sumantri, Indro; Priyambada, Ika Bagus

    2015-12-01

    Wastewater of energy drink type of powder produced when the the production equipment required cleaning treatment to produce one taste to others. These equipments washed by water, so that, it produced wastewater. It contains high organic substances and classified as high degradable due to food product. The content of wastewater is high carbon and nitrogen substances. Microalgae is an autotrophic microorganism, live without carbon presence, utilized to digest the substances in wastewater especially for nitrogen substances. Spirulina sp is the type of microalgae selected to utilize the wastewater of energy drink, the selection criteria is the size of Spirulina sp is relatively large and easy to separated from its solution. The experiment conducted by cultivate the seeding microalgae with certain nutrients until the certain volume. The synthetic wastewater obtained from one of energy drink type of powder with commercial brand as Kuku Bima Ener-G, the wastewater concentration selected under the close to the real condition of wastewater as basis of COD measurement (6 sachet/L or COD of 12.480mg/L) and aqueous concentration (1 sachet/L or COD of 2080mg/L). The batch experiments with 1L volume conducted and with variable of percent volume of wastewater added in order to observe the growth of microlagae. The response of the microalgae growth obtained by increasing the optical density of the microalgae solution and continued by calculation for the growth rate of microalgae. The result of the experiments indicated that for the aqueous concentration (1 sachet/L or COD of 2080mg/L) the optimum added of wastewater is 40 % with growrate of 0.55/day while for the concentrated wastewater (6 sachet/L or COD of 12.480mg/L), the optimum condition is 25 % wastewater added with growth rate of 0.43/day.

  7. Financing Disaster Recovery and Resilience Mitigation for Water and Wastewater Utilities

    Science.gov (United States)

    Free webinar series on Financing for Disaster Recovery and Resilience Mitigation for Water and Wastewater Utilities, hosted by EPA's Water Infrastructure and Resiliency Finance Center and Water Security Division.

  8. A combined model to assess technical and economic consequences of changing conditions and management options for wastewater utilities.

    Science.gov (United States)

    Giessler, Mathias; Tränckner, Jens

    2018-02-01

    The paper presents a simplified model that quantifies economic and technical consequences of changing conditions in wastewater systems on utility level. It has been developed based on data from stakeholders and ministries, collected by a survey that determined resulting effects and adapted measures. The model comprises all substantial cost relevant assets and activities of a typical German wastewater utility. It consists of three modules: i) Sewer for describing the state development of sewer systems, ii) WWTP for process parameter consideration of waste water treatment plants (WWTP) and iii) Cost Accounting for calculation of expenses in the cost categories and resulting charges. Validity and accuracy of this model was verified by using historical data from an exemplary wastewater utility. Calculated process as well as economic parameters shows a high accuracy compared to measured parameters and given expenses. Thus, the model is proposed to support strategic, process oriented decision making on utility level. Copyright © 2017 Elsevier Ltd. All rights reserved.

  9. Assessment of sulfide production risk in soil during the infiltration of domestic wastewater treated by a sulfur-utilizing denitrification process.

    Science.gov (United States)

    Ghorbel, L; Coudert, L; Gilbert, Y; Mercier, G; Blais, J F

    2016-10-01

    This study aimed to determine the potential of sulfide generation during infiltration through soil of domestic wastewater treated by a sulfur-utilizing denitrification process. Three types of soil with different permeability rates (K s = 0.028, 0.0013, and 0.00015 cm/s) were investigated to evaluate the potential risk of sulfur generation during the infiltration of domestic wastewater treated by a sulfur-utilizing denitrification system. These soils were thoroughly characterized and tested to assess their capacity to be used as drainages for wastewaters. Experiments were conducted under two operating modes (saturated and unsaturated). Sulfate, sulfide, and chemical oxygen demand (COD) levels were determined over a period of 100 days. Despite the high concentration of sulfates (200 mg/L) under anaerobic conditions (ORP = -297 mV), no significant amount of sulfide was generated in the aqueous (soil permeability did not have a noticeable effect on the infiltration of domestic wastewater treated by a sulfur-utilizing denitrification system due to low contents of organic matter (i.e., dissolved organic carbon, DOC). The autotrophic denitrification process used to treat the domestic wastewater allowed the reduction of the concentration of biochemical oxygen demand (BOD5) below 5 mg/L, of DOC below 7 mg/L, and of COD below 100 mg/L.

  10. Ciprofloxacin oxidation by UV-C activated peroxymonosulfate in wastewater

    International Nuclear Information System (INIS)

    Mahdi-Ahmed, Moussa; Chiron, Serge

    2014-01-01

    Highlights: • UV/PMS more efficient than UV/H 2 O 2 for ciprofloxacin removal in wastewater. • PMS decomposition into sulfate radical was activated by bicarbonate ions. • CIP degradation pathways elucidation support sulfate radical attacks as a main route. • Sulfate radical generation allows for CIP antibacterial activity elimination. -- Abstract: This work aimed at demonstrating the advantages to use sulfate radical anion for eliminating ciprofloxacin residues from treated domestic wastewater by comparing three UV-254 nm based advanced oxidation processes: UV/persulfate (PDS), UV/peroxymonosulfate (PMS) and UV/H 2 O 2 . In distilled water, the order of efficiency was UV/PDS > UV/PMS > UV/H 2 O 2 while in wastewater, the most efficient process was UV/PMS followed by UV/PDS and UV/H 2 O 2 mainly because PMS decomposition into sulfate radical anion was activated by bicarbonate ions. CIP was fully degraded in wastewater at pH 7 in 60 min for a [PMS]/[CIP] molar ratio of 20. Nine transformation products were identified by liquid chromatography–high resolution-mass spectrometry allowing for the establishment of degradation pathways in the UV/PMS system. Sulfate radical anion attacks prompted transformations at the piperazinyl ring through a one electron oxidation mechanism as a major pathway while hydroxyl radical attacks were mainly responsible for quinolone moiety transformations as a minor pathway. Sulfate radical anion generation has made UV/PMS a kinetically effective process in removing ciprofloxacin from wastewater with the elimination of ciprofloxacin antibacterial activity

  11. Ciprofloxacin oxidation by UV-C activated peroxymonosulfate in wastewater

    Energy Technology Data Exchange (ETDEWEB)

    Mahdi-Ahmed, Moussa; Chiron, Serge, E-mail: Serge.Chiron@msem.univ-montp2.fr

    2014-01-30

    Highlights: • UV/PMS more efficient than UV/H{sub 2}O{sub 2} for ciprofloxacin removal in wastewater. • PMS decomposition into sulfate radical was activated by bicarbonate ions. • CIP degradation pathways elucidation support sulfate radical attacks as a main route. • Sulfate radical generation allows for CIP antibacterial activity elimination. -- Abstract: This work aimed at demonstrating the advantages to use sulfate radical anion for eliminating ciprofloxacin residues from treated domestic wastewater by comparing three UV-254 nm based advanced oxidation processes: UV/persulfate (PDS), UV/peroxymonosulfate (PMS) and UV/H{sub 2}O{sub 2}. In distilled water, the order of efficiency was UV/PDS > UV/PMS > UV/H{sub 2}O{sub 2} while in wastewater, the most efficient process was UV/PMS followed by UV/PDS and UV/H{sub 2}O{sub 2} mainly because PMS decomposition into sulfate radical anion was activated by bicarbonate ions. CIP was fully degraded in wastewater at pH 7 in 60 min for a [PMS]/[CIP] molar ratio of 20. Nine transformation products were identified by liquid chromatography–high resolution-mass spectrometry allowing for the establishment of degradation pathways in the UV/PMS system. Sulfate radical anion attacks prompted transformations at the piperazinyl ring through a one electron oxidation mechanism as a major pathway while hydroxyl radical attacks were mainly responsible for quinolone moiety transformations as a minor pathway. Sulfate radical anion generation has made UV/PMS a kinetically effective process in removing ciprofloxacin from wastewater with the elimination of ciprofloxacin antibacterial activity.

  12. A soil infiltration system incorporated with sulfur-utilizing autotrophic denitrification (SISSAD) for domestic wastewater treatment.

    Science.gov (United States)

    Kong, Zhe; Feng, Chuanping; Chen, Nan; Tong, Shuang; Zhang, Baogang; Hao, Chunbo; Chen, Kun

    2014-05-01

    To enhance the denitrification performance of soil infiltration, a soil infiltration system incorporated with sulfur-utilizing autotrophic denitrification (SISSAD) for domestic wastewater treatment was developed, and the SISSAD performance was evaluated using synthetic domestic wastewater in this study. The aerobic respiration and nitrification were mainly taken place in the upper aerobic stage (AES), removed 88.44% COD and 89.99% NH4(+)-N. Moreover, autotrophic denitrification occurred in the bottom anaerobic stage (ANS), using the CO2 produced from AES as inorganic carbon source. Results demonstrated that the SISSAD showed a remarkable performance on COD removal efficiency of 95.09%, 84.86% for NO3(-)-N, 95.25% for NH4(+)-N and 93.15% for TP. This research revealed the developed system exhibits a promising application prospect for domestic wastewater in the future. Copyright © 2014 Elsevier Ltd. All rights reserved.

  13. Supply-chain environmental effects of wastewater utilities

    International Nuclear Information System (INIS)

    Stokes, Jennifer R; Horvath, Arpad

    2010-01-01

    This letter describes a comprehensive modeling framework and the Wastewater-Energy Sustainability Tool (WWEST) designed for conducting hybrid life-cycle assessments of the wastewater collection, treatment, and discharge infrastructure in the United States. Results from a case study treatment plant which produces electricity using methane offgas are discussed. The case study system supplements influent with 'high-strength organic waste' to augment electricity production. The system balance is 55 kg of greenhouse gases per million liters of wastewater. Sensitivity analysis confirms that reusing biogas from anaerobic digestion for electricity reduces life-cycle greenhouse gas emissions by nine times. When biogas is captured and reused for electricity, material production (e.g., chemicals and pipes) and the corresponding supply chains, rather than energy production, are responsible for most of the environmental effects. When biogas is flared, the material and energy production contributions are similar.

  14. Factors affecting ambulance utilization for asthma attack treatment: understanding where to target interventions.

    Science.gov (United States)

    Raun, L H; Ensor, K B; Campos, L A; Persse, D

    2015-05-01

    Asthma is a serious, sometimes fatal condition, in which attacks vary in severity, potentially requiring emergency medical services (EMS) ambulance treatment. A portion of asthma attacks requiring EMS ambulance treatment may be prevented with improved education and access to care. The aim of this study was to identify areas of the city with high rates of utilization of EMS ambulance for treatment, and the demographics, socio-economic status, and time of day associated with these rates, to better target future interventions to prevent emergencies and reduce cost. A cross-sectional study was conducted on individuals in Houston, TX (USA) requiring ambulance treatment for asthma attacks from 2004 to 2011. 12,155 EMS ambulance-treated asthma attack cases were linked to census tracts. High rate treatment areas were identified with geospatial mapping. Census tract demographic characteristics of these high rate areas were compared with the remainder of the city using logistic regression. The association between case level demographics and the time of day of asthma attack within the high rate area was also assessed with logistic regression. EMS ambulance-treated high rate areas were identified and found to have a utilization incidence rate over six times higher per 100,000 people than the remainder of the city. There is an increased risk of location in this high rate area with a census tract level increase of percent of population: earning less than $10,000 yearly income (RR 1.21, 1.16-1.26), which is black (RR 1.08, 1.07-1.10), which is female (RR 1.34, 1.20-1.49) and have obtained less than a high school degree (RR 1.02, 1.01-1.03). Within the high rate area, case level data indicates an increased risk of requiring an ambulance after normal doctor office hours for men compared with women (RR 1.13, 1.03-1.22), for black compared with Hispanic ethnicity (RR 1.31, 1.08-1.59), or for adults (less than 41 and greater than 60) compared with children. Interventions to prevent

  15. Removal of uranium and priority pollutant metals from Fernald Environmental Management Project wastewater utilizing potassium ferrate

    International Nuclear Information System (INIS)

    Hampshire, Lyle H.; Potts, Michael E.

    1992-01-01

    A side-by-side treatment comparison between calcium hydroxide and TRU/Clear '4', a potassium ferrate based wastewater treatment chemical, was performed in a process wastewater and stormwater treatment facility. Results from the full-scale plant testing demonstrated that potassium ferrate could achieve the same treatment levels as calcium hydroxide while generating 55% less sludge than the calcium hydroxide treatment. The testing also showed that utilization of potassium ferrate would minimize the volume of sludge generated and assist in the reduction of total waste management costs associated with storage, monitoring, transportation, and final disposition of generated sludge. (author)

  16. A comprehensive review on utilization of wastewater from coffee processing.

    Science.gov (United States)

    Rattan, Supriya; Parande, A K; Nagaraju, V D; Ghiwari, Girish K

    2015-05-01

    The coffee processing industry is one of the major agro-based industries contributing significantly in international and national growth. Coffee fruits are processed by two methods, wet and dry process. In wet processing, coffee fruits generate enormous quantities of high strength wastewater requiring systematic treatment prior to disposal. Different method approach is used to treat the wastewater. Many researchers have attempted to assess the efficiency of batch aeration as posttreatment of coffee processing wastewater from an upflow anaerobic hybrid reactor (UAHR)-continuous and intermittent aeration system. However, wet coffee processing requires a high degree of processing know-how and produces large amounts of effluents which have the potential to damage the environment. Characteristics of wastewater from coffee processing has a biological oxygen demand (BOD) of up to 20,000 mg/l and a chemical oxygen demand (COD) of up to 50,000 mg/l as well as the acidity of pH below 4. In this review paper, various methods are discussed to treat coffee processing wastewaters; the constitution of wastewater is presented and the technical solutions for wastewater treatment are discussed.

  17. Using EPA Tools and Data Services to Inform Changes to Design Storm Definitions for Wastewater Utilities based on Climate Model Projections

    Science.gov (United States)

    Tryby, M.; Fries, J. S.; Baranowski, C.

    2014-12-01

    Extreme precipitation events can cause significant impacts to drinking water and wastewater utilities, including facility damage, water quality impacts, service interruptions and potential risks to human health and the environment due to localized flooding and combined sewer overflows (CSOs). These impacts will become more pronounced with the projected increases in frequency and intensity of extreme precipitation events due to climate change. To model the impacts of extreme precipitation events, wastewater utilities often develop Intensity, Duration, and Frequency (IDF) rainfall curves and "design storms" for use in the U.S. Environmental Protection Agency's (EPA) Storm Water Management Model (SWMM). Wastewater utilities use SWMM for planning, analysis, and facility design related to stormwater runoff, combined and sanitary sewers, and other drainage systems in urban and non-urban areas. SWMM tracks (1) the quantity and quality of runoff made within each sub-catchment; and (2) the flow rate, flow depth, and quality of water in each pipe and channel during a simulation period made up of multiple time steps. In its current format, EPA SWMM does not consider climate change projection data. Climate change may affect the relationship between intensity, duration, and frequency described by past rainfall events. Therefore, EPA is integrating climate projection data available in the Climate Resilience Evaluation and Awareness Tool (CREAT) into SWMM. CREAT is a climate risk assessment tool for utilities that provides downscaled climate change projection data for changes in the amount of rainfall in a 24-hour period for various extreme precipitation events (e.g., from 5-year to 100-year storm events). Incorporating climate change projections into SWMM will provide wastewater utilities with more comprehensive data they can use in planning for future storm events, thereby reducing the impacts to the utility and customers served from flooding and stormwater issues.

  18. A GIS based national assessment of algal bio-oil production potential through flue gas and wastewater co-utilization

    International Nuclear Information System (INIS)

    Orfield, Nolan D.; Keoleian, Gregory A.; Love, Nancy G.

    2014-01-01

    The high theoretical productivity of microalgae makes it a promising energy crop, but economically viable large-scale production facilities have yet to emerge. Coupling algae cultivation ponds with flue gas emissions from power utilities to provide carbon dioxide and municipal wastewater to provide nutrients has been recommended as a solution. This flue gas and wastewater co-utilization (FWC) strategy not only reduces the upstream impacts and costs associated with providing inputs, but also provides a credit for wastewater treatment, a service currently required to reduce production costs to a viable level. This study provides the first national assessment of the potential for producing algal bio-oil in the United States using FWC. Spatial-temporal algae growth was simulated using solar radiation and temperature data to calculate the average annual algae yield for any location, which significantly impacts feasibility. The results of this model were integrated into a geospatial analysis which establishes the economically viable bio-oil production potential of FWC by accounting for the relative abundance of the input resources and their proximity. At most, 1.7 billion liters of bio-oil could be produced annually in a manner economically competitive with crude oil prices of $80 per barrel. The amount of nutrients in wastewater limits yields to 20.5 L of bio-oil per capita annually, and climatic constraints further reduce this potential by nearly 60%. Carbon dioxide constraints play a negligible role. Although the bio-oil production potential of FWC is relatively small, it does provide an opportunity to increase national biofuel output while providing a needed service. - Highlights: • Spatial-temporal algae growth was simulated using historical climate data. • A geospatial overlay analysis was used to assess national production potential. • Nutrient availability in wastewater is most limiting. • At most, 1.7 billion liters of algal biofuel per year could be

  19. Utilizing Slurry and Carwash Wastewater as Fresh Water Replacement in Concrete Properties

    Directory of Open Access Journals (Sweden)

    Shahidan Shahiron

    2017-01-01

    Full Text Available The high demand for concrete production generates wastewater which causes environmental problems. However, if wastewater is able to be recycled as part of engineering construction materials, many benefits can be reaped. Unfortunately, the use of wastewater in manufacturing concrete is not common. Therefore, this research aims to identify the influence of using slurry water and car wash wastewater on concrete properties, focusing particularly on its mechanical properties. The basic characteristics of wastewater were studied according to USEPA method while the properties of concrete with wastewater were compared according to ASTM C1602 and BS EN 1008 standards. In this paper, the compressive strength, modulus of elasticity and tensile strength were examined in order to determine the mechanical properties of concrete. The wastewater was replaced in the concrete mix from 0% up to 40%. The results indicated that the characteristics of wastewater complied with the BS and ASTM standards. In addition, the results also recommended that the concrete mixture with 20% of wastewater has given the highest compressive strength and modulus of elasticity.

  20. Effect of industrial wastewater ontotal protein and the peroxidase ...

    African Journals Online (AJOL)

    STORAGESEVER

    2009-10-19

    Oct 19, 2009 ... undergo degradation during wastewater treatment. As these chemicals ... environmental factors, hormonal stimuli and by microbial attack (Nover and ... sowed in plastic pots (10 x 20 cm) containing a mixture of 1:2 perlite-peat.

  1. An Analysis of Cyber-Attack on NPP Considering Physical Impact

    Energy Technology Data Exchange (ETDEWEB)

    Lee, In Hyo; Kang, Hyun Gook [KAIST, Daejeon (Korea, Republic of); Son, Han Seong [Joonbu University, Geumsan (Korea, Republic of)

    2016-05-15

    Some research teams performed related works on cyber-physical system which is a system that cyber-attack can lead to serious consequences including product loss, damage, injury and death when it is attacked. They investigated the physical impact on cyber-physical system due to the cyber-attack. But it is hard to find the research about NPP cyber security considering the physical impact or safety. In this paper, to investigate the relationship between physical impact and cyber-attack, level 1 PSA results are utilized in chapter 2 and cyber-attack analysis is performed in chapter 3. The cyber security issue on NPP is inevitable issue. Unlike general cyber security, cyber-physical system like NPP can induce serious consequences such as core damage by cyber-attack. So in this paper, to find how hacker can attack the NPP, (1) PSA results were utilized to find the relationship between physical system and cyber-attack and (2) vulnerabilities on digital control systems were investigated to find how hacker can implement the possible attack. It is expected that these steps are utilized when establishing penetration test plans or cyber security drill plans.

  2. An Analysis of Cyber-Attack on NPP Considering Physical Impact

    International Nuclear Information System (INIS)

    Lee, In Hyo; Kang, Hyun Gook; Son, Han Seong

    2016-01-01

    Some research teams performed related works on cyber-physical system which is a system that cyber-attack can lead to serious consequences including product loss, damage, injury and death when it is attacked. They investigated the physical impact on cyber-physical system due to the cyber-attack. But it is hard to find the research about NPP cyber security considering the physical impact or safety. In this paper, to investigate the relationship between physical impact and cyber-attack, level 1 PSA results are utilized in chapter 2 and cyber-attack analysis is performed in chapter 3. The cyber security issue on NPP is inevitable issue. Unlike general cyber security, cyber-physical system like NPP can induce serious consequences such as core damage by cyber-attack. So in this paper, to find how hacker can attack the NPP, (1) PSA results were utilized to find the relationship between physical system and cyber-attack and (2) vulnerabilities on digital control systems were investigated to find how hacker can implement the possible attack. It is expected that these steps are utilized when establishing penetration test plans or cyber security drill plans

  3. Water and Wastewater Rate Hikes Outpace CPI

    Energy Technology Data Exchange (ETDEWEB)

    Stratton, Hannah [Lawrence Berkeley National Lab. (LBNL), Berkeley, CA (United States); Fuchs, Heidi [Lawrence Berkeley National Lab. (LBNL), Berkeley, CA (United States); Chen, Yuting [Lawrence Berkeley National Lab. (LBNL), Berkeley, CA (United States); Dunham, Camilla [Lawrence Berkeley National Lab. (LBNL), Berkeley, CA (United States); Williams, Alison [Lawrence Berkeley National Lab. (LBNL), Berkeley, CA (United States)

    2017-08-31

    Water and wastewater treatment and delivery is the most capital-intensive of all utility services. Historically underpriced, water and wastewater rates have exhibited unprecedented growth in the past fifteen years. Steep annual increases in water and wastewater rates that outpace the Consumer Price Index (CPI) have increasingly become the norm across the United States. In this paper, we analyze water and wastewater rates across U.S. census regions between 2000 and 2014. We also examine some of the driving factors behind these rate increases, including drought, water source, required infrastructure investment, population patterns, and conservation effects. Our results demonstrate that water and wastewater prices have consistently increased and have outstripped CPI throughout the study period nationwide, as well as within each census region. Further, evaluation of the current and upcoming challenges facing water and wastewater utilities suggests that sharp rate increases are likely to continue in the foreseeable future.

  4. Removal of basic dye (methylene blue) from wastewaters utilizing beer brewery waste

    International Nuclear Information System (INIS)

    Tsai, W.-T.; Hsu, H.-C.; Su, T.-Y.; Lin, K.-Y.; Lin, C.-M.

    2008-01-01

    In the work, the beer brewery waste has been shown to be a low-cost adsorbent for the removal of basic dye from the aqueous solution as compared to its precursor (i.e., diatomite) based on its physical and chemical characterizations including surface area, pore volume, scanning electron microscopy (SEM), and non-mineral elemental analyses. The pore properties of this waste were significantly larger than those of its raw material, reflecting that the trapped organic matrices contained in the waste probably provided additional adsorption sites and/or adsorption area. The results of preliminary adsorption kinetics showed that the diatomite waste could be directly used as a potential adsorbent for removal of methylene blue on the basis of its adsorption-biosorption mechanisms. The adsorption parameters thus obtained from the pseudo-second-order model were in accordance with their pore properties. From the results of adsorption isotherm at 298 K and the applicability examinations in treating industrial wastewater containing basic dye, it was further found that the adsorption capacities of diatomite waste were superior to those of diatomite, which were also in good agreement with their corresponding physical properties. From the results mentioned above, it is feasible to utilize the food-processing waste for removing dye from the industrial dying wastewater

  5. Removal of basic dye (methylene blue) from wastewaters utilizing beer brewery waste.

    Science.gov (United States)

    Tsai, Wen-Tien; Hsu, Hsin-Chieh; Su, Ting-Yi; Lin, Keng-Yu; Lin, Chien-Ming

    2008-06-15

    In the work, the beer brewery waste has been shown to be a low-cost adsorbent for the removal of basic dye from the aqueous solution as compared to its precursor (i.e., diatomite) based on its physical and chemical characterizations including surface area, pore volume, scanning electron microscopy (SEM), and non-mineral elemental analyses. The pore properties of this waste were significantly larger than those of its raw material, reflecting that the trapped organic matrices contained in the waste probably provided additional adsorption sites and/or adsorption area. The results of preliminary adsorption kinetics showed that the diatomite waste could be directly used as a potential adsorbent for removal of methylene blue on the basis of its adsorption-biosorption mechanisms. The adsorption parameters thus obtained from the pseudo-second-order model were in accordance with their pore properties. From the results of adsorption isotherm at 298 K and the applicability examinations in treating industrial wastewater containing basic dye, it was further found that the adsorption capacities of diatomite waste were superior to those of diatomite, which were also in good agreement with their corresponding physical properties. From the results mentioned above, it is feasible to utilize the food-processing waste for removing dye from the industrial dying wastewater.

  6. Removal of basic dye (methylene blue) from wastewaters utilizing beer brewery waste

    Energy Technology Data Exchange (ETDEWEB)

    Tsai, W.-T. [Graduate Institute of Bioresources, National Pingtung University of Science and Technology, Pingtung 912, Taiwan (China)], E-mail: wttsai@mail.npust.edu.tw; Hsu, H.-C.; Su, T.-Y.; Lin, K.-Y.; Lin, C.-M. [Department of Environmental Engineering and Science, Chia Nan University of Pharmacy and Science, Tainan 717, Taiwan (China)

    2008-06-15

    In the work, the beer brewery waste has been shown to be a low-cost adsorbent for the removal of basic dye from the aqueous solution as compared to its precursor (i.e., diatomite) based on its physical and chemical characterizations including surface area, pore volume, scanning electron microscopy (SEM), and non-mineral elemental analyses. The pore properties of this waste were significantly larger than those of its raw material, reflecting that the trapped organic matrices contained in the waste probably provided additional adsorption sites and/or adsorption area. The results of preliminary adsorption kinetics showed that the diatomite waste could be directly used as a potential adsorbent for removal of methylene blue on the basis of its adsorption-biosorption mechanisms. The adsorption parameters thus obtained from the pseudo-second-order model were in accordance with their pore properties. From the results of adsorption isotherm at 298 K and the applicability examinations in treating industrial wastewater containing basic dye, it was further found that the adsorption capacities of diatomite waste were superior to those of diatomite, which were also in good agreement with their corresponding physical properties. From the results mentioned above, it is feasible to utilize the food-processing waste for removing dye from the industrial dying wastewater.

  7. Estimation of Viable Biomass In Wastewater And Activated Sludge By Determination of ATP, Oxygen Utilization Rate And FDA Hydrolysis

    DEFF Research Database (Denmark)

    Jørgensen, Poul-Erik; Eriksen, T.; Jensen, B.K.

    1992-01-01

    ATP content, oxygen utilization rate (OUR) and fluorescein diacetate (FDA) hydrolysis were tested for the ability to express the amount of viable biomass in wastewater and activated sludge. The relationship between biomass and these activity parameters was established in growth cultures made...... with biomass, while FDA hydrolysis in the sludge failed to show any such correlation. Conversion factors of 3 mg ATP/g dw, 300 mg O2/h g dw and 0.4 A/h (mg dw/ml) for ATP, OUR and FDA methods, respectively, were calculated. When the methods were applied for in situ determinations in four different wastewater...... plants, it was found that ATP content and respiration rate estimated viable biomass to range from 81 to 293 mg dw/g SS for raw wastewater and from 67 to 187 mg dw/g SS for activated sludge with a rather weak correlation between ATP and respiration measurements. The FDA hydrolysis estimated viable biomass...

  8. The Effects of Operational and Environmental Variables on Efficiency of Danish Water and Wastewater Utilities

    Directory of Open Access Journals (Sweden)

    Andrea Guerrini

    2015-06-01

    Full Text Available Efficiency improvement is one of three patterns a public utility should follow in order to get funds for investments realization. The other two are recourse to bank loans or to private equity and tariff increase. Efficiency can be improved, for example, by growth and vertical integration and may be conditioned by environmental variables, such as customer and output density. Prior studies into the effects of these variables on the efficiency of water utilities do not agree on certain points (e.g., scale and economies of scope and rarely consider others (e.g., density economies. This article aims to contribute to the literature by analysing the efficiency of water utilities in Denmark, observing the effects of operational and environmental variables. The method is based on two-stage Data Envelopment Analysis (DEA applied to 101 water utilities. We found that the efficiency of the water sector was not affected by the observed variables, whereas that of wastewater was improved by smaller firm size, vertical integration strategy, and higher population density.

  9. New efficient utility upper bounds for the fully adaptive model of attack trees

    NARCIS (Netherlands)

    Buldas, Ahto; Lenin, Aleksandr

    2013-01-01

    We present a new fully adaptive computational model for attack trees that allows attackers to repeat atomic attacks if they fail and to play on if they are caught and have to pay penalties. The new model allows safer conclusions about the security of real-life systems and is somewhat

  10. An innovative integrated system utilizing solar energy as power for the treatment of decentralized wastewater.

    Science.gov (United States)

    Han, Changfu; Liu, Junxin; Liang, Hanwen; Guo, Xuesong; Li, Lin

    2013-02-01

    This article reports an innovative integrated system utilizing solar energy as power for decentralized wastewater treatment, which consists of an oxidation ditch with double channels and a photovoltaic (PV) system without a storage battery. Because the system operates without a storage battery, which can reduce the cost of the PV system, the solar radiation intensity affects the amount of power output from the PV system. To ensure that the power output is sufficient in all different weather conditions, the solar radiation intensity of 78 W/m2 with 95% confidence interval was defined as a threshold of power output for the PV system according to the monitoring results in this study, and a step power output mode was used to utilize the solar energy as well as possible. The oxidation ditch driven by the PV system without storage battery ran during the day and stopped at night. Therefore, anaerobic, anoxic and aerobic conditions could periodically appear in the oxidation ditch, which was favorable to nitrogen and phosphate removal from the wastewater. The experimental results showed that the system was efficient, achieving average removal efficiencies of 88% COD, 98% NH4+-N, 70% TN and 83% TP, under the loading rates of 140 mg COD/(g MLSS x day), 32 mg NH4+-N/(g MLSS x day), 44 mg TN/(g MLSS x day) and 5 mg TP/(g MLSS x day).

  11. Utilization of Shochu distillery wastewater for production of polyunsaturated fatty acids and xanthophylls using thraustochytrid.

    Science.gov (United States)

    Yamasaki, Takashi; Aki, Tsunehiro; Shinozaki, Masami; Taguchi, Masahiro; Kawamoto, Seiji; Ono, Kazuhisa

    2006-10-01

    The industrial production of barley shochu, a distilled alcoholic beverage, results in distillery waste that is currently incinerated or disposed of in landfills, causing environmental pollution. The supernatant of distillery waste contains organic matter such as proteins ( approximately 2.5%) and amino acids ( approximately 0.2%). This study demonstrates that the utilization of distillery wastewater as a sole nitrogen source enables a marine thraustochytrid, Schizochytrium sp. strain KH105, to propagate and accumulate valuable lipids including docosahexaenoic acid (DHA) and astaxanthin. Under optimized culture conditions, the highest DHA and astaxanthin yields were obtained at 3.4 g/l and 7.7 mg/l, respectively, after 4 or 5 d of cultivation in a 3-l jar fermentor. The chemical oxygen demand of the wastewater was reduced by 35%. About 67% of crude protein content and 85% of total free amino acid content also decreased in the culture supernatant. The thraustochytrid therefore serves to upgrade the distillery by-product to one containing value-added lipids for functional foods as well as to regulate the environmental contamination.

  12. Utilization of wastewater on seed germination and physioogical parameters of rice (Oryza sativa L.)

    Science.gov (United States)

    Huy, V.; Iwai, C. B.

    2018-03-01

    Due to increasing world population and demand, fresh water availability is becoming a limited resource. Reusing wastewater for agriculture has received attention since it contains nutrients, which are beneficial for growing crops. Even though wastewater can be used as the nutrient source for the plant, the toxicity of wastewater can still be a cause for concern and investigation. The main objective of this paper was to assess the effect of different sources of wastewater on the germination of Jasmine rice (KDML105), White rice (Phatum Thani 1), and Sticky rice (RD6) under laboratory conditions. Petri dish cultures were used with various concentrations (0, 50, and 100%) of wastewater collected from swine farm, aquaculture activity, and domestic. Seed germination, root length, shoot length, seed vigor index, fresh weight and dry weight were measured after each experiment. The results have shown that domestic wastewater and aquaculture activity wastewater did not decrease performance of Jasmine rice (KDML105), White rice (Phatum thani 1), and Sticky rice (RD6) while the germination of Jasmine rice (KDML105), White rice (Phatum thani 1), and Sticky rice (RD6) decreased when irrigated with swine farm wastewater. Therefore, using domestic and aquaculture activity wastewater for irrigation are suitable for growth of these crop.

  13. Caffeine in Boston Harbor past and present, assessing its utility as a tracer of wastewater contamination in an urban estuary

    Science.gov (United States)

    Sites throughout Boston Harbor were analyzed for caffeine to assess its utility as a tracer in identifying sources of sanitary wastewater. Caffeine ranged from 15 ng/L in the outer harbor to a high of 185 ng/L in the inner harbor. Inner harbor concentrations were a result of comb...

  14. A Dynamic Programming Model for Internal Attack Detection in Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Qiong Shi

    2017-01-01

    Full Text Available Internal attack is a crucial security problem of WSN (wireless sensor network. In this paper, we focus on the internal attack detection which is an important way to locate attacks. We propose a state transition model, based on the continuous time Markov chain (CTMC, to study the behaviors of the sensors in a WSN under internal attack. Then we conduct the internal attack detection model as the epidemiological model. In this model, we explore the detection rate as the rate of a compromised state transition to a response state. By using the Bellman equation, the utility for the state transitions of a sensor can be written in standard forms of dynamic programming. It reveals a natural way to find the optimal detection rate that is by maximizing the total utility of the compromised state of the node (the sum of current utility and future utility. In particular, we encapsulate the current state, survivability, availability, and energy consumption of the WSN into an information set. We conduct extensive experiments and the results show the effectiveness of our solutions.

  15. Optimal number of energy generators for biogas utilization in wastewater treatment facility

    International Nuclear Information System (INIS)

    Tsagarakis, Konstantinos P.

    2007-01-01

    A technoeconomic analysis has been undertaken considering the optimum number of energy producing generators using biogas coming from anaerobic digestion. Inputs for this analysis originate from available data on the first generator for energy production from biogas, installed in Greece at the wastewater treatment facility of Iraklio city. The data spans a period of 5.5 years of operation. It is concluded that the cost per kWh produced is 0.0876 Euro /kWh if one generator is used covering 15.9% of the facility's needs. If two generators are used, more biogas is utilized contributing 32.6% of the facility's needs at a marginal production cost of 0.0886 Euro /kWh. Similar estimations have been made for scenarios involving up to six generators. In contrast, the marginal cost of conventionally produced energy is 0.1383-0.2483 Euro /kWh

  16. Barriers to Innovation in Urban Wastewater Utilities: Attitudes of Managers in California.

    Science.gov (United States)

    Kiparsky, Michael; Thompson, Barton H; Binz, Christian; Sedlak, David L; Tummers, Lars; Truffer, Bernhard

    2016-06-01

    In many regions of the world, urban water systems will need to transition into fundamentally different forms to address current stressors and meet impending challenges-faster innovation will need to be part of these transitions. To assess the innovation deficit in urban water organizations and to identify means for supporting innovation, we surveyed wastewater utility managers in California. Our results reveal insights about the attitudes towards innovation among decision makers, and how perceptions at the level of individual managers might create disincentives for experimentation. Although managers reported feeling relatively unhindered organizationally, they also spend less time on innovation than they feel they should. The most frequently reported barriers to innovation included cost and financing; risk and risk aversion; and regulatory compliance. Considering these results in the context of prior research on innovation systems, we conclude that collective action may be required to address underinvestment in innovation.

  17. Israeli Adolescents' Coping Strategies in Relation to Terrorist Attacks

    Science.gov (United States)

    Tatar, Moshe; Amram, Sima

    2007-01-01

    Exposure to terrorism seriously threatens the well-being of children and adolescents. Israeli citizens have witnessed massive ongoing terrorist attacks during the last few years. The present research, conducted among 330 Israeli adolescents, examined coping strategies in relation to terrorist attacks. We found that adolescents utilize more…

  18. Defense and attack of complex and dependent systems

    International Nuclear Information System (INIS)

    Hausken, Kjell

    2010-01-01

    A framework is constructed for how to analyze the strategic defense of an infrastructure subject to attack by a strategic attacker. Merging operations research, reliability theory, and game theory for optimal analytical impact, the optimization program for the defender and attacker is specified. Targets can be in parallel, series, combined series-parallel, complex, k-out-of-n redundancy, independent, interdependent, and dependent. The defender and attacker determine how much to invest in defending versus attacking each of multiple targets. A target can have economic, human, and symbolic values, subjectively assessed by the defender and attacker. A contest success function determines the probability of a successful attack on each target, dependent on the investments by the defender and attacker into each target, and on characteristics of the contest. The defender minimizes the expected damage plus the defense costs. The attacker maximizes the expected damage minus the attack costs. Each agent is concerned about how his investments vary across the targets, and the impact on his utilities. Interdependent systems are analyzed where the defense and attack on one target impacts all targets. Dependent systems are analyzed applying Markov analysis and repeated games where a successful attack on one target in the first period impacts the unit costs of defense and attack, and the contest intensity, for the other target in the second period.

  19. Defense and attack of complex and dependent systems

    Energy Technology Data Exchange (ETDEWEB)

    Hausken, Kjell, E-mail: kjell.hausken@uis.n [Faculty of Social Sciences, University of Stavanger, N-4036 Stavanger (Norway)

    2010-01-15

    A framework is constructed for how to analyze the strategic defense of an infrastructure subject to attack by a strategic attacker. Merging operations research, reliability theory, and game theory for optimal analytical impact, the optimization program for the defender and attacker is specified. Targets can be in parallel, series, combined series-parallel, complex, k-out-of-n redundancy, independent, interdependent, and dependent. The defender and attacker determine how much to invest in defending versus attacking each of multiple targets. A target can have economic, human, and symbolic values, subjectively assessed by the defender and attacker. A contest success function determines the probability of a successful attack on each target, dependent on the investments by the defender and attacker into each target, and on characteristics of the contest. The defender minimizes the expected damage plus the defense costs. The attacker maximizes the expected damage minus the attack costs. Each agent is concerned about how his investments vary across the targets, and the impact on his utilities. Interdependent systems are analyzed where the defense and attack on one target impacts all targets. Dependent systems are analyzed applying Markov analysis and repeated games where a successful attack on one target in the first period impacts the unit costs of defense and attack, and the contest intensity, for the other target in the second period.

  20. Utilization of Paper Sludge Wastes for Treatment of Wastewater from Food Processing Industries

    Directory of Open Access Journals (Sweden)

    Tohru Suzuki

    2012-12-01

    Full Text Available The food processing industries usually produced large amount of wastewater containing fine and small particles. It takes long time for complete settlement of the fine and small particles in the wastewater. The coagulation method appears to become one of the useful treatments. New inorganic coagulant named “Agoclean‒P” has been developed from paper sludge ash. The treatment by coagulation and flocculation were carried out for the wastewater from three different food processing industries namely soup, tofu, and natto. “Hi‒Biah‒System”, which is an in‒situ solidification system, was used for the continuous treatment of wastewater. The parameters for the water quality were pH, five‒day biochemical oxygen demand (BOD5, chemical oxygen demand (COD, total suspended solids (TSS, total nitrogen (TN and total phosphorus (TP. These parameters after the treatment became much lower values relative to those obtained before the treatment.

  1. A Reasoning Method of Cyber-Attack Attribution Based on Threat Intelligence

    OpenAIRE

    Li Qiang; Yang Ze-Ming; Liu Bao-Xu; Jiang Zheng-Wei

    2016-01-01

    With the increasing complexity of cyberspace security, the cyber-attack attribution has become an important challenge of the security protection systems. The difficult points of cyber-attack attribution were forced on the problems of huge data handling and key data missing. According to this situation, this paper presented a reasoning method of cyber-attack attribution based on threat intelligence. The method utilizes the intrusion kill chain model and Bayesian network to build attack chain a...

  2. Agricultural use of treated municipal wastewaters preserving environmental sustainability

    OpenAIRE

    Pietro Rubino; Maurizia Catalano; Antonio Lonigro

    2007-01-01

    In this paper the utility of the treated municipal wastewaters in agriculture, analyzing the chemical, physical and microbiological characteristics and their pollution indicators evaluation are being illustrated. Some methods employed for treating wastewaters are examined, as well as instructions and rules actually in force in different countries of the world, for evaluating the legislative hygienic and sanitary and agronomic problems connected with the treated wastewaters use, are being coll...

  3. Spatial Characteristics and Driving Factors of Provincial Wastewater Discharge in China.

    Science.gov (United States)

    Chen, Kunlun; Liu, Xiaoqiong; Ding, Lei; Huang, Gengzhi; Li, Zhigang

    2016-12-09

    Based on the increasing pressure on the water environment, this study aims to clarify the overall status of wastewater discharge in China, including the spatio-temporal distribution characteristics of wastewater discharge and its driving factors, so as to provide reference for developing "emission reduction" strategies in China and discuss regional sustainable development and resources environment policies. We utilized the Exploratory Spatial Data Analysis (ESDA) method to analyze the characteristics of the spatio-temporal distribution of the total wastewater discharge among 31 provinces in China from 2002 to 2013. Then, we discussed about the driving factors, affected the wastewater discharge through the Logarithmic Mean Divisia Index (LMDI) method and classified those driving factors. Results indicate that: (1) the total wastewater discharge steadily increased, based on the social economic development, with an average growth rate of 5.3% per year; the domestic wastewater discharge is the main source of total wastewater discharge, and the amount of domestic wastewater discharge is larger than the industrial wastewater discharge. There are many spatial differences of wastewater discharge among provinces via the ESDA method. For example, provinces with high wastewater discharge are mainly the developed coastal provinces such as Jiangsu Province and Guangdong Province. Provinces and their surrounding areas with low wastewater discharge are mainly the undeveloped ones in Northwest China; (2) The dominant factors affecting wastewater discharge are the economy and technological advance; The secondary one is the efficiency of resource utilization, which brings about the unstable effect; population plays a less important role in wastewater discharge. The dominant driving factors affecting wastewater discharge among 31 provinces are divided into three types, including two-factor dominant type, three-factor leading type and four-factor antagonistic type. In addition, the

  4. Suggestion of a Framework to Analyze Failure Modes and Effect of Cyber Attacks in NPP

    Energy Technology Data Exchange (ETDEWEB)

    Lee, Chan Young; Seong, Poong Hyun [KAIST, Daejeon (Korea, Republic of)

    2016-05-15

    The cyber security issue on NPP is inevitable issue. Unlike general cyber security, cyber-physical system like NPP can induce serious consequences such as core damage by cyber-attack. So in this paper, to find how hacker can attack the NPP, (1) PSA results were utilized to find the relationship between physical system and cyber-attack and (2) vulnerabilities on digital control systems were investigated to find how hacker can implement the possible attack. It is expected that these steps are utilized when establishing penetration test plans or cyber security drill plans.

  5. Suggestion of a Framework to Analyze Failure Modes and Effect of Cyber Attacks in NPP

    International Nuclear Information System (INIS)

    Lee, Chan Young; Seong, Poong Hyun

    2016-01-01

    The cyber security issue on NPP is inevitable issue. Unlike general cyber security, cyber-physical system like NPP can induce serious consequences such as core damage by cyber-attack. So in this paper, to find how hacker can attack the NPP, (1) PSA results were utilized to find the relationship between physical system and cyber-attack and (2) vulnerabilities on digital control systems were investigated to find how hacker can implement the possible attack. It is expected that these steps are utilized when establishing penetration test plans or cyber security drill plans

  6. Opportunities for Automated Demand Response in California Wastewater Treatment Facilities

    Energy Technology Data Exchange (ETDEWEB)

    Aghajanzadeh, Arian [Lawrence Berkeley National Lab. (LBNL), Berkeley, CA (United States); Wray, Craig [Lawrence Berkeley National Lab. (LBNL), Berkeley, CA (United States); McKane, Aimee [Lawrence Berkeley National Lab. (LBNL), Berkeley, CA (United States)

    2015-08-30

    Previous research over a period of six years has identified wastewater treatment facilities as good candidates for demand response (DR), automated demand response (Auto-­DR), and Energy Efficiency (EE) measures. This report summarizes that work, including the characteristics of wastewater treatment facilities, the nature of the wastewater stream, energy used and demand, as well as details of the wastewater treatment process. It also discusses control systems and automated demand response opportunities. Furthermore, this report summarizes the DR potential of three wastewater treatment facilities. In particular, Lawrence Berkeley National Laboratory (LBNL) has collected data at these facilities from control systems, submetered process equipment, utility electricity demand records, and governmental weather stations. The collected data were then used to generate a summary of wastewater power demand, factors affecting that demand, and demand response capabilities. These case studies show that facilities that have implemented energy efficiency measures and that have centralized control systems are well suited to shed or shift electrical loads in response to financial incentives, utility bill savings, and/or opportunities to enhance reliability of service. In summary, municipal wastewater treatment energy demand in California is large, and energy-­intensive equipment offers significant potential for automated demand response. In particular, large load reductions were achieved by targeting effluent pumps and centrifuges. One of the limiting factors to implementing demand response is the reaction of effluent turbidity to reduced aeration at an earlier stage of the process. Another limiting factor is that cogeneration capabilities of municipal facilities, including existing power purchase agreements and utility receptiveness to purchasing electricity from cogeneration facilities, limit a facility’s potential to participate in other DR activities.

  7. The utilization of waste by-products for removing silicate from mineral processing wastewater via chemical precipitation.

    Science.gov (United States)

    Kang, Jianhua; Sun, Wei; Hu, Yuehua; Gao, Zhiyong; Liu, Runqing; Zhang, Qingpeng; Liu, Hang; Meng, Xiangsong

    2017-11-15

    This study investigates an environmentally friendly technology that utilizes waste by-products (waste acid and waste alkali liquids) to treat mineral processing wastewater. Chemical precipitation is used to remove silicate from scheelite (CaWO 4 ) cleaning flotation wastewater and the waste by-products are used as a substitute for calcium chloride (CaCl 2 ). A series of laboratory experiments is conducted to explain the removal of silicate and the characterization and formation mechanism of calcium silicate. The results show that silicate removal reaches 90% when the Ca:Si molar ratio exceeds 1.0. The X-ray diffraction (XRD) results confirm the characterization and formation of calcium silicate. The pH is the key factor for silicate removal, and the formation of polysilicic acid with a reduction of pH can effectively improve the silicate removal and reduce the usage of calcium. The economic analysis shows that the treatment costs with waste acid (0.63 $/m 3 ) and waste alkali (1.54 $/m 3 ) are lower than that of calcium chloride (2.38 $/m 3 ). The efficient removal of silicate is confirmed by industrial testing at a plant. The results show that silicate removal reaches 85% in the recycled water from tailings dam. Copyright © 2017 Elsevier Ltd. All rights reserved.

  8. Wastewater and sludge management and research in Oman: An overview.

    Science.gov (United States)

    Jaffar Abdul Khaliq, Suaad; Ahmed, Mushtaque; Al-Wardy, Malik; Al-Busaidi, Ahmed; Choudri, B S

    2017-03-01

    It is well recognized that management of wastewater and sludge is a critical environmental issue in many countries. Wastewater treatment and sludge production take place under different technical, economic, and social contexts, thus requiring different approaches and involving different solutions. In most cases, a regular and environmentally safe wastewater treatment and associated sludge management requires the development of realistic and enforceable regulations, as well as treatment systems appropriate to local circumstances. The main objective of this paper is to provide useful information about the current wastewater and sludge treatment, management, regulations, and research in Oman. Based on the review and discussion, the wastewater treatment and sludge management in Oman has been evolving over the years. Further, the land application of sewage sludge should encourage revision of existing standards, regulations, and policies for the management and beneficial use of sewage sludge in Oman. Wastewater treatment and sludge management in Oman have been evolving over the years. Sludge utilization has been a challenge due to its association with human waste. Therefore, composting of sewage sludge is the best option in agriculture activities. Sludge and wastewater utilization can add up positively in the economic aspects of the country in terms of creating jobs and improving annual income rate. The number of research projects done on wastewater reuse and other ongoing ones related to the land application of sewage sludge should encourage revision of existing standards, regulations, and policies for the management and beneficial use of sewage sludge in Oman.

  9. Solutions to microplastic pollution - Removal of microplastics from wastewater effluent with advanced wastewater treatment technologies.

    Science.gov (United States)

    Talvitie, Julia; Mikola, Anna; Koistinen, Arto; Setälä, Outi

    2017-10-15

    Conventional wastewater treatment with primary and secondary treatment processes efficiently remove microplastics (MPs) from the wastewater. Despite the efficient removal, final effluents can act as entrance route of MPs, given the large volumes constantly discharged into the aquatic environments. This study investigated the removal of MPs from effluent in four different municipal wastewater treatment plants utilizing different advanced final-stage treatment technologies. The study included membrane bioreactor treating primary effluent and different tertiary treatment technologies (discfilter, rapid sand filtration and dissolved air flotation) treating secondary effluent. The MBR removed 99.9% of MPs during the treatment (from 6.9 to 0.005 MP L -1 ), rapid sand filter 97% (from 0.7 to 0.02 MP L -1 ), dissolved air flotation 95% (from 2.0 to 0.1 MP L -1 ) and discfilter 40-98.5% (from 0.5 - 2.0 to 0.03-0.3 MP L -1 ) of the MPs during the treatment. Our study shows that with advanced final-stage wastewater treatment technologies WWTPs can substantially reduce the MP pollution discharged from wastewater treatment plants into the aquatic environments. Copyright © 2017 Elsevier Ltd. All rights reserved.

  10. A study on the treatment of industrial wastewater containing heavy metals

    International Nuclear Information System (INIS)

    Yoon, Myoung Hwan; Jang, In Soon; Park, Jang Jin; Choi, Chang Shik; Lee, Yoon Hwan; Shin, Jin Myoung

    1993-06-01

    It is essential to treat heavy metals contained in industrial wastewater safely and economically for the protection of the environment. An effective method of separating heavy metals using acornic acid for the first time in the world must be utilized for wastewater treatment. One of the merits of this method lies in its cheap treatment cost. Furthermore, the secondary contamination, which occurs often when chemical purifiers are used, could be minimized. Another advantage of utilizing the acornic acid is that various kinds of heavy metals contained in industrial wastewater can be purified at once. The final purpose of this project is to commercialize the method by 1994. (Auther)

  11. Advanced wastewater treatment system (SEADS)

    International Nuclear Information System (INIS)

    Dunn, J.

    2002-01-01

    'Full text:' This presentation will describe the nature, scope, and findings of a third-party evaluation of a wastewater treatment technology identified as the Advanced Wastewater Treatment System Inc.'s Superior Extended Aerobic Digester System (SEADS). SEADS is an advanced miniaturized wastewater treatment plant that can meet advanced wastewater treatment standards for effluent public reuse. SEADS goes beyond primary and secondary treatment operations to reduce nutrients such as nitrogen and phosphorus, which are typically found in excessive quantities in traditional wastewater treatment effluent. The objective of this evaluation will be to verify the performance and reliability of the SEADS to treat wastewater from a variety of sources, including domestic wastewater and commercial industrial wastewater. SEADS utilizes remote telemetry equipment to achieve added reliability and reduces monitoring costs as compared to many package wastewater treatment plants. The evaluation process will be overseen and coordinated by the Environmental Technology Evaluation Center (EvTEC), a program of the Civil Engineering Research Foundation (CERF), the research and technology transfer arm of the American Society of Civil Engineers (ASCE). EvTEC is a pilot program evaluating innovative environmental technologies under the US Environmental Protection Agency's (USEPA) Environmental Technology Verification (ETV) Program. Among other performance issues, the SEADS technology evaluation will address its ability to treat low flows-from remote individual and clustered housing applications, and individual commercial applications in lieu of a main station conventional wastewater treatment plant. The unneeded reliance on particular soil types for percolation and the improved effluent water quality over septic systems alone look to make these types of package treatment plants a viable option for rural communities, small farms, and other low-flow remote settings. Added benefits to be examined

  12. Opportunities and Challenges for Water and Wastewater Industries to Provide Exchangeable Services

    Energy Technology Data Exchange (ETDEWEB)

    Sparn, Bethany [National Renewable Energy Lab. (NREL), Golden, CO (United States); Hunsberger, Randolph [National Renewable Energy Lab. (NREL), Golden, CO (United States)

    2015-11-13

    Water and wastewater treatment plants and distribution systems use significant amounts of energy, around 2 - 4% of the total electricity used in the US, and their energy use is projected to increase as populations increase and regulations become more stringent. Water and wastewater systems have largely been disconnected from the electric utilities' efforts to improve energy efficiency and provide energy efficiency and provide grid services, likely because their core mission is to provide clean water and treated wastewater. Energy efficiency has slowly crept into the water and wastewater industry as the economic benefit has become more apparent, but there is still potential for significant improvement. Some of the larger, more progressive water utilities are starting to consider providing grid services; however, it remains a foreign concept to many. This report explores intrinsic mechanisms by which the water and wastewater industries can provide exchangeable services, the benefit to the parties involved, and the barriers to implementation. It also highlights relevant case studies and next steps. Although opportunities for increasing process efficiencies are certainly available, this report focuses on the exchangeable services that water and wastewater loads can provide to help maintain grid reliability, keep overall costs down, and increase the penetration of distributed renewables on the electric grid. These services have potential to provide water utilities additional value streams, using existing equipment with modest or negligible upgrade cost.

  13. Comprehensive techno-economic analysis of wastewater-based algal biofuel production: A case study.

    Science.gov (United States)

    Xin, Chunhua; Addy, Min M; Zhao, Jinyu; Cheng, Yanling; Cheng, Sibo; Mu, Dongyan; Liu, Yuhuan; Ding, Rijia; Chen, Paul; Ruan, Roger

    2016-07-01

    Combining algae cultivation and wastewater treatment for biofuel production is considered the feasible way for resource utilization. An updated comprehensive techno-economic analysis method that integrates resources availability into techno-economic analysis was employed to evaluate the wastewater-based algal biofuel production with the consideration of wastewater treatment improvement, greenhouse gases emissions, biofuel production costs, and coproduct utilization. An innovative approach consisting of microalgae cultivation on centrate wastewater, microalgae harvest through flocculation, solar drying of biomass, pyrolysis of biomass to bio-oil, and utilization of co-products, was analyzed and shown to yield profound positive results in comparison with others. The estimated break even selling price of biofuel ($2.23/gallon) is very close to the acceptable level. The approach would have better overall benefits and the internal rate of return would increase up to 18.7% if three critical components, namely cultivation, harvest, and downstream conversion could achieve breakthroughs. Copyright © 2016 Elsevier Ltd. All rights reserved.

  14. Active Detection for Exposing Intelligent Attacks in Control Systems

    Energy Technology Data Exchange (ETDEWEB)

    Weerakkody, Sean [Carnegie Mellon Univ., Pittsburgh, PA (United States); Ozel, Omur [Carnegie Mellon Univ., Pittsburgh, PA (United States); Griffioen, Paul [Carnegie Mellon Univ., Pittsburgh, PA (United States); Sinopoli, Bruno [Carnegie Mellon Univ., Pittsburgh, PA (United States)

    2017-07-01

    In this paper, we consider approaches for detecting integrity attacks carried out by intelligent and resourceful adversaries in control systems. Passive detection techniques are often incorporated to identify malicious behavior. Here, the defender utilizes finely-tuned algorithms to process information and make a binary decision, whether the system is healthy or under attack. We demonstrate that passive detection can be ineffective against adversaries with model knowledge and access to a set of input/output channels. We then propose active detection as a tool to detect attacks. In active detection, the defender leverages degrees of freedom he has in the system to detect the adversary. Specifically, the defender will introduce a physical secret kept hidden from the adversary, which can be utilized to authenticate the dynamics. In this regard, we carefully review two approaches for active detection: physical watermarking at the control input, and a moving target approach for generating system dynamics. We examine practical considerations for implementing these technologies and discuss future research directions.

  15. Utilization of brewery wastewater for culturing yeast cells for use in river water remediation.

    Science.gov (United States)

    Chang, Su-Yun; Sun, Jing-Mei; Song, Shu-Qiang; Sun, Bao-Sheng

    2012-01-01

    Successful in situ bio-augmentation of contaminated river water involves reducing the cost of the bio-agent. In this study, brewery wastewater was used to culture yeast cells for degrading the COD(Cr) from a contaminated river. The results showed that 15 g/L of yeast cells could be achieved after being cultured in the autoclaved brewery wastewater with 5 mL/L of saccharified starch and 9 g/L of corn steep liquor. The COD(Cr) removal efficiency was increased from 22% to 33% when the cells were cultured using the mentioned method. Based on the market price of materials used in this method, the cost of the medium for remediating 1 m3 of river water was 0.0076 US dollars. If the additional cost of field implementation is included, the total cost is less than 0.016 US dollars for treating 1 m3 of river water. The final cost was dependent on the size of remediation: the larger the scale, the lower the cost. By this method, the nutrient in the brewery wastewater was reused, the cost of brewery wastewater treatment was saved and the cost of the remediation using bio-augmentation was reduced. Hence, it is suggested that using brewery wastewater to culture a bio-agent for bio-augmentation is a cost-effective method.

  16. Behavioral Modeling of WSN MAC Layer Security Attacks: A Sequential UML Approach

    DEFF Research Database (Denmark)

    Pawar, Pranav M.; Nielsen, Rasmus Hjorth; Prasad, Neeli R.

    2012-01-01

    is the vulnerability to security attacks/threats. The performance and behavior of a WSN are vastly affected by such attacks. In order to be able to better address the vulnerabilities of WSNs in terms of security, it is important to understand the behavior of the attacks. This paper addresses the behavioral modeling...... of medium access control (MAC) security attacks in WSNs. The MAC layer is responsible for energy consumption, delay and channel utilization of the network and attacks on this layer can introduce significant degradation of the individual sensor nodes due to energy drain and in performance due to delays....... The behavioral modeling of attacks will be beneficial for designing efficient and secure MAC layer protocols. The security attacks are modeled using a sequential diagram approach of Unified Modeling Language (UML). Further, a new attack definition, specific to hybrid MAC mechanisms, is proposed....

  17. Efficacies of Various Anaerobic Starter Seeds for Biogas Production from Different Types of Wastewater

    Directory of Open Access Journals (Sweden)

    Pawinee Chaiprasert

    2017-01-01

    Full Text Available Various anaerobic starter seeds from different sources were investigated for their efficacies in treatment of different types of wastewater. Six combinations of starter seeds and wastewaters were selected out of 25 combination batch experiments and operated in semicontinuous reactors. It was noticed that the efficacies of various anaerobic starter seeds for biogas production from different types of wastewater in terms of reactor performance and stability were depended on wastewater characteristics and F/M ratio affecting microbial community and their microbial activities. However, exogenous starter seed can be used across different types of wastewater with or without acclimatization. Four reactors reached the targeted OLR of 2 kg COD/m3·d with high performance and stability except for concentrated rubber wastewater (RBw, even using high active starter seeds of cassava starch (CSs and palm oil (POs. The toxic compounds in RBw such as ammonia and sulfate might also adversely affect methanogenic activity in CSsRBw and POsRBw reactors. DGGE analysis showed that propionate utilizers, Smithella propionica strain LYP and Syntrophus sp., were detected in all samples. For Archaea domain, methylotrophic, hydrogenotrophic, and acetoclastic methanogens were also detected. Syntrophic relationships were assumed between propionate utilizers and methanogens as acetate/H2 producers and utilizers, respectively.

  18. Cooperative Electronic Attack using Unmanned Air Vehicles

    National Research Council Canada - National Science Library

    Mears, Mark J

    2006-01-01

    ... that are salient in the context of cooperative control. The utility of electronic attack is described in the context of integrated air defense systems that rely on RADAR sites that act as a network to gather information about potential airborne threats...

  19. Command Disaggregation Attack and Mitigation in Industrial Internet of Things

    Directory of Open Access Journals (Sweden)

    Peng Xun

    2017-10-01

    Full Text Available A cyber-physical attack in the industrial Internet of Things can cause severe damage to physical system. In this paper, we focus on the command disaggregation attack, wherein attackers modify disaggregated commands by intruding command aggregators like programmable logic controllers, and then maliciously manipulate the physical process. It is necessary to investigate these attacks, analyze their impact on the physical process, and seek effective detection mechanisms. We depict two different types of command disaggregation attack modes: (1 the command sequence is disordered and (2 disaggregated sub-commands are allocated to wrong actuators. We describe three attack models to implement these modes with going undetected by existing detection methods. A novel and effective framework is provided to detect command disaggregation attacks. The framework utilizes the correlations among two-tier command sequences, including commands from the output of central controller and sub-commands from the input of actuators, to detect attacks before disruptions occur. We have designed components of the framework and explain how to mine and use these correlations to detect attacks. We present two case studies to validate different levels of impact from various attack models and the effectiveness of the detection framework. Finally, we discuss how to enhance the detection framework.

  20. Command Disaggregation Attack and Mitigation in Industrial Internet of Things.

    Science.gov (United States)

    Xun, Peng; Zhu, Pei-Dong; Hu, Yi-Fan; Cui, Peng-Shuai; Zhang, Yan

    2017-10-21

    A cyber-physical attack in the industrial Internet of Things can cause severe damage to physical system. In this paper, we focus on the command disaggregation attack, wherein attackers modify disaggregated commands by intruding command aggregators like programmable logic controllers, and then maliciously manipulate the physical process. It is necessary to investigate these attacks, analyze their impact on the physical process, and seek effective detection mechanisms. We depict two different types of command disaggregation attack modes: (1) the command sequence is disordered and (2) disaggregated sub-commands are allocated to wrong actuators. We describe three attack models to implement these modes with going undetected by existing detection methods. A novel and effective framework is provided to detect command disaggregation attacks. The framework utilizes the correlations among two-tier command sequences, including commands from the output of central controller and sub-commands from the input of actuators, to detect attacks before disruptions occur. We have designed components of the framework and explain how to mine and use these correlations to detect attacks. We present two case studies to validate different levels of impact from various attack models and the effectiveness of the detection framework. Finally, we discuss how to enhance the detection framework.

  1. Utilization of Gamma Radiation for Disinfecting Domestic Wastewater

    International Nuclear Information System (INIS)

    Aldehmani, K.; Abokhabta, S.; Rahil, E.; Elammari, M.; Aboudeeb, F.

    2004-01-01

    Wastewater treatment by Gamma radiation is an effective, economic and environmentally friendly as the water produced has the specification to be reused for watering trees, gardens, football fields and golf courses instead of using fresh water that can be saved for drinking purposes as we suffer a severe shortage of fresh water. Sewage water samples were brought from Elhadba Elkhadra wastewater treatment plant which is located in the City of Tripoli. Samples were taken from two places: the inlet of the plant and from the stream coming out from the biological treatment, they are taken in sterile plastic bottles to ensure that cross contamination does not take place. Samples were irradiated at Tajura Research Centre with different doses ranged between 0.5 and 2 kGy with a dose rate of 10 Gy/min. These samples were investigated chemically and microbiologically. A study was carried out on the effect of gamma radiation on pathogenic organisms, and the total suspended solids in the raw and treated samples. Results showed that the doses 2.0 kGy and 1.5 kGy were enough to terminate the total microbial count and Enterobacter ease respectively but only a dose of 1.0 kGy was needed to eliminate total coliform, fecal coliform and spore forming bacteria. There were also higher BOD, pH and E.C. values in raw sewage than the sewage that was subjected to biological treatment which gave a good indication for the efficiency of the biological treatment. (authors)

  2. Utilization of municipal wastewater for cooling in thermoelectric power plants

    Energy Technology Data Exchange (ETDEWEB)

    Safari, Iman [Illinois Inst. of Technology, Chicago, IL (United States); Walker, Michael E. [Illinois Inst. of Technology, Chicago, IL (United States); Hsieh, Ming-Kai [Carnegie Mellon Univ., Pittsburgh, PA (United States); Dzombak, David A. [Carnegie Mellon Univ., Pittsburgh, PA (United States); Liu, Wenshi [Univ. of Pittsburgh, PA (United States); Vidic, Radisav D. [Univ. of Pittsburgh, PA (United States); Miller, David C. [National Energy Technology Lab. (NETL), Morgantown, WV (United States); Abbasian, Javad [Illinois Inst. of Technology, Chicago, IL (United States)

    2013-09-01

    A process simulation model has been developed using Aspen Plus® with the OLI (OLI System, Inc.) water chemistry model to predict water quality in the recirculating cooling loop utilizing secondary- and tertiary-treated municipal wastewater as the source of makeup water. Simulation results were compared with pilot-scale experimental data on makeup water alkalinity, loop pH, and ammonia evaporation. The effects of various parameters including makeup water quality, salt formation, NH3 and CO2 evaporation mass transfer coefficients, heat load, and operating temperatures were investigated. The results indicate that, although the simulation model can capture the general trends in the loop pH, experimental data on the rates of salt precipitation in the system are needed for more accurate prediction of the loop pH. It was also found that stripping of ammonia and carbon dioxide in the cooling tower can influence the cooling loop pH significantly. The effects of the NH3 mass transfer coefficient on cooling loop pH appear to be more significant at lower values (e.g., kNH3 < 4×10-3 m/s) when the makeup water alkalinity is low (e.g., <90 mg/L as CaCO3). The effect of the CO2 mass transfer coefficient was found to be significant only at lower alkalinity values (e.g., kCO2<4×10-6 m/s).

  3. Green Systems for Wastewater Treatment

    Science.gov (United States)

    Environmental Science and Technology, 1975

    1975-01-01

    Plants found in marshlands and wetlands in many parts of the world may play an increasing part in a very new, yet very old approach to treatment of water and wastewater--the application of biological methods. Biological water pollution control methods being utilized around the world are examined. (BT)

  4. Estimation of EuroQol 5-Dimensions health status utility values in hereditary angioedema.

    Science.gov (United States)

    Aygören-Pürsün, Emel; Bygum, Anette; Beusterien, Kathleen; Hautamaki, Emily; Sisic, Zlatko; Boysen, Henrik B; Caballero, Teresa

    2016-01-01

    To estimate health status utility (preference) weights for hereditary angioedema (HAE) during an attack and between attacks using data from the Hereditary Angioedema Burden of Illness Study in Europe (HAE-BOIS-Europe) survey. Utility measures quantitatively describe the net impact of a condition on a patient's life; a score of 0.0 reflects death and 1.0 reflects full health. The HAE-BOIS-Europe was a cross-sectional survey conducted in Spain, Germany, and Denmark to assess the real-world experience of HAE from the patient perspective. Survey items that overlapped conceptually with the EuroQol 5-Dimensions (EQ-5D) domains (pain/discomfort, mobility, self-care, usual activities, and anxiety/depression) were manually crosswalked to the corresponding UK population-based EQ-5D utility weights. EQ-5D utilities were computed for each respondent in the HAE-BOIS-Europe survey for acute attacks and between attacks. Overall, a total of 111 HAE-BOIS-Europe participants completed all selected survey items and thus allowed for computation of EQ-5D-based utilities. The mean utilities for an HAE attack and between attacks were 0.44 and 0.72, respectively. Utilities for an acute attack were dependent on the severity of pain of the last attack (0.61 for no pain or mild pain, 0.47 for moderate pain, and 0.08 for severe pain). There were no significant differences across countries. Mean utilities derived from the study approach compare sensibly with other disease states for both acute attacks and between attacks. The impacts of HAE translate into substantial health status disutilities associated with acute attacks as well as between attacks, documenting that the detrimental effects of HAE are meaningful from the patient perspective. Results were consistent across countries with regard to pain severity and in comparison to similar disease states. The results can be used to raise awareness of HAE as a serious disease with wide-ranging personal and social impacts.

  5. Thermochemical Wastewater Valorization via Enhanced Microbial Toxicity Tolerance

    Energy Technology Data Exchange (ETDEWEB)

    Beckham, Gregg T [National Renewable Energy Laboratory (NREL), Golden, CO (United States); Thelhawadigedara, Lahiru Niroshan Jayakody [National Renewable Energy Laboratory (NREL), Golden, CO (United States); Johnson, Christopher W [National Renewable Energy Laboratory (NREL), Golden, CO (United States); Pleitner, Brenna P [National Renewable Energy Laboratory (NREL), Golden, CO (United States); Cleveland, Nicholas S [National Renewable Energy Laboratory (NREL), Golden, CO (United States); Michener, William E [National Renewable Energy Laboratory (NREL), Golden, CO (United States); Olstad-Thompson, Jessica L [National Renewable Energy Laboratory (NREL), Golden, CO (United States); Vardon, Derek R [National Renewable Energy Laboratory (NREL), Golden, CO (United States); Whitham, Jason M. [Oak Ridge National Laboratory; Giannone, Richard J. [Oak Ridge National Laboratory; Klingeman, Dawn M. [Oak Ridge National Laboratory; Brown, Robert C. [Iowa State University; Brown, Steven D. [Oak Ridge National Laboratory; LanzaTech, Inc.; Hettich, Robert L. [Oak Ridge National Laboratory; Guss, Adam M. [Oak Ridge National Laboratory

    2018-04-17

    Thermochemical (TC) biomass conversion processes such as pyrolysis and liquefaction generate considerable amounts of wastewater, which often contains highly toxic compounds that are incredibly challenging to convert via standard wastewater treatment approaches such as anaerobic digestion. These streams represent a cost for TC biorefineries, and a potential valorization opportunity, if effective conversion methods are developed. The primary challenge hindering microbial conversion of TC wastewater is toxicity. In this study, we employ a robust bacterium, Pseudomonas putida, with TC wastewater streams to demonstrate that aldehydes are the most inhibitory compounds in these streams. Proteomics, transcriptomics, and fluorescence-based immunoassays of P. putida grown in a representative wastewater stream indicate that stress results from protein damage, which we hypothesize is a primary toxicity mechanism. Constitutive overexpression of the chaperone genes, groEL, groES, and clpB, in a genome-reduced P. putida strain improves the tolerance towards multiple TC wastewater samples up to 200-fold. Moreover, the concentration ranges of TC wastewater are industrially relevant for further bioprocess development for all wastewater streams examined here, representing different TC process configurations. Furthermore, we demonstrate proof-of-concept polyhydroxyalkanoate production from the usable carbon in an exemplary TC wastewater stream. Overall, this study demonstrates that protein quality control machinery and repair mechanisms can enable substantial gains in microbial tolerance to highly toxic substrates, including heterogeneous waste streams. When coupled to other metabolic engineering advances such as expanded substrate utilization and enhanced product accumulation, this study generally enables new strategies for biological conversion of highly-toxic, organic-rich wastewater via engineered aerobic monocultures or designer consortia.

  6. Rising Trend: Complex and sophisticated attack methods

    Indian Academy of Sciences (India)

    Stux, DuQu, Nitro, Luckycat, Exploit Kits, FLAME. ADSL/SoHo Router Compromise. Botnets of compromised ADSL/SoHo Routers; User Redirection via malicious DNS entry. Web Application attacks. SQL Injection, RFI etc. More and more Webshells. More utility to hackers; Increasing complexity and evading mechanisms.

  7. Resilience of LTE networks against smart jamming attacks

    KAUST Repository

    Aziz, Farhan M.

    2014-12-08

    Commercial LTE networks are being studied for mission-critical applications, such as public safety and smart grid communications. In this paper, LTE networks are shown vulnerable to Denial-of-Service (DOS) and loss of service attacks from smart jammers, who may employ simple narrowband jamming techniques to attack without any need to hack the network or its users. We modeled the utilities of jamming and anti-jamming actions played by the jammer and the network under the framework of single-shot and repeated Bayesian games. In a single-shot game formulation the only Nash Equilibria (NE) are pure strategy equilibria at which network utility is severely compromised. We propose a repeated-game learning and strategy algorithm for the network that outperforms single-shot games by a significant margin. Furthermore, all of our proposed actions and algorithms can be implemented with current technology.

  8. Vulnerability of water supply systems to cyber-physical attacks

    Science.gov (United States)

    Galelli, Stefano; Taormina, Riccardo; Tippenhauer, Nils; Salomons, Elad; Ostfeld, Avi

    2016-04-01

    The adoption of smart meters, distributed sensor networks and industrial control systems has largely improved the level of service provided by modern water supply systems. Yet, the progressive computerization exposes these critical infrastructures to cyber-physical attacks, which are generally aimed at stealing critical information (cyber-espionage) or causing service disruption (denial-of-service). Recent statistics show that water and power utilities are undergoing frequent attacks - such as the December power outage in Ukraine - , attracting the interest of operators and security agencies. Taking the security of Water Distribution Networks (WDNs) as domain of study, our work seeks to characterize the vulnerability of WDNs to cyber-physical attacks, so as to conceive adequate defense mechanisms. We extend the functionality of EPANET, which models hydraulic and water quality processes in pressurized pipe networks, to include a cyber layer vulnerable to repeated attacks. Simulation results on a medium-scale network show that several hydraulic actuators (valves and pumps, for example) can be easily attacked, causing both service disruption - i.e., water spillage and loss of pressure - and structural damages - e.g., pipes burst. Our work highlights the need for adequate countermeasures, such as attacks detection and reactive control systems.

  9. Aftermath of bustamante attack on genomic beacon service.

    Science.gov (United States)

    Aziz, Md Momin Al; Ghasemi, Reza; Waliullah, Md; Mohammed, Noman

    2017-07-26

    With the enormous need for federated eco-system for holding global genomic and clinical data, Global Alliance for Genomic and Health (GA4GH) has created an international website called beacon service which allows a researcher to find out whether a specific dataset can be utilized to his or her research beforehand. This simple webservice is quite useful as it allows queries like whether a certain position of a target chromosome has a specific nucleotide. However, the increased integration of individuals genomic data into clinical practice and research raised serious privacy concern. Though the answer of such queries are yes or no in Bacon network, it results in serious privacy implication as demonstrated in a recent work from Shringarpure and Bustamante. In their attack model, the authors demonstrated that with a limited number of queries, presence of an individual in any dataset can be determined. We propose two lightweight algorithms (based on randomized response) which captures the efficacy while preserving the privacy of the participants in a genomic beacon service. We also elaborate the strength and weakness of the attack by explaining some of their statistical and mathematical models using real world genomic database. We extend their experimental simulations for different adversarial assumptions and parameters. We experimentally evaluated the solutions on the original attack model with different parameters for better understanding of the privacy and utility tradeoffs provided by these two methods. Also, the statistical analysis further elaborates the different aspects of the prior attack which leads to a better risk management for the participants in a beacon service. The differentially private and lightweight solutions discussed here will make the attack much difficult to succeed while maintaining the fundamental motivation of beacon database network.

  10. Utilization of Waste Materials for Microbial Carrier in Wastewater Treatment

    Directory of Open Access Journals (Sweden)

    H. T. Le

    2016-01-01

    Full Text Available This research focused on the ammonium-nitrogen (NH4-N removal from the domestic wastewater using the attached growth reactors. Two types of waste material of corncob (biodegradable material and concrete (nonbiodegradable material were used as the carrier for microorganisms’ attachment. During operation, both reactors achieved absolutely high performance of ammonium removal (up to 99% and total nitrogen removal (up to 95%. The significant advantage of corncob carrier was that the corncob was able to be a source of carbon for biological denitrification, leading to no external carbon requirement for operating the system. However, the corncob caused an increasing turbidity of the effluent. On the other hand, the concrete carrier required the minimal external carbon of 3.5 C/N ratio to reach the good performance. Moreover, a longer period for microorganisms’ adaptation was found in the concrete carrier rather than the corncob carrier. Further, the same physiological and biochemical characteristics of active bacteria were found at the two carriers, which were negative gram, cocci shape, and smooth and white-turbid colony. Due to the effluent quality, the concrete was more appropriate carrier than the corncob for wastewater treatment.

  11. Multilevel Modeling of Distributed Denial of Service Attacks in Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Katarzyna Mazur

    2016-01-01

    Full Text Available The growing popularity of wireless sensor networks increases the risk of security attacks. One of the most common and dangerous types of attack that takes place these days in any electronic society is a distributed denial of service attack. Due to the resource constraint nature of mobile sensors, DDoS attacks have become a major threat to its stability. In this paper, we established a model of a structural health monitoring network, being disturbed by one of the most common types of DDoS attacks, the flooding attack. Through a set of simulations, we explore the scope of flood-based DDoS attack problem, assessing the performance and the lifetime of the network under the attack condition. To conduct our research, we utilized the Quality of Protection Modeling Language. With the proposed approach, it was possible to examine numerous network configurations, parameters, attack options, and scenarios. The results of the carefully performed multilevel analysis allowed us to identify a new kind of DDoS attack, the delayed distributed denial of service, by the authors, referred to as DDDoS attack. Multilevel approach to DDoS attack analysis confirmed that, examining endangered environments, it is significant to take into account many characteristics at once, just to not overlook any important aspect.

  12. VTAC: virtual terrain assisted impact assessment for cyber attacks

    Science.gov (United States)

    Argauer, Brian J.; Yang, Shanchieh J.

    2008-03-01

    Overwhelming intrusion alerts have made timely response to network security breaches a difficult task. Correlating alerts to produce a higher level view of intrusion state of a network, thus, becomes an essential element in network defense. This work proposes to analyze correlated or grouped alerts and determine their 'impact' to services and users of the network. A network is modeled as 'virtual terrain' where cyber attacks maneuver. Overlaying correlated attack tracks on virtual terrain exhibits the vulnerabilities exploited by each track and the relationships between them and different network entities. The proposed impact assessment algorithm utilizes the graph-based virtual terrain model and combines assessments of damages caused by the attacks. The combined impact scores allow to identify severely damaged network services and affected users. Several scenarios are examined to demonstrate the uses of the proposed Virtual Terrain Assisted Impact Assessment for Cyber Attacks (VTAC).

  13. Energy Efficiency Strategies for Municipal Wastewater Treatment Facilities

    Energy Technology Data Exchange (ETDEWEB)

    Daw, J.; Hallett, K.; DeWolfe, J.; Venner, I.

    2012-01-01

    Water and wastewater systems are significant energy consumers with an estimated 3%-4% of total U.S. electricity consumption used for the movement and treatment of water and wastewater. Water-energy issues are of growing importance in the context of water shortages, higher energy and material costs, and a changing climate. In this economic environment, it is in the best interest for utilities to find efficiencies, both in water and energy use. Performing energy audits at water and wastewater treatment facilities is one way community energy managers can identify opportunities to save money, energy, and water. In this paper the importance of energy use in wastewater facilities is illustrated by a case study of a process energy audit performed for Crested Butte, Colorado's wastewater treatment plant. The energy audit identified opportunities for significant energy savings by looking at power intensive unit processes such as influent pumping, aeration, ultraviolet disinfection, and solids handling. This case study presents best practices that can be readily adopted by facility managers in their pursuit of energy and financial savings in water and wastewater treatment. This paper is intended to improve community energy managers understanding of the role that the water and wastewater sector plays in a community's total energy consumption. The energy efficiency strategies described provide information on energy savings opportunities, which can be used as a basis for discussing energy management goals with water and wastewater treatment facility managers.

  14. Strategic defense and attack for reliability systems

    International Nuclear Information System (INIS)

    Hausken, Kjell

    2008-01-01

    This article illustrates a method by which arbitrarily complex series/parallel reliability systems can be analyzed. The method is illustrated with the series-parallel and parallel-series systems. Analytical expressions are determined for the investments and utilities of the defender and the attacker, depend on their unit costs of investment for each component, the contest intensity for each component, and their evaluations of the value of system functionality. For a series-parallel system, infinitely many components in parallel benefit the defender maximally regardless of the finite number of parallel subsystems in series. Conversely, infinitely many components in series benefit the attacker maximally regardless of the finite number of components in parallel in each subsystem. For a parallel-series system, the results are opposite. With equivalent components, equal unit costs for defender and attacker, equal intensity for all components, and equally many components in series and parallel, the defender always prefers the series-parallel system rather than the parallel-series system, and converse holds for the attacker. Hence from the defender's perspective, ceteris paribus, the series-parallel system is more reliable, and has fewer 'cut sets' or failure modes

  15. The Tokyo subway sarin attack-lessons learned

    International Nuclear Information System (INIS)

    Okumura, T.; Hisaoka, T.; Yamada, A.; Naito, T.; Isonuma, H.; Okumura, S.; Miura, K.; Sakurada, M.; Maekawa, H.; Ishimatsu, S.; Takasu, N.; Suzuki, K.

    2005-01-01

    The sarin gas attack in the Tokyo subway system is reviewed from a clinical toxicology perspective. Based on the lessons learned from this attack, the following areas should be addressed on a global scale. First, an adequate supply of protective equipment is required, including level B protective equipment with a pressure demand breathing apparatus. In addition, a system should be established that enables a possible cause to be determined based on symptoms, physical findings, general laboratory tests, and a simple qualitative analysis for poisonous substances. If an antidote is needed, the system should enable it to be administered to the victims as quickly as possible. Preparation for a large-scale chemical attack by terrorists requires the prior establishment of a detailed decontamination plan that utilizes not only mass decontamination facilities but also public facilities in the area. A system should be established for summarizing, evaluating, and disseminating information on poisonous substances. Finally, a large-scale scientific investigation of the Tokyo sarin attack should be conducted to examine its long-term and subclinical effects and the effects of exposure to asymptomatic low levels of sarin

  16. Decomposition of colored wastewater for recycling water by gamma-ray irradiation

    International Nuclear Information System (INIS)

    Tanabe, Hiroko; Sekiguchi, Masayuki; Sawai, Teruko

    1995-01-01

    Utilization of advanced treated water from wastewater treatment plants for the restoration of waterway is in progress to improve the waterside environment. However, the colored wastewater containing molasses pigments, melanoidins, is not decolorized by activated sludge process, and the water can not be applied for recycling water. We have studied the radiation treatment for decolorization of wastewater discharged from baker's yeast factory. The decolorization after decomposition of colored biorefractory organic substances in wastewater, enhancement in biodegradability and effective decrease in values of COD were observed after gammaray irradiation. Although the decrease in values of COD was observed, however chromaticity was not improved after the combined treatment of wastewater by radiation together with activated sludge. The result suggests that it is necessary to find the optimum conditions for stimulation of sludge in the combined treatment. (author)

  17. Utilization of the high energy electrons beams generated in accelerator for treatment of drinking water and wastewater

    International Nuclear Information System (INIS)

    Oliveira Sampa, M.H. de; Borrely, S.I.; Morita, D.M.

    1991-01-01

    Samples of drinking water and wastewater were irradiated using high energy electron beam with doses from 0.37kGy to 100kGy. Preliminary data show the removal of about 100% of trihalomethanes (THM) in drinking water (concentration from 2.7μg/l to 45μg/l, 90% of the color of the Public Owned Wastewater Treatment Plant effluent and 87% of oil and grease of the cutting fluid wastewater. (author)

  18. Generation and energy utilization of methane form industrial wastewater

    International Nuclear Information System (INIS)

    Lebek, M.

    2009-01-01

    At the production site of a natural ingredients manufacturer for the food industry was necessary the adjustment of the WWTP to the enlargement of the production and its complement with a pre-treatment. The core of the treatment plan tis an UASB (Upflow Anaerobic Sludge Blanket) reactor where the wastewater is removed under anaerobic conditions. The main advantages of this treatment ar the operation stability and the high methane production. The biogas generated is cleaned before it is used during the production process as an energy resource. (Author)

  19. An efficient attack identification and risk prediction algorithm for ...

    African Journals Online (AJOL)

    The social media is highly utilized cloud for storing huge amount of data. ... However, the adversarial scenario did not design properly to maintain the privacy of the ... Information Retrieval, Security Evaluation, Efficient Attack Identification and ...

  20. Evaluation of alternative institutional arrangements in public utilities

    Directory of Open Access Journals (Sweden)

    Ermishina Anna, V.

    2015-06-01

    Full Text Available Since early 2000s a policy of attracting private operators to public utilities, which should help to increase productivity, reduce costs, and as a result, reduce utility prices takes place in Russia. The aim of the study is to identify the relationship between institutional arrangements and pricing for water and wastewater services. Applying statistical and cluster analysis to empirical data on water utilities in 13 largest cities has revealed the differences in the level and dynamics of prices for water and wastewater services in the group of public utilities and public private water utilities. In 2011-2014 the level and growth price rates in the group of public private partnerships were higher than in group of municipal water utilities. Thus, the involvement of private operators has not yet lead to the expected reduction in prices.

  1. Investigating multi-thread utilization as a software defence mechanism against side channel attacks

    CSIR Research Space (South Africa)

    Frieslaar, Ibraheem

    2016-11-01

    Full Text Available out information at critical points in the cryptographic algorithm and confuse the attacker. This research demonstrates it is capable of outperforming the known countermeasure of hiding and shuffling in terms of preventing the secret information from...

  2. Real-Time Detection of Application-Layer DDoS Attack Using Time Series Analysis

    Directory of Open Access Journals (Sweden)

    Tongguang Ni

    2013-01-01

    Full Text Available Distributed denial of service (DDoS attacks are one of the major threats to the current Internet, and application-layer DDoS attacks utilizing legitimate HTTP requests to overwhelm victim resources are more undetectable. Consequently, neither intrusion detection systems (IDS nor victim server can detect malicious packets. In this paper, a novel approach to detect application-layer DDoS attack is proposed based on entropy of HTTP GET requests per source IP address (HRPI. By approximating the adaptive autoregressive (AAR model, the HRPI time series is transformed into a multidimensional vector series. Then, a trained support vector machine (SVM classifier is applied to identify the attacks. The experiments with several databases are performed and results show that this approach can detect application-layer DDoS attacks effectively.

  3. Target-oriented utility theory for modeling the deterrent effects of counterterrorism

    International Nuclear Information System (INIS)

    Bier, Vicki M.; Kosanoglu, Fuat

    2015-01-01

    Optimal resource allocation in security has been a significant challenge for critical infrastructure protection. Numerous studies use game theory as the method of choice, because of the fact that an attacker can often observe the defender’s investment in security and adapt his choice of strategies accordingly. However, most of these models do not explicitly consider deterrence, with the result that they may lead to wasted resources if less investment would be sufficient to deter an attack. In this paper, we assume that the defender is uncertain about the level of defensive investment that would deter an attack, and use the target-oriented utility to optimize the level of defensive investment, taking into account the probability of deterrence. - Highlights: • We propose a target-oriented utility model for attacker deterrence. • We model attack deterrence as a function of attacker success probability. • We compare target-oriented utility model and conventional game-theoretical model. • Results show that our model results better value of the defender’s objective function. • Results support that defending series systems is more difficult than parallel systems

  4. Calculating Adversarial Risk from Attack Trees: Control Strength and Probabilistic Attackers

    NARCIS (Netherlands)

    Pieters, Wolter; Davarynejad, Mohsen

    2015-01-01

    Attack trees are a well-known formalism for quantitative analysis of cyber attacks consisting of multiple steps and alternative paths. It is possible to derive properties of the overall attacks from properties of individual steps, such as cost for the attacker and probability of success. However, in

  5. Content modification attacks on consensus seeking multi-agent system with double-integrator dynamics

    Science.gov (United States)

    Dong, Yimeng; Gupta, Nirupam; Chopra, Nikhil

    2016-11-01

    In this paper, vulnerability of a distributed consensus seeking multi-agent system (MAS) with double-integrator dynamics against edge-bound content modification cyber attacks is studied. In particular, we define a specific edge-bound content modification cyber attack called malignant content modification attack (MCoMA), which results in unbounded growth of an appropriately defined group disagreement vector. Properties of MCoMA are utilized to design detection and mitigation algorithms so as to impart resilience in the considered MAS against MCoMA. Additionally, the proposed detection mechanism is extended to detect the general edge-bound content modification attacks (not just MCoMA). Finally, the efficacies of the proposed results are illustrated through numerical simulations.

  6. An energy evaluation of coupling nutrient removal from wastewater with algal biomass production

    International Nuclear Information System (INIS)

    Sturm, Belinda S.M.; Lamer, Stacey L.

    2011-01-01

    Recently, several life cycle analyses of algal biodiesel from virtual production facilities have outlined the potential environmental benefits and energetic balance of the process. There are a wide range of assumptions that have been utilized for these calculations, including the addition of fertilizers and carbon dioxide to achieve high algal yields in open ponds. This paper presents an energy balance of microalgal production in open ponds coupled with nutrient removal from wastewater. Actual microalgal yields and nutrient removal rates were obtained from four pilot-scale reactors (2500 gallons each) fed with wastewater effluent from a conventional activated sludge process for 6 months, and the data was used to estimate an energy balance for treating the total average 12 million gallons per day processed by the wastewater treatment plant. Since one of the most energy-intensive steps is the dewatering of algal cultures, several thickening and dewatering processes were compared. This analysis also includes the energy offset from removing nutrients with algal reactors rather than the biological nutrient removal processes typically utilized in municipal wastewater treatment. The results show that biofuel production is energetically favorable for open pond reactors utilizing wastewater as a nutrient source, even without an energy credit for nutrient removal. The energy content of algal biomass was also considered as an alternate to lipid extraction and biodiesel production. Direct combustion of algal biomass may be a more viable energy source than biofuel production, especially when the lipid content of dry biomass (10% in this field experiment) is lower than the high values reported in lab-scale reactors (50-60%).

  7. Fuzzy Expert System for Heart Attack Diagnosis

    Science.gov (United States)

    Hassan, Norlida; Arbaiy, Nureize; Shah, Noor Aziyan Ahmad; Afizah Afif@Afip, Zehan

    2017-08-01

    Heart attack is one of the serious illnesses and reported as the main killer disease. Early prevention is significant to reduce the risk of having the disease. The prevention efforts can be strengthen through awareness and education about risk factor and healthy lifestyle. Therefore the knowledge dissemination is needed to play role in order to distribute and educate public in health care management and disease prevention. Since the knowledge dissemination in medical is important, there is a need to develop a knowledge based system that can emulate human intelligence to assist decision making process. Thereby, this study utilized hybrid artificial intelligence (AI) techniques to develop a Fuzzy Expert System for Diagnosing Heart Attack Disease (HAD). This system integrates fuzzy logic with expert system, which helps the medical practitioner and people to predict the risk and as well as diagnosing heart attack based on given symptom. The development of HAD is expected not only providing expert knowledge but potentially become one of learning resources to help citizens to develop awareness about heart-healthy lifestyle.

  8. Hydrogen attack evaluation of boiler tube using ultrasonic wave

    International Nuclear Information System (INIS)

    Won, Soon Ho; Hyun, Yang Ki; Lee, Jong O; Cho, Kyung Shik; Lee, Jae Do

    2001-01-01

    The presence of hydrogen in industrial plants is a source of damage. Hydrogen attack is one such form of degradation and often causing large tube ruptures that necessitate an immediate shutdown. Hydrogen attack may reduce the fracture toughness as well as the strength of steels. This reduction is caused partially by the presence of cavities and microcracks at the grain boundaries. In the past several techniques have been used with limited results. This paper describes the application of an ultrasonic velocity, attenuation and backscatter techniques for detecting the presence of hydrogen damage in utility boiler tubes. Ultrasonic tests showed a decrease in wave velocity and an increase in attenuation. Such results demonstrate the potential for ultrasonic nondestructive testing to quantify damage. Based on this study, recommendations are that both velocity and attenuation be used to detect hydrogen attack in steels.

  9. ELECTRICITY GENERATION FROM SWINE WASTEWATER USING MICROBIAL FUEL CELL

    Directory of Open Access Journals (Sweden)

    Chimezie Jason Ogugbue

    2015-11-01

    Full Text Available Electricity generation from swine wastewater using microbial fuel cell (MFC was investigated. Swine wastewater was collected into dual-chambered (aerobic and anaerobic fuel cell. The maximum power output using copper and carbon electrodes were 250.54 and 52.33 µW, while 10.0 and 5.0 cm salt bridge length between the cathode and anode were 279.50 and 355.26 µW, respectively. Potassium permanganate and ordinal water gave a maximum power output of 1287.8 and 13 9.18 µW. MFCs utilize microbial communities to degrade organic materials found within wastewater and converted stored chemical energy to electrical energy in a single step. The initial bacterial and fungal counts were 7.4×106 and 1.1×103 CFU ml-1. Bacterial counts steadily increased with time to 1.40×107 CFU ml-1 while fungal count declined to 4.4×106 CFU ml-1 after day 60. The declined in microbial counts may be attributed to the time necessary for acclimatization of microbes to the anode. The genera identified were Bacillus, Citrobacter, Pseudomonas, Lactobacillus, Escherichia coli, Aspergillus and Rhizopus. These microbes acted as primary and secondary utilizers, utilizing carbon and other organics of the wastewater. Chemical parameters indicated that the biochemical oxygen demand ranged from 91.4–23.2 mg/L, giving 75% while the chemical oxygen demand ranged from 243.1–235.2 mg/L, representing 3.3%. Although, the metabolic activities of microbes were responsible for the observed degradation, leading to electricity, the overall power output depended on the distance between the anode and cathode compartment, types of electrode materials and mediators and oxygen reaction at the cathode.

  10. Quantum hacking of two-way continuous-variable quantum key distribution using Trojan-horse attack

    International Nuclear Information System (INIS)

    Ma Hong-Xin; Bao Wan-Su; Li Hong-Wei; Chou Chun

    2016-01-01

    We present a Trojan-horse attack on the practical two-way continuous-variable quantum key distribution system. Our attack mainly focuses on the imperfection of the practical system that the modulator has a redundancy of modulation pulse-width, which leaves a loophole for the eavesdropper inserting a Trojan-horse pulse. Utilizing the unique characteristics of two-way continuous-variable quantum key distribution that Alice only takes modulation operation on the received mode without any measurement, this attack allows the eavesdropper to render all of the final keys shared between the legitimate parties insecure without being detected. After analyzing the feasibility of the attack, the corresponding countermeasures are put forward. (paper)

  11. Research Note on the Energy Infrastructure Attack Database (EIAD

    Directory of Open Access Journals (Sweden)

    Jennifer Giroux

    2013-12-01

    Full Text Available The January 2013 attack on the In Amenas natural gas facility drew international attention. However this attack is part of a portrait of energy infrastructure targeting by non-state actors that spans the globe. Data drawn from the Energy Infrastructure Attack Database (EIAD shows that in the last decade there were, on average, nearly 400 annual attacks carried out by armed non-state actors on energy infrastructure worldwide, a figure that was well under 200 prior to 1999. This data reveals a global picture whereby violent non-state actors target energy infrastructures to air grievances, communicate to governments, impact state economic interests, or capture revenue in the form of hijacking, kidnapping ransoms, theft. And, for politically motivated groups, such as those engaged in insurgencies, attacking industry assets garners media coverage serving as a facilitator for international attention. This research note will introduce EIAD and position its utility within various research areas where the targeting of energy infrastructure, or more broadly energy infrastructure vulnerability, has been addressed, either directly or indirectly. We also provide a snapshot of the initial analysis of the data between 1980-2011, noting specific temporal and spatial trends, and then conclude with a brief discussion on the contribution of EIAD, highlighting future research trajectories. 

  12. Acid Pretreatment of Sago Wastewater for Biohydrogen Production

    Science.gov (United States)

    Illi Mohamad Puad, Noor; Rahim, Nurainin Farhan Abd; Suhaida Azmi, Azlin

    2018-03-01

    Biohydrogen has been recognized to be one of the future renewable energy sources and has the potential in solving the greenhouse effects. In this study, Enterobacter aerogenes (E. aerogenes) was used as the biohydrogen producer via dark fermentation process using sago wastewater as the substrate. However, pretreatment of sago wastewater is required since it consists of complex sugars that cannot be utilized directly by the bacteria. This study aimed to use acid pretreatment method to produce high amount of glucose from sago wastewater. Three different types of acid: sulfuric acid (H2SO4); hydrochloric acid (HCl) and nitric acid (HNO3) were screened for the best acid in producing a maximum amount of glucose. H2SO4 gave the highest amount of glucose which was 9.406 g/L. Design of experiment was done using Face-centred Central Composite Design (FCCCD) tool under Response Surface Methodology (RSM) in Design Expert 9 software. The maximum glucose (9.138 g/L) was recorded using 1 M H2SO4 at 100 °C for 60 min. A batch dark fermentation using E. aerogenes was carried out and it was found that pretreated sago wastewater gave a higher hydrogen concentration (1700 ppm) compared to the raw wastewater (410 ppm).

  13. Reduction of Cryptosporidium, Giardia, and Fecal Indicators by Bardenpho Wastewater Treatment.

    Science.gov (United States)

    Schmitz, Bradley W; Moriyama, Hitoha; Haramoto, Eiji; Kitajima, Masaaki; Sherchan, Samendra; Gerba, Charles P; Pepper, Ian L

    2018-06-19

    Increased demand for water reuse and reclamation accentuates the importance for optimal wastewater treatment to limit protozoa in effluents. Two wastewater treatment plants utilizing advanced Bardenpho were investigated over a 12-month period to determine the incidence and reduction of Cryptosporidium, Giardia, Cyclospora, and fecal indicators. Results were compared to facilities that previously operated in the same geographical area. Protozoa (oo)cysts were concentrated using an electronegative filter and subsequently detected by fluorescent microscopy and/or PCR methods. Cryptosporidium and Giardia were frequently detected in raw sewage, but Cyclospora was not detected in any wastewater samples. Facilities with Bardenpho treatment exhibited higher removals of (oo)cysts than facilities utilizing activated sludge or trickling filters. This was likely due to Bardenpho systems having increased solid wasting rates; however, this mechanism cannot be confirmed as sludge samples were not analyzed. Use of dissolved-air-flotation instead of sedimentation tanks did not result in more efficient removal of (oo)cysts. Concentrations of protozoa were compared with each other, Escherichia coli, somatic coliphage, and viruses (pepper mild mottle virus, Aichi virus 1, adenovirus, and polyomaviruses JC and BK). Although significant correlations were rare, somatic coliphage showed the highest potential as an indicator for the abundance of protozoa in wastewaters.

  14. Bluetooth security attacks comparative analysis, attacks, and countermeasures

    CERN Document Server

    Haataja, Keijo; Pasanen, Sanna; Toivanen, Pekka

    2013-01-01

    This overview of Bluetooth security examines network vulnerabilities and offers a comparative analysis of recent security attacks. It also examines related countermeasures and proposes a novel attack that works against all existing Bluetooth versions.

  15. Review of Hosein Aabad Sugar Factory (HASF) Wastewater and ...

    African Journals Online (AJOL)

    MICHAEL HORSFALL

    evaluate the quality and quantity of wastewater of the said factory and to estimate the pollution ... appropriate for artificial recharge use, discharge in rivers and lakes or utilization in agriculture ..... These problems have a negative impact on.

  16. Enrichment of bio-oil after hydrothermal liquefaction (HTL) of microalgae C. vulgaris grown in wastewater: Bio-char and post HTL wastewater utilization studies.

    Science.gov (United States)

    Arun, Jayaseelan; Varshini, Padmanabhan; Prithvinath, P Kamath; Priyadarshini, Venkataramani; Gopinath, Kannappan Panchamoorthy

    2018-08-01

    In this study, bio-oil was produced through hydrothermal liquefaction (HTL) of C. vulgaris biomass cultivated in wastewater and was enriched into transportation fuels. Bio-oil yield was 29.37% wt at 300 °C, 60 min, at 15 g/200 mL biomass loading rate with 3% wt nano ZnO catalyst loading. Applying catalyst reduced oxygen and nitrogen content in bio-oil and increased its calorific value (19.6 ± 0.8 MJ/Kg). Bio-oil was enriched through liquid-liquid extraction (LLE) and higher yield was obtained at 30 °C for dichloromethane solvent (18.2% wt). Compounds of enriched oil were within the petro-diesel range (C 8 -C 21 ). Bio-char after HTL process was activated and used as adsorbent in wastewater treatment process to remove organic pollutants (COD, NO 3 , NH 3 and PO 4 ). Treated wastewater can be supplied as growth medium for microalgae cultivation in further experiments. Nearly 3-4 times the nanocatalyst can be reused in the HTL process. Copyright © 2018 Elsevier Ltd. All rights reserved.

  17. Dielectric Barrier Discharge Plasma-Induced Photocatalysis and Ozonation for the Treatment of Wastewater

    International Nuclear Information System (INIS)

    Sun, Mok Young; Jin-Oh, Jo; Heon-Ju, Lee

    2008-01-01

    The physicochemical processes of dielectric barrier discharge (DBD) such as in-situ formation of chemically active species and emission of ultraviolet (UV)/visible light were utilized for the treatment of a simulated wastewater formed with Acid Red 4 as the model organic contaminant. The chemically active species (mostly ozone) produced in the DBD reactor were well distributed in the wastewater using a porous gas diffuser, thereby increasing the gas-liquid contact area. For the purpose of making the best use of the light emission, a titanium oxide-based photocatalyst was incorporated in the wastewater treating system. The experimental parameters chosen were the voltage applied to the DBD reactor, the initial pH of the wastewater, and the concentration of hydrogen peroxide added to the wastewater. The results have clearly shown that the present system capable of degrading organic contaminants in two ways (photocatalysis and ozonation) may be a promising wastewater treatment technology.

  18. Dielectric Barrier Discharge Plasma-Induced Photocatalysis and Ozonation for the Treatment of Wastewater

    Science.gov (United States)

    Mok, Young Sun; Jo, Jin-Oh; Lee, Heon-Ju

    2008-02-01

    The physicochemical processes of dielectric barrier discharge (DBD) such as in-situ formation of chemically active species and emission of ultraviolet (UV)/visible light were utilized for the treatment of a simulated wastewater formed with Acid Red 4 as the model organic contaminant. The chemically active species (mostly ozone) produced in the DBD reactor were well distributed in the wastewater using a porous gas diffuser, thereby increasing the gas-liquid contact area. For the purpose of making the best use of the light emission, a titanium oxide-based photocatalyst was incorporated in the wastewater treating system. The experimental parameters chosen were the voltage applied to the DBD reactor, the initial pH of the wastewater, and the concentration of hydrogen peroxide added to the wastewater. The results have clearly shown that the present system capable of degrading organic contaminants in two ways (photocatalysis and ozonation) may be a promising wastewater treatment technology.

  19. Resilience of LTE networks against smart jamming attacks: Wideband model

    KAUST Repository

    Aziz, Farhan M.

    2015-12-03

    LTE/LTE-A networks have been successfully providing advanced broadband services to millions of users worldwide. Lately, it has been suggested to use LTE networks for mission-critical applications like public safety, smart grid and military communications. We have previously shown that LTE networks are vulnerable to Denial-of-Service (DOS) and loss of service attacks from smart jammers. In this paper, we extend our previous work on resilience of LTE networks to wideband multipath fading channel, SINR estimation in frequency domain and computation of utilities based on observable parameters under the framework of single-shot and repeated games with asymmetric information. In a single-shot game formulation, network utility is severely compromised at its solutions, i.e. at the Nash Equilibria (NE). We propose evolved repeated-game strategy algorithms to combat smart jamming attacks that can be implemented in existing deployments using current technology. © 2015 IEEE.

  20. Phytoremediation of Nitrogen as Green Chemistry for Wastewater Treatment System

    Directory of Open Access Journals (Sweden)

    Lennevey Kinidi

    2017-01-01

    Full Text Available It is noteworthy that ammoniacal nitrogen contamination in wastewater has reportedly posed a great threat to the environment. Although there are several conventional technologies being employed to remediate ammoniacal nitrogen contamination in wastewater, they are not sustainable and cost-effective. Along this line, the present study aims to highlight the significance of green chemistry characteristics of phytoremediation in nitrogen for wastewater treatment. Notably, ammoniacal nitrogen can be found in many types of sources and it brings harmful effects to the environment. Hence, the present study also reviews the phytoremediation of nitrogen and describes its green chemistry characteristics. Additionally, the different types of wastewater contaminants and their effects on phytoremediation and the phytoremediation consideration in wastewater treatment application and sustainable waste management of harvested aquatic macrophytes were reviewed. Finally, the present study explicates the future perspectives of phytoremediation. Based on the reviews, it can be concluded that green chemistry characteristics of phytoremediation in nitrogen have proved that it is sustainable and cost-effective in relation to other existing ammoniacal nitrogen remediation technologies. Therefore, it can be deduced that a cheaper and more environmental friendly ammoniacal nitrogen technology can be achieved with the utilization of phytoremediation in wastewater treatment.

  1. Disposal of olive mill wastewater with DC arc plasma method.

    Science.gov (United States)

    Ibrahimoglu, Beycan; Yilmazoglu, M Zeki

    2018-07-01

    Olive mill wastewater is an industrial waste, generated as a byproduct of olive oil production process and generally contains components such as organic matter, suspended solids, oil, and grease. Although various methods have been developed to achieve the disposal of this industrial wastewater, due to the low cost, the most common disposal application is the passive storage in the lagoons. The main objective of this study is to reduce pollution parameters in olive mill wastewater and draw water to discharge limits by using plasma technology. Plasma-assisted disposal of olive mill wastewater method could be an alternative disposal technique when considering potential utilization of treated water in agricultural areas and economic value of flammable plasma gas which is the byproduct of disposal process. According to the experimental results, the rates of COD (chemical oxygen demand) and BOD (biological oxygen demand) of olive mill wastewater are decreased by 94.42% and 95.37%, respectively. The dissolved oxygen amount is increased from 0.36 to 6.97 mg/l. In addition, plasma gas with high H 2 content and treated water that can be used in agricultural areas for irrigation are obtained from non-dischargeable wastewater. Copyright © 2018 Elsevier Ltd. All rights reserved.

  2. Agricultural use of treated municipal wastewaters preserving environmental sustainability

    Directory of Open Access Journals (Sweden)

    Antonio Lonigro

    2007-07-01

    Full Text Available In this paper the utility of the treated municipal wastewaters in agriculture, analyzing the chemical, physical and microbiological characteristics and their pollution indicators evaluation are being illustrated. Some methods employed for treating wastewaters are examined, as well as instructions and rules actually in force in different countries of the world, for evaluating the legislative hygienic and sanitary and agronomic problems connected with the treated wastewaters use, are being collected and compared. Successively, in order to provide useful indications for the use of treated municipal wastewaters, results of long-term field researches, carried out in Puglia, regarding two types of waters (treated municipal wastewater and conventional water and two irrigation methods (drip and capillary sub-irrigation on vegetable crops grown in succession, are being reported. For each crop cycle, chemical physical and microbiological analyses have been performed on irrigation water, soil and crop samples. The results evidenced that although irrigating with waters having high colimetric values, higher than those indicated by law and with two different irrigation methods, never soil and marketable yield pollutions have been observed. Moreover, the probability to take infection and/or disease for ingestion of fruits coming from crops irrigated with treated wastewaters, calculated by Beta-Poisson method, resulted negligible and equal to 1 person for 100 millions of exposed people. Concentrations of heavy metals in soil and crops were lesser than those admissible by law. The free chlorine, coming from disinfection, found in the wastewaters used for watering, in some cases caused toxicity effects, which determined significant yield decreases. Therefore, municipal wastewaters, if well treated, can be used for irrigation representing a valid alternative to the conventional ones.

  3. The effect of hydraulic retention time in onsite wastewater treatment and removal of pharmaceuticals, hormones and phenolic utility substances.

    Science.gov (United States)

    Ejhed, H; Fång, J; Hansen, K; Graae, L; Rahmberg, M; Magnér, J; Dorgeloh, E; Plaza, G

    2018-03-15

    Micropollutants such as pharmaceuticals, hormones and phenolic utility chemicals in sewage water are considered to be an emerging problem because of increased use and observed adverse effects in the environment. The study provides knowledge on the removal efficiency of micropollutants with a range of physical and chemical properties in three commercially available onsite wastewater treatment facilities (OWTFs), tested on influent wastewater collected from 2500 person equivalents in Bildchen, Germany. A longer hydraulic retention time would in theory be expected to have a positive effect, and this study presents results for three different OWTFs in full-scale comparable tests under natural conditions. A range of 24 different pharmaceuticals, five phenols and three hormones were analyzed. Flow-proportional consecutive sampling was performed in order to determine the removal efficiency. Twenty-eight substances were detected in the effluent wastewater out of 32 substances included. Average effluent concentrations of Simvastatin, Estrone, Estradiol and Ethinylestradiol were above the indicative critical-effect concentration of pharmacological effect on fish in all facilities. Average effluent concentrations of both Diclofenac and Estradiol were higher than the Environmental Quality Standards applied in Sweden (190-240 times and 9-35 times respectively). The removal efficiency of micropollutants was high for substances with high logK ow , which enhance the adsorption and removal with sludge. Low removal was observed for substances with low logK ow and acidic characteristics, and for substances with stabilizing elements of the chemical structure. Facilities that use activated sludge processes removed hormones more efficiently than facilities using trickling filter treatment technique. Moreover, longer hydraulic retention time increased the removal of pharmaceuticals, hormones, turbidity and total nitrogen. Removal of Caffeine, Ibuprofen, Estrone, Naproxen and Estradiol

  4. Defense of Cyber Infrastructures Against Cyber-Physical Attacks Using Game-Theoretic Models.

    Science.gov (United States)

    Rao, Nageswara S V; Poole, Stephen W; Ma, Chris Y T; He, Fei; Zhuang, Jun; Yau, David K Y

    2016-04-01

    The operation of cyber infrastructures relies on both cyber and physical components, which are subject to incidental and intentional degradations of different kinds. Within the context of network and computing infrastructures, we study the strategic interactions between an attacker and a defender using game-theoretic models that take into account both cyber and physical components. The attacker and defender optimize their individual utilities, expressed as sums of cost and system terms. First, we consider a Boolean attack-defense model, wherein the cyber and physical subinfrastructures may be attacked and reinforced as individual units. Second, we consider a component attack-defense model wherein their components may be attacked and defended, and the infrastructure requires minimum numbers of both to function. We show that the Nash equilibrium under uniform costs in both cases is computable in polynomial time, and it provides high-level deterministic conditions for the infrastructure survival. When probabilities of successful attack and defense, and of incidental failures, are incorporated into the models, the results favor the attacker but otherwise remain qualitatively similar. This approach has been motivated and validated by our experiences with UltraScience Net infrastructure, which was built to support high-performance network experiments. The analytical results, however, are more general, and we apply them to simplified models of cloud and high-performance computing infrastructures. © 2015 Society for Risk Analysis.

  5. Integrated centralized utility services to a chemical complex on Jurong Island, Singapore.

    Science.gov (United States)

    Yan, Y G; Wong, P C Y; Tan, C G; Tang, K F

    2003-01-01

    SUT pioneered centralized utility services for the chemical industry on Jurong Island, which are cost-effective due to economies of scale, reliable due to inter-connection of satellite operations, and customer tailored for special requirements. The utility services range from the supply of steam and water, wastewater treatment, incineration, terminalling, service corridor to fire fighting. Among the services, water management achieves the complete cycle from wastewater treatment to effluent recycling.

  6. Water and Sewage Utilities Sector (NAICS 2213)

    Science.gov (United States)

    Environmental regulation information for water utilities, including drinking and wastewater treatment facilities. Includes links to NESHAP for POTW, compliance information, and information about pretreatment programs.

  7. Estimation of EuroQol 5-Dimensions health status utility values in hereditary angioedema

    DEFF Research Database (Denmark)

    Aygören-Pürsün, Emel; Bygum, Anette; Beusterien, Kathleen

    2016-01-01

    OBJECTIVE: To estimate health status utility (preference) weights for hereditary angioedema (HAE) during an attack and between attacks using data from the Hereditary Angioedema Burden of Illness Study in Europe (HAE-BOIS-Europe) survey. Utility measures quantitatively describe the net impact of a...

  8. Distinguishing attack and second-preimage attack on encrypted message authentication codes (EMAC)

    Science.gov (United States)

    Ariwibowo, Sigit; Windarta, Susila

    2016-02-01

    In this paper we show that distinguisher on CBC-MAC can be applied to Encrypted Message Authentication Code (EMAC) scheme. EMAC scheme in general is vulnerable to distinguishing attack and second preimage attack. Distinguishing attack simulation on AES-EMAC using 225 message modifications, no collision have been found. According to second preimage attack simulation on AES-EMAC no collision found between EMAC value of S1 and S2, i.e. no second preimage found for messages that have been tested. Based on distinguishing attack simulation on truncated AES-EMAC we found collision in every message therefore we cannot distinguish truncated AES-EMAC with random function. Second-preimage attack is successfully performed on truncated AES-EMAC.

  9. Wastewater Treatment Energy Recovery Potential For Adaptation To Global Change: An Integrated Assessment

    Science.gov (United States)

    Breach, Patrick A.; Simonovic, Slobodan P.

    2018-04-01

    Approximately 20% of wastewaters globally do not receive treatment, whereas wastewater discharges are projected to increase, thereby leading to excessive water quality degradation of surface waters on a global scale. Increased treatment could help alleviate water quality issues by constructing more treatment plants; however, in many areas there exist economic constraints. Energy recovery methods including the utilization of biogas and incineration of biosolids generated during the treatment process may help to alleviate treatment costs. This study explores the potential for investments in energy recovery from wastewater to increase treatment levels and thus improve surface water quality. This was done by examining the relationships between nutrient over-enrichment, wastewater treatment, and energy recovery at a global scale using system dynamics simulation as part of the ANEMI integrated assessment model. The results show that a significant amount of energy can be recovered from wastewater, which helps to alleviate some of the costs of treatment. It was found that wastewater treatment levels could be increased by 34%, helping to offset the higher nutrient loading from a growing population with access to improved sanitation. The production of renewable natural gas from biogas was found to have the potential to prolong the depletion of natural gas resources used to produce electricity and heat. It is recommended that agricultural nutrient discharges be better managed to help reduce nutrient over-enrichment on global scale. To increase the utility of the simulation, a finer spatial scale should be used to consider regional treatment, economic, and water quality characteristics.

  10. Innovation in radioactive wastewater-stream management. Pt. 1

    International Nuclear Information System (INIS)

    Karameldin, A.

    2002-01-01

    Recently an invention of a system for volume reduction of the wastewater streams present in SDTs has been achieved. This system substantially utilized the air conditioning and ventilation techniques in water transfer from the wastewater to air. This process is promoted by a mutual heating and humidification of a compressed dry air introduced through SDTs (or in another tank). From the probable release of radioactive nuclides point of view, the analysis of the evaporation of waste streams present in SDTs have been indicated that the proposed optimal evaporating temperature is round 75 C. The design curve of the daily volumetric reduction of the wastewater streams versus the necessary volumetric airflow rates at different operating temperature has been achieved. The evaporating temperature varied from 40 C to 95 C with a step of 5 C. The obtained curve illustrates that the required volumetric airflow rate utilized to evaporate one m 3 /day (when maintaining SDTs at the temperature 75 C) is less than 90 m 3 /h. The assessments of the obtained curve have been indicated that this system is feasible and viable, economic and has no secondary waste residuals. Recently, an experimental facility proposed to be constructed to obtain the optimal operating parameters of the system, regarding to the probable emissions of the radioactive nuclides within the permissible release limits. (authors)

  11. Bio-treatment of phosphate from synthetic wastewater using ...

    African Journals Online (AJOL)

    In this study, the efficient phosphate utilizing isolates were used to remove phosphate from synthetic phosphate wastewater was tested using batch scale process. Hence the objective of the present study was to examine the efficiency of bacterial species individually for the removal of phosphate from synthetic phosphate ...

  12. Disinfection of wastewaters: high-energy electron vs gamma irradiation

    Energy Technology Data Exchange (ETDEWEB)

    Farooq, S [King Fahd Univ. of Petroleum and Minerals, Dhahran (Saudi Arabia). Dept. of Civil Engineering; Kurucz, C N; Waite, T D [Miami Univ., Coral Gables, FL (United States); Cooper, W J [Florida International Univ., Miami, FL (United States). Drinking Water Research Center

    1993-07-01

    A study was undertaken to examine the sensitivity of a wastewater population of coliphage, total coliforms and total flora present in raw sewage and secondary effluent after irradiating with similar doses delivered by a high-energy electron beam and [gamma]-radiation. The electron beam study was conducted on a large scale at the Virginia Key Wastewater Treatment Plant, Miami, Florida. The facility is equipped with a 1.5 MeV, 50 mA electron accelerator, with a wastewater flow rate of 8ls[sup -1]. Concurrent [gamma]-radiation studies were conducted at laboratory scale using a 5000 Ci, [sup 60]Co [gamma]-source. Three logs reduction of all three test organisms were observed at an electron beam dose of 500 krads, while at least four logs reduction were observed at the same dose utilizing the [gamma]'source. (Author).

  13. Caffeine in an Urbanized Estuary: Past and Present Influence of Wastewater Effluents in Boston Harbor, MA, USA

    Science.gov (United States)

    Caffeine has been identified by previous research as a potential tracer of sanitary wastewater. To further assess the utility of caffeine as a tracer of wastewater sources, samples from 25 sites throughout Boston Harbor were collected and analyzed for caffeine by LC-MS/MS. Caff...

  14. Treatment Of Wastewater For Reuse With Mobile Electron Beam Plant

    Energy Technology Data Exchange (ETDEWEB)

    Han, B.; Kim, J. K.; Kim, Y. R. [EB TECH Co., Ltd., Daejeon (Korea, Republic of); Zommer, N. [Pele Inc., Milpitas Californaa (United States)

    2012-07-01

    The use of alternative disinfectants to chlorine for the wastewater treatment has received increasing attention in recent years to treat either liquid or solids streams within wastewater treatment plants for pathogens and trace organics (TOrCs). Although several technologies have come to the forefront as an alternative to chlorine (e.g., ultraviolet [UV] and hydrogen peroxide), the majority of these technologies are chemically based, with the exception of UV. An attractive physical disinfection approach is by electron beam (EB) irradiation. EB treatment of wastewater leads to their purification from various pollutants. It is caused by the decomposition of pollutants as a result of their reactions with highly reactive species formed from water radiolysis: hydrated electron, OH free radical and H atom [Pikaev (1986)]. Sometimes methods such as EB with biological treatment, adsorption and others improve the effect of EB treatment of the wastewater purification. In the process of EB treatment of wastewater there are utilized chemical transformations of pollutants induced by ionizing radiation. At sufficiently high absorbed doses these transformations can result in complete decomposition (removal) of the substance. Under real conditions, i.e., at rather high content of pollutants in a wastewater and economically acceptable doses, partial decomposition of pollutant takes place as well as transformations of pollutant molecules that result in improving subsequent purification stages, efficiency of the process being notably influenced by irradiation conditions and wastewater composition [Woods and Pikaev (1994)]. (author)

  15. Treatment Of Wastewater For Reuse With Mobile Electron Beam Plant

    International Nuclear Information System (INIS)

    Han, B.; Kim, J.K.; Kim, Y.R.; Zommer, N.

    2012-01-01

    The use of alternative disinfectants to chlorine for the wastewater treatment has received increasing attention in recent years to treat either liquid or solids streams within wastewater treatment plants for pathogens and trace organics (TOrCs). Although several technologies have come to the forefront as an alternative to chlorine (e.g., ultraviolet [UV] and hydrogen peroxide), the majority of these technologies are chemically based, with the exception of UV. An attractive physical disinfection approach is by electron beam (EB) irradiation. EB treatment of wastewater leads to their purification from various pollutants. It is caused by the decomposition of pollutants as a result of their reactions with highly reactive species formed from water radiolysis: hydrated electron, OH free radical and H atom [Pikaev (1986)]. Sometimes methods such as EB with biological treatment, adsorption and others improve the effect of EB treatment of the wastewater purification. In the process of EB treatment of wastewater there are utilized chemical transformations of pollutants induced by ionizing radiation. At sufficiently high absorbed doses these transformations can result in complete decomposition (removal) of the substance. Under real conditions, i.e., at rather high content of pollutants in a wastewater and economically acceptable doses, partial decomposition of pollutant takes place as well as transformations of pollutant molecules that result in improving subsequent purification stages, efficiency of the process being notably influenced by irradiation conditions and wastewater composition [Woods and Pikaev (1994)]. (author)

  16. Cooperating attackers in neural cryptography.

    Science.gov (United States)

    Shacham, Lanir N; Klein, Einat; Mislovaty, Rachel; Kanter, Ido; Kinzel, Wolfgang

    2004-06-01

    A successful attack strategy in neural cryptography is presented. The neural cryptosystem, based on synchronization of neural networks by mutual learning, has been recently shown to be secure under different attack strategies. The success of the advanced attacker presented here, called the "majority-flipping attacker," does not decay with the parameters of the model. This attacker's outstanding success is due to its using a group of attackers which cooperate throughout the synchronization process, unlike any other attack strategy known. An analytical description of this attack is also presented, and fits the results of simulations.

  17. Estimation of EuroQol 5-Dimensions health status utility values in hereditary angioedema

    Directory of Open Access Journals (Sweden)

    Aygören-Pürsün E

    2016-09-01

    Full Text Available Emel Aygören-Pürsün,1 Anette Bygum,2 Kathleen Beusterien,3 Emily Hautamaki,4 Zlatko Sisic,5 Henrik B Boysen,6 Teresa Caballero7 1Angioedema Centre, Department for Children and Adolescents, University Hospital Frankfurt, Goethe University, Frankfurt, Germany; 2Hereditary Angioedema Centre Denmark, Department of Dermatology and Allergy Centre, Odense University Hospital, Odense, Denmark; 3Outcomes Research Strategies in Health, Washington, DC, 4Patient Reported Outcomes, Oxford Outcomes Inc., an ICON plc company, Bethesda, MD, USA; 5ViroPharma Incorporated, Chatsworth House, Maidenhead, UK; 6HAEi – Hereditary Angioedema International Patient Organization for C1 Inhibitor Deficiencies, Skanderborg, Denmark; 7Allergy Department, Hospital La Paz Institute for Health Research (IdiPaz, Biomedical Research Network on Rare Diseases U754 (CIBERER, University Hospital La Paz, Madrid, Spain Objective: To estimate health status utility (preference weights for hereditary angioedema (HAE during an attack and between attacks using data from the Hereditary Angioedema Burden of Illness Study in Europe (HAE-BOIS-Europe survey. Utility measures quantitatively describe the net impact of a condition on a patient’s life; a score of 0.0 reflects death and 1.0 reflects full health.Study design and methods: The HAE-BOIS-Europe was a cross-sectional survey conducted in Spain, Germany, and Denmark to assess the real-world experience of HAE from the patient perspective. Survey items that overlapped conceptually with the EuroQol 5-Dimensions (EQ-5D domains (pain/discomfort, mobility, self-care, usual activities, and anxiety/depression were manually crosswalked to the corresponding UK population-based EQ-5D utility weights. EQ-5D utilities were computed for each respondent in the HAE-BOIS-Europe survey for acute attacks and between attacks.Results: Overall, a total of 111 HAE-BOIS-Europe participants completed all selected survey items and thus allowed for computation

  18. Crony Attack: Strategic Attack’s Silver Bullet

    Science.gov (United States)

    2006-11-01

    physical assets or financial assets. The form of crony attack that most closely resembles classic strategic attack is to deny, degrade, or destroy a money...February 1951. Reprinted in Airpower Studies Coursebook , Air Command and Staff College, Maxwell AFB, AL, 2002, 152–58. Hirsch, Michael. “NATO’s Game of

  19. Synergistic effects of irradiation of waste-water

    International Nuclear Information System (INIS)

    Woodbridge, D.D.

    1975-01-01

    Water is an absolute necessity for all forms of animal and plant life. As man's requirements for water increase, the need for better methods of purification also increase. Technology has been slow to develop new methods of water treatment for the direct utilization of waste-water. Many new construction projects are at a standstill because waste-water treatment methods have not been developed to handle adequately the ever-increasing flow of sewage. Theoretical considerations of the use of high-level radiation in the treatment of waste-water have failed to consider the effects of the hydrated electron, and the potential of the possible synergistic effects of combining chlorine, oxygen and irradiation. An extensive testing programme at the University Center for Pollution Research of the Florida Institute of Technology over the past four years has shown that irradiation of waste-water samples immersed in an aqueous environment provide bacterial kill and reduction in organic pollution far greater than that obtained from theoretical considerations of G values and earlier experiments where the waste samples were not immersed in an aqueous environment. These testing programmes have investigated the synergistic effects of combining oxygen and irradiation. Each of these combined treatments resulted in an increased bacterial kill factor. Tests on Staphylococcus aureus bacteria and faecal streptococcus bacteria indicate that the synergistic effects observed for faecal coliform bacteria also apply to the pathogenic bacteria. A statistical analysis of the data obtained shows the relationships between the various effects on the bacteria. A definite shielding factor from the turbidity of the waste-water has been shown to exist. Synergistic effects have been shown to offset significantly the shielding effects. Optimization of these synergistic effects can greatly increase the effectiveness of irradiation in the treatment of waste-water. (author)

  20. Condition Assessment Technologies for Drinking Water and Wastewater Pipelines: State-of-the-Art Literature and Practice Review

    OpenAIRE

    Thuruthy, Nisha

    2012-01-01

    Aging and deteriorating drinking water and wastewater pipelines have become a major problem in the United States, warranting significant federal attention and regulation. Many utilities have begun or improved programs to manage the renewal of their water and wastewater pipes and are proactively managing their pipeline assets rather than reactively fixing them. However, the extensive size of drinking water and wastewater systems and the severity of the deterioration problem are such that it ...

  1. Composite Dos Attack Model

    Directory of Open Access Journals (Sweden)

    Simona Ramanauskaitė

    2012-04-01

    Full Text Available Preparation for potential threats is one of the most important phases ensuring system security. It allows evaluating possible losses, changes in the attack process, the effectiveness of used countermeasures, optimal system settings, etc. In cyber-attack cases, executing real experiments can be difficult for many reasons. However, mathematical or programming models can be used instead of conducting experiments in a real environment. This work proposes a composite denial of service attack model that combines bandwidth exhaustion, filtering and memory depletion models for a more real representation of similar cyber-attacks. On the basis of the introduced model, different experiments were done. They showed the main dependencies of the influence of attacker and victim’s properties on the success probability of denial of service attack. In the future, this model can be used for the denial of service attack or countermeasure optimization.

  2. Characterization of livestock wastewater at various stages of wastewater treatment plant

    International Nuclear Information System (INIS)

    Ting Teo Ming; Kim, Tak Hyun; Lee, Myun Joo

    2007-01-01

    A characterization study has been conducted at Gongju Livestock Wastewater Treatment Plant, Gongju, South Korea. It is owned and operated by the government with treatment capacity of 250 tons per day. Livestock wastewater was collected from individual farmer and treated at the treatment plant. The centralized livestock wastewater treatment plant has various treatment processes namely pre-treatment, anaerobic digestion, nitrification, de-nitrification , chemical treatment, sand filtration and ozonization. The livestock wastewater was characterized by high COD, SS, T-N and T-P with concentration of 20600 mg/l, 6933 mg/l, 2820 mg/l and 700 mg/ l, respectively. After the wastewater has undergone various treatment processes it was discharged to waterways with concentration of COD, SS, T-N and T-P at 105 mg/l, 73 mg/l, 2.1 mg/l and 9 mg/l, respectively. This is part of the study to investigate the potential of irradiation to be applied at the centralized livestock wastewater treatment plant. Although livestock wastewater can be potentially applied to crop as source of nutrients it also affect the water quality due to runoff and leaching. When the wastewater applied at the rates in excess of crop uptake rates, the excess wastewater could potentially enter surface and groundwater and polluted them. (author)

  3. Combination of Advanced Oxidation Processes and biological treatments for wastewater decontamination-A review

    International Nuclear Information System (INIS)

    Oller, I.; Malato, S.; Sanchez-Perez, J.A.

    2011-01-01

    Nowadays there is a continuously increasing worldwide concern for development of alternative water reuse technologies, mainly focused on agriculture and industry. In this context, Advanced Oxidation Processes (AOPs) are considered a highly competitive water treatment technology for the removal of those organic pollutants not treatable by conventional techniques due to their high chemical stability and/or low biodegradability. Although chemical oxidation for complete mineralization is usually expensive, its combination with a biological treatment is widely reported to reduce operating costs. This paper reviews recent research combining AOPs (as a pre-treatment or post-treatment stage) and bioremediation technologies for the decontamination of a wide range of synthetic and real industrial wastewater. Special emphasis is also placed on recent studies and large-scale combination schemes developed in Mediterranean countries for non-biodegradable wastewater treatment and reuse. The main conclusions arrived at from the overall assessment of the literature are that more work needs to be done on degradation kinetics and reactor modeling of the combined process, and also dynamics of the initial attack on primary contaminants and intermediate species generation. Furthermore, better economic models must be developed to estimate how the cost of this combined process varies with specific industrial wastewater characteristics, the overall decontamination efficiency and the relative cost of the AOP versus biological treatment.

  4. Potential improvement to a citric wastewater treatment plant using bio-hydrogen and a hybrid energy system

    Science.gov (United States)

    Zhi, Xiaohua; Yang, Haijun; Berthold, Sascha; Doetsch, Christian; Shen, Jianquan

    Treatment of highly concentrated organic wastewater is characterized as cost-consuming. The conventional technology uses the anaerobic-anoxic-oxic process (A 2/O), which does not produce hydrogen. There is potential for energy saving using hydrogen utilization associated with wastewater treatment because hydrogen can be produced from organic wastewater using anaerobic fermentation. A 50 m 3 pilot bio-reactor for hydrogen production was constructed in Shandong Province, China in 2006 but to date the hydrogen produced has not been utilized. In this work, a technical-economic model based on hydrogen utilization is presented and analyzed to estimate the potential improvement to a citric wastewater plant. The model assesses the size, capital cost, annual cost, system efficiency and electricity cost under different configurations. In a stand-alone situation, the power production from hydrogen is not sufficient for the required load, thus a photovoltaic array (PV) is employed as the power supply. The simulated results show that the combination of solar and bio-hydrogen has a much higher cost compared with the A 2/O process. When the grid is connected, the system cost achieved is 0.238 US t -1 wastewater, which is lower than 0.257 US t -1 by the A 2/O process. The results reveal that a simulated improvement by using bio-hydrogen and a FC system is effective and feasible for the citric wastewater plant, even when compared to the current cost of the A 2/O process. In addition, lead acid and vanadium flow batteries were compared for energy storage service. The results show that a vanadium battery has lower cost and higher efficiency due to its long lifespan and energy efficiency. Additionally, the cost distribution of components shows that the PV dominates the cost in the stand-alone situation, while the bio-reactor is the main cost component in the parallel grid.

  5. Proactive Alleviation Procedure to Handle Black Hole Attack and Its Version

    Science.gov (United States)

    Babu, M. Rajesh; Dian, S. Moses; Chelladurai, Siva; Palaniappan, Mathiyalagan

    2015-01-01

    The world is moving towards a new realm of computing such as Internet of Things. The Internet of Things, however, envisions connecting almost all objects within the world to the Internet by recognizing them as smart objects. In doing so, the existing networks which include wired, wireless, and ad hoc networks should be utilized. Moreover, apart from other networks, the ad hoc network is full of security challenges. For instance, the MANET (mobile ad hoc network) is susceptible to various attacks in which the black hole attacks and its versions do serious damage to the entire MANET infrastructure. The severity of this attack increases, when the compromised MANET nodes work in cooperation with each other to make a cooperative black hole attack. Therefore this paper proposes an alleviation procedure which consists of timely mandate procedure, hole detection algorithm, and sensitive guard procedure to detect the maliciously behaving nodes. It has been observed that the proposed procedure is cost-effective and ensures QoS guarantee by assuring resource availability thus making the MANET appropriate for Internet of Things. PMID:26495430

  6. Proactive Alleviation Procedure to Handle Black Hole Attack and Its Version.

    Science.gov (United States)

    Babu, M Rajesh; Dian, S Moses; Chelladurai, Siva; Palaniappan, Mathiyalagan

    2015-01-01

    The world is moving towards a new realm of computing such as Internet of Things. The Internet of Things, however, envisions connecting almost all objects within the world to the Internet by recognizing them as smart objects. In doing so, the existing networks which include wired, wireless, and ad hoc networks should be utilized. Moreover, apart from other networks, the ad hoc network is full of security challenges. For instance, the MANET (mobile ad hoc network) is susceptible to various attacks in which the black hole attacks and its versions do serious damage to the entire MANET infrastructure. The severity of this attack increases, when the compromised MANET nodes work in cooperation with each other to make a cooperative black hole attack. Therefore this paper proposes an alleviation procedure which consists of timely mandate procedure, hole detection algorithm, and sensitive guard procedure to detect the maliciously behaving nodes. It has been observed that the proposed procedure is cost-effective and ensures QoS guarantee by assuring resource availability thus making the MANET appropriate for Internet of Things.

  7. Advanced oxidation-based treatment of furniture industry wastewater.

    Science.gov (United States)

    Tichonovas, Martynas; Krugly, Edvinas; Grybauskas, Arturas; Jankūnaitė, Dalia; Račys, Viktoras; Martuzevičius, Dainius

    2017-07-16

    The paper presents a study on the treatment of the furniture industry wastewater in a bench scale advanced oxidation reactor. The researched technology utilized a simultaneous application of ozone, ultraviolet radiation and surface-immobilized TiO 2 nanoparticle catalyst. Various combinations of processes were tested, including photolysis, photocatalysis, ozonation, catalytic ozonation, photolytic ozonation and photocatalytic ozonation were tested against the efficiency of degradation. The efficiency of the processes was primarily characterized by the total organic carbon (TOC) analysis, indicating the remaining organic material in the wastewater after the treatment, while the toxicity changes in wastewater were researched by Daphnia magna toxicity tests. Photocatalytic ozonation was confirmed as the most effective combination of processes (99.3% of TOC reduction during 180 min of treatment), also being the most energy efficient (4.49-7.83 MJ/g). Photocatalytic ozonation and photolytic ozonation remained efficient across a wide range of pH (3-9), but the pH was an important factor in photocatalysis. The toxicity of wastewater depended on the duration of the treatment: half treated water was highly toxic, while fully treated water did not possess any toxicity. Our results indicate that photocatalytic ozonation has a high potential for the upscaling and application in industrial settings.

  8. Heart Attack Recovery FAQs

    Science.gov (United States)

    ... recommendations to make a full recovery. View an animation of a heart attack . Heart Attack Recovery Questions ... Support Network Popular Articles 1 Understanding Blood Pressure Readings 2 Sodium and Salt 3 Heart Attack Symptoms ...

  9. Kinetic coefficients for the biological treatment of tannery wastewater

    International Nuclear Information System (INIS)

    Haydar, S.

    2008-01-01

    Determination of kinetic coefficients for a particular wastewater is imperative for the rational design of biological treatment-facilities. The present study was undertaken with the objective of finding out kinetic coefficients for tannery wastewater. A bench-scale model of aerated lagoon, consisting of an aeration tank and final clarifier, was use to conduct the studies. The model was operated continuously for 96 days, by varying the detention times from 3 to 9 days. Influent for the aerated lagoon was settled tannery wastewater. Biochemical oxygen demand (BOD) of the influent and effluent and the mixed-liquor suspended solids (MLSS) of aeration tank were determined at various detention-times so as to generate data for kinetic coefficients. The kinetic coefficients k, Ks, Y and Ed were found to be 3.125 day/sup -1/, 488 mg/L, 0.64 and 0.035 day/sup -1/ respectively. Overall rate-constant of BOD, removal 'K' was also determined and was found to be 1.43 day/sup -1/. Kinetic coefficients were determined, at mean reactor-temperature of 30.2 degree C. These coefficients may be utilized for the design of biological-treatment facilities for tannery wastewater. (author)

  10. Simulating Effects of Long Term Use of Wastewater on Farmers Health Using System Dynamics Modeling (Case Study: Varamin Plain

    Directory of Open Access Journals (Sweden)

    Hamzehali Alizadeh

    2017-06-01

    Full Text Available Introduction: Agricultural activity in Varamin plain has been faced with many challenges in recent years, due to vicinity to Tehran the capital of Iran (competition for Latian dam reservoir, and competition with Tehran south network in allocation of Mamlou dam reservoir and treated wastewater of south wastewater treatment plant. Mamlou and Latian dam reservoirs, due to increase of population and industry sectors, allocated to urban utilization of Tehran. Based on national policy, the treated wastewater should be replaced with Latian dam reservoir water to supply water demand of agricultural sector. High volume transmission of wastewater to Varamin plain, will be have economical, environmental, and social effects. Several factors effect on wastewater management and success of utilization plans and any change in these factors may have various feedbacks on the other elements of wastewater use system. Hence, development of a model with capability of simulation of all factors, aspects and interactions that affect wastewater utilization is very necessary. The main objective of present study was development of water integrated model to study long-term effects of irrigation with Tehran treated wastewater, using system dynamics modeling (SD approach. Materials and Methods: Varamin Plain is one of the most important agricultural production centers of the country due to nearness to the large consumer market of Tehran and having fertile soil and knowledge of agriculture. The total agricultural irrigated land in Varamin Plain is 53486 hectares containing 17274 hectares of barley, 16926 hectares of wheat, 3866 hectares of tomato, 3521 hectares of vegetables, 3556 hectares of alfalfa, 2518 hectares of silage maize, 1771 hectares of melon, 1642 hectares of cotton, 1121 hectares of cucumber and 1291 hectares of other crops. In 2006 the irrigation requirement of the crop pattern was about 690 MCM and the actual agriculture water consumption was about 620 MCM

  11. Advanced unambiguous state discrimination attack and countermeasure strategy in a practical B92 QKD system

    Science.gov (United States)

    Ko, Heasin; Choi, Byung-Seok; Choe, Joong-Seon; Youn, Chun Ju

    2018-01-01

    Even though unconditional security of B92 quantum key distribution (QKD) system is based on the assumption of perfect positive-operator-valued measures, practical B92 systems only utilize two projective measurements. Unfortunately, such implementation may degrade the security of the B92 QKD system due to Eve's potential attack exploiting the imperfection of system. In this paper, we propose an advanced attack strategy with an unambiguous state discrimination (USD) measurement which makes practical B92 QKD systems insecure even under a lossless channel. In addition, we propose an effective countermeasure against the advanced USD attack model by monitoring double-click events. We further address a fundamental approach to make the B92 QKD system tolerable to attack strategies with USD measurements using a multi-qubit scheme.

  12. California Food Processing Industry Wastewater Demonstration Project: Phase I Final Report

    Energy Technology Data Exchange (ETDEWEB)

    Lewis, Glen; Atkinson, Barbara; Rhyne, Ivin

    2009-09-09

    Wastewater treatment is an energy-intensive process and electricity demand is especially high during the utilities summer peak electricity demand periods. This makes wastewater treatment facilities prime candidates for demand response programs. However, wastewater treatment is often peripheral to food processing operations and its demand response opportunities have often been overlooked. Phase I of this wastewater demonstration project monitored wastewater energy and environmental data at Bell-Carter Foods, Inc., California's largest olive processing plant. For this monitoring activity the project team used Green Energy Management System (GEMS) automated enterprise energy management (EEM) technologies. This report presents results from data collected by GEMS from September 15, 2008 through November 30, 2008, during the olive harvest season. This project established and tested a methodology for (1) gathering baseline energy and environmental data at an industrial food-processing plant and (2) using the data to analyze energy efficiency, demand response, daily peak load management, and environmental management opportunities at the plant. The Phase I goals were to demonstrate the measurement and interrelationship of electricity demand, electricity usage, and water quality metrics and to estimate the associated CO{sub 2} emissions.

  13. Sustainable management of leakage from wastewater pipelines.

    Science.gov (United States)

    DeSilva, D; Burn, S; Tjandraatmadja, G; Moglia, M; Davis, P; Wolf, L; Held, I; Vollertsen, J; Williams, W; Hafskjold, L

    2005-01-01

    Wastewater pipeline leakage is an emerging concern in Europe, especially with regards to the potential effect of leaking effluent on groundwater contamination and the effects infiltration has on the management of sewer reticulation systems. This paper describes efforts by Australia, in association with several European partners, towards the development of decision support tools to prioritize proactive rehabilitation of wastewater pipe networks to account for leakage. In the fundamental models for the decision support system, leakage is viewed as a function of pipeline system deterioration. The models rely on soil type identification across the service area to determine the aggressiveness of the pipe environment and for division of the area into zones based on pipe properties and operational conditions. By understanding the interaction between pipe materials, operating conditions, and the pipe environment in the mechanisms leading to pipe deterioration, the models allow the prediction of leakage rates in different zones across a network. The decision support system utilizes these models to predict the condition of pipes in individual zones, and to optimize the utilization of rehabilitation resources by targeting the areas with the highest leakage rates.

  14. Separation of Tritium from Wastewater

    International Nuclear Information System (INIS)

    JEPPSON, D.W.

    2000-01-01

    A proprietary tritium loading bed developed by Molecular Separations, Inc (MSI) has been shown to selectively load tritiated water as waters of hydration at near ambient temperatures. Tests conducted with a 126 (micro)C 1 tritium/liter water standard mixture showed reductions to 25 (micro)C 1 /L utilizing two, 2-meter long columns in series. Demonstration tests with Hanford Site wastewater samples indicate an approximate tritium concentration reduction from 0.3 (micro)C 1 /L to 0.07 (micro)C 1 /L for a series of two, 2-meter long stationary column beds Further reduction to less than 0.02 (micro)C 1 /L, the current drinking water maximum contaminant level (MCL), is projected with additional bed media in series. Tritium can be removed from the loaded beds with a modest temperature increase and the beds can be reused Results of initial tests are presented and a moving bed process for treating large quantities of wastewaters is proposed. The moving bed separation process appears promising to treat existing large quantities of wastewater at various US Department of Energy (DOE) sites. The enriched tritium stream can be grouted for waste disposition. The separations system has also been shown to reduce tritium concentrations in nuclear reactor cooling water to levels that allow reuse. Energy requirements to reconstitute the loading beds and waste disposal costs for this process appear modest

  15. Higher Order Differential Attack on 6-Round MISTY1

    Science.gov (United States)

    Tsunoo, Yukiyasu; Saito, Teruo; Nakashima, Hiroki; Shigeri, Maki

    MISTY1 is a 64-bit block cipher that has provable security against differential and linear cryptanalysis. MISTY1 is one of the algorithms selected in the European NESSIE project, and it has been recommended for Japanese e-Government ciphers by the CRYPTREC project. This paper reports a previously unknown higher order differential characteristic of 4-round MISTY1 with the FL functions. It also shows that a higher order differential attack that utilizes this newly discovered characteristic is successful against 6-round MISTY1 with the FL functions. This attack can recover a partial subkey with a data complexity of 253.7 and a computational complexity of 264.4, which is better than any previous cryptanalysis of MISTY1.

  16. Seven Deadliest Wireless Technologies Attacks

    CERN Document Server

    Haines, Brad

    2010-01-01

    How can an information security professional keep up with all of the hacks, attacks, and exploits? One way to find out what the worst of the worst are is to read the seven books in our Seven Deadliest Attacks Series. Not only do we let you in on the anatomy of these attacks but we also tell you how to get rid of them and how to defend against them in the future. Countermeasures are detailed so that you can fight against similar attacks as they evolve. Attacks featured in this book include:Bluetooth AttacksCredit Card, Access Card, and Passport AttacksBad Encryption

  17. Wastewater from monosodium glutamate industry as a low cost fertilizer source for corn (Zea mays L.)

    International Nuclear Information System (INIS)

    Singh, Satnam; Rekha, P.D.; Arun, A.B.; Huang, Y.-M.; Shen, F.-T.; Young, Chiu-Chung

    2011-01-01

    Nitrogen rich wastewater from monosodium glutamate industry (MSG) and paper-mill wastewater were used in this study as low cost fertilizers for growing corn, a common fuel crop. Detailed characterization of the wastewaters and toxicity testes were conducted to assure the safety of these wastewaters. In a greenhouse pot experiment, effects of these wastewaters on corn growth and biomass yield along with the soil properties were evaluated. MSG-wastewater was applied at three rates i.e., zero, 5 m 3 ha -1 and 7.5 m 3 ha -1 and paper-mill wastewater was applied at and zero, 3.5 m 3 ha -1 and 5 m 3 ha -1 in a complete randomized blocks design experiment. Significant increase in the corn biomass yield was observed in all the wastewater treatments compared to the Control. Both these wastewaters did not show any adverse effects on plant. N-use efficiency from the MSG-wastewater was comparable to urea-N application. This study emphasizes on sustainable practices for energy crop production by utilizing wastewaters as fertilizer sources. Hence, we report for the first time that the MSG-wastewater can be used for growing corn as a low cost green practice without adverse affects on the soil properties. -- Highlights: → MSG-wastewater acidity neutralization with highly alkaline paper-mill effluent is sustainable practice. → Growing fuel crops using wastewaters comprises multiple benefits on plant, soil, and environment. → Organic rich wastewaters improve SOC. → Co-application of MSG and paper-mill wastewaters stimulates humification.

  18. Energy positive domestic wastewater treatment: the roles of anaerobic and phototrophic technologies

    KAUST Repository

    Shoener, B. D.; Bradley, I. M.; Cusick, R. D.; Guest, J. S.

    2014-01-01

    The negative energy balance of wastewater treatment could be reversed if anaerobic technologies were implemented for organic carbon oxidation and phototrophic technologies were utilized for nutrient recovery. To characterize the potential for energy

  19. A Performance Measurement Tool Leading Wastewater Treatment Plants toward Economic Efficiency and Sustainability

    Directory of Open Access Journals (Sweden)

    Andrea Guerrini

    2016-11-01

    Full Text Available Wastewater treatment is an important link in the water cycle that allows for water sanitation and reuse, facilitates energy generation, and allows for the recovery of products from waste. The scientific community has paid significant attention to wastewater treatment, especially from a technical point of view. Extensive literature is available on new technologies, processes, and materials to improve wastewater treatment. However, scant studies have been conducted in the management field focusing on the development of a performance measurement tool that supports plant managers. The current article addresses this literature gap, developing a reporting tool that integrates technical and cost measures and implements it in a large wastewater utility. The tool successfully identifies cause and effect linkages among key plant performance drivers and supports management in finding activities with poor performance and allows them to delay non-relevant measures of control.

  20. Blocking of Brute Force Attack

    OpenAIRE

    M.Venkata Krishna Reddy

    2012-01-01

    A common threat Web developers face is a password-guessing attack known as a brute-force attack. A brute-force attack is an attempt to discover a password by systematically trying every possible combination of letters, numbers, and symbols until you discover the one correct combination that works. If your Web site requires user authentication, you are a good target for a brute-force attack. An attacker can always discover a password through a brute-force attack, but the downside is that it co...

  1. Influencing factors on microbubble ozonation treatment of acid red 3R wastewater

    Directory of Open Access Journals (Sweden)

    Yurong YA

    2017-08-01

    Full Text Available The microbubble ozonation was used to treat acid red 3R wastewater in order to investigate the influencing factors on its performance. The effects of ozone dose, initial acid red 3R concentration and activated carbon on the performance of microbubble ozonation treatment of acid red 3R wastewater are investigated. The decolorization rate, TOC removal rate, pH variation and ozone utilization efficiency in the microbubble ozonation treatment are compared under different treatment conditions. The results indicate that when increasing ozone dose or decreasing initial acid red 3R concentration, both decolorization rate and TOC removal rate of acid red 3R wastewater increase, but ozone utilization efficiency decreases. The coal-based activated carbon shows strong catalytic activity for microbubble ozonation, which could enhance the decolorization rate and TOC removal rate of acid red 3R wastewater. The better performance of microbubble ozonation treatment is achieved when the ozone dose is 48.3 mg/min and the initial acid red 3R mass concentration is 100 mg/L. Under these conditions, the decolorization efficiency reaches to 100% after treatment for 30 min, the TOC removal efficiency reaches to 78.0% after treatment for 120 min, the reaction rate constant of TOC removal is 0.015 min-1 and the ozone utilization efficiency is higher than 99%. With addition of the coal-based activated carbon of 5 g/L, the decolorization efficiency reaches to 100% after treatment for 15 min, the TOC removal efficiency reaches to 91.2% after treatment for 120 min and the reaction rate constant of TOC removal increases to 0037 min-1.The accumulation and following degradation of intermediate products of small molecule organic acid happens during treatment process, and as a result, the solution pH decreases initially and then increases. Therefore, the optimization of influencing factors for microbubble ozonation could increase both contaminant removal

  2. A social choice-based methodology for treated wastewater reuse in urban and suburban areas.

    Science.gov (United States)

    Mahjouri, Najmeh; Pourmand, Ehsan

    2017-07-01

    Reusing treated wastewater for supplying water demands such as landscape and agricultural irrigation in urban and suburban areas has become a major water supply approach especially in regions struggling with water shortage. Due to limited available treated wastewater to satisfy all water demands, conflicts may arise in allocating treated wastewater to water users. Since there is usually more than one decision maker and more than one criterion to measure the impact of each water allocation scenario, effective tools are needed to combine individual preferences to reach a collective decision. In this paper, a new social choice (SC) method, which can consider some indifference thresholds for decision makers, is proposed for evaluating and ranking treated wastewater and urban runoff allocation scenarios to water users in urban and suburban areas. Some SC methods, namely plurality voting, Borda count, pairwise comparisons, Hare system, dictatorship, and approval voting, are applied for comparing and evaluating the results. Different scenarios are proposed for allocating treated wastewater and urban runoff to landscape irrigation, agricultural lands as well as artificial recharge of aquifer in the Tehran metropolitan Area, Iran. The main stakeholders rank the proposed scenarios based on their utilities using two different approaches. The proposed method suggests ranking of the scenarios based on the stakeholders' utilities and considering the scores they assigned to each scenario. Comparing the results of the proposed method with those of six different SC methods shows that the obtained ranks are mostly in compliance with the social welfare.

  3. Characterisation of wastewater for modelling of wastewater ...

    African Journals Online (AJOL)

    Bio-process modelling is increasingly used in design, modification and troubleshooting of wastewater treatment plants (WWTPs). Characterisation of the influent wastewater to a WWTP is an important part of developing such a model. The characterisation required for modelling is more detailed than that routinely employed ...

  4. Anti-spoofing for display and print attacks on palmprint verification systems

    Science.gov (United States)

    Kanhangad, Vivek; Bhilare, Shruti; Garg, Pragalbh; Singh, Pranjalya; Chaudhari, Narendra

    2015-05-01

    A number of approaches for personal authentication using palmprint features have been proposed in the literature, majority of which focus on improving the matching performance. However, of late, preventing potential attacks on biometric systems has become a major concern as more and more biometric systems get deployed for wide range of applications. Among various types of attacks, sensor level attack, commonly known as spoof attack, has emerged as the most common attack due to simplicity in its execution. In this paper, we present an approach for detection of display and print based spoof attacks on palmprint verifcation systems. The approach is based on the analysis of acquired hand images for estimating surface re ectance. First and higher order statistical features computed from the distributions of pixel intensities and sub-band wavelet coeefficients form the feature set. A trained binary classifier utilizes the discriminating information to determine if the acquired image is of real hand or a fake one. Experiments are performed on a publicly available hand image dataset, containing 1300 images corresponding to 230 subjects. Experimental results show that the real hand biometrics samples can be substituted by the fake digital or print copies with an alarming spoof acceptance rate as high as 79.8%. Experimental results also show that the proposed spoof detection approach is very effective for discriminating between real and fake palmprint images. The proposed approach consistently achieves over 99% average 10-fold cross validation classification accuracy in our experiments.

  5. Quantum hacking of two-way continuous-variable quantum key distribution using Trojan-horse attack

    Science.gov (United States)

    Ma, Hong-Xin; Bao, Wan-Su; Li, Hong-Wei; Chou, Chun

    2016-08-01

    We present a Trojan-horse attack on the practical two-way continuous-variable quantum key distribution system. Our attack mainly focuses on the imperfection of the practical system that the modulator has a redundancy of modulation pulse-width, which leaves a loophole for the eavesdropper inserting a Trojan-horse pulse. Utilizing the unique characteristics of two-way continuous-variable quantum key distribution that Alice only takes modulation operation on the received mode without any measurement, this attack allows the eavesdropper to render all of the final keys shared between the legitimate parties insecure without being detected. After analyzing the feasibility of the attack, the corresponding countermeasures are put forward. Project supported by the National Basic Research Program of China (Grant No. 2013CB338002) and the National Natural Science Foundation of China (Grant Nos. 11304397 and 61505261).

  6. Solidarity under Attack

    DEFF Research Database (Denmark)

    Meret, Susi; Goffredo, Sergio

    2017-01-01

    https://www.opendemocracy.net/can-europe-make-it/susi-meret-sergio-goffredo/solidarity-under-attack......https://www.opendemocracy.net/can-europe-make-it/susi-meret-sergio-goffredo/solidarity-under-attack...

  7. Attack surfaces

    DEFF Research Database (Denmark)

    Gruschka, Nils; Jensen, Meiko

    2010-01-01

    The new paradigm of cloud computing poses severe security risks to its adopters. In order to cope with these risks, appropriate taxonomies and classification criteria for attacks on cloud computing are required. In this work-in-progress paper we present one such taxonomy based on the notion...... of attack surfaces of the cloud computing scenario participants....

  8. Stripping of organic compounds from wastewater as an auxiliary fuel of regenerative thermal oxidizer

    International Nuclear Information System (INIS)

    Chang, Meng-Wen; Chern, Jia-Ming

    2009-01-01

    Organic solvents with different volatilities are widely used in various processes and generate air and water pollution problems. In the cleaning processes of electronics industries, most volatile organic compounds (VOCs) are vented to air pollution control devices while most non-volatile organic solvents dissolve in the cleaning water and become the major sources of COD in wastewater. Discharging a high-COD wastewater stream to wastewater treatment facility often disturbs the treatment performance. A pretreatment of the high-COD wastewater is therefore highly desirable. This study used a packed-bed stripping tower in combination with a regenerative thermal oxidizer to remove the COD in the wastewater from a printed circuit board manufacturing process and to utilize the stripped organic compounds as the auxiliary fuel of the RTO. The experimental results showed that up to 45% of the COD could be removed and 66% of the RTO fuel could be saved by the combined treatment system.

  9. Natural treatment system models for wastewater management: a study from Hyderabad, India.

    Science.gov (United States)

    Sonkamble, Sahebrao; Wajihuddin, Md; Jampani, Mahesh; Sarah, S; Somvanshi, V K; Ahmed, Shakeel; Amerasinghe, Priyanie; Boisson, Alexandre

    2018-01-01

    Wastewater generated on a global scale has become a significant source of water resources which necessitates appropriate management strategies. However, the complexities associated with wastewater are lack of economically viable treatment systems, especially in low- and middle-income countries. While many types of treatment systems are needed to serve the various local issues, we propose natural treatment systems (NTS) such as natural wetlands that are eco-friendly, cost-effective, and can be jointly driven by public bodies and communities. In order for it to be part of wastewater management, this study explores the NTS potential for removal of pollutants, cost-effectiveness, and reuse options for the 1.20 million m 3 /day of wastewater generated in Hyderabad, India. The pilot study includes hydro-geophysical characterization of natural wetland to determine pollutant removal efficiency and its effective utilization for treated wastewater in the peri-urban habitat. The results show the removal of organic content (76-78%), nutrients (77-97%), and microbes (99.5-99.9%) from the wetland-treated wastewater and its suitability for agriculture applications. Furthermore, the wetland efficiency integrated with engineered interventions led to the development of NTS models with different application scenarios: (i) constructed wetlands, (ii) minimized community wetlands, and (iii) single outlet system, suitable for urban, peri-urban and rural areas, respectively.

  10. Wastewater treatment facilities: Energy efficient improvements and cogeneration

    International Nuclear Information System (INIS)

    Kunkle, R.; Gray, R.; Delzel, D.

    1992-10-01

    The Washington State Energy Office (WSEO) has worked with both the Bonneville Power Administration (BPA) and the US Department of Energy to provide technical and financial assistance to local governments. Based on a recent study conducted by Ecotope for WSEO, local governments spend an estimated $45 million on utility bills statewide. Water and wastewater facilities account for almost a third of this cost. As a result, WSEO decided to focus its efforts on the energy intensive water and wastewater sector. The ultimate goal of this project was to develop mechanisms to incorporate energy efficiency improvements into wastewater treatment facilities in retrofits and during upgrades, remodels, and new construction. Project activities included the following: The review of the existing regulatory environment for treatment system construction, A summary of financing options for efficiency improvements in treatment facilities, A literature review of energy efficiency opportunities in treatment plants, Survey and site visits to characterize existing facilities in Washington State, Estimates of the energy efficiency and cogeneration potential in the sector, and A case study to illustrate the implementation of an efficiency improvement in a treatment facility

  11. Wastewater Outfalls

    Data.gov (United States)

    Iowa State University GIS Support and Research Facility — Outfalls which discharge wastewater from wastewater treatment facilities with individual NPDES permits. It does not include NPDES general permits.

  12. Pulsed corona discharge for improving treatability of coking wastewater.

    Science.gov (United States)

    Liu, Ming; Preis, Sergei; Kornev, Iakov; Hu, Yun; Wei, Chao-Hai

    2018-02-01

    Coking wastewater (CW) contains toxic and macromolecular substances that inhibit biological treatment. The refractory compounds remaining in biologically treated coking wastewater (BTCW) provide chemical oxygen demand (COD) and color levels that make it unacceptable for reuse or disposal. Gas-phase pulsed corona discharge (PCD) utilizing mostly hydroxyl radicals and ozone as oxidants was applied to both raw coking wastewater (RCW) and BTCW wastewater as a supplemental treatment. The energy efficiency of COD, phenol, thiocyanate and cyanide degradation by PCD was the subject of the research. The cost-effective removal of intermediate oxidation products with addition of lime was also studied. The energy efficiency of oxidation was inversely proportional to the pulse repetition frequency: lower frequency allows more effective utilization of ozone at longer treatment times. Oxidative treatment of RCW showed the removal of phenol and thiocyanate at 800 pulses per second from 611 to 227mg/L and from 348 to 86mg/L, respectively, at 42kWh/m 3 delivered energy, with substantial improvement in the BOD 5 /COD ratio (from 0.14 to 0.43). The COD and color of BTCW were removed by 30% and 93%, respectively, at 20kWh/m 3 , showing energy efficiency for the PCD treatment exceeding that of conventional ozonation by a factor of 3-4. Application of lime appeared to be an effective supplement to the PCD treatment of RCW, degrading COD by about 28% at an energy input of 28kWh/m 3 and the lime dose of 3.0kg/m 3 . The improvement of RCW treatability is attributed to the degradation of toxic substances and fragmentation of macromolecular compounds. Copyright © 2017. Published by Elsevier B.V.

  13. Benchmarking the scientific output of industrial wastewater research in Arab world by utilizing bibliometric techniques.

    Science.gov (United States)

    Zyoud, Shaher H; Al-Rawajfeh, Aiman E; Shaheen, Hafez Q; Fuchs-Hanusch, Daniela

    2016-05-01

    Rapid population growth, worsening of the climate, and severity of freshwater scarcity are global challenges. In Arab world countries, where water resources are becoming increasingly scarce, the recycling of industrial wastewater could improve the efficiency of freshwater use. The benchmarking of scientific output of industrial wastewater research in the Arab world is an initiative that could support in shaping up and improving future research activities. This study assesses the scientific output of industrial wastewater research in the Arab world. A total of 2032 documents related to industrial wastewater were retrieved from 152 journals indexed in the Scopus databases; this represents 3.6 % of the global research output. The h-index of the retrieved documents was 70. The total number of citations, at the time of data analysis, was 34,296 with an average citation of 16.88 per document. Egypt, with a total publications of 655 (32.2 %), was ranked the first among the Arab countries followed by Saudi Arabia 300 (14.7 %) and Tunisia 297 (14.6 %). Egypt also had the highest h-index, assumed with Saudi Arabia, the first place in collaboration with other countries. Seven hundred fifteen (35.2 %) documents with 66 countries in Arab/non-Arab country collaborations were identified. Arab researchers collaborated mostly with researchers from France 239 (11.7 %), followed by the USA 127 (6.2 %). The top active journal was Desalination 126 (6.2 %), and the most productive institution was the National Research Center, Egypt 169 (8.3 %), followed by the King Abdul-Aziz University, Saudi Arabia 75 (3.7 %). Environmental Science was the most prevalent field of interest 930 (45.8 %). Despite the promising indicators, there is a need to close the gap in research between the Arab world and the other nations. Optimizing the investments and developing regional experiences are key factors to promote the scientific research.

  14. Integrated control of the wastewater system – potentials and barriers

    DEFF Research Database (Denmark)

    Mollerup, Ane Loft; Grum, Morten; Muschalla, Dirk

    2013-01-01

    Applying integrated control to a sewer system and wastewater treatment plant often leads to additional benefits for both systems when compared to controlling them independently. However, barriers such as a lack of incentive for utilities to put this type of control in place mean that in practice...

  15. Critical supply network protection against intentional attacks: A game-theoretical model

    International Nuclear Information System (INIS)

    Bricha, Naji; Nourelfath, Mustapha

    2013-01-01

    A crucial issue in today's critical supply chains is how to protect facilities against intentional attacks, since it has become unacceptable to ignore the high impact of low probability disruptions caused by these attacks. This article develops a game-theoretical model to deal with the protection of facilities, in the context of the uncapacitated fixed-charge location problem. Given a set of investment alternatives for protecting the facilities against identified threats, the objective is to select the optimal defence strategy. The attacker is considered as a player who tries to maximise the expected damage while weighing against the attacks expenditures. The conflict on facilities vulnerability is modelled using the concept of contest. The vulnerability of a facility is defined by its destruction probability. Contest success functions determine the vulnerability of each facility dependent on the relative investments of the defender and the attacker on each facility, and on the characteristics of the contest. A method is developed to evaluate the utilities of the players (i.e., the defender and the attacker). This method evaluates many expected costs, including the cost needed to restore disabled facilities, the backorder cost, and the cost incurred because of the increase in transportation costs after attacks. In fact, when one or several facilities are unavailable, transportation costs will increase since reassigned customers may receive shipments from facilities which are farther away. The model considers a non-cooperative two-period game between the players, and an algorithm is presented to determine the equilibrium solution and the optimal defence strategy. An illustrative example is presented. The approach is compared to other suggested strategies, and some managerial insights are provided in the context of facility location

  16. Seven Deadliest Microsoft Attacks

    CERN Document Server

    Kraus, Rob; Borkin, Mike; Alpern, Naomi

    2010-01-01

    Do you need to keep up with the latest hacks, attacks, and exploits effecting Microsoft products? Then you need Seven Deadliest Microsoft Attacks. This book pinpoints the most dangerous hacks and exploits specific to Microsoft applications, laying out the anatomy of these attacks including how to make your system more secure. You will discover the best ways to defend against these vicious hacks with step-by-step instruction and learn techniques to make your computer and network impenetrable. Windows Operating System-Password AttacksActive Directory-Escalat

  17. Hardening Logic Encryption against Key Extraction Attacks with Circuit Camouflage

    Science.gov (United States)

    2017-03-01

    camouflage; obfuscation; SAT; key extraction; reverse engineering ; security; trusted electronics Introduction Integrated Circuit (IC) designs are... Circuit camouflage is hardware obfuscation technology that prevents reverse engineering of a fabricated device by utilizing a relatively small...obfuscated with circuit camouflage technology, this type of attack becomes much more difficult because a reverse engineer cannot extract a gate- level

  18. A quantitative method to evaluate microbial electrolysis cell effectiveness for energy recovery and wastewater treatment

    KAUST Repository

    Ivanov, Ivan

    2013-10-01

    Microbial electrolysis cells (MECs) are potential candidates for sustainable wastewater treatment as they allow for recovery of the energy input by producing valuable chemicals such as hydrogen gas. Evaluating the effectiveness of MEC treatment for different wastewaters requires new approaches to quantify performance, and the establishment of specific procedures and parameters to characterize the outcome of fed-batch treatability tests. It is shown here that Coulombic efficiency can be used to directly calculate energy consumption relative to wastewater treatment in terms of COD removal, and that the average current, not maximum current, is a better metric to evaluate the rate of the bioelectrochemical reactions. The utility of these methods was demonstrated using simulated current profiles and actual wastewater tests. Industrial and domestic wastewaters were evaluated using small volume MECs, and different inoculation strategies. The energy needed for treatment was 2.17kWhkgCOD-1 for industrial wastewater and 2.59kWhkgCOD-1 for domestic wastewater. When these wastewaters were combined in equal amounts, the energy required was reduced to 0.63kWhkgCOD-1. Acclimation of the MEC to domestic wastewater, prior to tests with industrial wastewaters, was the easiest and most direct method to optimize MEC performance for industrial wastewater treatment. A pre-acclimated MEC accomplished the same removal (1847 ± 53 mg L-1) as reactor acclimated to only the industrial wastewater (1839 ± 57 mg L-1), but treatment was achieved in significantly less time (70 h versus 238 h). © 2013, Hydrogen Energy Publications, LLC. Published by Elsevier Ltd. All rights reserved.

  19. Wastewater reuse

    Directory of Open Access Journals (Sweden)

    Milan R. Radosavljević

    2013-12-01

    Full Text Available Water scarcity and water pollution are some of the crucial issues that must be addressed within local and global perspectives. One of the ways to reduce the impact of water scarcity  and to minimizine water pollution is to expand water and wastewater reuse. The local conditions including regulations, institutions, financial mechanisms, availability of local technology and stakeholder participation have a great influence on the decisions for wastewater reuse. The increasing awareness of food safety and the influence of the countries which import food are influencing policy makers and agriculturists to improve the standards of wastewater reuse in agriculture. The environmental awareness of consumers has been putting pressure on the producers (industries to opt for environmentally sound technologies including those which conserve water and reduce the level of pollution. It may be observed that we have to move forwards to implement strategies and plans for wastewater reuse. However, their success and sustainability will depend on political will, public awareness and active support from national and international agencies to create favorable    environment for the promotion of environmentally sustainable technologies. Wastewater treatment has a long history, especially in agriculture, but also in industry and households. Poor quality of wastewater can pose a significant risk to the health of farmers and users of agricultural products. The World Health Organization (WHO is working on a project for the reuse of wastewater in agriculture. To reduce effects of human activities to the minimum, it is necessary to provide such technical and technological solutions that would on the one hand ensure complying with  the existing regulations and legislation, and on the other hand provide economically viable systems as seen through investments and operating costs. The use of wastewater The practice of using wastewater varies from country to country. Its

  20. Wastewater Treatment

    Science.gov (United States)

    ... day before releasing it back to the environment. Treatment plants reduce pollutants in wastewater to a level nature can handle. Wastewater is used water. It includes substances such as human waste, food ...

  1. Precious Metals Recovery from Electroplating Wastewater: A Review

    Science.gov (United States)

    Azmi, A. A.; Jai, J.; Zamanhuri, N. A.; Yahya, A.

    2018-05-01

    Metal bearing electroplating wastewater posts great health and environmental concerns, but could also provide opportunities for precious and valuable metal recovery, which can make the treatment process more cost-effective and sustainable. Current conventional electroplating wastewater treatment and metal recovery methods include chemical precipitation, coagulation and flocculation, ion exchange, membrane filtration, adsorption, electrochemical treatment and photocatalysis. However, these physico-chemical methods have several disadvantages such as high initial capital cost, high operational cost due to expensive chemical reagents and electricity supply, generation of metal complexes sludge which requires further treatment, ineffective in diluted and/or concentrated wastewater, low precious metal selectivity, and slow recovery process. On the other hand, metal bio-reduction assisted by bioactive phytochemical compounds extracted from plants and plant parts is a new found technology explored by several researchers in recent years aiming to recover precious and valuable metals from secondary sources mainly industrial wastewater by utilizing low-cost and eco-friendly biomaterials as reagents. Extract of plants contains polyphenolic compounds which have great antioxidant properties and reducing capacities, able to reduce metal ions into zerovalent metal atoms and stabilize the metal particles formed. This green bio-recovery method has a value added in their end products since the metals are recovered in nano-sized particles which are more valuable and have high commercial demand in other fields ranging from electrochemistry to medicine.

  2. Attack methodology Analysis: SQL Injection Attacks and Their Applicability to Control Systems

    Energy Technology Data Exchange (ETDEWEB)

    Bri Rolston

    2005-09-01

    Database applications have become a core component in control systems and their associated record keeping utilities. Traditional security models attempt to secure systems by isolating core software components and concentrating security efforts against threats specific to those computers or software components. Database security within control systems follows these models by using generally independent systems that rely on one another for proper functionality. The high level of reliance between the two systems creates an expanded threat surface. To understand the scope of a threat surface, all segments of the control system, with an emphasis on entry points, must be examined. The communication link between data and decision layers is the primary attack surface for SQL injection. This paper facilitates understanding what SQL injection is and why it is a significant threat to control system environments.

  3. Viability of increasing the tariff of freshwater for irrigation as a tool to stimulate wastewater reuse in the MENA region

    NARCIS (Netherlands)

    Abu-Madi, M.; Al-Sa'ed, R.; Braadbaart, O.D.; Alaerts, G.

    2008-01-01

    Despite water scarcity and high agricultural water demand in the Middle East and North Africa region, substantial proportions of treated wastewater are discharged into the environment and seas without proper utilization. All countries of the region, low pricing of reclaimed wastewater is a common

  4. Toxicity of fluoride to microorganisms in biological wastewater treatment systems.

    Science.gov (United States)

    Ochoa-Herrera, Valeria; Banihani, Qais; León, Glendy; Khatri, Chandra; Field, James A; Sierra-Alvarez, Reyes

    2009-07-01

    Fluoride is a common contaminant in a variety of industrial wastewaters. Available information on the potential toxicity of fluoride to microorganisms implicated in biological wastewater treatment is very limited. The objective of this study was to evaluate the inhibitory effect of fluoride towards the main microbial populations responsible for the removal of organic constituents and nutrients in wastewater treatment processes. The results of short-term batch bioassays indicated that the toxicity of sodium fluoride varied widely depending on the microbial population. Anaerobic microorganisms involved in various metabolic steps of anaerobic digestion processes were found to be very sensitive to the presence of fluoride. The concentrations of fluoride causing 50% metabolic inhibition (IC(50)) of propionate- and butyrate-degrading microorganisms as well as mesophilic and thermophilic acetate-utilizing methanogens ranged from 18 to 43 mg/L. Fluoride was also inhibitory to nitrification, albeit at relatively high levels (IC(50)=149 mg/L). Nitrifying bacteria appeared to adapt rapidly to fluoride, and a near complete recovery of their metabolic activity was observed after only 4d of exposure to high fluoride levels (up to 500 mg/L). All other microbial populations evaluated in this study, i.e., glucose fermenters, aerobic glucose-degrading heterotrophs, denitrifying bacteria, and H(2)-utilizing methanogens, tolerated fluoride at very high concentrations (>500 mg/L).

  5. Wastewater Characteristics, Treatment and Disposal

    OpenAIRE

    Von Sperling, Marcos

    2007-01-01

    "Wastewater Characteristics, Treatment and Disposal is the first volume in the series Biological Wastewater Treatment, presenting an integrated view of water quality and wastewater treatment. The book covers the following topics: wastewater characteristics (flow and major constituents) impact of wastewater discharges to rivers and lakes overview of wastewater treatment systems complementary items in planning studies. This book, with its clear and practical approach, lays the foundations f...

  6. Whispering through DDoS attack

    OpenAIRE

    Miralem Mehic; Jiri Slachta; Miroslav Voznak

    2016-01-01

    Denial of service (DoS) attack is an attempt of the attacker to disable victim's machine by depleting network or computing resources. If this attack is performed with more than one machine, it is called distributed denial of service (DDoS) attack. Covert channels are those channels which are used for information transmission even though they are neither designed nor intended to transfer information at all. In this article, we investigated the possibility of using of DDoS attack for purposes o...

  7. SEM analysis of particle size during conventional treatment of CMP process wastewater

    International Nuclear Information System (INIS)

    Roth, Gary A.; Neu-Baker, Nicole M.; Brenner, Sara A.

    2015-01-01

    Engineered nanomaterials (ENMs) are currently employed by many industries and have different physical and chemical properties from their bulk counterparts that may confer different toxicity. Nanoparticles used or generated in semiconductor manufacturing have the potential to enter the municipal waste stream via wastewater and their ultimate fate in the ecosystem is currently unknown. This study investigates the fate of ENMs used in chemical mechanical planarization (CMP), a polishing process repeatedly utilized in semiconductor manufacturing. Wastewater sampling was conducted throughout the wastewater treatment (WWT) process at the fabrication plant's on-site wastewater treatment facility. The goal of this study was to assess whether the WWT processes resulted in size-dependent filtration of particles in the nanoscale regime by analyzing samples using scanning electron microscopy (SEM). Statistical analysis demonstrated no significant differences in particle size between sampling points, indicating low or no selectivity of WWT methods for nanoparticles based on size. All nanoparticles appeared to be of similar morphology (near-spherical), with a high variability in particle size. EDX verified nanoparticles composition of silicon- and/or aluminum-oxide. Nanoparticle sizing data compared between sampling points, including the final sampling point before discharge from the facility, suggested that nanoparticles could be released to the municipal waste stream from industrial sources. - Highlights: • The discrete treatments of a semiconductor wastewater treatment system were examined. • A sampling scheme and method for analyzing nanoparticles in wastewater was devised. • The wastewater treatment process studied is not size-selective for nanoparticles

  8. Asset Management for Water and Wastewater Utilities

    Science.gov (United States)

    Renewing and replacing the nation's public water infrastructure is an ongoing task. Asset management can help a utility maximize the value of its capital as well as its operations and maintenance dollars.

  9. Characteristics and Biodegradability of Wastewater Organic Matter in Municipal Wastewater Treatment Plants Collecting Domestic Wastewater and Industrial Discharge

    Directory of Open Access Journals (Sweden)

    Yun-Young Choi

    2017-06-01

    Full Text Available Municipal wastewater treatment plants (WWTPs in Korea collect and treat not only domestic wastewater, but also discharge from industrial complexes. However, some industrial discharges contain a large amount of non-biodegradable organic matter, which cannot be treated properly in a conventional biological WWTP. This study aimed to investigate the characteristics and biodegradability of the wastewater organic matter contained in the industrial discharges and to examine the fate of the industrial discharges in a biological WWTP. In contrast to most previous studies targeting a specific group of organic compounds or traditional water quality indices, such as biological oxygen demand (BOD and chemical oxygen demand (COD, this study was purposed to quantify and characterize the biodegradable and nonbiodegradable fractions of the wastewater organic matter. Chemical oxygen demand (COD fractionation tests and fluorescence spectroscopy revealed that the industrial discharge from dyeing or pulp mill factories contained more non-biodegradable soluble organic matter than did the domestic wastewater. Statistical analysis on the WWTPs’ monitoring data indicated that the industrial discharge containing non-biodegradable soluble organic matter was not treated effectively in a biological WWTP, but was escaping from the system. Thus, industrial discharge that contained non-biodegradable soluble organic matter was a major factor in the decrease in biodegradability of the discharge, affecting the ultimate fate of wastewater organic matter in a biological WWTP. Further application of COD fractionation and fluorescence spectroscopy to wastewaters, with various industrial discharges, will help scientists and engineers to better design and operate a biological WWTP, by understanding the fate of wastewater organic matter.

  10. Engineered nanoparticles in wastewater and wastewater sludge - Evidence and impacts

    International Nuclear Information System (INIS)

    Brar, Satinder K.; Verma, Mausam; Tyagi, R.D.; Surampalli, R.Y.

    2010-01-01

    Nanotechnology has widespread application in agricultural, environmental and industrial sectors ranging from fabrication of molecular assemblies to microbial array chips. Despite the booming application of nanotechnology, there have been serious implications which are coming into light in the recent years within different environmental compartments, namely air, water and soil and its likely impact on the human health. Health and environmental effects of common metals and materials are well-known, however, when the metals and materials take the form of nanoparticles - consequential hazards based on shape and size are yet to be explored. The nanoparticles released from different nanomaterials used in our household and industrial commodities find their way through waste disposal routes into the wastewater treatment facilities and end up in wastewater sludge. Further escape of these nanoparticles into the effluent will contaminate the aquatic and soil environment. Hence, an understanding of the presence, behavior and impact of these nanoparticles in wastewater and wastewater sludge is necessary and timely. Despite the lack of sufficient literature, the present review attempts to link various compartmentalization aspects of the nanoparticles, their physical properties and toxicity in wastewater and wastewater sludge through simile drawn from other environmental streams.

  11. Protecting Cryptographic Memory against Tampering Attack

    DEFF Research Database (Denmark)

    Mukherjee, Pratyay

    In this dissertation we investigate the question of protecting cryptographic devices from tampering attacks. Traditional theoretical analysis of cryptographic devices is based on black-box models which do not take into account the attacks on the implementations, known as physical attacks. In prac......In this dissertation we investigate the question of protecting cryptographic devices from tampering attacks. Traditional theoretical analysis of cryptographic devices is based on black-box models which do not take into account the attacks on the implementations, known as physical attacks....... In practice such attacks can be executed easily, e.g. by heating the device, as substantiated by numerous works in the past decade. Tampering attacks are a class of such physical attacks where the attacker can change the memory/computation, gains additional (non-black-box) knowledge by interacting...... with the faulty device and then tries to break the security. Prior works show that generically approaching such problem is notoriously difficult. So, in this dissertation we attempt to solve an easier question, known as memory-tampering, where the attacker is allowed tamper only with the memory of the device...

  12. Composite wastewater treatment by aerated electrocoagulation and modified peroxi-coagulation processes.

    Science.gov (United States)

    Kumar, Abhijeet; Nidheesh, P V; Suresh Kumar, M

    2018-08-01

    Treatment of composite wastewater generating from the industrial estates is a great challenge. The present study examines the applicability of aerated electrocoagulation and modified peroxi-coagulation processes for removing color and COD from composite wastewater. Iron plates were used as anodes and cathodes in both electrochemical processes and experiments were carried out in a working volume of 2 L. Aeration enhanced the efficiency of electrocoagulation process significantly. More than 50% of COD and 60% of color were removed after 1 h of electrocoagulation process operated at pH 3 and applied voltage of 1 V. Efficiency of the modified peroxi-coagulation process was significantly higher than that of aerated electrocoagulation. COD and color removal efficiencies of the modified peroxi-coagulation process were found as 77.7% and 97%, respectively after 1 h of electrolysis operated at 1 V, solution pH 3 and 50 mM hydrogen peroxide addition. This improved efficiency of modified peroxi-coagulation compared to aerated electrocoagulation is mainly due to the attack of in-situ generated hydroxyl radicals. Copyright © 2018 Elsevier Ltd. All rights reserved.

  13. Security strategy of powered-off SRAM for resisting physical attack to data remanence

    International Nuclear Information System (INIS)

    Yu Kai; Zou Xuecheng; Yu Guoyi; Wang Weixu

    2009-01-01

    This paper presents a security strategy for resisting a physical attack utilizing data remanence in powered-off static random access memory (SRAM). Based on the mechanism of physical attack to data remanence, the strategy intends to erase data remanence in memory cells once the power supply is removed, which disturbs attackers trying to steal the right information. Novel on-chip secure circuits including secure power supply and erase transistor are integrated into conventional SRAM to realize erase operation. Implemented in 0.25 μm Huahong-NEC CMOS technology, an SRAM exploiting the proposed security strategy shows the erase operation is accomplished within 0.2 μs and data remanence is successfully eliminated. Compared with conventional SRAM, the retentive time of data remanence is reduced by 82% while the operation power consumption only increases by 7%.

  14. Exploiting Hardware Vulnerabilities to Attack Embedded System Devices: a Survey of Potent Microarchitectural Attacks

    Directory of Open Access Journals (Sweden)

    Apostolos P. Fournaris

    2017-07-01

    Full Text Available Cyber-Physical system devices nowadays constitute a mixture of Information Technology (IT and Operational Technology (OT systems that are meant to operate harmonically under a security critical framework. As security IT countermeasures are gradually been installed in many embedded system nodes, thus securing them from many well-know cyber attacks there is a lurking danger that is still overlooked. Apart from the software vulnerabilities that typical malicious programs use, there are some very interesting hardware vulnerabilities that can be exploited in order to mount devastating software or hardware attacks (typically undetected by software countermeasures capable of fully compromising any embedded system device. Real-time microarchitecture attacks such as the cache side-channel attacks are such case but also the newly discovered Rowhammer fault injection attack that can be mounted even remotely to gain full access to a device DRAM (Dynamic Random Access Memory. Under the light of the above dangers that are focused on the device hardware structure, in this paper, an overview of this attack field is provided including attacks, threat directives and countermeasures. The goal of this paper is not to exhaustively overview attacks and countermeasures but rather to survey the various, possible, existing attack directions and highlight the security risks that they can pose to security critical embedded systems as well as indicate their strength on compromising the Quality of Service (QoS such systems are designed to provide.

  15. Seven deadliest USB attacks

    CERN Document Server

    Anderson, Brian

    2010-01-01

    Do you need to keep up with the latest hacks, attacks, and exploits effecting USB technology? Then you need Seven Deadliest USB Attacks. This book pinpoints the most dangerous hacks and exploits specific to USB, laying out the anatomy of these attacks including how to make your system more secure. You will discover the best ways to defend against these vicious hacks with step-by-step instruction and learn techniques to make your computer and network impenetrable. Attacks detailed in this book include: USB Hacksaw USB Switchblade USB Based Virus/Malicous Code Launch USB Device Overflow RAMdum

  16. Evaluation of different smoking habits during music festivals through wastewater analysis.

    Science.gov (United States)

    Mackuľak, Tomáš; Grabic, Roman; Gál, Marián; Gál, Miroslav; Birošová, Lucia; Bodík, Igor

    2015-11-01

    Wastewater analysis is a powerful method that can provide useful information about the abuse of legal and illicit drugs. The aim of our study was to determine nicotine consumption during four different music festivals and to find a connection between smoking and preferences for specific music styles using wastewater analysis. The amount of the nicotine metabolite cotinine was monitored in wastewater at the influent of three waste water treatment plants WWTPs in the Czech Republic and Slovakia, where the festivals took place. Urinary bio-markers of nicotine utilization were analyzed by LC-HRMS. More than 80,000 festival participants were monitored during our study from June to September 2014. A significant increase of nicotine consumption was observed in wastewaters during music festivals. The nicotine ingestion level was back-calculated and expressed as mass of pure drug consumed per day and per 1000 inhabitants for selected cities of both countries. The highest differences between typical levels of cotinine in wastewaters and the levels during music festivals were detected in Piešťany: 4 g/L/1000 inhabitants during non-festival days compared to 8 g/L/1000 inhabitants during the Topfest pop-rock festival and 6g/L/1000 inhabitants during the Grape dance festival. No significant increase of the amounts of cotinine in wastewater was recorded for the Country and Folk festivals. Copyright © 2015 Elsevier B.V. All rights reserved.

  17. Seven Deadliest Unified Communications Attacks

    CERN Document Server

    York, Dan

    2010-01-01

    Do you need to keep up with the latest hacks, attacks, and exploits effecting Unified Communications technology? Then you need Seven Deadliest Unified Communication Attacks. This book pinpoints the most dangerous hacks and exploits specific to Unified Communications, laying out the anatomy of these attacks including how to make your system more secure. You will discover the best ways to defend against these vicious hacks with step-by-step instruction and learn techniques to make your computer and network impenetrable. Attacks featured in this book include: UC Ecosystem Attacks Insecure Endpo

  18. Invisible Trojan-horse attack.

    Science.gov (United States)

    Sajeed, Shihan; Minshull, Carter; Jain, Nitin; Makarov, Vadim

    2017-08-21

    We demonstrate the experimental feasibility of a Trojan-horse attack that remains nearly invisible to the single-photon detectors employed in practical quantum key distribution (QKD) systems, such as Clavis2 from ID Quantique. We perform a detailed numerical comparison of the attack performance against Scarani-Ac´ın-Ribordy-Gisin (SARG04) QKD protocol at 1924 nm versus that at 1536 nm. The attack strategy was proposed earlier but found to be unsuccessful at the latter wavelength, as reported in N. Jain et al., New J. Phys. 16, 123030 (2014). However at 1924 nm, we show experimentally that the noise response of the detectors to bright pulses is greatly reduced, and show by modeling that the same attack will succeed. The invisible nature of the attack poses a threat to the security of practical QKD if proper countermeasures are not adopted.

  19. Treatment of Wastewater with High Conductivity by Pulsed Discharge Plasma

    Science.gov (United States)

    Wang, Zhaojun; Jiang, Song; Liu, Kefu

    2014-07-01

    A wastewater treatment system was established by means of pulsed dielectric barrier discharge (DBD). The main advantage of this system is that the wastewater is employed as one of the electrodes for the degradation of rhodamine B, which makes use of the high conductivity and lessenes its negative influence on the discharge process. At the same time, the reactive species like ozone and ultraviolet (UV) light generated by the DBD can be utilized for the treatment of wastewater. The effects of some factors like conductivity, peak pulse voltage, discharge frequency and pH values were investigated. The results show that the combination of these reactive species could enhance the degradation of the dye while the ozone played the most important role in the process. The degradation efficiency was enhanced with the increase of energy supplied. The reduction in the concentration of rhodamine B was much more effective with high solution conductivity; under the highest conductivity condition, the degradation rate could rise to 99%.

  20. Treatment of Wastewater with High Conductivity by Pulsed Discharge Plasma

    International Nuclear Information System (INIS)

    Wang Zhaojun; Jiang Song; Liu Kefu

    2014-01-01

    A wastewater treatment system was established by means of pulsed dielectric barrier discharge (DBD). The main advantage of this system is that the wastewater is employed as one of the electrodes for the degradation of rhodamine B, which makes use of the high conductivity and lessenes its negative influence on the discharge process. At the same time, the reactive species like ozone and ultraviolet (UV) light generated by the DBD can be utilized for the treatment of wastewater. The effects of some factors like conductivity, peak pulse voltage, discharge frequency and pH values were investigated. The results show that the combination of these reactive species could enhance the degradation of the dye while the ozone played the most important role in the process. The degradation efficiency was enhanced with the increase of energy supplied. The reduction in the concentration of rhodamine B was much more effective with high solution conductivity; under the highest conductivity condition, the degradation rate could rise to 99%. (plasma technology)

  1. Enhancing collaborative intrusion detection networks against insider attacks using supervised intrusion sensitivity-based trust management model

    DEFF Research Database (Denmark)

    Li, Wenjuan; Meng, Weizhi; Kwok, Lam-For

    2017-01-01

    To defend against complex attacks, collaborative intrusion detection networks (CIDNs) have been developed to enhance the detection accuracy, which enable an IDS to collect information and learn experience from others. However, this kind of networks is vulnerable to malicious nodes which are utili......To defend against complex attacks, collaborative intrusion detection networks (CIDNs) have been developed to enhance the detection accuracy, which enable an IDS to collect information and learn experience from others. However, this kind of networks is vulnerable to malicious nodes which...... are utilized by insider attacks (e.g., betrayal attacks). In our previous research, we developed a notion of intrusion sensitivity and identified that it can help improve the detection of insider attacks, whereas it is still a challenge for these nodes to automatically assign the values. In this article, we...... of intrusion sensitivity based on expert knowledge. In the evaluation, we compare the performance of three different supervised classifiers in assigning sensitivity values and investigate our trust model under different attack scenarios and in a real wireless sensor network. Experimental results indicate...

  2. Briquette fuel production from wastewater sludge of beer industry and biodiesel production wastes

    Science.gov (United States)

    Nusong, P.; Puajindanetr, S.

    2018-04-01

    The production of industrial wastes is increasing each year. Current methods of waste disposal are severely impacting the environment. Utilization of industrial wastes as an alternative material for fuel is gaining interest due to its environmental friendliness. Thus, the objective of this research was to study the optimum condition for fuel briquettes produced from wastewater sludge of the beer industry and biodiesel production wastes. This research is divided into two parts. Part I will study the effects of carbonization of brewery wastewater sludge for high fixed carbon. Part II will study the ratio between brewery wastewater sludge and bleaching earth for its high heating value. The results show that the maximum fixed carbon of 10.01% by weight was obtained at a temperature of 350 °C for 30 minutes. The appropriate ratio of brewery wastewater sludge and bleaching earth by weight was 95:5. This condition provided the highest heating value of approximately 3548.10 kcal/kg.

  3. A microbial fuel cell–membrane bioreactor integrated system for cost-effective wastewater treatment

    International Nuclear Information System (INIS)

    Wang, Yong-Peng; Liu, Xian-Wei; Li, Wen-Wei; Li, Feng; Wang, Yun-Kun; Sheng, Guo-Ping; Zeng, Raymond J.; Yu, Han-Qing

    2012-01-01

    Highlights: ► An MFC–MBR integrated system for wastewater treatment and electricity generation. ► Stable electricity generation during 1000-h continuous operation. ► Low-cost electrode, separator and filter materials were adopted. -- Abstract: Microbial fuel cell (MFC) and membrane bioreactor (MBR) are both promising technologies for wastewater treatment, but both with limitations. In this study, a novel MFC–MBR integrated system, which combines the advantages of the individual systems, was proposed for simultaneous wastewater treatment and energy recovery. The system favored a better utilization of the oxygen in the aeration tank of MBR by the MFC biocathode, and enabled a high effluent quality. Continuous and stable electricity generation, with the average current of 1.9 ± 0.4 mA, was achieved over a long period of about 40 days. The maximum power density reached 6.0 W m −3 . Moreover, low-cost materials were used for the reactor construction. This integrated system shows great promise for practical wastewater treatment application.

  4. Whispering through DDoS attack

    Directory of Open Access Journals (Sweden)

    Miralem Mehic

    2016-03-01

    Full Text Available Denial of service (DoS attack is an attempt of the attacker to disable victim's machine by depleting network or computing resources. If this attack is performed with more than one machine, it is called distributed denial of service (DDoS attack. Covert channels are those channels which are used for information transmission even though they are neither designed nor intended to transfer information at all. In this article, we investigated the possibility of using of DDoS attack for purposes of hiding data or concealing the existing covert channel. In addition, in this paper we analyzed the possibility of detection of such covert communication with the well-known statistical method. Also, we proposed the coordination mechanisms of the attack which may be used. A lot of research has been done in order to describe and prevent DDoS attacks, yet research on steganography on this field is still scarce.

  5. Energy-neutral sustainable nutrient recovery incorporated with the wastewater purification process in an enlarged microbial nutrient recovery cell

    Science.gov (United States)

    Sun, Dongya; Gao, Yifan; Hou, Dianxun; Zuo, Kuichang; Chen, Xi; Liang, Peng; Zhang, Xiaoyuan; Ren, Zhiyong Jason; Huang, Xia

    2018-04-01

    Recovery of nutrient resources from the wastewater is now an inevitable strategy to maintain the supply of both nutrient and water for our huge population. While the intensive energy consumption in conventional nutrient recovery technologies still remained as the bottleneck towards the sustainable nutrient recycle. This study proposed an enlarged microbial nutrient recovery cell (EMNRC) which was powered by the energy contained in wastewater and achieved multi-cycle nutrient recovery incorporated with in situ wastewater treatment. With the optimal recovery solution of 3 g/L NaCl and the optimal volume ratio of wastewater to recovery solution of 10:1, >89% of phosphorus and >62% of ammonium nitrogen were recovered into struvite. An extremely low water input ratio of water. It was proved the EMNRC system was a promising technology which could utilize the chemical energy contained in wastewater itself and energy-neutrally recover nutrient during the continuous wastewater purification process.

  6. Heart attack - discharge

    Science.gov (United States)

    ... and lifestyle Cholesterol - drug treatment Controlling your high blood pressure Deep vein thrombosis - discharge Dietary fats explained Fast food tips Heart attack - discharge Heart attack - what to ask your doctor Heart bypass ... pacemaker - discharge High blood pressure - what to ask your doctor How to read ...

  7. Shilling Attack Prevention for Recommender Systems Using Social-based Clustering

    KAUST Repository

    Lee, Tak

    2011-06-06

    A Recommender System (RS) is a system that utilizes user and item information to predict the feeling of users towards unfamiliar items. Recommender Systems have become popular tools for online stores due to their usefulness in confidently recommending items to users. A popular algorithm for recommender system is Collaborative Filtering (CF). CF uses other users\\' profiles to predict whether a user is interested in a particular object. This system, however, is vulnerable to malicious users seeking to promote items by manipulating rating predictions with fake user profiles. Profiles with behaviors similar to "victim" users alter the prediction of a Recommender System. Manipulating rating predictions through injected profiles is referred to as a shilling attack. It is important to develop shilling attack prevention frameworks for to protect the trustworthiness of Recommender Systems. In this thesis, we will demonstrate a new methodology that utilizes social information to prevent malicious users from manipulating the prediction system. The key element in our new methodology rests upon the concept of trust among real users, an element we claim absent among malicious profiles. In order to use trust information for shilling attack prevention, we first develop a weighting system which makes the system rely more on trustworthy users when making predictions. We then use this trust information to cluster out untrustworthy users to improve rating robustness. The robustness of the new and classic systems is then evaluated with data from a public commercial consumer RS, Epinions.com. Several complexity reduction procedures are also introduced to make implementing the algorithms mentioned possible for a huge commercial database.

  8. Wastewater garden--a system to treat wastewater with environmental benefits to community.

    Science.gov (United States)

    Nair, Jaya

    2008-01-01

    Many communities and villages around the world face serious problems with lack of sanitation especially in disposing of the wastewater-black water and grey water from the houses, or wash outs from animal rearing sheds. Across the world diverting wastewater to the surroundings or to the public spaces are not uncommon. This is responsible for contaminating drinking water sources causing health risks and environmental degradation as they become the breeding grounds of mosquitoes and pathogens. Lack of collection and treatment facilities or broken down sewage systems noticed throughout the developing world are associated with this situation. Diverting the wastewater to trees and vegetable gardens was historically a common practice. However the modern world has an array of problems associated with such disposal such as generation of large quantity of wastewater, unavailability of space for onsite disposal or treatment and increase in population. This paper considers the wastewater garden as a means for wastewater treatment and to improve the vegetation and biodiversity of rural areas. This can also be implemented in urban areas in association with parks and open spaces. This also highlights environmental safety in relation to the nutrient, pathogen and heavy metal content of the wastewater. The possibilities of different types of integration and technology that can be adopted for wastewater gardens are also discussed. IWA Publishing 2008.

  9. Comparison of various advanced oxidation processes used in remediation of industrial wastewater laden with recalcitrant pollutants

    Science.gov (United States)

    Krishnan, S.; Rawindran, H.; Sinnathambi, C. M.; Lim, J. W.

    2017-06-01

    Due to the scarcity of water, it has become a necessity to improve the quality of wastewater that is discharged into the environment. Conventional wastewater treatment can be either a physical, chemical, and/or biological processes, or in some cases a combination of these operations. The main purpose of wastewater treatment is to eliminate nutrients, solids, and organic compounds from effluents. Current wastewater treatment technologies are deemed ineffective in the complete removal of pollutants, particularly organic matter. In many cases, these organic compounds are resistant to conventional treatment methods, thus creating the necessity for tertiary treatment. Advanced oxidation process (AOP), constitutes as a promising treatment technology for the management of wastewater. AOPs are characterised by a common chemical feature, where they utilize the highly reactive hydroxyl radicals for achieving complete mineralization of the organic pollutants into carbon dioxide and water. This paper delineates advanced oxidation processes currently used for the remediation of water and wastewater. It also provides the cost estimation of installing and running an AOP system. The costs are separated into three categories: capital, operational, and operating & maintenance.

  10. Coupling UV irradiation and electrocoagulation for reclamation of urban wastewater

    International Nuclear Information System (INIS)

    Cotillas, Salvador; Llanos, Javier; Miranda, Oscar G.; Díaz-Trujillo, Gerardo C.; Cañizares, Pablo; Rodrigo, Manuel A.

    2014-01-01

    Graphical abstract: - Highlights: • Iron electrodes allow removing turbidity and E. coli in urban wastewaters. • Enmeshment into growing flocs and oxidation are the key disinfection processes. • A synergistic effect of coupling UV and EC is found at low current densities. • Efficiency of UV irradiation is lowered at high current density. - Abstract: This work focuses on coupling electrocoagulation, with iron electrodes, and UV irradiation (photo-electrocoagulation) for the simultaneous removal of turbidity and E. coli from actual treated municipal wastewaters. Results show that single electrocoagulation behaves as a very efficient technology even using low current densities. E. coli is removed not only by the enmeshment of microorganisms into growing flocs, but also by the attack of electrochemically produced chlorine disinfectant species. Coupling UV irradiation to electrocoagulation with iron electrodes improves the process performance in terms of E. coli and turbidity removal. The effect of current density on process performance was evaluated, finding a synergistic interaction of both techniques at low current density (1.44 A m −2 ) but an antagonistic effect at higher values of current density (7.20 A m −2 ). This antagonistic effect is caused by the less efficient transmission of UV irradiation to the bulk solution due to the increase in the concentration of solids

  11. Microbial Community Profiles in Wastewaters from Onsite Wastewater Treatment Systems Technology.

    Directory of Open Access Journals (Sweden)

    Łukasz Jałowiecki

    Full Text Available The aim of the study was to determine the potential of community-level physiological profiles (CLPPs methodology as an assay for characterization of the metabolic diversity of wastewater samples and to link the metabolic diversity patterns to efficiency of select onsite biological wastewater facilities. Metabolic fingerprints obtained from the selected samples were used to understand functional diversity implied by the carbon substrate shifts. Three different biological facilities of onsite wastewater treatment were evaluated: fixed bed reactor (technology A, trickling filter/biofilter system (technology B, and aerated filter system (the fluidized bed reactor, technology C. High similarities of the microbial community functional structures were found among the samples from the three onsite wastewater treatment plants (WWTPs, as shown by the diversity indices. Principal components analysis (PCA showed that the diversity and CLPPs of microbial communities depended on the working efficiency of the wastewater treatment technologies. This study provided an overall picture of microbial community functional structures of investigated samples in WWTPs and discerned the linkages between microbial communities and technologies of onsite WWTPs used. The results obtained confirmed that metabolic profiles could be used to monitor treatment processes as valuable biological indicators of onsite wastewater treatment technologies efficiency. This is the first step toward understanding relations of technology types with microbial community patterns in raw and treated wastewaters.

  12. Chemical Attributes of Soil Fertilized with Cassava Mill Wastewater and Cultivated with Sunflower

    Directory of Open Access Journals (Sweden)

    Mara Suyane Marques Dantas

    2014-01-01

    Full Text Available The use of waste arising from agroindustrial activities, such as cassava wastewater, has been steadily implemented in order to reduce environmental pollution and nutrient utilization. The aim of this study is that the changes in chemical properties of dystrophic red-yellow latosol (oxisol were evaluated at different sampling times after reuse of cassava wastewater as an alternative to mineral fertilizer in the cultivation of sunflower, hybrid Helio 250. The experiment was conducted at the Experimental Station of the Agricultural Research Company of Pernambuco (IPA, located in Vitória de Santo Antão. The experimental design was randomized blocks with 6×5 subplots; six doses of cassava wastewater (0; 8.5; 17.0; 34.0; 68.0; and 136 m3 ha−1; and five sampling times (21, 42, 63, 84, and 105 days after applying the cassava wastewater, with four replications. Concentrations of available phosphorus and exchangeable potassium, calcium, magnesium and sodium, pH, and electrical conductivity of the soil saturation extract were evaluated. Results indicate that cassava wastewater is an efficient provider of nutrients to the soil and thus to the plants, making it an alternative to mineral fertilizers.

  13. Municipal wastewater biological nutrient removal driven by the fermentation liquid of dairy wastewater.

    Science.gov (United States)

    Liu, Hui; Chen, Yinguang; Wu, Jiang

    2017-11-01

    Carbon substrate is required by biological nutrient removal (BNR) microorganism, but it is usually insufficient in the influent of many municipal wastewater treatment plants. In this study the use of ethanol-enriched fermentation liquid, which was derived from dairy wastewater, as the preferred carbon substrate of BNR was reported. First, the application of dairy wastewater and food processing wastewater and their fermentation liquid as the carbon substrate of BNR was compared in the short-term tests. The fermented wastewater showed higher BNR performance than the unfermented one, and the fermentation liquid of dairy wastewater (FL-DW), which was obtained under pH 8 and fermentation time of 6 day, exhibited the highest phosphorus (95.5%) and total nitrogen (97.6%) removal efficiencies due to its high ethanol content (57.9%). Then, the long-term performance of FL-DW acting as the carbon substrate of BNR was compared with that of acetate and ethanol, and the FL-DW showed the greatest phosphorus and total nitrogen removal. Further investigation showed that the use of FL-DW caused the highest polyhydroxyalkanoates (PHAs) synthesis in BNR microbial cells, and more PHAs were used for phosphorus uptake and denitrification rather than glycogen synthesis and microbial growth. The FL-DW can be used as a preferred carbon substrate for BNR microbes. AB: aerobic end sludge active biomass; BNR: biological nutrient removal; DW: dairy wastewater; FL-DW: fermentation liquid of dairy wastewater; FPW: food processing wastewater; FL-FPW: fermentation liquid of food processing wastewater; PHAs: polyhydroxyalkanoates; PHB: poly-3-hydroxybutyrate; PHV: poly-3-hydroxyvalerate; PH2MV: poly-3-hydroxy-2- methylvalerate; PAOs: phosphorus accumulating organisms; SBR: sequencing batch reactor; SOP: soluble ortho-phosphorus; TN: total nitrogen; TSS: total suspended solids; VSS: volatile suspended solids; VFAs: volatile fatty acids; WWTPs: wastewater treatment plants.

  14. Characteristics and Biodegradability of Wastewater Organic Matter in Municipal Wastewater Treatment Plants Collecting Domestic Wastewater and Industrial Discharge

    OpenAIRE

    Yun-Young Choi; Seung-Ryong Baek; Jae-In Kim; Jeong-Woo Choi; Jin Hur; Tae-U Lee; Cheol-Joon Park; Byung Joon Lee

    2017-01-01

    Municipal wastewater treatment plants (WWTPs) in Korea collect and treat not only domestic wastewater, but also discharge from industrial complexes. However, some industrial discharges contain a large amount of non-biodegradable organic matter, which cannot be treated properly in a conventional biological WWTP. This study aimed to investigate the characteristics and biodegradability of the wastewater organic matter contained in the industrial discharges and to examine the fate of the industri...

  15. Attack Trees for Practical Security Assessment: Ranking of Attack Scenarios with ADTool 2.0

    NARCIS (Netherlands)

    Gadyatskaya, Olga; Jhawar, Ravi; Kordy, P.T.; Lounis, Karim; Mauw, Sjouke; Trujillo-Rasua, Rolando

    2016-01-01

    In this tool demonstration paper we present the ADTool2.0: an open-source software tool for design, manipulation and analysis of attack trees. The tool supports ranking of attack scenarios based on quantitative attributes entered by the user; it is scriptable; and it incorporates attack trees with

  16. Phenol Removal from Industrial Wastewater by HRP Enzyme

    Directory of Open Access Journals (Sweden)

    Iran Alemzadeh

    2009-01-01

    Full Text Available In this research, horseradish peroxidase for phenol removal was utilized. First, the process was studied at the laboratory scale using a synthetic phenol solution (1-10 mM. Results showed that horseradish peroxidase (HRP could effectively remove phenolic compounds from wastewater and that the catalytic capability of the enzyme was maintained for a wide range of pH, temperature, and aromatic concentration levels. The performance conditions were optimized for at lease 95% and 100% removal of phenolic compounds for both actual and synthetic wastewaters under high and low phenol concentrations (1 and 10 mM. The phenolic wastewater used was an olive mill effluent with a phenol concentration of 1221 mg/L (13 mM and a pH value of 3.5. At the end of the reaction, the phenolic compounds changed to insoluble polymers and precipitated. Each enzyme/wastewater system was optimized for the following chemical dosages: hydrogen peroxide, enzyme, polyethylene glycol (PEG, and buffer. Furthermore, the reaction time to achieve at least 95% phenol removal was determined. According to the results, COD and BOD reduced to 58% and 78%, respectively. Experimental results showed an increase in H2O2 concentration beyond the optimum dose resulting from enzyme inactivation, thus reducing the phenol removal efficiency. On the other hand, increasing the enzyme, PEG, and/or reaction time beyond the optimum values resulted in only a marginal increase in removal efficiency.

  17. Supported graphene oxide hollow fibre membrane for oily wastewater treatment

    Science.gov (United States)

    Othman, Nur Hidayati; Alias, Nur Hashimah; Shahruddin, Munawar Zaman; Hussein, Siti Nurliyana Che Mohamed; Dollah, Aqilah

    2017-12-01

    Oil and gas industry deals with a large amount of undesirable discharges of liquid, solid, and gaseous wastes and the amounts can considerably change during the production phases. Oilfield wastewater or produced water is known to constitute various organic and inorganic components. Discharging the produced water can pollute surface and underground water and therefore the necessity to treat this oily wastewater is an inevitable challenge. The current technologies for the treatment of this metastable oil-in-water are not really effective and very pricey. As a result, there is a great interest from many parties around the world in finding cost-effective technologies. In recent years, membrane processes have been utilized for oily wastewater treatment. In these work, a graphene oxide membrane supported on a highly porous Al2O3 hollow fibre was prepared using vacuum assisted technique and its performance in treating oily wastewater was investigated. Graphene oxide (GO) was prepared using a modified Hummer's method and further characterized using XRD, FTIR, TGA and SEM. The results showed that the GO was successfully synthesized. The GO membrane was deposited on alumina hollow fibre substrates. The membrane performance was then investigated using dead-end filtration setup with synthetic oily wastewater as a feed. The effects of operating times on rejection rate and permeate flux were investigated. The experimental results showed that the oil rejections were over 90%. It was concluded that the supported GO membrane developed in this study may be considered feasible in treating oily wastewater. Detail study on the effects of transmembrane pressure, oil concentration, pH and fouling should be carried out in the future

  18. The work-averse cyber attacker model : theory and evidence from two million attack signatures

    NARCIS (Netherlands)

    Allodi, L.; Massacci, F.; Williams, J.

    The typical cyber attacker is assumed to be all powerful and to exploit all possible vulnerabilities. In this paper we present, and empirically validate, a novel and more realistic attacker model. The intuition of our model is that an attacker will optimally choose whether to act and weaponize a new

  19. Information security becoming a priority for utilities

    Energy Technology Data Exchange (ETDEWEB)

    Nicolaides, S. [Numerex, Atlanta, GA (United States)

    2009-10-15

    As part of North America's national critical infrastructure, utilities are finding themselves at the forefront of a security issue. In October 2007, a leading security service provider reported a 90 per cent increase in the number of hackers attempting to attack its utility clients in just one year. Utilities are vulnerable to cyber attacks that could disrupt power production and the transmission system. This article discussed the need for intelligent technologies in securely enabling resource management and operational efficiency of the utilities market. It discussed the unique security challenges that utilities face at a time of greater regulatory activity, heightened environmental concerns, tighter data security requirements and an increasing need for remote monitoring and control. A new tool has emerged for cyber security in the form of an international standard that may offer a strong guideline to work toward 11 security domains. These include security policy; organization of information security; asset management; human resources security; physical and environmental security; communications and operations management; access control; information systems acquisition; development and maintenance; information security incident management; business continuity management; and compliance. 2 figs.

  20. Oxidative Mineralization and Characterization of Polyvinyl Alcohol Solutions for Wastewater Treatment

    Energy Technology Data Exchange (ETDEWEB)

    Oji, L.N.

    1999-08-31

    The principal objectives of this study are to identify an appropriate polyvinyl alcohol (PVA) oxidative mineralization technique, perform compatibility and evaporation fate tests for neat and mineralized PVA, and determine potential for PVA chemical interferences which may affect ion exchange utilization for radioactive wastewater processing in the nuclear industry.

  1. Resource Guide to Effective Utility Management and Lean

    Science.gov (United States)

    Water and wastewater utilities are critical to the environmental, economic, and social well being of our nation’s communities, as they work to ensure that the public continues to enjoy the benefits of clean and safe water.

  2. Web server attack analyzer

    OpenAIRE

    Mižišin, Michal

    2013-01-01

    Web server attack analyzer - Abstract The goal of this work was to create prototype of analyzer of injection flaws attacks on web server. Proposed solution combines capabilities of web application firewall and web server log analyzer. Analysis is based on configurable signatures defined by regular expressions. This paper begins with summary of web attacks, followed by detection techniques analysis on web servers, description and justification of selected implementation. In the end are charact...

  3. Wastewater collection and treatment technologies for semi-urban areas of India: a case study.

    Science.gov (United States)

    Sundaravadivel, M; Vigneswaran, S

    2001-01-01

    Sanitation and wastewater management problems in small and medium towns in India (referred to as "semi-urban areas"--SUAs) are distinctly different from those of large cities or rural villages. There is an apparent lack of choices of appropriate sanitation options for these semi-urban areas, leading them to adopt on-site sanitation technologies. A field study of four such small towns in India was conducted to evaluate the suitability of available low-cost wastewater collection and treatment technologies, in light of their current practice. Based on the field study, this paper suggests a system comprising "combined surface sewers" and "reed-bed channel" for collection and treatment of wastewater for semi-urban areas, that can utilize all the existing infrastructure to effect better sanitation at lower costs. The suggested system involves converting the existing open wastewater collection drains on the road sides, as "decentralized" networks of covered drains with simple structural modifications to collect both wastewater and stormwater; and, converting the large open drains on the outskirts of SUAs that carry wastewater to agricultural fields, as gravel media filled beds planted with local reeds. Cost estimates for the towns studied indicate this system to be over 70% cheaper compared to conventional collection and treatment systems.

  4. Network Protection Against DDoS Attacks

    Directory of Open Access Journals (Sweden)

    Petr Dzurenda

    2015-03-01

    Full Text Available The paper deals with possibilities of the network protection against Distributed Denial of Service attacks (DDoS. The basic types of DDoS attacks and their impact on the protected network are presented here. Furthermore, we present basic detection and defense techniques thanks to which it is possible to increase resistance of the protected network or device against DDoS attacks. Moreover, we tested the ability of current commercial Intrusion Prevention Systems (IPS, especially Radware DefensePro 6.10.00 product against the most common types of DDoS attacks. We create five scenarios that are varied in type and strength of the DDoS attacks. The attacks intensity was much greater than the normal intensity of the current DDoS attacks.

  5. Attack Tree Generation by Policy Invalidation

    DEFF Research Database (Denmark)

    Ivanova, Marieta Georgieva; Probst, Christian W.; Hansen, Rene Rydhof

    2015-01-01

    through brainstorming of experts. In this work we formalize attack tree generation including human factors; based on recent advances in system models we develop a technique to identify possible attacks analytically, including technical and human factors. Our systematic attack generation is based......Attacks on systems and organisations increasingly exploit human actors, for example through social engineering, complicating their formal treatment and automatic identification. Formalisation of human behaviour is difficult at best, and attacks on socio-technical systems are still mostly identified...... on invalidating policies in the system model by identifying possible sequences of actions that lead to an attack. The generated attacks are precise enough to illustrate the threat, and they are general enough to hide the details of individual steps....

  6. Influence of wastewater characteristics on methane potential in food-processing industry wastewaters

    DEFF Research Database (Denmark)

    Maya Altamira, Larisa; Baun, Anders; Angelidaki, Irini

    2008-01-01

    ) were compared to the theoretical methane yields (Bo,th) in order to evaluate the biodegradability of the tested wastewaters and the influence of their physico-chemical characteristics. The analytical method applied to quantify the wastewaters’ organic content proved to influence the estimation...... of their theoretical yields. The substrate:inoculum ratio as well as the dilution factor of the wastewaters influenced the ultimate practical methane yields differently in each of the wastewaters assessed. Substrate chemical oxygen demand (COD) concentrations did not present any influence on ultimate practical methane...... yields; on the other hand, it was found that they were affected positively by concentrations of total inorganic carbon when wastewaters were 25% and 50% diluted and affected negatively by concentrations of total acetate when wastewaters were undiluted. Carbohydrate and protein concentrations affected...

  7. Terrorists and Suicide Attacks

    National Research Council Canada - National Science Library

    Cronin, Audrey K

    2003-01-01

    Suicide attacks by terrorist organizations have become more prevalent globally, and assessing the threat of suicide attacks against the United States and its interests at home and abroad has therefore...

  8. The sustainable utilization of malting industry wastewater biological treatment sludge

    Science.gov (United States)

    Vasilenko, T. A.; Svintsov, A. V.; Chernysh, I. V.

    2018-01-01

    The article deals with the research of using the sludge from malting industry wastewater’s biological treatment and the calcium carbonate slurry as organo-mineral fertilizing additives. The sludge, generated as a result of industrial wastewater biological treatment, is subject to dumping at solid domestic waste landfills, which has a negative impact on the environment, though its properties and composition allow using it as an organic fertilizer. The physical and chemical properties of both wastes have been studied; the recommendations concerning the optimum composition of soil mix, containing the above-mentioned components, have been provided. The phytotoxic effect on the germination capacity and sprouts of cress (Lepidium sativum), barley (Hordéum vulgáre) and oats (Avena sativa) in soil mixes has been determined. The heavy metals and arsenic contents in the sludge does not exceed the allowable level; it is also free of pathogenic flora and helminthes.

  9. Stochastic Model of TCP SYN Attacks

    Directory of Open Access Journals (Sweden)

    Simona Ramanauskaitė

    2011-08-01

    Full Text Available A great proportion of essential services are moving into internet space making the threat of DoS attacks even more actual. To estimate the real risk of some kind of denial of service (DoS attack in real world is difficult, but mathematical and software models make this task easier. In this paper we overview the ways of implementing DoS attack models and offer a stochastic model of SYN flooding attack. It allows evaluating the potential threat of SYN flooding attacks, taking into account both the legitimate system flow as well as the possible attack power. At the same time we can assess the effect of such parameters as buffer capacity, open connection storage in the buffer or filte­ring efficiency on the success of different SYN flooding attacks. This model can be used for other type of memory depletion denial of service attacks.Article in Lithuanian

  10. Attack Trees with Sequential Conjunction

    NARCIS (Netherlands)

    Jhawar, Ravi; Kordy, Barbara; Mauw, Sjouke; Radomirović, Sasa; Trujillo-Rasua, Rolando

    2015-01-01

    We provide the first formal foundation of SAND attack trees which are a popular extension of the well-known attack trees. The SAND at- tack tree formalism increases the expressivity of attack trees by intro- ducing the sequential conjunctive operator SAND. This operator enables the modeling of

  11. Heart attack first aid

    Science.gov (United States)

    First aid - heart attack; First aid - cardiopulmonary arrest; First aid - cardiac arrest ... A heart attack occurs when the blood flow that carries oxygen to the heart is blocked. The heart muscle ...

  12. Removal of Arsenic from Wastewaters by Airlift Electrocoagulation: Part 3: Copper Smelter Wastewater Treatment

    DEFF Research Database (Denmark)

    Hansen, H.K.; Ottosen, Lisbeth M.

    2010-01-01

    The arsenic content in wastewater is of major concern for copper smelters. A typical complex wastewater treatment is needed with a combination of chemical and physical processes. Electrocoagulation (EC) has shown its potential for arsenic removal due to the formation of ferric hydroxide-arsenate ...... threshold value for wastewater discharge could rapidly be reached when the conventional method did not clean the wastewater sufficiently....

  13. Detecting Attacks in CyberManufacturing Systems: Additive Manufacturing Example

    Directory of Open Access Journals (Sweden)

    Wu Mingtao

    2017-01-01

    Full Text Available CyberManufacturing System is a vision for future manufacturing where physical components are fully integrated with computational processes in a connected environment. However, realizing the vision requires that its security be adequately ensured. This paper presents a vision-based system to detect intentional attacks on additive manufacturing processes, utilizing machine learning techniques. Particularly, additive manufacturing systems have unique vulnerabilities to malicious attacks, which can result in defective infills but without affecting the exterior. In order to detect such infill defects, the research uses simulated 3D printing process images as well as actual 3D printing process images to compare accuracies of machine learning algorithms in classifying, clustering and detecting anomalies on different types of infills. Three algorithms - (i random forest, (ii k nearest neighbor, and (iii anomaly detection - have been adopted in the research and shown to be effective in detecting such defects.

  14. Investigating the Possibility to Individualize Asthma Attack Therapy Based on Attack Severity and Patient Characteristics

    Directory of Open Access Journals (Sweden)

    Sárkány Zoltán

    2016-03-01

    Full Text Available Introduction: The objective of this study was to investigate with the help of a computerized simulation model whether the treatment of an acute asthma attack can be individualized based on the severity of the attack and the characteristics of the patient. Material and Method: A stochastic lung model was used to simulate the deposition of 1 nm - 10 μm particles during a mild and a moderate asthma attack. Breathing parameters were varied to maximize deposition, and simulation results were compared with those obtained in the case of a severe asthma attack. In order to investigate the effect of height on the deposition of inhaled particles, another series of simulations was carried out with identical breathing parameters, comparing patient heights of 155 cm, 175 cm and 195 cm. Results: The optimization process yielded an increase in the maximum deposition values of around 6-7% for each type of investigated asthma attack, and the difference between attacks of different degree of severity was around 5% for both the initial and the optimized values, a higher degree of obstruction increasing the amount of deposited particles. Conclusions: Our results suggest that the individualization of asthma attack treatment cannot be based on particles of different size, as the highest deposited fraction in all three types of attacks can be obtained using 0.01 μm particles. The use of a specific set of breathing parameters yields a difference between a mild and a moderate, as well as a moderate and a severe asthma attack of around 5%.

  15. Analytical Characterization of Internet Security Attacks

    Science.gov (United States)

    Sellke, Sarah H.

    2010-01-01

    Internet security attacks have drawn significant attention due to their enormously adverse impact. These attacks includes Malware (Viruses, Worms, Trojan Horse), Denial of Service, Packet Sniffer, and Password Attacks. There is an increasing need to provide adequate defense mechanisms against these attacks. My thesis proposal deals with analytical…

  16. Analysis of Treated Wastewater Produced from Al-Lajoun Wastewater Treatment Plant, Jordan

    Directory of Open Access Journals (Sweden)

    Waleed Manasreh

    2009-01-01

    Full Text Available Assessment of treated wastewater produced from Al-Lajoun collection tanks of the wastewater treatment plant in Karak province was carried out in term of physical properties, its major ionic composition, heavy metals and general organic content, for both wastewater influent and effluent. Sampling was done in two periods during (2005-2006 summer season and during winter season to detect the impact of climate on treated wastewater quality. Soil samples were collected from Al-Lajoun valley where the treated wastewater drained, to determine the heavy metal and total organic carbon concentrations at same time. The study showed that the treated wastewater was low in its heavy metals contents during both winter and summer seasons, which was attributed to high pH value enhancing their precipitations. Some of the major ions such as Cl-, Na+, HCO33-, Mg2+ in addition to biological oxygen demand and chemical oxygen demand were higher than the recommended Jordanian guidelines for drained water in valleys. The treated wastewater contained some organic compounds of toxic type such as polycyclic aromatic hydrocarbons. Results showed that the soil was low in its heavy metal contents and total organic carbon with distance from the discharging pond, which attributed to the adsorption of heavy metals, total organic carbon and sedimentation of suspended particulates. From this study it was concluded that the treated wastewater must be used in situ for production of animal fodder and prohibit its contact with the surface and groundwater resources of the area specially Al-Mujeb dam where it is collected.

  17. Isolation and characterization of an n-hexadecane degrading Acinetobacter baumannii KSS1060 from a petrochemical wastewater treatment plant

    International Nuclear Information System (INIS)

    Shiri, Z.; Kermanshahi, R. K.; Soudi, M. R.; Farajzadeh, D.

    2015-01-01

    Hydrocarbons are widespread in the environment, but because of the massive utilization of petroleum products, they are nowadays strongly involved in environmental pollution. Bioremediation is the obliging technology for the treatment of hydrocarbon-contaminated sites. Therefore, to investigate the potential of petrochemical hydrocarbon (HC)-degrading indigenous microorganisms in wastewater samples collected from Fajr petrochemical wastewater treatment plants, a strain of Acinetobacter baumannii was isolated from this hydrocarbon-contaminated wastewater and examined for its ability to utilize hexadecane. This strain was capable to grow on n-hexadecane as the sole source of carbon and energy. The ability of the isolate to degrade n-hexadecane was assessed by growth assays and gas chromatography/mass spectrometry analysis. Using GC analysis, it was shown that the strain KSS1060 was able to degrade 62 % of n-hexadecane within 6 days, which mostly (51.6 %) occurred within the first 24 h. Identification of this hexadecane-degrader bacterium was carried out using 16S rDNA sequence analysis. Additionally, characterization of chemical composition of wastewater samples by the use of gas chromatography/mass spectrometry analysis indicated the presence of Hexanal, Benzene methanol, Indanol, 1,2-benzenedicarboxylic acid diethyl ester, diisobutyl phthalate, and Phenol,4,4′-(1-methylethylidene) in the major constituents of wastewater. In conclusion, this study can focus on more cost-efficient applications of native bacterial strains for the large-scale biodegradation of wastewater samples from petrochemical plant in industry, where it causes disturbing problems due to its harmful effects on different organisms and human beings.

  18. Assessment of wastewater treatment plant effluent on fish reproduction utilizing the adverse outcome pathway conceptual framework

    Science.gov (United States)

    Wastewater treatment plant (WWTP) effluents are a known contributor of chemical mixture inputs into the environment. Whole effluent testing guidelines were developed to screen these complex mixtures for acute toxicity. However, efficient and cost-effective approaches for screenin...

  19. Anger attacks in obsessive compulsive disorder

    Directory of Open Access Journals (Sweden)

    Nitesh Prakash Painuly

    2011-01-01

    Full Text Available Background: Research on anger attacks has been mostly limited to depression, and only a few studies have focused on anger attacks in obsessive compulsive disorder. Materials and Methods: In a cross-sectional study all new obsessive compulsive disorder patients aged 20-60 years attending an outpatient clinic were assessed using the anger attack questionnaire, irritability, depression and anxiety scale (for the direction of the aggressive behavior and quality of life (QOL. Results: The sample consisted of 42 consecutive subjects with obsessive compulsive disorder, out of which 21 (50% had anger attacks. The obsessive compulsive disorder subjects with and without anger attacks did not show significant differences in terms of sociodemographic variables, duration of illness, treatment, and family history. However, subjects with anger attacks had significantly higher prevalence of panic attacks and comorbid depression. Significantly more subjects with anger attacks exhibited aggressive acts toward spouse, parents, children, and other relatives in the form of yelling and threatening to hurt, trying to hurt, and threatening to leave. However, the two groups did not differ significantly in terms of QOL, except for the psychological domain being worse in the subjects with anger attacks. Conclusion: Anger attacks are present in half of the patients with obsessive compulsive disorder, and they correlate with the presence of comorbid depression.

  20. Wastewater screening method for evaluating applicability of zero-valent iron to industrial wastewater

    International Nuclear Information System (INIS)

    Lee, J.W.; Cha, D.K.; Oh, Y.K.; Ko, K.B.; Jin, S.H.

    2010-01-01

    This study presents a screening protocol to evaluate the applicability of the ZVI pretreatment to various industrial wastewaters of which major constituents are not identified. The screening protocol consisted of a sequential analysis of UV-vis spectrophotometry, high-performance liquid chromatograph (HPLC), and bioassay. The UV-vis and HPLC analyses represented the potential reductive transformation of unknown constituents in wastewater by the ZVI. The UV-vis and HPLC results were quantified using principal component analysis (PCA) and Euclidian distance (ED). The short-term bioassay was used to assess the increased biodegradability of wastewater constituents after ZVI treatment. The screening protocol was applied to seven different types of real industrial wastewaters. After identifying one wastewater as the best candidate for the ZVI treatment, the benefit of ZVI pretreatment was verified through continuous operation of an integrated iron-sequencing batch reactor (SBR) resulting in the increased organic removal efficiency compared to the control. The iron pretreatment was suggested as an economical option to modify some costly physico-chemical processes in the existing wastewater treatment facility. The screening protocol could be used as a robust strategy to estimate the applicability of ZVI pretreatment to a certain wastewater with unknown composition.

  1. A Weak Value Based QKD Protocol Robust Against Detector Attacks

    Science.gov (United States)

    Troupe, James

    2015-03-01

    We propose a variation of the BB84 quantum key distribution protocol that utilizes the properties of weak values to insure the validity of the quantum bit error rate estimates used to detect an eavesdropper. The protocol is shown theoretically to be secure against recently demonstrated attacks utilizing detector blinding and control and should also be robust against all detector based hacking. Importantly, the new protocol promises to achieve this additional security without negatively impacting the secure key generation rate as compared to that originally promised by the standard BB84 scheme. Implementation of the weak measurements needed by the protocol should be very feasible using standard quantum optical techniques.

  2. Phosphate Recovery from Human Waste via the Formation of Hydroxyapatite during Electrochemical Wastewater Treatment.

    Science.gov (United States)

    Cid, Clément A; Jasper, Justin T; Hoffmann, Michael R

    2018-03-05

    Electrolysis of toilet wastewater with TiO 2 -coated semiconductor anodes and stainless steel cathodes is a potentially viable onsite sanitation solution in parts of the world without infrastructure for centralized wastewater treatment. In addition to treating toilet wastewater, pilot-scale and bench-scale experiments demonstrated that electrolysis can remove phosphate by cathodic precipitation as hydroxyapatite at no additional energy cost. Phosphate removal could be predicted based on initial phosphate and calcium concentrations, and up to 80% total phosphate removal was achieved. While calcium was critical for phosphate removal, magnesium and bicarbonate had only minor impacts on phosphate removal rates at concentrations typical of toilet wastewater. Optimal conditions for phosphate removal were 3 to 4 h treatment at about 5 mA cm -2 (∼3.4 V), with greater than 20 m 2 m -3 electrode surface area to reactor volume ratios. Pilot-scale systems are currently operated under similar conditions, suggesting that phosphate removal can be viewed as an ancillary benefit of electrochemical wastewater treatment, adding utility to the process without requiring additional energy inputs. Further value may be provided by designing reactors to recover precipitated hydroxyapatite for use as a low solubility phosphorus-rich fertilizer.

  3. Optimized biological nitrogen removal of high-strength ammonium wastewater by activated sludge modeling

    Directory of Open Access Journals (Sweden)

    Abdelsalam Elawwad

    2018-09-01

    Full Text Available Wastewater containing high ammonium concentrations is produced from various industrial activities. In this study, the author used a complex activated sludge model, improved by utilizing BioWin© (EnviroSim, Hamilton, Canada simulation software, to gain understanding of the problem of instability in biological nitrogen removal (BNR. Specifically, the study focused on BNR in an industrial wastewater treatment plant that receives high-strength ammonium wastewater. Using the data obtained from a nine-day sampling campaign and routinely measured data, the model was successfully calibrated and validated, with modifications to the sensitive stoichiometric and kinetic parameters. Subsequently, the calibrated model was employed to study various operating conditions in order to optimize the BNR. These operating conditions include alkalinity addition, sludge retention time, and the COD/N ratio. The addition of a stripping step and modifications to the configuration of the aerators are suggested by the author to increase the COD/N ratio and therefore enhance denitrification. It was found that the calibrated model could successfully represent and optimize the treatment of the high-strength ammonium wastewater.

  4. Advanced purification of petroleum refinery wastewater by catalytic vacuum distillation.

    Science.gov (United States)

    Yan, Long; Ma, Hongzhu; Wang, Bo; Mao, Wei; Chen, Yashao

    2010-06-15

    In our work, a new process, catalytic vacuum distillation (CVD) was utilized for purification of petroleum refinery wastewater that was characteristic of high chemical oxygen demand (COD) and salinity. Moreover, various common promoters, like FeCl(3), kaolin, H(2)SO(4) and NaOH were investigated to improve the purification efficiency of CVD. Here, the purification efficiency was estimated by COD testing, electrolytic conductivity, UV-vis spectrum, gas chromatography-mass spectrometry (GC-MS) and pH value. The results showed that NaOH promoted CVD displayed higher efficiency in purification of refinery wastewater than other systems, where the pellucid effluents with low salinity and high COD removal efficiency (99%) were obtained after treatment, and the corresponding pH values of effluents varied from 7 to 9. Furthermore, environment estimation was also tested and the results showed that the effluent had no influence on plant growth. Thus, based on satisfied removal efficiency of COD and salinity achieved simultaneously, NaOH promoted CVD process is an effective approach to purify petroleum refinery wastewater. Copyright 2010 Elsevier B.V. All rights reserved.

  5. Energy and air emission implications of a decentralized wastewater system

    International Nuclear Information System (INIS)

    Shehabi, Arman; Stokes, Jennifer R; Horvath, Arpad

    2012-01-01

    Both centralized and decentralized wastewater systems have distinct engineering, financial and societal benefits. This paper presents a framework for analyzing the environmental effects of decentralized wastewater systems and an evaluation of the environmental impacts associated with two currently operating systems in California, one centralized and one decentralized. A comparison of energy use, greenhouse gas emissions and criteria air pollutants from the systems shows that the scale economies of the centralized plant help lower the environmental burden to less than a fifth of that of the decentralized utility for the same volume treated. The energy and emission burdens of the decentralized plant are reduced when accounting for high-yield wastewater reuse if it supplants an energy-intensive water supply like a desalination one. The centralized facility also reduces greenhouse gases by flaring methane generated during the treatment process, while methane is directly emitted from the decentralized system. The results are compelling enough to indicate that the life-cycle environmental impacts of decentralized designs should be carefully evaluated as part of the design process. (letter)

  6. Seven Deadliest Social Network Attacks

    CERN Document Server

    Timm, Carl

    2010-01-01

    Do you need to keep up with the latest hacks, attacks, and exploits effecting social networks? Then you need Seven Deadliest Social Network Attacks. This book pinpoints the most dangerous hacks and exploits specific to social networks like Facebook, Twitter, and MySpace, laying out the anatomy of these attacks including how to make your system more secure. You will discover the best ways to defend against these vicious hacks with step-by-step instruction and learn techniques to make your computer and network impenetrable. Attacks detailed in this book include: Social Networking Infrastruct

  7. Pericarditis - after heart attack

    Science.gov (United States)

    ... include: A previous heart attack Open heart surgery Chest trauma A heart attack that has affected the thickness of your heart muscle Symptoms Symptoms include: Anxiety Chest pain from the swollen pericardium rubbing on the ...

  8. Production of a High Efficiency Microbial Flocculant by Proteus mirabilis TJ-1 Using Compound Organic Wastewater

    Science.gov (United States)

    Zhang, Zhiqiang; Xia, Siqing; Zhang, Jiao

    2010-11-01

    The production of a high efficiency microbial flocculant (MBF) by Proteus mirabilis TJ-1 using compound organic wastewater was investigated. To cut down the cost of the MBF production, several nutritive organic wastewaters were selected to replace glucose and peptone as the carbon source and the nitrogen source in the optimized medium of strain TJ-1, respectively. The compound wastewater of the milk candy and the soybean milk was found to be good carbon source and nitrogen source for this strain to produce MBF. The cost-effective culture medium consists of (per liter): 800 mL wastewater of milk candy, 200 mL wastewater of soybean milk, 0.3 g MgSO4ṡ7 H2O, 5 g K2HPO4, 2 g and KH2PO4, pH 7.0. The economic cost for the MBF production can be cut down over a half by using the developed culture medium. Furthermore, the utilization of the two wastewaters in the preparation of culture medium of strain TJ-1 can not only save their big treatment cost, but also realize their resource reuse.

  9. The physiological and biochemical mechanism of nitrate-nitrogen removal by water hyacinth from agriculture eutrophic wastewater

    Directory of Open Access Journals (Sweden)

    WU Wenwei

    Full Text Available ABSTRACT Large amount of agriculturl wastewater containing high level nitrate-nitrogen (NO3 --N is produced from modern intensive agricultural production management due to the excessive use of chemical fertilizers and livestock scale farming. The hydroponic experiment of water hyacinth was conducted for analyzing the content of NO3 --N, soluble sugar content, N-transported the amino acid content and growth change in water hyacinth to explore its purification ability to remove NO3 --N from agriculture eutrophic wastewater and physiological and biochemical mechanism of this plant to remove NO3 --N. The results showed that the water hyacinth could effectively utilize the NO3 --N from agriculture eutrophic wastewater. Compared with the control, the contents of NO3 -change to NO3 --N in the root, leaf petiole and leaf blade of water hyacinth after treatment in the wastewater for a week was significantly higher than that in the control plants treated with tap water, and also the biomass of water hyacinth increased significantly, indicating that the accumulation of biomass due to the rapid growth of water hyacinth could transfer some amount of NO3 --N.13C-NMR analysis confirmed that water hyacinth would convert the part nitrogen absorbed from agriculture eutrophic wastewater to ammonia nitrogen, which increased the content of aspartic acid and glutamic acid, decreased the content of soluble sugar, sucrose and fructose and the content of N-storaged asparagine and glutamine, lead to enhance the synthesis of plant amino acids and promote the growth of plants. These results indicate that the nitrate in agriculture eutrophic wastewater can be utilized by water hyacinth as nitrogen nutrition, and can promote plant growth by using soluble sugar and amide to synthesis amino acids and protein.

  10. Defense strategies for asymmetric networked systems under composite utilities

    Energy Technology Data Exchange (ETDEWEB)

    Rao, Nageswara S. [ORNL; Ma, Chris Y. T. [Hang Seng Management College, Hon Kong; Hausken, Kjell [University of Stavanger, Norway; He, Fei [Texas A& M University, Kingsville, TX, USA; Yau, David K. Y. [Singapore University of Technology and Design; Zhuang, Jun [University at Buffalo (SUNY)

    2017-11-01

    We consider an infrastructure of networked systems with discrete components that can be reinforced at certain costs to guard against attacks. The communications network plays a critical, asymmetric role of providing the vital connectivity between the systems. We characterize the correlations within this infrastructure at two levels using (a) aggregate failure correlation function that specifies the infrastructure failure probability giventhe failure of an individual system or network, and (b) first order differential conditions on system survival probabilities that characterize component-level correlations. We formulate an infrastructure survival game between an attacker and a provider, who attacks and reinforces individual components, respectively. They use the composite utility functions composed of a survival probability term and a cost term, and the previously studiedsum-form and product-form utility functions are their special cases. At Nash Equilibrium, we derive expressions for individual system survival probabilities and the expected total number of operational components. We apply and discuss these estimates for a simplified model of distributed cloud computing infrastructure

  11. Simultaneous photocatalytic and microbial degradation of dye-containing wastewater by a novel g-C3N4-P25/photosynthetic bacteria composite.

    Directory of Open Access Journals (Sweden)

    Xinying Zhang

    Full Text Available Azo dyes are very resistant to light-induced fading and biodegradation. Existing advanced oxidative pre-treatment methods based on the generation of non-selective radicals cannot efficiently remove these dyes from wastewater streams, and post-treatment oxidative dye removal is problematic because it may leave many byproducts with unknown toxicity profiles in the outgoing water, or cause expensive complete mineralization. These problems could potentially be overcome by combining photocatalysis and biodegradation. A novel visible-light-responsive hybrid dye removal agent featuring both photocatalysts (g-C3N4-P25 and photosynthetic bacteria encapsulated in calcium alginate beads was prepared by self-assembly. This system achieved a removal efficiency of 94% for the dye reactive brilliant red X-3b and also reduced the COD of synthetic wastewater samples by 84.7%, successfully decolorized synthetic dye-contaminated wastewater and reduced its COD, demonstrating the advantages of combining photocatalysis and biocatalysis for wastewater purification. The composite apparently degrades X-3b by initially converting the dye into aniline and phenol derivatives whose aryl moieties are then attacked by free radicals to form alkyl derivatives, preventing the accumulation of aromatic hydrocarbons that might suppress microbial activity. These alkyl intermediates are finally degraded by the photosynthetic bacteria.

  12. WILD PIG ATTACKS ON HUMANS

    Energy Technology Data Exchange (ETDEWEB)

    Mayer, J.

    2013-04-12

    Attacks on humans by wild pigs (Sus scrofa) have been documented since ancient times. However, studies characterizing these incidents are lacking. In an effort to better understand this phenomenon, information was collected from 412 wild pig attacks on humans. Similar to studies of large predator attacks on humans, data came from a variety of sources. The various attacks compiled occurred in seven zoogeographic realms. Most attacks occurred within the species native range, and specifically in rural areas. The occurrence was highest during the winter months and daylight hours. Most happened under non-hunting circumstances and appeared to be unprovoked. Wounded animals were the chief cause of these attacks in hunting situations. The animals involved were typically solitary, male and large in size. The fate of the wild pigs involved in these attacks varied depending upon the circumstances, however, most escaped uninjured. Most human victims were adult males traveling on foot and alone. The most frequent outcome for these victims was physical contact/mauling. The severity of resulting injuries ranged from minor to fatal. Most of the mauled victims had injuries to only one part of their bodies, with legs/feet being the most frequent body part injured. Injuries were primarily in the form of lacerations and punctures. Fatalities were typically due to blood loss. In some cases, serious infections or toxemia resulted from the injuries. Other species (i.e., pets and livestock) were also accompanying some of the humans during these attacks. The fates of these animals varied from escaping uninjured to being killed. Frequency data on both non-hunting and hunting incidents of wild pig attacks on humans at the Savannah River Site, South Carolina, showed quantitatively that such incidents are rare.

  13. Cache timing attacks on recent microarchitectures

    DEFF Research Database (Denmark)

    Andreou, Alexandres; Bogdanov, Andrey; Tischhauser, Elmar Wolfgang

    2017-01-01

    Cache timing attacks have been known for a long time, however since the rise of cloud computing and shared hardware resources, such attacks found new potentially devastating applications. One prominent example is S$A (presented by Irazoqui et al at S&P 2015) which is a cache timing attack against...... AES or similar algorithms in virtualized environments. This paper applies variants of this cache timing attack to Intel's latest generation of microprocessors. It enables a spy-process to recover cryptographic keys, interacting with the victim processes only over TCP. The threat model is a logically...... separated but CPU co-located attacker with root privileges. We report successful and practically verified applications of this attack against a wide range of microarchitectures, from a two-core Nehalem processor (i5-650) to two-core Haswell (i7-4600M) and four-core Skylake processors (i7-6700). The attack...

  14. Hazardous substances in wastewater systems:a delicate issue for wastewater management

    OpenAIRE

    Palmquist, Helena

    2001-01-01

    Many substances derived from human activity end up in wastewater systems at some point. A large number of different substances - up to 30,000 - are present in wastewater. Some of them are valuable, such as nitrogen and phosphorus, but there are also hazardous substances such as heavy metals and anthropogenic organic substances. To be able to utilise the wastewater nutrients on arable land (agriculture, forestry or other alternatives), it is of great importance to investigate the sources of ha...

  15. Disinfection of Ebola Virus in Sterilized Municipal Wastewater.

    Science.gov (United States)

    Bibby, Kyle; Fischer, Robert J; Casson, Leonard W; de Carvalho, Nathalia Aquino; Haas, Charles N; Munster, Vincent J

    2017-02-01

    Concerns have been raised regarding handling of Ebola virus contaminated wastewater, as well as the adequacy of proposed disinfection approaches. In the current study, we investigate the inactivation of Ebola virus in sterilized domestic wastewater utilizing sodium hypochlorite addition and pH adjustment. No viral inactivation was observed in the one-hour tests without sodium hypochlorite addition or pH adjustment. No virus was recovered after 20 seconds (i.e. 4.2 log10 unit inactivation to detection limit) following the addition of 5 and 10 mg L-1 sodium hypochlorite, which resulted in immediate free chlorine residuals of 0.52 and 1.11 mg L-1, respectively. The addition of 1 mg L-1 sodium hypochlorite resulted in an immediate free chlorine residual of 0.16 mg L-1, which inactivated 3.5 log10 units of Ebola virus in 20 seconds. Further inactivation was not evident due to the rapid consumption of the chlorine residual. Elevating the pH to 11.2 was found to significantly increase viral decay over ambient conditions. These results indicate the high susceptibility of the enveloped Ebola virus to disinfection in the presence of free chlorine in municipal wastewater; however, we caution that extension to more complex matrices (e.g. bodily fluids) will require additional verification.

  16. Integrated Constructed Wetlands (ICW) for livestock wastewater management.

    Science.gov (United States)

    Harrington, Rory; McInnes, Robert

    2009-11-01

    Social, economic and environmental coherence is sought in the management of livestock wastewater. Wetlands facilitate the biogeochemical processes that exploit livestock wastewater and provide opportunities to achieve such coherence and also to deliver on a range of ecosystem services. The Integrated Constructed Wetland (ICW) concept integrates three inextricably linked objectives: water quantity and quality management, landscape-fit to improve aesthetic site values and enhanced biodiversity. The synergies derived from this explicit integration allow one of the key challenges for livestock management to be addressed. An example utilizing twelve ICW systems from a catchment on the south coast of Ireland demonstrates that over an eight year period mean reduction of total and soluble phosphorus (molybdate reactive phosphorus) exceeded 95% and the mean removal of ammonium-N exceeded 98%. This paper reviews evidence regarding the capacity of ICWs to provide a coherent and sustainable alternative to conventional systems.

  17. Assessment of On-Site Treatment Process of Institutional Building’s Wastewater

    Directory of Open Access Journals (Sweden)

    Motasem N. Saidan

    2018-03-01

    Full Text Available This study is conducted to investigate the characteristics of outflow wastewater of the 1 m3 on-site wastewater treatment unit on the basis of the testing and measurement data of the samples that were taken during the study monitored period (August 2017 to January 2018. For this purpose, samples were taken on a weekly basis from the treated wastewater effluent and five quality parameters (biochemical oxygen demand (BOD, chemical oxygen demand (COD, total suspended solids (TSS, pH, E-coli counts were monitored and measured. The average values of the five parameters were compared with the Jordanian standard maximum values, and water reuse in irrigation of plants classifications have been assessed and investigated. Average values of BOD, COD, TSS, pH, and E-coli in treated wastewater were 11 mg/L, 104 mg/L, 15 mg/L, 7.51, and 387 counts, respectively. The installation of in-line ultraviolet (UV unit in recirculating delivery system played a vital role in the reduction of counts far below the permissible maximum level (1000 counts. Based on national and international standards and criteria, results showed that the treated wastewater is suitable for the irrigation of two classifications of plants: (i Fruit trees, road-green sides outside cities, and green landscape; (ii Crops, commercial crops, and forest trees. Hence, such very low water flow rate treatment system can be utilized in refugees’ camps and water scarce residential areas in Jordan.

  18. Treatment of low-activity-level process wastewaters by continuous countercurrent ion exchange

    International Nuclear Information System (INIS)

    Hall, R.; Watson, J.S.; Robinson, S.M.

    1990-01-01

    A mobile pilot-scale continuous countercurrent ion-exchange (CCIX) system is being operated at the Oak Ridge National Laboratory (ORNL) for the treatment of wastewaters that contain predominantly calcium sodium, and magnesium bicarbonates and are slightly contaminated with 90 Sr and 137 Cs radioisotopes. A demonstration study is being conducted to evaluate the near-steady-state performance and feasibility of a pilot-scale CCIX column for the selective removal of strontium from wastewater. Test results show that the process removes strontium sufficiently from the wastewater to permit discharge while significantly reducing the volume of secondary waste generation. CCIX has the potential for effective use in several applications; however, it has not been frequently utilized by industries to date. The CCIX system could offer an economical alternative for decontamination of wastewaters containing trace amounts of contaminants prior to discharge into the environment. This paper discusses (a) application of the Thomas model for predicting breakthrough curves from ion exchange column tests, (b) methods for scaleup of experimental small-scale ion-exchange columns to industrial-scale columns, and (c) methods for predicting effluent compositions in a CCIX system. 20 refs., 6 figs., 2 tabs

  19. Resilience theory incorporated into urban wastewater systems management. State of the art.

    Science.gov (United States)

    Juan-García, P; Butler, D; Comas, J; Darch, G; Sweetapple, C; Thornton, A; Corominas, Ll

    2017-05-15

    Government bodies, utilities, practitioners, and researchers have growing interest in the incorporation of resilience into wastewater management. Since resilience is a multidisciplinary term, it is important to review what has been achieved in the wastewater sector, and describe the future research directions for the forthcoming years. This work presents a critical review of studies that deal with resilience in the wastewater treatment sector, with a special focus on understanding how they addressed the key elements for assessing resilience, such as stressors, system properties, metrics and interventions to increase resilience. The results showed that only 17 peer-reviewed papers and 6 relevant reports, a small subset of the work in wastewater research, directly addressed resilience. The lack of consensus in the definition of resilience, and the elements of a resilience assessment, is hindering the implementation of resilience in wastewater management. To date, no framework for resilience assessment is complete, comprehensive or directly applicable to practitioners; current examples are lacking key elements (e.g. a comprehensive study of stressors, properties and metrics, examples of cases study, ability to benchmark interventions or connectivity with broader frameworks). Furthermore, resilience is seen as an additional cost or extra effort, instead of a means to overcome project uncertainty that could unlock new opportunities for investment. Copyright © 2017 The Authors. Published by Elsevier Ltd.. All rights reserved.

  20. Review of wastewater problems and wastewater-management planning in the San Francisco Bay region, California

    Science.gov (United States)

    Hines, Walter G.

    1973-01-01

    The San Francisco Bay region has suffered adverse environmental effects related to the discharge of municipal-, industrial-, and agricultural- wastewater and storm-water runoff. Specific pollutional properties of theses discharges are not well understood in all cases although the toxic materials and aquatic-plant nutrients (biostimulants) found in municipal and industrial waterwater are considered to be a major cause of regional water-quality problems. Other water-quality problems in the region are commonly attributed to pesticides found in agricultural wastewater and potentially pathogenic bacteria in municipal-wastewater discharges and in storm-water runoff. The geographical distribution and magnitude of wastewater discharges in the bay region, particularly those from municipalities and industries, is largely a function of population, economic growth, and urban development. As might be expected, the total volume of wastewater has increased in a trend paralleling this growth and development. More significant, perhaps, is the fact that the total volume parameters such as BOD (biochemical oxygen demand), biostimulant concentrations, and toxicity, has increased despite large expenditures on new and improved municipal- and industrial-wastewater-treatment plants. Also, pollutant loadings from other major source, such as agriculture and storm-water runoff, have increased. At the time of writing (1972), many Federal, State, regional, and local agencies are engaged in a comprehensive wastewater-management-planning effort for the entire bay region. Initial objectives of this planning effort are: (1) the consolidation and coordination of loosely integrated wastewater-management facilities and (2) the elimination of wastewater discharges to ecologically sensitive areas, such as fresh-water streams and shallow extremities of San Francisco Bay. There has been some investigation of potential long-range wastewater-management alternatives based upon disposal in deep water in the

  1. The Cyber-Physical Attacker

    DEFF Research Database (Denmark)

    Vigo, Roberto

    2012-01-01

    The world of Cyber-Physical Systems ranges from industrial to national interest applications. Even though these systems are pervading our everyday life, we are still far from fully understanding their security properties. Devising a suitable attacker model is a crucial element when studying...... the security properties of CPSs, as a system cannot be secured without defining the threats it is subject to. In this work an attacker scenario is presented which addresses the peculiarities of a cyber-physical adversary, and we discuss how this scenario relates to other attacker models popular in the security...

  2. Forensics Investigation of Web Application Security Attacks

    OpenAIRE

    Amor Lazzez; Thabet Slimani

    2015-01-01

    Nowadays, web applications are popular targets for security attackers. Using specific security mechanisms, we can prevent or detect a security attack on a web application, but we cannot find out the criminal who has carried out the security attack. Being unable to trace back an attack, encourages hackers to launch new attacks on the same system. Web application forensics aims to trace back and attribute a web application security attack to its originator. This may significantly reduce the sec...

  3. Evaluation on ecological stability and biodegradation of dyeing wastewater pre-treated by electron beam

    International Nuclear Information System (INIS)

    Lee, M.J.; Park, C.K.; Yoo, D.H.; Lee, J.K.; Lee, B.J.; Han, B.S.; Kim, J.K.; Kim, Y.R.

    2005-01-01

    Biological treatment of dye wastewater pre-treated by electron beam has been performed in order to evaluate the biodegradation and ecological stability of effluent. In the process of electron-beam treatment of wastewater there are utilized chemical transformations of pollutants induced by ionizing radiation. Partial decomposition of pollutant takes place as well as transformations of pollutant molecules that result in improving subsequent purification stages like as biological processing. Dyeing wastewater contains many kind of pollutants which are difficult to be decomposed completely by microorganisms. In this study, biodegradation with dyeing wastewater pre-treated by electron beams was observed. On the other hand, consideration on public acceptance in terms of ecological stability of biological effluent pre-treated by electron beams was given in this study. The results of laboratory investigations on biodegradation and ecological stability of effluent showed that biodegradation of dye wastewater pre-treated by electron beam was enhanced compared to unirradiated one. In the initial stage of biological oxidation regardless of different HRT, dye wastewater pre-treated by electron beam could be oxidized easily compare to without treated one. More number of survived daphnia magna could be observed in the biological effluent pre-treated by electron beam. This means that biological effluent pre-treated by electron beam can be said 'it is safe on the ecological system'

  4. Energy Recovery from Wastewater Treatment Plants in the United States: A Case Study of the Energy-Water Nexus

    OpenAIRE

    Ashlynn S. Stillwell; David C. Hoppock; Michael E. Webber

    2010-01-01

    This manuscript uses data from the U.S. Environmental Protection Agency to analyze the potential for energy recovery from wastewater treatment plants via anaerobic digestion with biogas utilization and biosolids incineration with electricity generation. These energy recovery strategies could help offset the electricity consumption of the wastewater sector and represent possible areas for sustainable energy policy implementation. We estimate that anaerobic digestion could save 628 to 4,940 mil...

  5. Time Series Analysis and Forecasting of Wastewater Inflow into Bandar Tun Razak Sewage Treatment Plant in Selangor, Malaysia

    Science.gov (United States)

    Abunama, Taher; Othman, Faridah

    2017-06-01

    Analysing the fluctuations of wastewater inflow rates in sewage treatment plants (STPs) is essential to guarantee a sufficient treatment of wastewater before discharging it to the environment. The main objectives of this study are to statistically analyze and forecast the wastewater inflow rates into the Bandar Tun Razak STP in Kuala Lumpur, Malaysia. A time series analysis of three years’ weekly influent data (156weeks) has been conducted using the Auto-Regressive Integrated Moving Average (ARIMA) model. Various combinations of ARIMA orders (p, d, q) have been tried to select the most fitted model, which was utilized to forecast the wastewater inflow rates. The linear regression analysis was applied to testify the correlation between the observed and predicted influents. ARIMA (3, 1, 3) model was selected with the highest significance R-square and lowest normalized Bayesian Information Criterion (BIC) value, and accordingly the wastewater inflow rates were forecasted to additional 52weeks. The linear regression analysis between the observed and predicted values of the wastewater inflow rates showed a positive linear correlation with a coefficient of 0.831.

  6. Petroleum-hydrocarbon utilization by native bacterial population ...

    African Journals Online (AJOL)

    Two Nigerian crude oils (Bonny light and Escravos blend) were exposed to the wastewater canal via oil impregnated membrane filters (0.45 μm diameter) for 21 days in a microcosm experiment. Bacterial petroleum-hydrocarbon utilizers were later harvested from both the millipore membrane filters and laboratory ...

  7. Adaptive cyber-attack modeling system

    Science.gov (United States)

    Gonsalves, Paul G.; Dougherty, Edward T.

    2006-05-01

    The pervasiveness of software and networked information systems is evident across a broad spectrum of business and government sectors. Such reliance provides an ample opportunity not only for the nefarious exploits of lone wolf computer hackers, but for more systematic software attacks from organized entities. Much effort and focus has been placed on preventing and ameliorating network and OS attacks, a concomitant emphasis is required to address protection of mission critical software. Typical software protection technique and methodology evaluation and verification and validation (V&V) involves the use of a team of subject matter experts (SMEs) to mimic potential attackers or hackers. This manpower intensive, time-consuming, and potentially cost-prohibitive approach is not amenable to performing the necessary multiple non-subjective analyses required to support quantifying software protection levels. To facilitate the evaluation and V&V of software protection solutions, we have designed and developed a prototype adaptive cyber attack modeling system. Our approach integrates an off-line mechanism for rapid construction of Bayesian belief network (BN) attack models with an on-line model instantiation, adaptation and knowledge acquisition scheme. Off-line model construction is supported via a knowledge elicitation approach for identifying key domain requirements and a process for translating these requirements into a library of BN-based cyber-attack models. On-line attack modeling and knowledge acquisition is supported via BN evidence propagation and model parameter learning.

  8. Predicting Factors of Zone 4 Attack in Volleyball.

    Science.gov (United States)

    Costa, Gustavo C; Castro, Henrique O; Evangelista, Breno F; Malheiros, Laura M; Greco, Pablo J; Ugrinowitsch, Herbert

    2017-06-01

    This study examined 142 volleyball games of the Men's Super League 2014/2015 seasons in Brazil from which we analyzed 24-26 games of each participating team, identifying 5,267 Zone 4 attacks for further analysis. Within these Zone 4 attacks, we analyzed the association between the effect of the attack carried out and the separate effects of serve reception, tempo and type of attack. We found that the reception, tempo of attack, second tempo of attack, and power of diagonal attack were predictors of the attack effect in Zone 4. Moreover, placed attacks showed a tendency to not yield a score. In conclusion, winning points in high-level men's volleyball requires excellent receptions, a fast attack tempo and powerfully executed of attacks.

  9. Extra-capacity versus protection for supply networks under attack

    International Nuclear Information System (INIS)

    Bricha, Naji; Nourelfath, Mustapha

    2014-01-01

    This article develops a game-theoretical model to deal with the protection of facilities, in the context of the capacitated fixed-charge location and capacity acquisition problem. A set of investment alternatives is available for direct protection of facilities. Furthermore, extra-capacity of neighbouring functional facilities can be used after attacks to avoid the backlog of demands and backorders. The proposed model considers a non-cooperative two-period game between the players, and an algorithm is presented to determine the equilibrium solution and the optimal defender strategy under capacity constraints. A method is developed to evaluate the utilities of the defender and the attacker. The benefit of the proposed approach is illustrated using a numerical example. The defence strategy of our model is compared to other strategies, and the obtained results clearly indicate the superiority of our model in finding the best trade-off between direct protection investment and extra-capacity deployment

  10. Basic Principles of Wastewater Treatment

    OpenAIRE

    Von Sperling, Marcos

    2007-01-01

    "Basic Principles of Wastewater Treatment is the second volume in the series Biological Wastewater Treatment, and focusses on the unit operations and processes associated with biological wastewater treatment. The major topics covered are: microbiology and ecology of wastewater treatment reaction kinetics and reactor hydraulics conversion of organic and inorganic matter sedimentation aeration The theory presented in this volume forms the basis upon which the other books...

  11. Wastewater management in Khartoum Region Soba wastewater treatment plant (stabilization ponds)

    International Nuclear Information System (INIS)

    Maki, A. M. E.

    2010-03-01

    Soba wastewater treatment plant will be replaced shortly by new plant based on activate sludge. This study was carried in order to evaluate: the design, physical, chemical and biological characteristics and the capacity of the plant. Outlet Effluents quality was compared with Sudan wastewater treatment standards. Samples analyses were carried by UNESCO CHAIR 2006 (Khartoum State). It was found that the result is not as: The designed and standard level especially for BOD, COD, TBC and TC. It was also found that BOD and COD of the effluents were not complying with adopted standards for treated wastewater to be discharged to the environment. The study reached the conclusions that plant is overloaded and the characteristics of the wastewater received is not as the design which affects the efficiency of the treatment process. (Author)

  12. Attack Potential Evaluation in Desktop and Smartphone Fingerprint Sensors: Can They Be Attacked by Anyone?

    Directory of Open Access Journals (Sweden)

    Ines Goicoechea-Telleria

    2018-01-01

    Full Text Available The use of biometrics keeps growing. Every day, we use biometric recognition to unlock our phones or to have access to places such as the gym or the office, so we rely on the security manufacturers offer when protecting our privileges and private life. It is well known that it is possible to hack into a fingerprint sensor using fake fingers made of Play-Doh and other easy-to-obtain materials but to what extent? Is this true for all users or only for specialists with a deep knowledge on biometrics? Are smartphone fingerprint sensors as reliable as desktop sensors? To answer these questions, we performed 3 separate evaluations. First, we evaluated 4 desktop fingerprint sensors of different technologies by attacking them with 7 different fake finger materials. All of them were successfully attacked by an experienced attacker. Secondly, we carried out a similar test on 5 smartphones with embedded sensors using the most successful materials, which also hacked the 5 sensors. Lastly, we gathered 15 simulated attackers with no background in biometrics to create fake fingers of several materials, and they had one week to attack the fingerprint sensors of the same 5 smartphones, with the starting point of a short video with the techniques to create them. All 5 smartphones were successfully attacked by an inexperienced attacker. This paper will provide the results achieved, as well as an analysis on the attack potential of every case. All results are given following the metrics of the standard ISO/IEC 30107-3.

  13. Wastewater treatment by nanofiltration membranes

    Science.gov (United States)

    Mulyanti, R.; Susanto, H.

    2018-03-01

    Lower energy consumption compared to reverse osmosis (RO) and higher rejection compared to ultrafiltration make nanofiltration (NF) membrane get more and more attention for wastewater treatment. NF has become a promising technology not only for treating wastewater but also for reusing water from wastewater. This paper presents various application of NF for wastewater treatments. The factors affecting the performance of NF membranes including operating conditions, feed characteristics and membrane characteristics were discussed. In addition, fouling as a severe problem during NF application is also presented. Further, future prospects and challenges of NF for wastewater treatments are explained.

  14. Managing burn victims of suicide bombing attacks: outcomes, lessons learnt, and changes made from three attacks in Indonesia.

    Science.gov (United States)

    Chim, Harvey; Yew, Woon Si; Song, Colin

    2007-01-01

    Terror attacks in Southeast Asia were almost nonexistent until the 2002 Bali bomb blast, considered the deadliest attack in Indonesian history. Further attacks in 2003 (Jakarta), 2004 (Jakarta), and 2005 (Bali) have turned terrorist attacks into an ever-present reality. The authors reviewed medical charts of victims evacuated to the Singapore General Hospital (SGH) Burns Centre during three suicide attacks involving Bali (2002 and 2005) and the Jakarta Marriott hotel (2003). Problems faced, lessons learnt, and costs incurred are discussed. A burns disaster plan drawing on lessons learnt from these attacks is presented. Thirty-one patients were treated at the SGH Burns Centre in three attacks (2002 Bali attack [n = 15], 2003 Jakarta attack [n = 14], and 2005 Bali attack [n = 2]). For the 2002 Bali attack, median age was 29 years (range 20 to 50 years), median percentage of total burn surface area (TBSA) was 29% (range 5% to 55%), and median abbreviated burn severity index (ABSI) was 6 (range 3 to 10). Eight of 15 patients were admitted to the intensive care unit. For the 2003 Jakarta attack, median age was 35 years (range 24 to 56 years), median percentage of TBSA was 10% (range 2% to 46%), and median ABSI was 4 (range 3 to 9). A large number of patients had other injuries. Problems faced included manpower issues, lack of bed space, shortage of blood products, and lack of cadaver skin. The changing nature of terror attacks mandates continued vigilance and disaster preparedness. The multidimensional burns patient, complicated by other injuries, is likely to become increasingly common. A burns disaster plan with emphasis on effective command, control, and communication as well as organisation of health care personnel following a 'team concept' will do much to ensure that the sudden onset of a crisis situation at an unexpected time does not overwhelm hospital manpower and resources.

  15. Report of the 2nd RCM on Radiation Treatment of Wastewater for Reuse with Particular Focus on Wastewaters Containing Organic Pollutants. Working Material

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    2012-07-01

    Chronic shortages of water in arid and semi-arid regions of the world and environmental policy regulations have stimulated the search for appropriate technologies capable of treating wastewater for reuse or safe discharge. Industrial effluents often carry chemical contaminants such as organics, petrochemicals, pesticides, dyes and heavy metal ions. The standard biological treatment processes commonly used for wastewater treatment are not capable of treating some of these complex organic chemicals that are found in varying quantities in the wastewaters. Another emerging problem is the increasing presence of pharmaceuticals and endocrine disruptor compounds in municipal wastewater entering into the receiving stream, for which new treatment techniques and procedures are needed to remove excreted drugs before releasing the effluent into public waterways or reuse. Radiation-initiated degradation of organics helps to transform various pollutants into less harmful substances or reduced to the levels below the permissible concentrations. Studies in several Member States (MS) have demonstrated the usefulness and efficiency of radiation technology for treatment of different organic pollutants. The lack of comparative data in pilot scale studies using radiation technique (alone or in combination with other methods) has been a major issue in further utilization of this method for wastewater treatment. There is a need to study further the radiation effects, evaluate reliability and cost of treating specific group of organic pollutants in cooperation with other stakeholders who are involved in using other technologies. The Co-ordinated Research Project (CRP) on “Radiation treatment of wastewater for reuse with particular focus on wastewaters containing organic pollutants” has been launched with the objective to study the effectiveness, reliability and economics of radiation processing technology to treat wastewater contaminated with low and high concentration of organic

  16. Report of the 2nd RCM on Radiation Treatment of Wastewater for Reuse with Particular Focus on Wastewaters Containing Organic Pollutants. Working Material

    International Nuclear Information System (INIS)

    2012-01-01

    Chronic shortages of water in arid and semi-arid regions of the world and environmental policy regulations have stimulated the search for appropriate technologies capable of treating wastewater for reuse or safe discharge. Industrial effluents often carry chemical contaminants such as organics, petrochemicals, pesticides, dyes and heavy metal ions. The standard biological treatment processes commonly used for wastewater treatment are not capable of treating some of these complex organic chemicals that are found in varying quantities in the wastewaters. Another emerging problem is the increasing presence of pharmaceuticals and endocrine disruptor compounds in municipal wastewater entering into the receiving stream, for which new treatment techniques and procedures are needed to remove excreted drugs before releasing the effluent into public waterways or reuse. Radiation-initiated degradation of organics helps to transform various pollutants into less harmful substances or reduced to the levels below the permissible concentrations. Studies in several Member States (MS) have demonstrated the usefulness and efficiency of radiation technology for treatment of different organic pollutants. The lack of comparative data in pilot scale studies using radiation technique (alone or in combination with other methods) has been a major issue in further utilization of this method for wastewater treatment. There is a need to study further the radiation effects, evaluate reliability and cost of treating specific group of organic pollutants in cooperation with other stakeholders who are involved in using other technologies. The Co-ordinated Research Project (CRP) on “Radiation treatment of wastewater for reuse with particular focus on wastewaters containing organic pollutants” has been launched with the objective to study the effectiveness, reliability and economics of radiation processing technology to treat wastewater contaminated with low and high concentration of organic

  17. Integrative approach for utilization of olive mill wastewater and lebna's whey for ethanol production

    Energy Technology Data Exchange (ETDEWEB)

    Ibrahim, M A; Hayek, B O; Al-Hmoud, N; Al-Gogazeh, L

    2009-09-15

    The industry of olive oil extraction in Jordan involves an intensive consumption of water and generates large quantities of olive mill wastewater (OMW). This wastewater has a high pollution risk with biological oxygen demand (BOD). The organic fraction of OMW includes sugars, tannins, polyphenols, polyalcohols, pectins and lipids. The presence of remarkable amounts of aromatic compounds in OMW is responsible for its phytotoxic and antimicrobial effects. The environmental problems and potential hazards caused by OMW had led olive oil producing countries to limit their discharge and to propose and develop new technologies for OMW treatments, such as physicochemical and biological treatments. In the present investigation lebna's whey a local byproduct of widely consumed local yogurt was used with OMW for ethanol production. The obtained results showed that the proteins of lebna's whey can remove substantial amounts of aromatic compounds present in OMW. This was reflected on the reduction of the intensity of black color of OMW and removal of 37% polyphenols. Moreover, the production of ethanol was ascertained in fermentation media composed of whey and in presence of various concentrations of OMW up to 20% OMW. The obtained results showed the possibility to develop a process for improvement and enhancement of ethanol production from whey and olive oil waste in mixed yeast cultures. (au)

  18. Overview of DOS attacks on wireless sensor networks and experimental results for simulation of interference attacks

    Directory of Open Access Journals (Sweden)

    Željko Gavrić

    2018-01-01

    Full Text Available Wireless sensor networks are now used in various fields. The information transmitted in the wireless sensor networks is very sensitive, so the security issue is very important. DOS (denial of service attacks are a fundamental threat to the functioning of wireless sensor networks. This paper describes some of the most common DOS attacks and potential methods of protection against them. The case study shows one of the most frequent attacks on wireless sensor networks – the interference attack. In the introduction of this paper authors assume that the attack interference can cause significant obstruction of wireless sensor networks. This assumption has been proved in the case study through simulation scenario and simulation results.

  19. Securing internet by eliminating DDOS attacks

    Science.gov (United States)

    Niranchana, R.; Gayathri Devi, N.; Santhi, H.; Gayathri, P.

    2017-11-01

    The major threat caused to the authorised usage of Internet is Distributed Denial of Service attack. The mechanisms used to prevent the DDoS attacks are said to overcome the attack’s ability in spoofing the IP packets source addresses. By utilising Internet Protocol spoofing, the attackers cause a consequential load over the networks destination for policing attack packets. To overcome the IP Spoofing level on the Internet, We propose an Inter domain Packet Filter (IPF) architecture. The proposed scheme is not based on global routing information. The packets with reliable source addresses are not rejected, the IPF frame work works in such a manner. The spoofing capability of attackers is confined by IPF, and also the filter identifies the source of an attack packet by minimal number of candidate network.

  20. Plants under dual attack

    NARCIS (Netherlands)

    Ponzio, C.A.M.

    2016-01-01

    Though immobile, plants are members of complex environments, and are under constant threat from a wide range of attackers, which includes organisms such as insect herbivores or plant pathogens. Plants have developed sophisticated defenses against these attackers, and include chemical responses

  1. New attacks on Wi-Fi Protected Setup

    OpenAIRE

    Hamed Mohtadi; Alireza Rahimi

    2015-01-01

    Wi-Fi Protected Setup (WPS) is a network security standard that is used to secure networks in home and office, introduced in 2006 by the Wi-Fi Alliance. It provides easier configuration setup and is used in almost all recent Wi-Fi devices. In this paper we propose two attacks on this standard. The first attack is an offline brute force attack that uses imbalance on registration protocol. This attack needs user action, but it is more efficient than previous attacks. The second attack uses weak...

  2. A Game Theoretic Approach to Cyber Attack Prediction

    Energy Technology Data Exchange (ETDEWEB)

    Peng Liu

    2005-11-28

    The area investigated by this project is cyber attack prediction. With a focus on correlation-based prediction, current attack prediction methodologies overlook the strategic nature of cyber attack-defense scenarios. As a result, current cyber attack prediction methodologies are very limited in predicting strategic behaviors of attackers in enforcing nontrivial cyber attacks such as DDoS attacks, and may result in low accuracy in correlation-based predictions. This project develops a game theoretic framework for cyber attack prediction, where an automatic game-theory-based attack prediction method is proposed. Being able to quantitatively predict the likelihood of (sequences of) attack actions, our attack prediction methodology can predict fine-grained strategic behaviors of attackers and may greatly improve the accuracy of correlation-based prediction. To our best knowledge, this project develops the first comprehensive framework for incentive-based modeling and inference of attack intent, objectives, and strategies; and this project develops the first method that can predict fine-grained strategic behaviors of attackers. The significance of this research and the benefit to the public can be demonstrated to certain extent by (a) the severe threat of cyber attacks to the critical infrastructures of the nation, including many infrastructures overseen by the Department of Energy, (b) the importance of cyber security to critical infrastructure protection, and (c) the importance of cyber attack prediction to achieving cyber security.

  3. Management of textile wastewater for improving growth and yield of field mustard (Brassica campestris L.).

    Science.gov (United States)

    Yaseen, Muhammad; Aziz, Muhammad Zahir; Komal, Aqleema; Naveed, Muhammad

    2017-09-02

    Disposal of industrial wastewater is a current issue of urbanization. However, this problem can be sorted out by using wastewater as an alternate source of irrigation after the addition of some amendment. In this way, the problem of disposal of wastewater not only will be resolved but also scarcity of irrigation water can be kept off in the future. The current research study was performed to evaluate the influence of different concentrations of wastewater along with canal water for enhancing growth and yield of field mustard. Plants were irrigated with different mixtures of canal water and wastewater (75:25, 50:50, 25:75, and 00:100) in addition to canal water as control. The results revealed that application of 50:50% waste and canal water improved plant height, the number of pods plant -1 , pod length, root length, root dry weight, shoot dry weight, 100 grain weight, grain and biomass yield plant -1 , and nitrogen, phosphorus, and potassium concentration in grain and straw up to 16%, 15%, 17%, 29%, 15%, 56%, 25%, 41%, 35%, 20%, 52%, 45%, 20%, 44%, and 42%, respectively, over positive control treatment. While, nutrient uptakes and agronomic efficiency of fertilizers also improved by the application of 50:50% canal and wastewater compared to positive control treatment. Furthermore, the concentration of heavy metals, predominantly Cr, Cu, Cd, and Pb, was reduced in grains by application of 50% canal water and 50% wastewater. The outcomes suggest that wastewater utilization along with canal water mixing might be an effective approach for enhancing growth and yield of field mustard.

  4. Neutralization of wastewater from nitrite passivation

    International Nuclear Information System (INIS)

    Pawlowski, L.; Mientki, B.; Wasag, H.

    1982-01-01

    A method for neutralization of wastewater formed in nitrite passivation has been presented. The method consists of introducing urea into wastewater and acidifying it with sulphuric acid. Wastewater is neutralized with lime. After clarification, wastewater can be drained outside the plant

  5. Benchmarking the scientific research on wastewater-energy nexus by using bibliometric analysis.

    Science.gov (United States)

    Zheng, Tianlong; Li, Pengyu; Shi, Zhining; Liu, Jianguo

    2017-12-01

    With an exponential increase in urbanization and industrialization, water pollution is an inevitable consequence of relatively lagging wastewater treatment facilities. The conventional activated sludge process for wastewater treatment primarily emphasizes the removal of harmful substances to maintain increasingly stringent effluent discharged standards, which is considered an energy-intensive technique. Therefore, innovative and sustainable wastewater treatment should pay more attention to energy and resource recovery in dealing with fossil fuel depletion, global-scale energy security, and climate change. A bibliometric analysis was applied to trace wastewater-energy nexus-related research during the period 1991 to 2015, with respect to the Science Citation Index EXPANDED (SCI-EXPANDED) database. Journal of Hazardous Materials, ranking 1st in h-index (79), was the most productive journal (431, 4.5%) during the same time, followed by International Journal of Hydrogen Energy (422, 4.4%) and Water Research (393, 4.1%) journal, the latter owning a topmost journal impact factor. Though, China (2154, 22.5%) was the most productive country, while the USA with highest h-index (88) was the favorest collaborative country. The Chinese Academy of Sciences, China (241, 2.5%) produced the maximum publications. A novel method called "word cluster analysis" showed that the emerging sustainable processes and novel renewable energy application are applied in response to the desire for a net wastewater-energy nexus system. Based on different wastewater types, the emerging energy and sources recovery treatment processes of Anammox, anaerobic digestion, and microbial fuel cells gained extensive innovation. Evaluation indicators including sustainability, life cycle assessment, and environmental impact were appropriately used to dissert feasibility of the novel treatment methods in regard of renewable energy utilization, energy savings, and energy recovery. The transformation of the new

  6. ``Living off the land'': resource efficiency of wetland wastewater treatment

    Science.gov (United States)

    Nelson, M.; Odum, H. T.; Brown, M. T.; Alling, A.

    Bioregenerative life support technologies for space application are advantageous if they can be constructed using locally available materials, and rely on renewable energy resources, lessening the need for launch and resupply of materials. These same characteristics are desirable in the global Earth environment because such technologies are more affordable by developing countries, and are more sustainable long-term since they utilize less non-renewable, imported resources. Subsurface flow wetlands (wastewater gardens™) were developed and evaluated for wastewater recycling along the coast of Yucatan. Emergy evaluations, a measure of the environmental and human economic resource utilization, showed that compared to conventional sewage treatment, wetland wastewater treatment systems use far less imported and purchased materials. Wetland systems are also less energy-dependent, lessening dependence on electrical infrastructure, and require simpler maintenance since the system largely relies on the ecological action of microbes and plants for their efficacy. Detailed emergy evaluations showed that wetland systems use only about 15% the purchased emergy of conventional sewage systems, and that renewable resources contribute 60% of total emergy used (excluding the sewage itself) compared to less than 1% use of renewable resources in the high-tech systems. Applied on a larger scale for development in third world countries, wetland systems would require 1/5 the electrical energy of conventional sewage treatment (package plants), and save 2/3 of total capital and operating expenses over a 20-year timeframe. In addition, there are numerous secondary benefits from wetland systems including fiber/fodder/food from the wetland plants, creation of ecosystems of high biodiversity with animal habitat value, and aesthestic/landscape enhancement of the community. Wetland wastewater treatment is an exemplar of ecological engineering in that it creates an interface ecosystem to handle

  7. Invisible Trojan-horse attack

    DEFF Research Database (Denmark)

    Sajeed, Shihan; Minshull, Carter; Jain, Nitin

    2017-01-01

    We demonstrate the experimental feasibility of a Trojan-horse attack that remains nearly invisible to the single-photon detectors employed in practical quantum key distribution (QKD) systems, such as Clavis2 from ID Quantique. We perform a detailed numerical comparison of the attack performance...

  8. Nitrification in Saline Industrial Wastewater

    NARCIS (Netherlands)

    Moussa, M.S.

    2004-01-01

    Biological nitrogen removal is widely and successfully applied for municipal wastewater. However, these experiences are not directly applicable to industrial wastewater, due to its specific composition. High salt levels in many industrial wastewaters affect nitrification negatively and improved

  9. Radiological attacks and accidents. Medical consequences

    International Nuclear Information System (INIS)

    Sakuta, Hidenari

    2007-01-01

    Probability of the occurrence of radiological attacks appears to be elevated after the terrorist attacks against the United States on September 11 in 2001. There are a lot of scenarios of radiological attack: simple radiological device, radiological disperse device (RDD or dirty bomb), attacks against nuclear reactor, improvised nuclear device, and nuclear weapons. Of these, RDD attack is the most probable scenario, because it can be easily made and can generate enormous psychological and economic damages. Radiological incidents are occurring to and fro in the world, including several cases of theft to nuclear facilities and unsuccessful terrorist attacks against them. Recently, a former Russian spy has allegedly been killed using polonium-210. In addition, serious radiological accidents have occurred in Chernobyl, Goiania, and Tokai-mura. Planning, preparation, education, and training exercise appear to be essential factors to cope with radiological attacks and accidents effectively without feeling much anxiety. Triage and psychological first aid are prerequisite to manage and provide effective medial care for mass casualties without inducing panic. (author)

  10. Script-viruses Attacks on UNIX OS

    Directory of Open Access Journals (Sweden)

    D. M. Mikhaylov

    2010-06-01

    Full Text Available In this article attacks on UNIX OS are considered. Currently antivirus developers are concentrated on protecting systems from viruses that are most common and attack popular operating systems. If the system or its components are not often attacked then the antivirus products are not protecting these components as it is not profitable. The same situation is with script-viruses for UNIX OS as most experts consider that it is impossible for such viruses to get enough rights to attack. Nevertheless the main conclusion of this article is the fact that such viruses can be very powerful and can attack systems and get enough rights.

  11. Carbon and energy footprint of electrochemical vinegar wastewater treatment

    Science.gov (United States)

    Gerek, Emine Esra; Yilmaz, Seval; Savaş Koparal, A.; Nezih Gerek, Ömer

    2017-11-01

    Electrochemical treatment of wastewaters that are rich in organic compounds is a popular method, due to its acidic nature that avoids biological treatment. In many cases, the pollution hazard is considered as the chemical oxygen demand (COD) from active carbon, and the success of the treatment is measured in terms of how much this specific parameter is reduced. However, if electricity is used during the treatment process, the treatment "itself" has manufacturing and operational energy costs. Many of the studies consider energy utilization as a monetary cost, and try to reduce its amount. However, the energy cost of the treatment also causes emission of carbon at the energy producing side of the closed loop. This carbon emission can be converted into oxygen demand, too. Therefore, it can be argued that one must look for the total optimal carbon efficiency (or oxygen demand), while reducing the COD. We chose a highly acidic wastewater case of vinegar production, which is a popular food product in Turkey, to demonstrate the high energy consumption and carbon emission problem of the electrochemical treatment approach. A novel strategy is presented to monitor total oxygen demand simultaneously at the treatment and energy production sides. Necessity of renewable energy utilization and conditions on process termination points are discussed.

  12. Decoloration of textile wastewater by means of a fluidized-bed loop reactor and immobilized anaerobic bacteria

    International Nuclear Information System (INIS)

    Georgiou, D.; Aivasidis, A.

    2006-01-01

    Textile wastewater was treated by means of a fluidized-bed loop reactor and immobilized anaerobic bacteria. The main target of this treatment was decoloration of the wastewater and transformation of the non-biodegradable azo-reactive dyes to the degradable, under aerobic biological conditions, aromatic amines. Special porous beads (Siran'' (registered)) were utilized as the microbial carriers. Acetic acid solution, enriched with nutrients and trace elements, served both as a pH-regulator and as an external substrate for the growth of methanogenic bacteria. The above technique was firstly applied on synthetic wastewater (an aqueous solution of a mixture of different azo-reactive dyes). Hydraulic residence time was gradually decreased from 24 to 6 h over a period of 3 months. Full decoloration of the wastewater could be achieved even at such a low hydraulic residence time (6 h), while methane-rich biogas was also produced. The same technique was then applied on real textile wastewater with excellent results (full decoloration at a hydraulic residence time of 6 h). Furthermore, the effluent proved to be highly biodegradable by aerobic microbes (activated-sludge). Thus, the above-described anaerobic/aerobic biological technique seems to be a very attractive method for treating textile wastewater since it is cost-effective and environment-friendly

  13. Hybrid attacks on model-based social recommender systems

    Science.gov (United States)

    Yu, Junliang; Gao, Min; Rong, Wenge; Li, Wentao; Xiong, Qingyu; Wen, Junhao

    2017-10-01

    With the growing popularity of the online social platform, the social network based approaches to recommendation emerged. However, because of the open nature of rating systems and social networks, the social recommender systems are susceptible to malicious attacks. In this paper, we present a certain novel attack, which inherits characteristics of the rating attack and the relation attack, and term it hybrid attack. Furtherly, we explore the impact of the hybrid attack on model-based social recommender systems in multiple aspects. The experimental results show that, the hybrid attack is more destructive than the rating attack in most cases. In addition, users and items with fewer ratings will be influenced more when attacked. Last but not the least, the findings suggest that spammers do not depend on the feedback links from normal users to become more powerful, the unilateral links can make the hybrid attack effective enough. Since unilateral links are much cheaper, the hybrid attack will be a great threat to model-based social recommender systems.

  14. Development of an Integrated Wastewater Treatment System/water reuse/agriculture model

    Science.gov (United States)

    Fox, C. H.; Schuler, A.

    2017-12-01

    Factors like increasing population, urbanization, and climate change have made the management of water resources a challenge for municipalities. By understanding wastewater recycling for agriculture in arid regions, we can expand the supply of water to agriculture and reduce energy use at wastewater treatment plants (WWTPs). This can improve management decisions between WWTPs and water managers. The objective of this research is to develop a prototype integrated model of the wastewater treatment system and nearby agricultural areas linked by water and nutrients, using the Albuquerque Southeast Eastern Reclamation Facility (SWRF) and downstream agricultural system as a case study. Little work has been done to understand how such treatment technology decisions affect the potential for water ruse, nutrient recovery in agriculture, overall energy consumption and agriculture production and water quality. A holistic approach to understanding synergies and tradeoffs between treatment, reuse, and agriculture is needed. For example, critical wastewater treatment process decisions include options to nitrify (oxidize ammonia), which requires large amounts of energy, to operate at low dissolved oxygen concentrations, which requires much less energy, whether to recover nitrogen and phosphorus, chemically in biosolids, or in reuse water for agriculture, whether to generate energy from anaerobic digestion, and whether to develop infrastructure for agricultural reuse. The research first includes quantifying existing and feasible agricultural sites suitable for irrigation by reuse wastewater as well as existing infrastructure such as irrigation canals and piping by using GIS databases. Second, a nutrient and water requirement for common New Mexico crop is being determined. Third, a wastewater treatment model will be utilized to quantify energy usage and nutrient removal under various scenarios. Different agricultural reuse sensors and treatment technologies will be explored. The

  15. Identifying Risk of Future Asthma Attacks Using UK Medical Record Data: A Respiratory Effectiveness Group Initiative.

    Science.gov (United States)

    Blakey, John D; Price, David B; Pizzichini, Emilio; Popov, Todor A; Dimitrov, Borislav D; Postma, Dirkje S; Josephs, Lynn K; Kaplan, Alan; Papi, Alberto; Kerkhof, Marjan; Hillyer, Elizabeth V; Chisholm, Alison; Thomas, Mike

    Asthma attacks are common, serious, and costly. Individual factors associated with attacks, such as poor symptom control, are not robust predictors. We investigated whether the rich data available in UK electronic medical records could identify patients at risk of recurrent attacks. We analyzed anonymized, longitudinal medical records of 118,981 patients with actively treated asthma (ages 12-80 years) and 3 or more years of data. Potential risk factors during 1 baseline year were evaluated using univariable (simple) logistic regression for outcomes of 2 or more and 4 or more attacks during the following 2-year period. Predictors with significant univariable association (P attacks included baseline-year markers of attacks (acute oral corticosteroid courses, emergency visits), more frequent reliever use and health care utilization, worse lung function, current smoking, blood eosinophilia, rhinitis, nasal polyps, eczema, gastroesophageal reflux disease, obesity, older age, and being female. The number of oral corticosteroid courses had the strongest association. The final cross-validated models incorporated 19 and 16 risk factors for 2 or more and 4 or more attacks over 2 years, respectively, with areas under the curve of 0.785 (95% CI, 0.780-0.789) and 0.867 (95% CI, 0.860-0.873), respectively. Routinely collected data could be used proactively via automated searches to identify individuals at risk of recurrent asthma attacks. Further research is needed to assess the impact of such knowledge on clinical prognosis. Copyright © 2016 American Academy of Allergy, Asthma & Immunology. Published by Elsevier Inc. All rights reserved.

  16. Flow rate analysis of wastewater inside reactor tanks on tofu wastewater treatment plant

    Science.gov (United States)

    Mamat; Sintawardani, N.; Astuti, J. T.; Nilawati, D.; Wulan, D. R.; Muchlis; Sriwuryandari, L.; Sembiring, T.; Jern, N. W.

    2017-03-01

    The research aimed to analyse the flow rate of the wastewater inside reactor tanks which were placed a number of bamboo cutting. The resistance of wastewater flow inside reactor tanks might not be occurred and produce biogas fuel optimally. Wastewater from eleven tofu factories was treated by multi-stages anaerobic process to reduce its organic pollutant and produce biogas. Biogas plant has six reactor tanks of which its capacity for waste water and gas dome was 18 m3 and 4.5 m3, respectively. Wastewater was pumped from collecting ponds to reactors by either serial or parallel way. Maximum pump capacity, head, and electrical motor power was 5m3/h, 50m, and 0.75HP, consecutively. Maximum pressure of biogas inside the reactor tanks was 55 mbar higher than atmosphere pressure. A number of 1,400 pieces of cutting bamboo at 50-60 mm diameter and 100 mm length were used as bacteria growth media inside each reactor tank, covering around 14,287 m2 bamboo area, and cross section area of inner reactor was 4,9 m2. In each reactor, a 6 inches PVC pipe was installed vertically as channel. When channels inside reactor were opened, flow rate of wastewater was 6x10-1 L.sec-1. Contrary, when channels were closed on the upper part, wastewater flow inside the first reactor affected and increased gas dome. Initially, wastewater flowed into each reactor by a gravity mode with head difference between the second and third reactor was 15x10-2m. However, head loss at the second reactor was equal to the third reactor by 8,422 x 10-4m. As result, wastewater flow at the second and third reactors were stagnant. To overcome the problem pump in each reactor should be installed in serial mode. In order to reach the output from the first reactor and the others would be equal, and biogas space was not filled by wastewater, therefore biogas production will be optimum.

  17. Microalgal biofilms for wastewater treatment

    NARCIS (Netherlands)

    Boelee, N.C.

    2013-01-01

    The objective of this thesis was to explore the possibilities of using microalgal biofilms for the treatment of municipal wastewater, with a focus on the post-treatment of municipal wastewater effluent. The potential of microalgal biofilms for wastewater treatment was first investigated using a

  18. Attacking 22 entries in rugby union: running demands and differences between successful and unsuccessful entries.

    Science.gov (United States)

    Tierney, P; Tobin, D P; Blake, C; Delahunt, E

    2017-12-01

    Global Positioning System (GPS) technology is commonly utilized in team sports, including rugby union. It has been used to describe the average running demands of rugby union. This has afforded an enhanced understanding of the physical fitness requirements for players. However, research in team sports has suggested that training players relative to average demands may underprepare them for certain scenarios within the game. To date, no research has investigated the running demands of attacking 22 entries in rugby union. Additionally, no research has been undertaken to determine whether differences exist in the running intensity of successful and unsuccessful attacking 22 entries in rugby union. The first aim of this study was to describe the running intensity of attacking 22 entries. The second aim of this study was to investigate whether differences exist in the running intensity of successful and unsuccessful attacking 22 entries. Running intensity was measured using meters per minute (m min -1 ) for (a) total distance, (b) running distance, (c) high-speed running distance, and (d) very high-speed running distance. This study provides normative data for the running intensity of attacking 22 entries in rugby union. Forwards achieved greater high-speed running intensity in successful (3.6 m min -1 ) compared to unsuccessful (1.8 m min -1 ) attacking 22 entries. Forwards should try and achieve greater high-speed running intensity in attacking 22 entries to increase the likelihood of successful outcomes during this period of gameplay. © 2016 John Wiley & Sons A/S. Published by John Wiley & Sons Ltd.

  19. An Analysis of Attacks on Blockchain Consensus

    OpenAIRE

    Bissias, George; Levine, Brian Neil; Ozisik, A. Pinar; Andresen, Gavin

    2016-01-01

    We present and validate a novel mathematical model of the blockchain mining process and use it to conduct an economic evaluation of the double-spend attack, which is fundamental to all blockchain systems. Our analysis focuses on the value of transactions that can be secured under a conventional double-spend attack, both with and without a concurrent eclipse attack. Our model quantifies the importance of several factors that determine the attack's success, including confirmation depth, attacke...

  20. Wastewater heat recovery apparatus

    Science.gov (United States)

    Kronberg, J.W.

    1992-09-01

    A heat recovery system is described with a heat exchanger and a mixing valve. A drain trap includes a heat exchanger with an inner coiled tube, baffle plate, wastewater inlet, wastewater outlet, cold water inlet, and preheated water outlet. Wastewater enters the drain trap through the wastewater inlet, is slowed and spread by the baffle plate, and passes downward to the wastewater outlet. Cold water enters the inner tube through the cold water inlet and flows generally upward, taking on heat from the wastewater. This preheated water is fed to the mixing valve, which includes a flexible yoke to which are attached an adjustable steel rod, two stationary zinc rods, and a pivoting arm. The free end of the arm forms a pad which rests against a valve seat. The rods and pivoting arm expand or contract as the temperature of the incoming preheated water changes. The zinc rods expand more than the steel rod, flexing the yoke and rotating the pivoting arm. The pad moves towards the valve seat as the temperature of the preheated water rises, and away as the temperature falls, admitting a variable amount of hot water to maintain a nearly constant average process water temperature. 6 figs.

  1. Automated classification of computer network attacks

    CSIR Research Space (South Africa)

    Van Heerden, R

    2013-11-01

    Full Text Available according to the relevant types of attack scenarios depicted in the ontology. The two network attack instances are the Distributed Denial of Service attack on SpamHaus in 2013 and the theft of 42 million Rand ($6.7 million) from South African Postbank...

  2. Operability test procedure for PFP wastewater sampling facility

    International Nuclear Information System (INIS)

    Hirzel, D.R.

    1995-01-01

    Document provides instructions for performing the Operability Test of the 225-WC Wastewater Sampling Station which monitors the discharge to the Treated Effluent Disposal Facility from the Plutonium Finishing Plant. This Operability Test Procedure (OTP) has been prepared to verify correct configuration and performance of the PFP Wastewater sampling system installed in Building 225-WC located outside the perimeter fence southeast of the Plutonium Finishing Plant (PFP). The objective of this test is to ensure the equipment in the sampling facility operates in a safe and reliable manner. The sampler consists of two Manning Model S-5000 units which are rate controlled by the Milltronics Ultrasonic flowmeter at manhole No.C4 and from a pH measuring system with the sensor in the stream adjacent to the sample point. The intent of the dual sampling system is to utilize one unit to sample continuously at a rate proportional to the wastewater flow rate so that the aggregate tests are related to the overall flow and thereby eliminate isolated analyses. The second unit will only operate during a high or low pH excursion of the stream (hence the need for a pH control). The major items in this OTP include testing of the Manning Sampler System and associated equipment including the pH measuring and control system, the conductivity monitor, and the flow meter

  3. Disinfection of Ebola Virus in Sterilized Municipal Wastewater.

    Directory of Open Access Journals (Sweden)

    Kyle Bibby

    2017-02-01

    Full Text Available Concerns have been raised regarding handling of Ebola virus contaminated wastewater, as well as the adequacy of proposed disinfection approaches. In the current study, we investigate the inactivation of Ebola virus in sterilized domestic wastewater utilizing sodium hypochlorite addition and pH adjustment. No viral inactivation was observed in the one-hour tests without sodium hypochlorite addition or pH adjustment. No virus was recovered after 20 seconds (i.e. 4.2 log10 unit inactivation to detection limit following the addition of 5 and 10 mg L-1 sodium hypochlorite, which resulted in immediate free chlorine residuals of 0.52 and 1.11 mg L-1, respectively. The addition of 1 mg L-1 sodium hypochlorite resulted in an immediate free chlorine residual of 0.16 mg L-1, which inactivated 3.5 log10 units of Ebola virus in 20 seconds. Further inactivation was not evident due to the rapid consumption of the chlorine residual. Elevating the pH to 11.2 was found to significantly increase viral decay over ambient conditions. These results indicate the high susceptibility of the enveloped Ebola virus to disinfection in the presence of free chlorine in municipal wastewater; however, we caution that extension to more complex matrices (e.g. bodily fluids will require additional verification.

  4. Cyber Attacks and Combat Behavior

    Directory of Open Access Journals (Sweden)

    Carataș Maria Alina

    2017-01-01

    Full Text Available Cyber terrorism is an intangible danger, a real over the corner threat in the life of individuals,organizations, and governments and is getting harder to deal with its damages. The motivations forthe cyber-attacks are different, depending on the terrorist group, from cybercrime to hacktivism,attacks over the authorities’ servers. Organizations constantly need to find new ways ofstrengthening protection against cyber-attacks, assess their cyber readiness, expand the resiliencecapacity and adopts international security regulations.

  5. Opportunities for Energy Efficiency and Open Automated Demand Response in Wastewater Treatment Facilities in California -- Phase I Report

    Energy Technology Data Exchange (ETDEWEB)

    Lekov, Alex; Thompson, Lisa; McKane, Aimee; Song, Katherine; Piette, Mary Ann

    2009-04-01

    This report summarizes the Lawrence Berkeley National Laboratory?s research to date in characterizing energy efficiency and automated demand response opportunities for wastewater treatment facilities in California. The report describes the characteristics of wastewater treatment facilities, the nature of the wastewater stream, energy use and demand, as well as details of the wastewater treatment process. It also discusses control systems and energy efficiency and automated demand response opportunities. In addition, several energy efficiency and load management case studies are provided for wastewater treatment facilities.This study shows that wastewater treatment facilities can be excellent candidates for open automated demand response and that facilities which have implemented energy efficiency measures and have centralized control systems are well-suited to shift or shed electrical loads in response to financial incentives, utility bill savings, and/or opportunities to enhance reliability of service. Control technologies installed for energy efficiency and load management purposes can often be adapted for automated demand response at little additional cost. These improved controls may prepare facilities to be more receptive to open automated demand response due to both increased confidence in the opportunities for controlling energy cost/use and access to the real-time data.

  6. Attacks on public telephone networks: technologies and challenges

    Science.gov (United States)

    Kosloff, T.; Moore, Tyler; Keller, J.; Manes, Gavin W.; Shenoi, Sujeet

    2003-09-01

    Signaling System 7 (SS7) is vital to signaling and control in America's public telephone networks. This paper describes a class of attacks on SS7 networks involving the insertion of malicious signaling messages via compromised SS7 network components. Three attacks are discussed in detail: IAM flood attacks, redirection attacks and point code spoofing attacks. Depending on their scale of execution, these attacks can produce effects ranging from network congestion to service disruption. Methods for detecting these denial-of-service attacks and mitigating their effects are also presented.

  7. Wastewater reuse

    OpenAIRE

    Milan R. Radosavljević; Vanja M. Šušteršič

    2013-01-01

    Water scarcity and water pollution are some of the crucial issues that must be addressed within local and global perspectives. One of the ways to reduce the impact of water scarcity  and to minimizine water pollution is to expand water and wastewater reuse. The local conditions including regulations, institutions, financial mechanisms, availability of local technology and stakeholder participation have a great influence on the decisions for wastewater reuse. The increasing awareness of food s...

  8. Automated Generation of Attack Trees

    DEFF Research Database (Denmark)

    Vigo, Roberto; Nielson, Flemming; Nielson, Hanne Riis

    2014-01-01

    Attack trees are widely used to represent threat scenarios in a succinct and intuitive manner, suitable for conveying security information to non-experts. The manual construction of such objects relies on the creativity and experience of specialists, and therefore it is error-prone and impractica......Attack trees are widely used to represent threat scenarios in a succinct and intuitive manner, suitable for conveying security information to non-experts. The manual construction of such objects relies on the creativity and experience of specialists, and therefore it is error......-prone and impracticable for large systems. Nonetheless, the automated generation of attack trees has only been explored in connection to computer networks and levering rich models, whose analysis typically leads to an exponential blow-up of the state space. We propose a static analysis approach where attack trees...... are automatically inferred from a process algebraic specification in a syntax-directed fashion, encompassing a great many application domains and avoiding incurring systematically an exponential explosion. Moreover, we show how the standard propositional denotation of an attack tree can be used to phrase...

  9. Pareto Efficient Solutions of Attack-Defence Trees

    DEFF Research Database (Denmark)

    Aslanyan, Zaruhi; Nielson, Flemming

    2015-01-01

    Attack-defence trees are a promising approach for representing threat scenarios and possible countermeasures in a concise and intuitive manner. An attack-defence tree describes the interaction between an attacker and a defender, and is evaluated by assigning parameters to the nodes, such as proba......Attack-defence trees are a promising approach for representing threat scenarios and possible countermeasures in a concise and intuitive manner. An attack-defence tree describes the interaction between an attacker and a defender, and is evaluated by assigning parameters to the nodes......, such as probability or cost of attacks and defences. In case of multiple parameters most analytical methods optimise one parameter at a time, e.g., minimise cost or maximise probability of an attack. Such methods may lead to sub-optimal solutions when optimising conflicting parameters, e.g., minimising cost while...... maximising probability. In order to tackle this challenge, we devise automated techniques that optimise all parameters at once. Moreover, in the case of conflicting parameters our techniques compute the set of all optimal solutions, defined in terms of Pareto efficiency. The developments are carried out...

  10. Organic contaminants in onsite wastewater treatment systems

    Science.gov (United States)

    Conn, K.E.; Siegrist, R.L.; Barber, L.B.; Brown, G.K.

    2007-01-01

    Wastewater from thirty onsite wastewater treatment systems was sampled during a reconnaissance field study to quantify bulk parameters and the occurrence of organic wastewater contaminants including endocrine disrupting compounds in treatment systems representing a variety of wastewater sources and treatment processes and their receiving environments. Bulk parameters ranged in concentrations representative of the wide variety of wastewater sources (residential vs. non-residential). Organic contaminants such as sterols, surfactant metabolites, antimicrobial agents, stimulants, metal-chelating agents, and other consumer product chemicals, measured by gas chromatography/mass spectrometry were detected frequently in onsite system wastewater. Wastewater composition was unique between source type likely due to differences in source water and chemical usage. Removal efficiencies varied by engineered treatment type and physicochemical properties of the contaminant, resulting in discharge to the soil treatment unit at ecotoxicologically-relevant concentrations. Organic wastewater contaminants were detected less frequently and at lower concentrations in onsite system receiving environments. Understanding the occurrence and fate of organic wastewater contaminants in onsite wastewater treatment systems will aid in minimizing risk to ecological and human health.

  11. Cross-site scripting attacks procedure and Prevention Strategies

    Directory of Open Access Journals (Sweden)

    Wang Xijun

    2016-01-01

    Full Text Available Cross-site scripting attacks and defense has been the site of attack and defense is an important issue, this paper, the definition of cross-site scripting attacks, according to the current understanding of the chaos on the cross-site scripting, analyzes the causes and harm cross-site scripting attacks formation of attacks XXS complete process XSS attacks made a comprehensive analysis, and then for the web program includes Mobility there are cross-site scripting filter laxity given from ordinary users browse the web and web application developers two the defense cross-site scripting attacks effective strategy.

  12. Heart Attack Symptoms in Women

    Science.gov (United States)

    ... fat, cholesterol and other substances (plaque). Watch an animation of a heart attack . Many women think the ... Support Network Popular Articles 1 Understanding Blood Pressure Readings 2 Sodium and Salt 3 Heart Attack Symptoms ...

  13. On the anatomy of social engineering attacks : A literature-based dissection of successful attacks

    NARCIS (Netherlands)

    Bullee, Jan-Willem; Montoya, L.; Pieters, Wolter; Junger, Marianne; Hartel, Pieter H.

    The aim of this studywas to explore the extent towhich persuasion principles are used in successful social engineering attacks. Seventy-four scenarioswere extracted from 4 books on social engineering (written by social engineers) and analysed. Each scenariowas split into attack steps, containing

  14. Microbubble enhanced ozonation process for advanced treatment of wastewater produced in acrylic fiber manufacturing industry

    KAUST Repository

    Zheng, Tianlong

    2015-02-02

    This work investigated microbubble-ozonation for the treatment of a refractory wet-spun acrylic fiber wastewater in comparison to macrobubble-ozonation. CODcr, NH3-N, and UV254 of the wastewater were removed by 42%, 21%, and 42%, respectively in the microbubble-ozonation, being 25%, 9%, and 35% higher than the removal rates achieved by macrobubble-ozonation at the same ozone dose. The microbubbles (with average diameter of 45μm) had a high concentration of 3.9×105 counts/mL at a gas flow rate of 0.5L/min. The gas holdup, total ozone mass-transfer coefficient, and average ozone utilization efficiency in the microbubble-ozonation were 6.6, 2.2, and 1.5 times higher than those of the macrobubble-ozonation. Greater generation of hydroxyl radicals and a higher zeta potential of the bubbles were also observed in the microbubble ozonation process. The biodegradability of the wastewater was also significantly improved by microbubble-ozonation, which was ascribed to the enhanced degradation of alkanes, aromatic compounds, and the many other bio-refractory organic compounds in the wastewater. Microbubble-ozonation can thus be a more effective treatment process than traditional macrobubble-ozonation for refractory wastewater produced by the acrylic fiber manufacturing industry.

  15. DDOS ATTACK DETECTION SIMULATION AND HANDLING MECHANISM

    Directory of Open Access Journals (Sweden)

    Ahmad Sanmorino

    2013-11-01

    Full Text Available In this study we discuss how to handle DDoS attack that coming from the attacker by using detection method and handling mechanism. Detection perform by comparing number of packets and number of flow. Whereas handling mechanism perform by limiting or drop the packets that detected as a DDoS attack. The study begins with simulation on real network, which aims to get the real traffic data. Then, dump traffic data obtained from the simulation used for detection method on our prototype system called DASHM (DDoS Attack Simulation and Handling Mechanism. From the result of experiment that has been conducted, the proposed method successfully detect DDoS attack and handle the incoming packet sent by attacker.

  16. Model checking exact cost for attack scenarios

    DEFF Research Database (Denmark)

    Aslanyan, Zaruhi; Nielson, Flemming

    2017-01-01

    Attack trees constitute a powerful tool for modelling security threats. Many security analyses of attack trees can be seamlessly expressed as model checking of Markov Decision Processes obtained from the attack trees, thus reaping the benefits of a coherent framework and a mature tool support....... However, current model checking does not encompass the exact cost analysis of an attack, which is standard for attack trees. Our first contribution is the logic erPCTL with cost-related operators. The extended logic allows to analyse the probability of an event satisfying given cost bounds and to compute...... the exact cost of an event. Our second contribution is the model checking algorithm for erPCTL. Finally, we apply our framework to the analysis of attack trees....

  17. Biosynthesis of poly (3-hydroxybutyrate-co-3-hydroxyvalerate) by bacterial community from propylene oxide saponification wastewater residual sludge.

    Science.gov (United States)

    Wang, Yiwei; Zhu, Ying; Gu, Pengfei; Li, Yumei; Fan, Xiangyu; Song, Dongxue; Ji, Yan; Li, Qiang

    2017-05-01

    The saponification wastewater from the process of propylene oxide (PO) production is contaminated with high chemical oxygen demand (COD) and chlorine contents. Although the activated sludge process could treat the PO saponification wastewater effectively, the residual sludge was difficult to be disposed properly. In this research, microbes in PO saponification wastewater residual sludge were acclimated to produce poly (3-hydroxybutyrate-co-3-hydroxyvalerate) (PHBV) from volatile fatty acids. Through Miseq Illumina highthroughput sequencing, the bacterial community discrepancy between the original and the acclimated sludge samples were analyzed. The proportions of Bacillus, Acinetobacter, Brevundimonas and Pseudomonas, the potential PHBV-producers in the residual sludge, were all obviously increased. In the batch fermentation, the production of PHBV could achieve 4.262g/L at 300min, with the content increased from 0.04% to 23.67% of mixed liquor suspended solid (MLSS) in the acclimated sludge, and the COD of the PO saponification wastewater was also decreased in the fermentation. This work would provide an effective solution for the utilization of PO saponification wastewater residual sludge. Copyright © 2017 Elsevier B.V. All rights reserved.

  18. Design of a pilot plant to study wastewater treatability. Utilization to nitrification-denitrification treatment of urban wastewater; Diseno de una plant pilot para estudios de tratabilidad de aguas residuales. Aplicacion a la nitrificacion/desnitrificaciond e aguas urbanas

    Energy Technology Data Exchange (ETDEWEB)

    Otal, E.; Vilches, L. F.; Pineda, D.; Garcia, A.; Fernandez-Pereira, C.

    2002-07-01

    The conventional design and the operation of secondary treatment of urban wastewater treatment plants presents different problems such as bulking foaming, the removal of nutrients as nitrogen and phosphorus, and the excess of sludge. to prevent these problems the use of selectors was initially proposed to selects the floc-formers bacteria against the filamentous microorganisms. In addition, these configurations removed nitrogen by the nitrification-denitrification mechanism and some of them removed both nitrogen and phosphors. In the last years, new systems have been developed to remove nitrogen, reducing the consumption of oxygen and the production of sludge by the use of different microorganisms, and by modifying environmental and operational conditions. To study the treatment urban wastewater in conditions similar to those existing in wastewater treatment plants and to improve the design and operational parameters of a large scale wastewater treatment plant, a versatile pilot plant has been designed. The main components of the plant are described in this paper. (Author) 18 refs.

  19. NETWORK SECURITY ATTACKS. ARP POISONING CASE STUDY

    Directory of Open Access Journals (Sweden)

    Luminiţa DEFTA

    2010-12-01

    Full Text Available Arp poisoning is one of the most common attacks in a switched network. A switch is a network device that limits the ability of attackers that use a packet sniffer to gain access to information from internal network traffic. However, using ARP poisoning the traffic between two computers can be intercepted even in a network that uses switches. This method is known as man in the middle attack. With this type of attack the affected stations from a network will have invalid entries in the ARP table. Thus, it will contain only the correspondence between the IP addresses of the stations from the same network and a single MAC address (the station that initiated the attack. In this paper we present step by step the initiation of such an attack in a network with three computers. We will intercept the traffic between two stations using the third one (the attacker.

  20. Understanding How Components of Organisations Contribute to Attacks

    DEFF Research Database (Denmark)

    Gu, Min; Aslanyan, Zaruhi; Probst, Christian W.

    2016-01-01

    Attacks on organisations today explore many different layers, including buildings infrastructure, IT infrastructure, and human factor – the physical, virtual, and social layer. Identifying possible attacks, understanding their impact, and attributing their origin and contributing factors is diffi......Attacks on organisations today explore many different layers, including buildings infrastructure, IT infrastructure, and human factor – the physical, virtual, and social layer. Identifying possible attacks, understanding their impact, and attributing their origin and contributing factors...... is difficult. Recently, system models have been used for automatically identifying possible attacks on the modelled organisation. The generated attacks consider all three layers, making the contribution of building infrastructure, computer infrastructure, and humans (insiders and outsiders) explicit. However......, this contribution is only visible in the attack trees as part of the performed steps; it cannot be mapped back to the model directly since the actions usually involve several elements (attacker and targeted actor or asset). Especially for large attack trees, understanding the relations between several model...

  1. Problems with textile wastewater discharge

    International Nuclear Information System (INIS)

    Rantala, Pentti

    1987-01-01

    The general character of textile industry wastewaters is briefly discussed. General guidelines and practice in Finland when discharging textile industry wastewaters to municipal sewer systems is described. A survey revealed that most municipalities experience some problems due to textile industry wastewaters. Pretreatment is not always practiced and in some cases pretreatment is not operated efficiently. (author)

  2. A California Winery Wastewater Survey: Assessing the Salinity Challenge for Wastewater Reuse

    Science.gov (United States)

    The increasing scarcity of water and tighter regulations for discharge make onsite wastewater reuse an attractive prospect for the California wine industry. This study reports winery wastewater (WW) data from eighteen Northern California (Northern CA) wineries. The current study provides a baseline ...

  3. Attack Graph Construction for Security Events Analysis

    Directory of Open Access Journals (Sweden)

    Andrey Alexeevich Chechulin

    2014-09-01

    Full Text Available The paper is devoted to investigation of the attack graphs construction and analysis task for a network security evaluation and real-time security event processing. Main object of this research is the attack modeling process. The paper contains the description of attack graphs building, modifying and analysis technique as well as overview of implemented prototype for network security analysis based on attack graph approach.

  4. Automated Discovery of Mimicry Attacks

    National Research Council Canada - National Science Library

    Giffin, Jonathon T; Jha, Somesh; Miller, Barton P

    2006-01-01

    .... These systems are useful only if they detect actual attacks. Previous research developed manually-constructed mimicry and evasion attacks that avoided detection by hiding a malicious series of system calls within a valid sequence allowed by the model...

  5. Energy positive domestic wastewater treatment: the roles of anaerobic and phototrophic technologies.

    Science.gov (United States)

    Shoener, B D; Bradley, I M; Cusick, R D; Guest, J S

    2014-05-01

    The negative energy balance of wastewater treatment could be reversed if anaerobic technologies were implemented for organic carbon oxidation and phototrophic technologies were utilized for nutrient recovery. To characterize the potential for energy positive wastewater treatment by anaerobic and phototrophic biotechnologies we performed a comprehensive literature review and analysis, focusing on energy production (as kJ per capita per day and as kJ m(-3) of wastewater treated), energy consumption, and treatment efficacy. Anaerobic technologies included in this review were the anaerobic baffled reactor (ABR), anaerobic membrane bioreactor (AnMBR), anaerobic fluidized bed reactor (AFB), upflow anaerobic sludge blanket (UASB), anaerobic sequencing batch reactor (ASBR), microbial electrolysis cell (MEC), and microbial fuel cell (MFC). Phototrophic technologies included were the high rate algal pond (HRAP), photobioreactor (PBR), stirred tank reactor, waste stabilization pond (WSP), and algal turf scrubber (ATS). Average energy recovery efficiencies for anaerobic technologies ranged from 1.6% (MFC) to 47.5% (ABR). When including typical percent chemical oxygen demand (COD) removals by each technology, this range would equate to roughly 40-1200 kJ per capita per day or 110-3300 kJ m(-3) of treated wastewater. The average bioenergy feedstock production by phototrophic technologies ranged from 1200-4700 kJ per capita per day or 3400-13 000 kJ m(-3) (exceeding anaerobic technologies and, at times, the energetic content of the influent organic carbon), with usable energy production dependent upon downstream conversion to fuels. Energy consumption analysis showed that energy positive anaerobic wastewater treatment by emerging technologies would require significant reductions of parasitic losses from mechanical mixing and gas sparging. Technology targets and critical barriers for energy-producing technologies are identified, and the role of integrated anaerobic and

  6. Energy positive domestic wastewater treatment: the roles of anaerobic and phototrophic technologies

    KAUST Repository

    Shoener, B. D.

    2014-01-01

    The negative energy balance of wastewater treatment could be reversed if anaerobic technologies were implemented for organic carbon oxidation and phototrophic technologies were utilized for nutrient recovery. To characterize the potential for energy positive wastewater treatment by anaerobic and phototrophic biotechnologies we performed a comprehensive literature review and analysis, focusing on energy production (as kJ per capita per day and as kJ m-3 of wastewater treated), energy consumption, and treatment efficacy. Anaerobic technologies included in this review were the anaerobic baffled reactor (ABR), anaerobic membrane bioreactor (AnMBR), anaerobic fluidized bed reactor (AFB), upflow anaerobic sludge blanket (UASB), anaerobic sequencing batch reactor (ASBR), microbial electrolysis cell (MEC), and microbial fuel cell (MFC). Phototrophic technologies included were the high rate algal pond (HRAP), photobioreactor (PBR), stirred tank reactor, waste stabilization pond (WSP), and algal turf scrubber (ATS). Average energy recovery efficiencies for anaerobic technologies ranged from 1.6% (MFC) to 47.5% (ABR). When including typical percent chemical oxygen demand (COD) removals by each technology, this range would equate to roughly 40-1200 kJ per capita per day or 110-3300 kJ m-3 of treated wastewater. The average bioenergy feedstock production by phototrophic technologies ranged from 1200-4700 kJ per capita per day or 3400-13000 kJ m-3 (exceeding anaerobic technologies and, at times, the energetic content of the influent organic carbon), with usable energy production dependent upon downstream conversion to fuels. Energy consumption analysis showed that energy positive anaerobic wastewater treatment by emerging technologies would require significant reductions of parasitic losses from mechanical mixing and gas sparging. Technology targets and critical barriers for energy-producing technologies are identified, and the role of integrated anaerobic and phototrophic

  7. Evaluation of rapid methods for in-situ characterization of organic contaminant load and biodegradation rates in winery wastewater.

    Science.gov (United States)

    Carvallo, M J; Vargas, I; Vega, A; Pizarro, G; Pizarr, G; Pastén, P

    2007-01-01

    Rapid methods for the in-situ evaluation of the organic load have recently been developed and successfully implemented in municipal wastewater treatment systems. Their direct application to winery wastewater treatment is questionable due to substantial differences between municipal and winery wastewater. We critically evaluate the use of UV-VIS spectrometry, buffer capacity testing (BCT), and respirometry as rapid methods to determine organic load and biodegradation rates of winery wastewater. We tested three types of samples: actual and treated winery wastewater, synthetic winery wastewater, and samples from a biological batch reactor. Not surprisingly, respirometry gave a good estimation of biodegradation rates for substrate of different complexities, whereas UV-VIS and BCT did not provide a quantitative measure of the easily degradable sugars and ethanol, typically the main components of the COD in the influent. However, our results strongly suggest that UV-VIS and BCT can be used to identify and estimate the concentration of complex substrates in the influent and soluble microbial products (SMP) in biological reactors and their effluent. Furthermore, the integration of UV-VIS spectrometry, BCT, and mathematical modeling was able to differentiate between the two components of SMPs: substrate utilization associated products (UAP) and biomass associated products (BAP). Since the effluent COD in biologically treated wastewaters is composed primarily by SMPs, the quantitative information given by these techniques may be used for plant control and optimization.

  8. Transforming Graphical System Models to Graphical Attack Models

    DEFF Research Database (Denmark)

    Ivanova, Marieta Georgieva; Probst, Christian W.; Hansen, Rene Rydhof

    2016-01-01

    Manually identifying possible attacks on an organisation is a complex undertaking; many different factors must be considered, and the resulting attack scenarios can be complex and hard to maintain as the organisation changes. System models provide a systematic representation of organisations...... approach to transforming graphical system models to graphical attack models in the form of attack trees. Based on an asset in the model, our transformations result in an attack tree that represents attacks by all possible actors in the model, after which the actor in question has obtained the asset....

  9. Effective self-purification of polynary metal electroplating wastewaters through formation of layered double hydroxides.

    Science.gov (United States)

    Zhou, Ji Zhi; Wu, Yue Ying; Liu, Chong; Orpe, Ajay; Liu, Qiang; Xu, Zhi Ping; Qian, Guang Ren; Qiao, Shi Zhang

    2010-12-01

    Heavy metal ions (Ni(2+), Zn(2+), and Cr(3+)) can be effectively removed from real polynary metal ions-bearing electroplating wastewaters by a carbonation process, with ∼99% of metal ions removed in most cases. The synchronous formation of layered double hydroxide (LDH) precipitates containing these metal ions was responsible for the self-purification of wastewaters. The constituents of formed polynary metals-LDHs mainly depended on the Ni(2+):Zn(2+):Cr(3+) molar ratio in wastewaters. LDH was formed at pH of 6.0-8.0 when the Ni(2+)/Zn(2+) molar ratio ≥ 1 where molar fraction of trivalent metal in the wastewaters was 0.2-0.4, otherwise ZnO, hydrozincite, or amorphous precipitate was observed. In the case of LDH formation, the residual concentration of Ni(2+), Zn(2+), and Cr(3+) in the treated wastewaters was very low, about 2-3, ∼2, and ∼1 mg/L, respectively, at 20-80 °C and pH of 6.0-8.0, indicating the effective incorporation of heavy metal ions into the LDH matrix. Furthermore, the obtained LDH materials were used to adsorb azoic dye GR, with the maximum adsorption amount of 129-134 mg/g. We also found that the obtained LDHs catalyzed more than 65% toluene to decompose at 350 °C under ambient pressure. Thus the current research has not only shown effective recovery of heavy metal ions from the electroplating wastewaters in an environmentally friendly process but also demonstrated the potential utilization of recovered materials.

  10. When Sinuses Attack! (For Kids)

    Science.gov (United States)

    ... First Aid & Safety Doctors & Hospitals Videos Recipes for Kids Kids site Sitio para niños How the Body Works ... Search English Español When Sinuses Attack! KidsHealth / For Kids / When Sinuses Attack! What's in this article? What ...

  11. A study on the treatment process of industrial wastewater related to heavy metal wastewater

    International Nuclear Information System (INIS)

    Park, J. J.; Shin, J. M.; Kim, J. H.; Yang, M. S.; Kim, M. J.; Son, J. S.; Park, H. S.

    1999-08-01

    The supernatant from metal wastewater by using magnesium hydroxide and dolomite was used to treat dyeing wastewater. In the case of magnesium hydroxide. In the case of magnesium hydroxide, the optimum dosage was 10 % (v/v) for supernatant A and 3 % (v/v) for separation B. Color turbidity and COD removal was 99 to 100 % , 85 to 97 % and 43 to 53 %, respectively. In the case of dolomite, the optimum dosage was 30 % (v/v) for supernatant A and 3% for supernatant B. Color, turbidity and COD removal was 96 to 99 %, 62 to 91 % and 52 to 53 %, respectively. In dyeing wastewater treatment by using supernatant from metal wastewater, the cost of chemicals was reduced by about 80 %

  12. Evaluation and Optimization of Electrode Configuration of Multi-Channel Corona Discharge Plasma for Dye-Containing Wastewater Treatment

    International Nuclear Information System (INIS)

    Ren Jingyu; Qu Guangzhou; Liang Dongli; Hu Shibin; Wang Tiecheng

    2015-01-01

    A discharge plasma reactor with a point-to-plane structure was widely studied experimentally in wastewater treatment. In order to improve the utilization efficiency of active species and the energy efficiency of this kind of discharge plasma reactor during wastewater treatment, the electrode configuration of the point-to-plane corona discharge reactor was studied by evaluating the effects of discharge spacing and adjacent point distance on discharge power and discharge energy density, and then dye-containing wastewater decoloration experiments were conducted on the basis of the optimum electrode configuration. The experimental results of the discharge characteristics showed that high discharge power and discharge energy density were achieved when the ratio of discharge spacing to adjacent point distance (d/s) was 0.5. Reactive Brilliant Blue (RBB) wastewater treatment experiments presented that the highest RBB decoloration efficiency was observed at d/s of 0.5, which was consistent with the result obtained in the discharge characteristics experiments. In addition, the biodegradability of RBB wastewater was enhanced greatly after discharge plasma treatment under the optimum electrode configuration. RBB degradation processes were analyzed by GC-MS and IC, and the possible mechanism for RBB decoloration was also discussed. (paper)

  13. Industrial wastewater treatment with electron beam

    Energy Technology Data Exchange (ETDEWEB)

    Han, Bumsoo; Ko, Jaein; Kim, Jinkyu; Kim, Yuri; Chung, Wooho [Central Research Institute of Samsung Heavy Industries Co., Taejon (Korea)

    2001-03-01

    Global withdrawals of water to satisfy human demands have grown dramatically in this century. Between 1900 and 1945, water consumption increased by over six times, more than double the rate of population growth. This rapid growth in water demand is due to the increasing reliance on irrigation to achieve food security, the growth of industrial uses, and the increasing use per capita for domestic purposes. Given the seriousness of the situation and future risk of crises, there is an urgent need to develop the water-efficient technologies including economical treatment methods of wastewater and polluted water. In the Central Research Institute of Samsung Heavy Industries (SHI), many industrial wastewater including leachate from landfill area, wastewater from papermill, dyeing complex, petrochemical processes, etc. are under investigation with electron beam irradiation. For the study of treating dyeing wastewater combined with conventional facilities, an electron beam pilot plant for treating 1,000m{sup 3}/day of wastewater from 80,000m{sup 3}/day of total dyeing wastewater has constructed and operated in Taegu Dyeing Industrial Complex. A commercial plant for re-circulation of wastewater from Papermill Company is also designed for S-paper Co. in Cheongwon City, and after the successful installation, up to 80% of wastewater could be re-used in paper producing process. (author)

  14. Industrial wastewater treatment with electron beam

    International Nuclear Information System (INIS)

    Han, Bumsoo; Ko, Jaein; Kim, Jinkyu; Kim, Yuri; Chung, Wooho

    2001-01-01

    Global withdrawals of water to satisfy human demands have grown dramatically in this century. Between 1900 and 1945, water consumption increased by over six times, more than double the rate of population growth. This rapid growth in water demand is due to the increasing reliance on irrigation to achieve food security, the growth of industrial uses, and the increasing use per capita for domestic purposes. Given the seriousness of the situation and future risk of crises, there is an urgent need to develop the water-efficient technologies including economical treatment methods of wastewater and polluted water. In the Central Research Institute of Samsung Heavy Industries (SHI), many industrial wastewater including leachate from landfill area, wastewater from papermill, dyeing complex, petrochemical processes, etc. are under investigation with electron beam irradiation. For the study of treating dyeing wastewater combined with conventional facilities, an electron beam pilot plant for treating 1,000m 3 /day of wastewater from 80,000m 3 /day of total dyeing wastewater has constructed and operated in Taegu Dyeing Industrial Complex. A commercial plant for re-circulation of wastewater from Papermill Company is also designed for S-paper Co. in Cheongwon City, and after the successful installation, up to 80% of wastewater could be re-used in paper producing process. (author)

  15. Heart Attack

    Science.gov (United States)

    ... properly causes your body's blood sugar levels to rise, increasing your risk of heart attack. Metabolic syndrome. This occurs when you have obesity, high blood pressure and high blood sugar. Having metabolic ...

  16. A study on radiation treatment of wastewater using an electron accelerator

    International Nuclear Information System (INIS)

    Hashimoto, Shoji

    1982-02-01

    A study on radiation oxidation treatment of refractory or toxic wastewater using an electron accelerator was carried out from the viewpoint of reaction engineering. For the process using electron beams, oxygen supply to the penetration range of electron (reaction zone) where the dose rate is extremely high, is significantly important. A concentric dual-tube-type bubbling column reactor was shown to be most suitable to maintain the dissolved oxygen at a high concentration. Rate expressions of pollutant reduction and oxygen consumption in the reactor were derived. The efficiency of active species utilization for oxidation, phi, was defined and shown to be an important design parameter. A new wastewater treatment system (Electron Accelerator-Dual tube Bubbling Reactor system) was proposed, and successfully demonstrated for the treatment of wastewater involving dyes and phenol. The dissolved oxygen was maintained at a high concentration by using this type of reactor for the high dose rate irradiation. phi was obtained as a function of dissolved oxygen concentration for the dye solution and was also obtained as functions of the oxygen concentration and dose rate for the phenol solution. By these experimental results, the effectiveness of EA-DBR system was proved. (author)

  17. Utilities' ''obligation to serve'' under deregulation

    International Nuclear Information System (INIS)

    Alexander, C.B.

    1997-01-01

    The utility no longer has protected status, and the traditional franchise concept is under attack. Exclusive rights once conveyed to the utilities are being denied and not just in the area of gas sales. Exclusive rights once conveyed to utilities will be denied in more areas. State by state, the utilities' franchise is being examined to see which, if any, of its provisions are necessary in a deregulated environment. Can the free market provide everything that's been provided for many years under monopolistic arrangements? Some of the most critical and difficult of these provisions concern the obligation to serve, which utilities, in most states, have assumed as part of their franchise agreement. Regulators, courts, utilities, marketers and others are busy sorting through these issues, but resolution could take years. The paper discusses deregulation, universal service fee, representation without taxation, suppliers and marketer restrictions

  18. Software-based Microarchitectural Attacks

    OpenAIRE

    Gruss, Daniel

    2017-01-01

    Modern processors are highly optimized systems where every single cycle of computation time matters. Many optimizations depend on the data that is being processed. Software-based microarchitectural attacks exploit effects of these optimizations. Microarchitectural side-channel attacks leak secrets from cryptographic computations, from general purpose computations, or from the kernel. This leakage even persists across all common isolation boundaries, such as processes, containers, and virtual ...

  19. Integrating cyber attacks within fault trees

    International Nuclear Information System (INIS)

    Nai Fovino, Igor; Masera, Marcelo; De Cian, Alessio

    2009-01-01

    In this paper, a new method for quantitative security risk assessment of complex systems is presented, combining fault-tree analysis, traditionally used in reliability analysis, with the recently introduced Attack-tree analysis, proposed for the study of malicious attack patterns. The combined use of fault trees and attack trees helps the analyst to effectively face the security challenges posed by the introduction of modern ICT technologies in the control systems of critical infrastructures. The proposed approach allows considering the interaction of malicious deliberate acts with random failures. Formal definitions of fault tree and attack tree are provided and a mathematical model for the calculation of system fault probabilities is presented.

  20. Integrating cyber attacks within fault trees

    Energy Technology Data Exchange (ETDEWEB)

    Nai Fovino, Igor [Joint Research Centre - EC, Institute for the Protection and Security of the Citizen, Ispra, VA (Italy)], E-mail: igor.nai@jrc.it; Masera, Marcelo [Joint Research Centre - EC, Institute for the Protection and Security of the Citizen, Ispra, VA (Italy); De Cian, Alessio [Department of Electrical Engineering, University di Genova, Genoa (Italy)

    2009-09-15

    In this paper, a new method for quantitative security risk assessment of complex systems is presented, combining fault-tree analysis, traditionally used in reliability analysis, with the recently introduced Attack-tree analysis, proposed for the study of malicious attack patterns. The combined use of fault trees and attack trees helps the analyst to effectively face the security challenges posed by the introduction of modern ICT technologies in the control systems of critical infrastructures. The proposed approach allows considering the interaction of malicious deliberate acts with random failures. Formal definitions of fault tree and attack tree are provided and a mathematical model for the calculation of system fault probabilities is presented.

  1. Attack and Vulnerability Penetration Testing: FreeBSD

    Directory of Open Access Journals (Sweden)

    Abdul Hanan Abdullah

    2013-07-01

    Full Text Available Computer system security has become a major concern over the past few years. Attacks, threasts or intrusions, against computer system and network have become commonplace events. However, there are some system devices and other tools that are available to overcome the threat of these attacks. Currently, cyber attack is a major research and inevitable. This paper presents some steps of penetration in FreeBSD operating system, some tools and new steps to attack used in this experiment, probes for reconnaissance, guessing password via brute force, gaining privilege access and flooding victim machine to decrease availability. All these attacks were executed and infiltrate within the environment of Intrusion Threat Detection Universiti Teknologi Malaysia (ITD UTM data set. This work is expected to be a reference for practitioners to prepare their systems from Internet attacks.

  2. Properties of Concrete Mixes with Carwash Wastewater

    Directory of Open Access Journals (Sweden)

    Shahidan Shahiron

    2017-01-01

    Full Text Available The rapid growth of the car wash industry today results in the need for wastewater reclamation. Thus, this paper aims to investigate the effect of using car wash wastewater on concrete properties in terms of mechanical properties. The basic characteristics of wastewater were investigated according to USEPA (Method 150.1 & 3 00.0 while the mechanical properties of concrete with car wash wastewater were compared according to ASTM C1602 and BS EN 1008 standards. In this research, the compressive strength, modulus of elasticity and tensile strength were studied. The percentages of wastewater replaced in the concrete mix ranged from 0% up to 40%. In addition, the results also suggest that the concrete with 20% car wash wastewater achieved the highest compressive strength and modulus of elasticity compared to other compositions of wastewater. Moreover, the results also recommended that concrete mixed with car wash wastewater has better compressive strength compared to conventional concrete.

  3. An Attack-Resilient Middleware Architecture for Grid Integration of Distributed Energy Resources

    Energy Technology Data Exchange (ETDEWEB)

    Wu, Yifu; Mendis, Gihan J.; He, Youbiao; Wei, Jin; Hodge, Bri-Mathias

    2017-05-04

    In recent years, the increasing penetration of Distributed Energy Resources (DERs) has made an impact on the operation of the electric power systems. In the grid integration of DERs, data acquisition systems and communications infrastructure are crucial technologies to maintain system economic efficiency and reliability. Since most of these generators are relatively small, dedicated communications investments for every generator are capital cost prohibitive. Combining real-time attack-resilient communications middleware with Internet of Things (IoTs) technologies allows for the use of existing infrastructure. In our paper, we propose an intelligent communication middleware that utilizes the Quality of Experience (QoE) metrics to complement the conventional Quality of Service (QoS) evaluation. Furthermore, our middleware employs deep learning techniques to detect and defend against congestion attacks. The simulation results illustrate the efficiency of our proposed communications middleware architecture.

  4. Superposition Attacks on Cryptographic Protocols

    DEFF Research Database (Denmark)

    Damgård, Ivan Bjerre; Funder, Jakob Løvstad; Nielsen, Jesper Buus

    2011-01-01

    of information. In this paper, we introduce a fundamentally new model of quantum attacks on classical cryptographic protocols, where the adversary is allowed to ask several classical queries in quantum superposition. This is a strictly stronger attack than the standard one, and we consider the security......Attacks on classical cryptographic protocols are usually modeled by allowing an adversary to ask queries from an oracle. Security is then defined by requiring that as long as the queries satisfy some constraint, there is some problem the adversary cannot solve, such as compute a certain piece...... of several primitives in this model. We show that a secret-sharing scheme that is secure with threshold $t$ in the standard model is secure against superposition attacks if and only if the threshold is lowered to $t/2$. We use this result to give zero-knowledge proofs for all of NP in the common reference...

  5. Process control, energy recovery and cost savings in acetic acid wastewater treatment

    International Nuclear Information System (INIS)

    Vaiopoulou, E.; Melidis, P.; Aivasidis, A.

    2011-01-01

    An anaerobic fixed bed loop (AFBL) reactor was applied for treatment of acetic acid (HAc) wastewater. Two pH process control concepts were investigated; auxostatic and chemostatic control. In the auxostatic pH control, feed pump is interrupted when pH falls below a certain pH value in the bioreactor, which results in reactor operation at maximum load. Chemostatic control assures alkaline conditions by setting a certain pH value in the influent, preventing initial reactor acidification. The AFBL reactor treated HAc wastewater at low hydraulic residence time (HRT) (10-12 h), performed at high space time loads (40-45 kg COD/m 3 d) and high space time yield (30-35 kg COD/m 3 d) to achieve high COD (Chemical Oxygen Demand) removal (80%). Material and cost savings were accomplished by utilizing the microbial potential for wastewater neutralization during anaerobic treatment along with application of favourable pH-auxostatic control. NaOH requirement for neutralization was reduced by 75% and HRT was increased up to 20 h. Energy was recovered by applying costless CO 2 contained in the biogas for neutralization of alkaline wastewater. Biogas was enriched in methane by 4 times. This actually brings in more energy profits, since biogas extra heating for CO 2 content during biogas combustion is minimized and usage of other acidifying agents is omitted.

  6. Effects of the dissolved organic carbon of treated municipal wastewater on soil infiltration as related to sodium adsorption ratio and pH

    Science.gov (United States)

    Increasing scarcity of fresh water in arid and semi arid regions means that we must utilize alternative water supplies for irrigation if we are to sustain agricultural production in these regions. Treated municipal wastewaters are being increasingly utilized for irrigation. In general only the salin...

  7. Recurrent spontaneous attacks of dizziness.

    Science.gov (United States)

    Lempert, Thomas

    2012-10-01

    This article describes the common causes of recurrent vertigo and dizziness that can be diagnosed largely on the basis of history. Ninety percent of spontaneous recurrent vertigo and dizziness can be explained by six disorders: (1) Ménière disease is characterized by vertigo attacks, lasting 20 minutes to several hours, with concomitant hearing loss, tinnitus, and aural fullness. Aural symptoms become permanent during the course of the disease. (2) Attacks of vestibular migraine may last anywhere from minutes to days. Most patients have a previous history of migraine headaches, and many experience migraine symptoms during the attack. (3) Vertebrobasilar TIAs affect older adults with vascular risk factors. Most attacks last less than 1 hour and are accompanied by other symptoms from the posterior circulation territory. (4) Vestibular paroxysmia is caused by vascular compression of the eighth cranial nerve. It manifests itself with brief attacks of vertigo that recur many times per day, sometimes with concomitant cochlear symptoms. (5) Orthostatic hypotension causes brief episodes of dizziness lasting seconds to a few minutes after standing up and is relieved by sitting or lying down. In older adults, it may be accompanied by supine hypertension. (6) Panic attacks usually last minutes, occur in specific situations, and are accompanied by choking, palpitations, tremor, heat, and anxiety. Less common causes of spontaneous recurrent vertigo and dizziness include perilymph fistula, superior canal dehiscence, autoimmune inner ear disease, otosclerosis, cardiac arrhythmia, and medication side effects. Neurologists need to venture into otolaryngology, internal medicine, and psychiatry to master the differential diagnosis of recurrent dizziness.

  8. Shark Attack Project - Marine Attack at Towed Hydrophone Arrays

    National Research Council Canada - National Science Library

    Kalmijn, Adrianus J

    2005-01-01

    The original objective of the SIO Marine Attack project was to identify the electric and magnetic fields causing sharks to inflict serious damage upon the towed hydrophone arrays of US Navy submarines...

  9. Novel Method For Low-Rate Ddos Attack Detection

    Science.gov (United States)

    Chistokhodova, A. A.; Sidorov, I. D.

    2018-05-01

    The relevance of the work is associated with an increasing number of advanced types of DDoS attacks, in particular, low-rate HTTP-flood. Last year, the power and complexity of such attacks increased significantly. The article is devoted to the analysis of DDoS attacks detecting methods and their modifications with the purpose of increasing the accuracy of DDoS attack detection. The article details low-rate attacks features in comparison with conventional DDoS attacks. During the analysis, significant shortcomings of the available method for detecting low-rate DDoS attacks were found. Thus, the result of the study is an informal description of a new method for detecting low-rate denial-of-service attacks. The architecture of the stand for approbation of the method is developed. At the current stage of the study, it is possible to improve the efficiency of an already existing method by using a classifier with memory, as well as additional information.

  10. Heart Attack

    Science.gov (United States)

    ... family history of heart attack race – African Americans, Mexican Americans, Native Americans, and native Hawaiians are at ... Your doctor will prescribe the medicines that are right for you. If you have had a heart ...

  11. Synergetic effect of copper-plating wastewater as a catalyst for the destruction of acrylonitrile wastewater in supercritical water oxidation

    Energy Technology Data Exchange (ETDEWEB)

    Shin, Young Ho; Lee, Hong-shik; Lee, Young-Ho [School of Chemical and Biological Engineering and Institute of Chemical Processes, Seoul National University, 599 Gwanangno, Gwanak-gu, Seoul 151-744 (Korea, Republic of); Kim, Jaehoon; Kim, Jae-Duck [Supercritical Fluid Research Laboratory, Energy and Environment Research Division, Korea Institute of Science and Technology (KIST), 39-1 Hawolgok-dong, Seongbuk-gu, Seoul 136-791 (Korea, Republic of); Lee, Youn-Woo, E-mail: ywlee@snu.ac.kr [School of Chemical and Biological Engineering and Institute of Chemical Processes, Seoul National University, 599 Gwanangno, Gwanak-gu, Seoul 151-744 (Korea, Republic of)

    2009-08-15

    A new supercritical water oxidation process for the simultaneous treatment of mixed wastewater containing wastewater from acrylonitrile manufacturing processes and copper-plating processes was investigated using a continuous tubular reactor system. Experiments were carried out at temperatures ranging from 400 to 600 deg. C and a pressure of 25 MPa. The residence time was fixed at 2 s by changing the flow rates of feeds, depending on reaction temperature. The initial total organic carbon (TOC) concentration of the wastewaters and the O{sub 2} concentration at the reactor inlet were kept constant at 0.49 and 0.74 mol/L. It was confirmed that the copper-plating wastewater accelerated the TOC conversion of acrylonitrile wastewater from 17.6% to 67.3% at a temperature of 450 deg. C. Moreover, copper and copper oxide nanoparticles were generated in the process of supercritical water oxidation (SCWO) of mixed wastewater. 99.8% of copper in mixed wastewater was recovered as solid copper and copper oxides at a temperature of 600 deg. C, with their average sizes ranging from 150 to 160 nm. Our study showed that SCWO provides a synergetic effect for simultaneous treatment of acrylonitrile and copper-plating wastewater. During the reaction, the oxidation rate of acrylonitrile wastewater was enhanced due to the in situ formation of nano-catalysts of copper and/or copper oxides, while the exothermic decomposition of acrylonitrile wastewater supplied enough heat for the recovery of solid copper and copper oxides from copper-plating wastewater. The synergetic effect of wastewater treatment by the newly proposed SCWO process leads to full TOC conversion, color removal, detoxification, and odor elimination, as well as full recovery of copper.

  12. Automatic Classification of Attacks on IP Telephony

    Directory of Open Access Journals (Sweden)

    Jakub Safarik

    2013-01-01

    Full Text Available This article proposes an algorithm for automatic analysis of attack data in IP telephony network with a neural network. Data for the analysis is gathered from variable monitoring application running in the network. These monitoring systems are a typical part of nowadays network. Information from them is usually used after attack. It is possible to use an automatic classification of IP telephony attacks for nearly real-time classification and counter attack or mitigation of potential attacks. The classification use proposed neural network, and the article covers design of a neural network and its practical implementation. It contains also methods for neural network learning and data gathering functions from honeypot application.

  13. Further attacks on Yeung-Mintzer fragile watermarking scheme

    Science.gov (United States)

    Fridrich, Jessica; Goljan, Miroslav; Memon, Nasir D.

    2000-05-01

    In this paper, we describe new and improved attacks on the authentication scheme previously proposed by Yeung and Mintzer. Previous attacks assumed that the binary watermark logo inserted in an image for the purposes of authentication was known. Here we remove that assumption and show how the scheme is still vulnerable, even if the binary logo is not known but the attacker has access to multiple images that have been watermarked with the same secret key and contain the same (but unknown) logo. We present two attacks. The first attack infers the secret watermark insertion function and the binary logo, given multiple images authenticated with the same key and containing the same logo. We show that a very good approximation to the logo and watermark insertion function can be constructed using as few as two images. With color images, one needs many more images, nevertheless the attack is still feasible. The second attack we present, which we call the 'collage-attack' is a variation of the Holliman-Memon counterfeiting attack. The proposed variation does not require knowledge of the watermark logo and produces counterfeits of superior quality by means of a suitable dithering process that we develop.

  14. Pareto Efficient Solution of Attack-Defence Trees

    NARCIS (Netherlands)

    Aslanyan, Zaruhi; Nielson, Flemming

    Attack-defence trees are a promising approach for representing threat scenarios and possible countermeasures in a concise and intuitive manner. An attack-defence tree describes the interaction between an attacker and a defender, and is evaluated by assigning parameters to the nodes, such as

  15. Effects of domestic wastewater treated by anaerobic stabilization on soil pollution, plant nutrition, and cotton crop yield.

    Science.gov (United States)

    Uzen, Nese; Cetin, Oner; Unlu, Mustafa

    2016-12-01

    This study has aimed to determine the effects of treated wastewater on cotton yield and soil pollution in Southeastern Anatolia Region of Turkey during 2011 and 2012. The treated wastewater was provided from the reservoir operated as anaerobic stabilization. After treatment, suspended solids (28-60 mg/l), biological oxygen demand (29-30 mg/l), and chemical oxygen demand (71-112 mg/l) decreased significantly compared to those in the wastewater. There was no heavy metal pollution in the water used. There were no significant amounts of coliform bacteria, fecal coliform, and Escherichia coli compared to untreated wastewater. The cottonseed yield (31.8 g/plant) in the tanks where no commercial fertilizers were applied was considerably higher compared to the yield (17.2 g/plant) in the fertilized tanks where a common nitrogenous fertilizer was utilized. There were no significant differences between the values of soil pH. Soil electrical conductivity (EC) after the experiment increased from 0.8-1.0 to 0.9-1.8 dS/m. Heavy metal pollution did not occur in the soil and plants, because there were no heavy metals in the treated wastewater. It can be concluded that treated domestic wastewater could be used to grow in a controlled manner crops, such as cotton, that would not be used directly as human nutrients.

  16. Genetic attack on neural cryptography.

    Science.gov (United States)

    Ruttor, Andreas; Kinzel, Wolfgang; Naeh, Rivka; Kanter, Ido

    2006-03-01

    Different scaling properties for the complexity of bidirectional synchronization and unidirectional learning are essential for the security of neural cryptography. Incrementing the synaptic depth of the networks increases the synchronization time only polynomially, but the success of the geometric attack is reduced exponentially and it clearly fails in the limit of infinite synaptic depth. This method is improved by adding a genetic algorithm, which selects the fittest neural networks. The probability of a successful genetic attack is calculated for different model parameters using numerical simulations. The results show that scaling laws observed in the case of other attacks hold for the improved algorithm, too. The number of networks needed for an effective attack grows exponentially with increasing synaptic depth. In addition, finite-size effects caused by Hebbian and anti-Hebbian learning are analyzed. These learning rules converge to the random walk rule if the synaptic depth is small compared to the square root of the system size.

  17. Genetic attack on neural cryptography

    International Nuclear Information System (INIS)

    Ruttor, Andreas; Kinzel, Wolfgang; Naeh, Rivka; Kanter, Ido

    2006-01-01

    Different scaling properties for the complexity of bidirectional synchronization and unidirectional learning are essential for the security of neural cryptography. Incrementing the synaptic depth of the networks increases the synchronization time only polynomially, but the success of the geometric attack is reduced exponentially and it clearly fails in the limit of infinite synaptic depth. This method is improved by adding a genetic algorithm, which selects the fittest neural networks. The probability of a successful genetic attack is calculated for different model parameters using numerical simulations. The results show that scaling laws observed in the case of other attacks hold for the improved algorithm, too. The number of networks needed for an effective attack grows exponentially with increasing synaptic depth. In addition, finite-size effects caused by Hebbian and anti-Hebbian learning are analyzed. These learning rules converge to the random walk rule if the synaptic depth is small compared to the square root of the system size

  18. Genetic attack on neural cryptography

    Science.gov (United States)

    Ruttor, Andreas; Kinzel, Wolfgang; Naeh, Rivka; Kanter, Ido

    2006-03-01

    Different scaling properties for the complexity of bidirectional synchronization and unidirectional learning are essential for the security of neural cryptography. Incrementing the synaptic depth of the networks increases the synchronization time only polynomially, but the success of the geometric attack is reduced exponentially and it clearly fails in the limit of infinite synaptic depth. This method is improved by adding a genetic algorithm, which selects the fittest neural networks. The probability of a successful genetic attack is calculated for different model parameters using numerical simulations. The results show that scaling laws observed in the case of other attacks hold for the improved algorithm, too. The number of networks needed for an effective attack grows exponentially with increasing synaptic depth. In addition, finite-size effects caused by Hebbian and anti-Hebbian learning are analyzed. These learning rules converge to the random walk rule if the synaptic depth is small compared to the square root of the system size.

  19. Characteristics of grey wastewater

    DEFF Research Database (Denmark)

    Eriksson, Eva; Auffarth, Karina Pipaluk Solvejg; Henze, Mogens

    2002-01-01

    The composition of grey wastewater depends on sources and installations from where the water is drawn, e.g. kitchen, bathroom or laundry. The chemical compounds present originate from household chemicals, cooking, washing and the piping. In general grey wastewater contains lower levels of organic...

  20. Attacks on the AJPS Mersenne-based cryptosystem

    NARCIS (Netherlands)

    K. de Boer (Koen); L. Ducas (Léo); S. Jeffery (Stacey); R. M. de Wolf (Ronald)

    2018-01-01

    textabstractAggarwal, Joux, Prakash and Santha recently introduced a new potentially quantum-safe public-key cryptosystem, and suggested that a brute-force attack is essentially optimal against it. They consider but then dismiss both Meet-in-the-Middle attacks and LLL-based attacks. Very soon after

  1. The political attack ad

    Directory of Open Access Journals (Sweden)

    Palma Peña-Jiménez, Ph.D.

    2011-01-01

    Full Text Available During election campaigns the political spot has a clear objective: to win votes. This message is communicated to the electorate through television and Internet, and usually presents a negative approach, which includes a direct critical message against the opponent, rather than an exposition of proposals. This article is focused on the analysis of the campaign attack video ad purposely created to encourage the disapproval of the political opponent among voters. These ads focus on discrediting the opponent, many times, through the transmission of ad hominem messages, instead of disseminating the potential of the political party and the virtues and manifesto of its candidate. The article reviews the development of the attack ad since its first appearance, which in Spain dates back to 1996, when the famous Doberman ad was broadcast, and examines the most memorable campaign attack ads.

  2. Robust Detection of Stepping-Stone Attacks

    National Research Council Canada - National Science Library

    He, Ting; Tong, Lang

    2006-01-01

    The detection of encrypted stepping-stone attack is considered. Besides encryption and padding, the attacker is capable of inserting chaff packets and perturbing packet timing and transmission order...

  3. A Framework for Attack-Resilient Industrial Control Systems : Attack Detection and Controller Reconfiguration

    OpenAIRE

    Paridari, Kaveh; O'Mahony, Niamh; Mady, Alie El-Din; Chabukswar, Rohan; Boubekeur, Menouer; Sandberg, Henrik

    2017-01-01

    Most existing industrial control systems (ICSs), such as building energy management systems (EMSs), were installed when potential security threats were only physical. With advances in connectivity, ICSs are now, typically, connected to communications networks and, as a result, can be accessed remotely. This extends the attack surface to include the potential for sophisticated cyber attacks, which can adversely impact ICS operation, resulting in service interruption, equipment damage, safety c...

  4. Verification of Sulfate Attack Penetration Rates for Saltstone Disposal Unit Modeling

    Energy Technology Data Exchange (ETDEWEB)

    Flach, G. P. [Savannah River Site (SRS), Aiken, SC (United States). Savannah River National Lab. (SRNL)

    2015-05-12

    Recent Special Analysis modeling of Saltstone Disposal Units consider sulfate attack on concrete and utilize degradation rates estimated from Cementitious Barriers Partnership software simulations. This study provides an independent verification of those simulation results using an alternative analysis method and an independent characterization data source. The sulfate penetration depths estimated herein are similar to the best-estimate values in SRNL-STI-2013-00118 Rev. 2 and well below the nominal values subsequently used to define Saltstone Special Analysis base cases.

  5. An Adaptive Approach for Defending against DDoS Attacks

    Directory of Open Access Journals (Sweden)

    Muhai Li

    2010-01-01

    Full Text Available In various network attacks, the Distributed Denial-of-Service (DDoS attack is a severe threat. In order to deal with this kind of attack in time, it is necessary to establish a special type of defense system to change strategy dynamically against attacks. In this paper, we introduce an adaptive approach, which is used for defending against DDoS attacks, based on normal traffic analysis. The approach can check DDoS attacks and adaptively adjust its configurations according to the network condition and attack severity. In order to insure the common users to visit the victim server that is being attacked, we provide a nonlinear traffic control formula for the system. Our simulation test indicates that the nonlinear control approach can prevent the malicious attack packets effectively while making legitimate traffic flows arrive at the victim.

  6. Countermeasures for unintentional and intentional video watermarking attacks

    Science.gov (United States)

    Deguillaume, Frederic; Csurka, Gabriela; Pun, Thierry

    2000-05-01

    These last years, the rapidly growing digital multimedia market has revealed an urgent need for effective copyright protection mechanisms. Therefore, digital audio, image and video watermarking has recently become a very active area of research, as a solution to this problem. Many important issues have been pointed out, one of them being the robustness to non-intentional and intentional attacks. This paper studies some attacks and proposes countermeasures applied to videos. General attacks are lossy copying/transcoding such as MPEG compression and digital/analog (D/A) conversion, changes of frame-rate, changes of display format, and geometrical distortions. More specific attacks are sequence edition, and statistical attacks such as averaging or collusion. Averaging attack consists of averaging locally consecutive frames to cancel the watermark. This attack works well for schemes which embed random independent marks into frames. In the collusion attack the watermark is estimated from single frames (based on image denoising), and averaged over different scenes for better accuracy. The estimated watermark is then subtracted from each frame. Collusion requires that the same mark is embedded into all frames. The proposed countermeasures first ensures robustness to general attacks by spread spectrum encoding in the frequency domain and by the use of an additional template. Secondly, a Bayesian criterion, evaluating the probability of a correctly decoded watermark, is used for rejection of outliers, and to implement an algorithm against statistical attacks. The idea is to embed randomly chosen marks among a finite set of marks, into subsequences of videos which are long enough to resist averaging attacks, but short enough to avoid collusion attacks. The Bayesian criterion is needed to select the correct mark at the decoding step. Finally, the paper presents experimental results showing the robustness of the proposed method.

  7. Link-layer Jamming Attacks on S-MAC

    NARCIS (Netherlands)

    Law, Y.W.; Hartel, Pieter H.; den Hartog, Jeremy; Havinga, Paul J.M.

    2004-01-01

    We argue that among denial-of-service (DoS) attacks, link-layer jamming is a more attractive option to attackers than radio jamming is. By exploiting the semantics of the link-layer protocol (aka MAC protocol), an attacker can achieve better efficiency than blindly jamming the radio signals alone.

  8. Link-layer jamming attacks on S-MAC

    NARCIS (Netherlands)

    Law, Y.W.; Hartel, Pieter H.; den Hartog, Jeremy; Havinga, Paul J.M.

    We argue that among denial-of-service (DoS) attacks, link-layer jamming is a more attractive option to attackers than radio jamming is. By exploiting the semantics of the link-layer protocol (aka MAC protocol), an attacker can achieve better efficiency than blindly jamming the radio signals alone.

  9. A computer network attack taxonomy and ontology

    CSIR Research Space (South Africa)

    Van Heerden, RP

    2012-01-01

    Full Text Available of the attack that occur after the attack goal has been achieved, and occurs because the attacker loses control of some systems. For example, after the launch of a DDOS (Distributed Denial of Service) attack, zombie computers may still connect to the target...-scrap- value-of-a-hacked-pc-revisited/ . Lancor, L., & Workman, R. (2007). Using Google Hacking to Enhance Defense Strategies. ACM SIGCSE Bulletin, 39 (1), 491-495. Lau, F., Rubin, S. H., Smith, M. H., & Trajkovic, L. (2000). Distributed Denial of Service...

  10. Unified communications forensics anatomy of common UC attacks

    CERN Document Server

    Grant, Nicholas Mr

    2013-01-01

    Unified Communications Forensics: Anatomy of Common UC Attacks is the first book to explain the issues and vulnerabilities and demonstrate the attacks, forensic artifacts, and countermeasures required to establish a secure (UC) environment. This book is written by leading UC experts Nicholas Grant and Joseph W. Shaw II and provides material never before found on the market, including: analysis of forensic artifacts in common UC attacks an in-depth look at established UC technologies and attack exploits hands-on understanding of UC attack vectors and associated countermeasures

  11. Recycling phosphorus from wastewater

    DEFF Research Database (Denmark)

    Lemming, Camilla Kjærulff

    wastewater-derived products, and to relate this to the availability from other P-containing waste products and mineral P fertiliser. This included aspects of development over time and soil accumulation, as well as effects of soil pH and the spatial distribution in soil. The P sources applied in this PhD work...... reserves. Wastewater represents the largest urban flow of P in waste. Hence, knowledge about plant P availability of products from the wastewater treatment system, and also comparison to other waste P sources and mineral P is essential to obtain an efficient recycling and to prioritise between different P...... recycling options. The work of this PhD focused on the plant P availability of sewage sludge, a P-rich residue from wastewater treatment which is commonly applied to agricultural soil in Denmark. The overall objective of the PhD work was to evaluate the plant availability of P in sewage sludge and other...

  12. Organic contaminant removal efficiency of sodium bentonite/clay (BC) mixtures in high permeability regions utilizing reclaimed wastewater: A meso-scale study

    Science.gov (United States)

    Xiao, Yang; Li, Yunkai; Ning, Zigong; Li, Pengxiang; Yang, Peiling; Liu, Chengcheng; Liu, Zhongwei; Xu, Feipeng; Hynds, Paul Dylan

    2018-03-01

    Wastewater reclamation now represents an effective measure for sustainable water resource management in arid regions, however wastewater components (organic micropollutants) may potentially impact local ecological and/or human health. Previous studies have shown that sodium bentonite/natural clay (BC) mixes may be used to effectively reduce riverbed infiltration in regions characterized by excessively high hydraulic conductivity. Accordingly, the current study sought to investigate the contaminant removal efficiency (Re) of several BC mass ratios in simulated dry riverbeds. Results indicate that the measured Re of NH4+-N, CODcr and BOD5 increased in concurrence with an increasing sodium bentonite ratio, up to a maximum Re of 97.4% (NH4+-N), 55.2% (CODcr), and 51.5% (BOD5). The primary contaminant removal site was shown to be the infiltration-reducing (BC) layer, accounting for approximately 40%, 60%, and 70% of NH4+-N, CODcr and BOD5 removal, respectively. Conversely, the removal efficiency of NO3-N was found to be low (managing recharge of non-potable aquifers with reclaimed wastewater.

  13. Disinfection of wastewater from a Riyadh Wastewater Treatment Plant with ionizing radiation

    International Nuclear Information System (INIS)

    Basfar, A.A.; Abdel Rehim, F.

    2002-01-01

    The goal of this research was to establish the applicability of the electron beam treatment process for treating wastewater intended for reuse. The objective of this study was to determine the effectiveness of gamma irradiation in the disinfection of wastewater, and the improvement of the water quality by determining the changes in organic matter as indicated by the measurement of biochemical oxygen demand (BOD), chemical oxygen demand (COD) and total organic carbon (TOC). Samples of effluent, before and after chlorination, and sludge were obtained from a Riyadh Wastewater Treatment Plant. The studies were conducted using a laboratory scale 60 Co gamma source. The improvement in quality of the irradiated samples was demonstrated by the reduction in bacteria, and the reduction in the BOD, COD and TOC. Radiation of the wastewater provided adequate disinfection while at the same time increasing the water quality. This treatment could lead to additional opportunities for the reuse of this valuable resource. Limited studies, conducted on the anaerobically digested secondary biosolids, showed an improvement in bacterial content and no change in COD

  14. Attacks and countermeasures on AES and ECC

    DEFF Research Database (Denmark)

    Tange, Henrik; Andersen, Birger

    2013-01-01

    AES (Advanced Encryption Standard) is widely used in LTE and Wi-Fi communication systems. AES has recently been exposed to new attacks which have questioned the overall security of AES. The newest attack is a so called biclique attack, which is using the fact that the content of the state array...

  15. Classifying network attack scenarios using an ontology

    CSIR Research Space (South Africa)

    Van Heerden, RP

    2012-03-01

    Full Text Available ) or to the target?s reputation. The Residue sub-phase refers to damage or artefacts of the attack that occur after the attack goal has been achieved, and occurs because the attacker loses control of some systems. For example after the launch of a DDOS..., A. (1995). Hacking theft of $10 million from citibank revealed. Retrieved 10/10, 2011, from http://articles.latimes.com/1995-08-19/business/fi-36656_1_citibank-system Hurley, E. (2004). SCO site succumbs to DDoS attack. Retrieved 10/10, 2011, from...

  16. Modelling Social-Technical Attacks with Timed Automata

    DEFF Research Database (Denmark)

    David, Nicolas; David, Alexandre; Hansen, Rene Rydhof

    2015-01-01

    . In this paper we develop an approach towards modelling socio-technical systems in general and socio-technical attacks in particular, using timed automata and illustrate its application by a complex case study. Thanks to automated model checking and automata theory, we can automatically generate possible attacks...... in our model and perform analysis and simulation of both model and attack, revealing details about the specific interaction between attacker and victim. Using timed automata also allows for intuitive modelling of systems, in which quantities like time and cost can be easily added and analysed....

  17. Quantitative Verification and Synthesis of Attack-Defence Scenarios

    DEFF Research Database (Denmark)

    Aslanyan, Zaruhi; Nielson, Flemming; Parker, David

    2016-01-01

    analysis of quantitative properties of complex attack-defence scenarios, using an extension of attack-defence trees which models temporal ordering of actions and allows explicit dependencies in the strategies adopted by attackers and defenders. We adopt a game-theoretic approach, translating attack...... which guarantee or optimise some quantitative property, such as the probability of a successful attack, the expected cost incurred, or some multi-objective trade-off between the two. We implement our approach, building upon the PRISM-games model checker, and apply it to a case study of an RFID goods...

  18. Situational awareness of a coordinated cyber attack

    Science.gov (United States)

    Sudit, Moises; Stotz, Adam; Holender, Michael

    2005-03-01

    As technology continues to advance, services and capabilities become computerized, and an ever increasing amount of business is conducted electronically the threat of cyber attacks gets compounded by the complexity of such attacks and the criticality of the information which must be secured. A new age of virtual warfare has dawned in which seconds can differentiate between the protection of vital information and/or services and a malicious attacker attaining their goal. In this paper we present a novel approach in the real-time detection of multistage coordinated cyber attacks and the promising initial testing results we have obtained. We introduce INFERD (INformation Fusion Engine for Real-time Decision-making), an adaptable information fusion engine which performs fusion at levels zero, one, and two to provide real-time situational assessment and its application to the cyber domain in the ECCARS (Event Correlation for Cyber Attack Recognition System) system. The advantages to our approach are fourfold: (1) The complexity of the attacks which we consider, (2) the level of abstraction in which the analyst interacts with the attack scenarios, (3) the speed at which the information fusion is presented and performed, and (4) our disregard for ad-hoc rules or a priori parameters.

  19. Bioconversion of wastewater from sweet potato starch production to Paenibacillus polymyxa biofertilizer for tea plants.

    Science.gov (United States)

    Xu, Shengjun; Bai, Zhihui; Jin, Bo; Xiao, Runlin; Zhuang, Guoqiang

    2014-02-28

    Wastewater from the sweet potato starch industry is a large source of nutrient-rich substrates. We assessed whether this wastewater could be used to produce Paenibacillus polymyxa biofertilizer for foliar application to tea trees. Using the central composite design methods we experientially determined that the optimal culture conditions for P. polymyxa were pH, 6.5; temperature, 29.0 °C; and incubation time, 16 h. Under these conditions, a maximum biomass of 9.7 × 10(9) cfu/mL was achieved. We then conducted a yearlong field investigation to determine the effect of P. polymyxa biofertilizer on the growth of tea plants (Camellia sinensis). Tea yield, quantity of water extract, and tea polyphenol levels were significantly higher after foliar application of the biofertilizer compared to that in the controls by an average of 16.7%, 6.3%, and 10.4%, respectively. This approach appears to be technically feasible for organic tea production, and is an environmentally friendly way to utilize wastewater.

  20. Parasitological Contamination of Wastewater Irrigated and Raw ...

    African Journals Online (AJOL)

    Tadesse

    Occurrence of infective stages of intestinal parasites on wastewater- irrigated vegetables ..... reported the health hazards of agricultural reuse of untreated wastewater through detection of .... State of knowledge in land treatment of wastewater.

  1. Polysulfone thin film composite nanofiltration membranes for removal of textile dyes wastewater

    Science.gov (United States)

    Sutedja, Andrew; Aileen Josephine, Claresta; Mangindaan, Dave

    2017-12-01

    This research was conducted to produce nanofiltration (NF) membranes, which have good performance in terms of removal of textile dye (Reactive Red 120, RR120) from simulated wastewater as one of several eco-engineering developments for sustainable water resource management. Phase inversion technique was utilized to fabricate the membrane with polysulfone (PSF) support, dissolved in N-methyl-2 pyrollidone (NMP) solvent, and diethylene glycol (DEG) as non-solvent additive. The fabricated membrane then modified with the additional of dopamine coating and further modified by interfacial polymerization (IP) to form a thin film composite (TFC)-NF membrane with PSF substrate. TFC was formed from interaction between amine monomer (2 %-weight of m-phenylenediamine (MPD) in deionized water) and acyl chloride (0.2 %-weight of trimesoyl chloride (TMC) in hexane). From this study, the fabricated PSF-TFC membrane could remove dyestuff from RR120 wastewater by 88% rejection at 120 psi. The result of this study is promising to be applied in Indonesia where researches on removal of dyes from textile wastewater by using membranes are still quite rare. Therefore, this paper may open new avenues for development of eco-engineering development in Indonesia.

  2. Anti-discrimination Analysis Using Privacy Attack Strategies

    KAUST Repository

    Ruggieri, Salvatore

    2014-09-15

    Social discrimination discovery from data is an important task to identify illegal and unethical discriminatory patterns towards protected-by-law groups, e.g., ethnic minorities. We deploy privacy attack strategies as tools for discrimination discovery under hard assumptions which have rarely tackled in the literature: indirect discrimination discovery, privacy-aware discrimination discovery, and discrimination data recovery. The intuition comes from the intriguing parallel between the role of the anti-discrimination authority in the three scenarios above and the role of an attacker in private data publishing. We design strategies and algorithms inspired/based on Frèchet bounds attacks, attribute inference attacks, and minimality attacks to the purpose of unveiling hidden discriminatory practices. Experimental results show that they can be effective tools in the hands of anti-discrimination authorities.

  3. Treatment of Preserved Wastewater with UASB

    Directory of Open Access Journals (Sweden)

    Zhang Yongli

    2016-01-01

    Full Text Available The preserved wastewater was treated by the upflow anaerobic sludge blanket (UASB reactor, the effects of the anaerobic time on COD, turbidity, pH, conductivity, SS, absorbance, and decolorization rate of the preserved wastewater were investigated. The results showed that with the increase of the anaerobic time, the treatment effect of the UASB reactor on the preserved wastewater was improved. Under the optimum anaerobic time condition, the COD removal rate, turbidity removal rate, pH, conductivity, SS removal rate, absorbance, and decoloration rate of the wastewater were 49.6%, 38.5%, 5.68, 0.518×104, 24%, 0.598, and 32.4%, respectively. Therefore, the UASB reactor can be used as a pretreatment for the preserved wastewater, in order to reduce the difficulty of subsequent aerobic treatment.

  4. Aerobic cyanide degradation by bacterial isolates from cassava factory wastewater.

    Science.gov (United States)

    Kandasamy, Sujatha; Dananjeyan, Balachandar; Krishnamurthy, Kumar; Benckiser, Gero

    2015-01-01

    Ten bacterial strains that utilize cyanide (CN) as a nitrogen source were isolated from cassava factory wastewater after enrichment in a liquid media containing sodium cyanide (1 mM) and glucose (0.2% w/v). The strains could tolerate and grow in cyanide concentrations of up to 5 mM. Increased cyanide levels in the media caused an extension of lag phase in the bacterial growth indicating that they need some period of acclimatisation. The rate of cyanide removal by the strains depends on the initial cyanide and glucose concentrations. When initial cyanide and glucose concentrations were increased up to 5 mM, cyanide removal rate increased up to 63 and 61 per cent by Bacillus pumilus and Pseudomonas putida. Metabolic products such as ammonia and formate were detected in culture supernatants, suggesting a direct hydrolytic pathway without an intermediate formamide. The study clearly demonstrates the potential of aerobic treatment with cyanide degrading bacteria for cyanide removal in cassava factory wastewaters.

  5. Cyberprints: Identifying Cyber Attackers by Feature Analysis

    Science.gov (United States)

    Blakely, Benjamin A.

    2012-01-01

    The problem of attributing cyber attacks is one of increasing importance. Without a solid method of demonstrating the origin of a cyber attack, any attempts to deter would-be cyber attackers are wasted. Existing methods of attribution make unfounded assumptions about the environment in which they will operate: omniscience (the ability to gather,…

  6. Understanding farmers' preferences for wastewater reuse ...

    African Journals Online (AJOL)

    Wastewater has emerged as an alternative source of water. Since the agricultural sector remains the largest water user world-wide, it is the main potential user of treated wastewater. However, while there are trade-offs in using wastewater, it may be the only option in water scarce regions. South Africa has included water ...

  7. Simulation of Attacks for Security in Wireless Sensor Network.

    Science.gov (United States)

    Diaz, Alvaro; Sanchez, Pablo

    2016-11-18

    The increasing complexity and low-power constraints of current Wireless Sensor Networks (WSN) require efficient methodologies for network simulation and embedded software performance analysis of nodes. In addition, security is also a very important feature that has to be addressed in most WSNs, since they may work with sensitive data and operate in hostile unattended environments. In this paper, a methodology for security analysis of Wireless Sensor Networks is presented. The methodology allows designing attack-aware embedded software/firmware or attack countermeasures to provide security in WSNs. The proposed methodology includes attacker modeling and attack simulation with performance analysis (node's software execution time and power consumption estimation). After an analysis of different WSN attack types, an attacker model is proposed. This model defines three different types of attackers that can emulate most WSN attacks. In addition, this paper presents a virtual platform that is able to model the node hardware, embedded software and basic wireless channel features. This virtual simulation analyzes the embedded software behavior and node power consumption while it takes into account the network deployment and topology. Additionally, this simulator integrates the previously mentioned attacker model. Thus, the impact of attacks on power consumption and software behavior/execution-time can be analyzed. This provides developers with essential information about the effects that one or multiple attacks could have on the network, helping them to develop more secure WSN systems. This WSN attack simulator is an essential element of the attack-aware embedded software development methodology that is also introduced in this work.

  8. Simulation of Attacks for Security in Wireless Sensor Network

    Science.gov (United States)

    Diaz, Alvaro; Sanchez, Pablo

    2016-01-01

    The increasing complexity and low-power constraints of current Wireless Sensor Networks (WSN) require efficient methodologies for network simulation and embedded software performance analysis of nodes. In addition, security is also a very important feature that has to be addressed in most WSNs, since they may work with sensitive data and operate in hostile unattended environments. In this paper, a methodology for security analysis of Wireless Sensor Networks is presented. The methodology allows designing attack-aware embedded software/firmware or attack countermeasures to provide security in WSNs. The proposed methodology includes attacker modeling and attack simulation with performance analysis (node’s software execution time and power consumption estimation). After an analysis of different WSN attack types, an attacker model is proposed. This model defines three different types of attackers that can emulate most WSN attacks. In addition, this paper presents a virtual platform that is able to model the node hardware, embedded software and basic wireless channel features. This virtual simulation analyzes the embedded software behavior and node power consumption while it takes into account the network deployment and topology. Additionally, this simulator integrates the previously mentioned attacker model. Thus, the impact of attacks on power consumption and software behavior/execution-time can be analyzed. This provides developers with essential information about the effects that one or multiple attacks could have on the network, helping them to develop more secure WSN systems. This WSN attack simulator is an essential element of the attack-aware embedded software development methodology that is also introduced in this work. PMID:27869710

  9. Ultraviolet disinfection of treated municipal wastewaters

    Energy Technology Data Exchange (ETDEWEB)

    Vander Laan, H; Cairns, B

    1993-12-31

    A wastewater disinfection system developed by a Canadian company, Trojan Technologies Inc., was discussed. Disinfection for pathogen reduction prior to discharge of treated municipal wastewater back into rivers and lakes has been either ignored or treated by the use of chemicals. In 1979 the first pilot ultraviolet (UV) wastewater disinfection system was established. Since then, over 500 municipal UV installations have been commissioned. The largest installation can process 212 million gallons of water per day. The advantages of UV as a disinfectant are: (1) It is more effective than chlorine. (2) There are no mutagenic/carcinogenic byproducts formed with UV. (3) No toxic chemical residuals are discharged. (4) UV is safe to both the operators and the public. (5) It is cost effective. Europe has not been as active in wastewater disinfection as has North America. One result of the absence of wastewater disinfection in Europe is that the Rhine River, for example, carries 50 million salmonella per second. Disinfection of wastewater effluents is, of course, indispensable in protecting our drinking water supply. 2 figs.

  10. Implications of Changes in Water Use, Population, and Climate on Performance and Planning of Wastewater Systems

    Science.gov (United States)

    Cook, L. M.; Samaras, C.; VanBriesen, J.

    2016-12-01

    The installation of water-efficient indoor appliances and fixtures - such as those meeting standards set by the 1992 Energy Policy Act - has led to a significant decline in residential water use over the past 30 years. Other water conservation strategies, like leak repair and greywater reuse, have also contributed to changes in the amount of potable water used by cities. These changes affect downstream systems like wastewater collection and treatment. During the 1970s drought in California, mandatory water conservation measures led to a reduction in wastewater flows by up to 60%, leading to an increase in pipe corrosion, solids settling, and odor due to lower flow velocities. Performance and design of wastewater systems over time is, however, a complex system affected by external drivers, like climate, population and land use, policy and public changes that influence water use, and water utility practices such as maintenance and green infrastructure installation that can reduce flows into the system. This research demonstrates how the use of active water management, e.g. measures that increase water use efficiency or decrease the amount of infiltration and inflow (I&I), may help offset exogenous factors, preventing or delaying the need for upgrades to existing water infrastructure systems. This is evaluated through a scenario analysis of flows to a wastewater treatment Plant, located in Portland, Oregon. Future wastewater flows were projected to 2040 using potential changes in per capita wastewater production, industrial wastewater production, population growth, and ranges of infiltration and inflow. Results show that with current efficiency trends in Portland, rapid population growth could be offset, leading to stabilization of wastewater flows over the next several decades, and elimination of the need for capital expansion. Climate drivers leading to an increase in stormwater inflows have the potential to outweigh declines in wastewater due to efficiency; yet the

  11. Sustainable water recovery from oily wastewater via forward osmosis-membrane distillation (FO-MD).

    Science.gov (United States)

    Zhang, Sui; Wang, Peng; Fu, Xiuzhu; Chung, Tai-Shung

    2014-04-01

    This study proposed and investigated a hybrid forward osmosis - membrane distillation (FO-MD) system for sustainable water recovery from oily wastewater by employing lab-fabricated FO and MD hollow fiber membranes. Stable oil-in-water emulsions of different concentrations with small droplet sizes (oil droplets and partial permeation of acetic acid could be achieved. Finally, an integrated FO-MD system was developed to treat the oily wastewater containing petroleum, surfactant, NaCl and acetic acid at 60 °C in the batch mode. The water flux in FO undergoes three-stage decline due to fouling and reduction in osmotic driving force, but is quite stable in MD regardless of salt concentration. Oily wastewater with relatively high salinity could be effectively recovered by the FO-MD hybrid system while maintaining large water flux, at least 90% feed water recovery could be readily attained with only trace amounts of oil and salts, and the draw solution was re-generated for the next rounds of FO-MD run. Interestingly, significant amount of acetic acid was also retained in the permeate for further reuse as a chemical additive during the production of crude oil. The work has demonstrated that not only water but also organic additives in the wastewater could be effectively recovered by FO-MD systems for reuse or other utilizations. Copyright © 2014 Elsevier Ltd. All rights reserved.

  12. Development of a BR-UASB-DHS system for natural rubber processing wastewater treatment.

    Science.gov (United States)

    Watari, Takahiro; Thanh, Nguyen Thi; Tsuruoka, Natsumi; Tanikawa, Daisuke; Kuroda, Kyohei; Huong, Nguyen Lan; Tan, Nguyen Minh; Hai, Huynh Trung; Hatamoto, Masashi; Syutsubo, Kazuaki; Fukuda, Masao; Yamaguchi, Takashi

    2015-11-21

    Natural rubber processing wastewater contains high concentrations of organic compounds, nitrogen, and other contaminants. In this study, a treatment system composed of a baffled reactor (BR), an upflow anaerobic sludge blanket (UASB) reactor, and a downflow hanging sponge (DHS) reactor was used to treat natural rubber processing wastewater in Vietnam. The BR showed good total suspended solids removal of 47.6%, as well as acidification of wastewater. The UASB reactor achieved a high chemical oxygen demand (COD) removal efficiency of 92.7% ± 2.3% and energy recovery in the form of methane with an organic loading rate of 12.2 ± 6.6 kg-COD·m -3 ·day -1 . The DHS reactor showed a high performance in residual organic matter removal from UASB effluent. In total, the system achieved high-level total COD removal of 98.6% ± 1.2% and total suspended solids removal of 98.0% ± 1.4%. Massive parallel 16S rRNA gene sequencing of the retained sludge in the UASB reactor showed the predominant microbial phyla to be Bacteroidetes, Firmicutes, Proteobacteria, WWE1, and Euryarchaeota. Uncultured bacteria belonging to the phylum Bacteroidetes and Phylum WWE1 were predominant in the UASB reactor. This microbial assemblage utilizes the organic compounds contained in natural rubber processing wastewater. In addition, the methane-producing archaea Methanosaeta sp. and Methanolinea sp. were detected.

  13. Using agility to combat cyber attacks.

    Science.gov (United States)

    Anderson, Kerry

    2017-06-01

    Some incident response practitioners feel that they have been locked in a battle with cyber criminals since the popular adoption of the internet. Initially, organisations made great inroads in preventing and containing cyber attacks. In the last few years, however, cyber criminals have become adept at eluding defence security technologies and rapidly modifying their exploit strategies for financial or political gains. Similar to changes in military combat tactics, cyber criminals utilise distributed attack cells, real-time communications, and rapidly mutating exploits to minimise the potential for detection. Cyber criminals have changed their attack paradigm. This paper describes a new incident response paradigm aimed at combating the new model of cyber attacks with an emphasis on agility to increase the organisation's ability to respond rapidly to these new challenges.

  14. Women's Heart Disease: Heart Attack Symptoms

    Science.gov (United States)

    ... of this page please turn JavaScript on. Feature: Women's Heart Disease Heart Attack Symptoms Past Issues / Winter ... most common heart attack symptom in men and women is chest pain or discomfort. However, women also ...

  15. A novel proposed network security management approach for cyber attacks

    International Nuclear Information System (INIS)

    Ahmed, Z.; Nazir, B.; Zafar, M.F.; Anwar, M.M.; Azam, K.; Asar, A.U.

    2007-01-01

    Network security is a discipline that focuses on securing networks from unauthorized access. Given the Escalating threats of malicious cyber attacks, modern enterprises employ multiple lines of defense. A comprehensive defense strategy against such attacks should include (I) an attack detection component that deter- mines the fact that a program is compromised, (2) an attack identification and prevention component that identifies attack packets so that one can block such packets in the future and prevents the attack from further propagation. Over the last decade, a significant amount of research has been vested in the systems that can detect cyber attacks either statically at compile time or dynamically at run time, However, not much effort is spent on automated attack packet identification or attack prevention. In this paper we present a unified solution to the problems mentioned above. We implemented this solution after the forward engineering of Open Source Security Information Management (OSSIM) system called Preventive Information Security management (PrISM) system that correlates input from different sensors so that the resulting product can automatically detect any cyber attack against it and prevents by identifying the actual attack packet(s). The PrISM was always able to detect the attacks, identify the attack packets and most often prevent by blocking the attacker's IP address to continue normal execution. There is no additional run-time performance overhead for attack prevention. (author)

  16. Resource Recovery from Wastewater by Biological Technologies: Opportunities, Challenges, and Prospects

    Science.gov (United States)

    Puyol, Daniel; Batstone, Damien J.; Hülsen, Tim; Astals, Sergi; Peces, Miriam; Krömer, Jens O.

    2017-01-01

    Limits in resource availability are driving a change in current societal production systems, changing the focus from residues treatment, such as wastewater treatment, toward resource recovery. Biotechnological processes offer an economic and versatile way to concentrate and transform resources from waste/wastewater into valuable products, which is a prerequisite for the technological development of a cradle-to-cradle bio-based economy. This review identifies emerging technologies that enable resource recovery across the wastewater treatment cycle. As such, bioenergy in the form of biohydrogen (by photo and dark fermentation processes) and biogas (during anaerobic digestion processes) have been classic targets, whereby, direct transformation of lipidic biomass into biodiesel also gained attention. This concept is similar to previous biofuel concepts, but more sustainable, as third generation biofuels and other resources can be produced from waste biomass. The production of high value biopolymers (e.g., for bioplastics manufacturing) from organic acids, hydrogen, and methane is another option for carbon recovery. The recovery of carbon and nutrients can be achieved by organic fertilizer production, or single cell protein generation (depending on the source) which may be utilized as feed, feed additives, next generation fertilizers, or even as probiotics. Additionlly, chemical oxidation-reduction and bioelectrochemical systems can recover inorganics or synthesize organic products beyond the natural microbial metabolism. Anticipating the next generation of wastewater treatment plants driven by biological recovery technologies, this review is focused on the generation and re-synthesis of energetic resources and key resources to be recycled as raw materials in a cradle-to-cradle economy concept. PMID:28111567

  17. Adaptive optimisation-offline cyber attack on remote state estimator

    Science.gov (United States)

    Huang, Xin; Dong, Jiuxiang

    2017-10-01

    Security issues of cyber-physical systems have received increasing attentions in recent years. In this paper, deception attacks on the remote state estimator equipped with the chi-squared failure detector are considered, and it is assumed that the attacker can monitor and modify all the sensor data. A novel adaptive optimisation-offline cyber attack strategy is proposed, where using the current and previous sensor data, the attack can yield the largest estimation error covariance while ensuring to be undetected by the chi-squared monitor. From the attacker's perspective, the attack is better than the existing linear deception attacks to degrade the system performance. Finally, some numerical examples are provided to demonstrate theoretical results.

  18. Cyber-physical attacks a growing invisible threat

    CERN Document Server

    Loukas, George

    2015-01-01

    Cyber-Physical Attacks: A Growing Invisible Threat presents the growing list of harmful uses of computers and their ability to disable cameras, turn off a building's lights, make a car veer off the road,  or a drone land in enemy hands. In essence, it details the ways cyber-physical attacks are replacing physical attacks in crime, warfare, and terrorism. The book explores how attacks using computers affect the physical world in ways that were previously only possible through physical means. Perpetrators can now cause damage without the same risk, and without the political, social, or moral

  19. Use of Attack Graphs in Security Systems

    Directory of Open Access Journals (Sweden)

    Vivek Shandilya

    2014-01-01

    Full Text Available Attack graphs have been used to model the vulnerabilities of the systems and their potential exploits. The successful exploits leading to the partial/total failure of the systems are subject of keen security interest. Considerable effort has been expended in exhaustive modeling, analyses, detection, and mitigation of attacks. One prominent methodology involves constructing attack graphs of the pertinent system for analysis and response strategies. This not only gives the simplified representation of the system, but also allows prioritizing the security properties whose violations are of greater concern, for both detection and repair. We present a survey and critical study of state-of-the-art technologies in attack graph generation and use in security system. Based on our research, we identify the potential, challenges, and direction of the current research in using attack graphs.

  20. Wastewater impact on physiology, biomass and yield of canola (brassica napus L.)

    International Nuclear Information System (INIS)

    Khan, I.U.; Khan, M.J.

    2012-01-01

    The impact of domestic/municipal wastewater (mww) of Dera Ismail Khan, Pakistan was assessed through its effects on biomass, physiology and yield of canola (Brassica napus L.). The pot experiments were conducted in a completely randomized design with three replications in net house during winter season 2006-07 and 2007-08 at Gomal University, Dera Ismail Khan, Pakistan. Treatments included were T0 (tube well/tap water), T/sub 1/ (20% mww), T/sub 2/ (40% mww), T/sub 3/ (80% mww) and T/sub 4/ (100% mww/raw-form municipal wastewater). The quality and chemical composition of wastewater was deviating from international (Anon., 1985) as well as NEQS (2005) standard. Analysis of wastewater showed that biochemical oxygen demand (BOD), chemical oxygen demand (COD), sodium adsorption ratio (SAR) and total suspended solids (TSS) were above the permissible limit of irrigation. In pods per plant, the reduction was 61.55% by recording 110 pods per plant with T/sub 4/ (100% mww) as compared to control T0 (286.1 pods per plant). Similarly pod length (reduced by 59.72%), seeds per pod (reduced by 42.53%), Seeds per plant (reduced by 82%), seed weight per plant (reduced by 88%), 100-seed weight (reduced by 19.54%) and straw yield (reduced by 54.23%) were significantly reduced by applying 100% wastewater. The most affected yield contributing traits were seeds per plant and seed weight per plant with 82% and 88% reduction, respectively due to T/sub 4/ (100% mww). On average, the decrease was 60% in the first stage and a further decrement of 4.83% was observed when the obtained seeds were re-sown in 2007-08. Results revealed that utilizing municipal wastewater of the area under investigation for irrigation purpose of food and feed crops might not be safe. The major reason seems to be the high salinity and sodium adsorption ratio that restricted crop growth and yield. (author)

  1. A fatal elephant attack.

    Science.gov (United States)

    Hejna, Petr; Zátopková, Lenka; Safr, Miroslav

    2012-01-01

    A rare case of an elephant attack is presented. A 44-year-old man working as an elephant keeper was attacked by a cow elephant when he tripped over a foot chain while the animal was being medically treated. The man fell down and was consequently repeatedly attacked with elephant tusks. The man sustained multiple stab injuries to both groin regions, a penetrating injury to the abdominal wall with traumatic prolapse of the loops of the small bowel, multiple defects of the mesentery, and incomplete laceration of the abdominal aorta with massive bleeding into the abdominal cavity. In addition to the penetrating injuries, the man sustained multiple rib fractures with contusion of both lungs and laceration of the right lobe of the liver, and comminuted fractures of the pelvic arch and left femoral body. The man died shortly after he had been received at the hospital. The cause of death was attributed to traumatic shock. © 2011 American Academy of Forensic Sciences.

  2. Cyber Attacks, Information Attacks, and Postmodern Warfare

    Directory of Open Access Journals (Sweden)

    Valuch Jozef

    2017-06-01

    Full Text Available The aim of this paper is to evaluate and differentiate between the phenomena of cyberwarfare and information warfare, as manifestations of what we perceive as postmodern warfare. We describe and analyse the current examples of the use the postmodern warfare and the reactions of states and international bodies to these phenomena. The subject matter of this paper is the relationship between new types of postmodern conflicts and the law of armed conflicts (law of war. Based on ICJ case law, it is clear that under current legal rules of international law of war, cyber attacks as well as information attacks (often performed in the cyberspace as well can only be perceived as “war” if executed in addition to classical kinetic warfare, which is often not the case. In most cases perceived “only” as a non-linear warfare (postmodern conflict, this practice nevertheless must be condemned as conduct contrary to the principles of international law and (possibly a crime under national laws, unless this type of conduct will be recognized by the international community as a “war” proper, in its new, postmodern sense.

  3. False Positive and False Negative Effects on Network Attacks

    Science.gov (United States)

    Shang, Yilun

    2018-01-01

    Robustness against attacks serves as evidence for complex network structures and failure mechanisms that lie behind them. Most often, due to detection capability limitation or good disguises, attacks on networks are subject to false positives and false negatives, meaning that functional nodes may be falsely regarded as compromised by the attacker and vice versa. In this work, we initiate a study of false positive/negative effects on network robustness against three fundamental types of attack strategies, namely, random attacks (RA), localized attacks (LA), and targeted attack (TA). By developing a general mathematical framework based upon the percolation model, we investigate analytically and by numerical simulations of attack robustness with false positive/negative rate (FPR/FNR) on three benchmark models including Erdős-Rényi (ER) networks, random regular (RR) networks, and scale-free (SF) networks. We show that ER networks are equivalently robust against RA and LA only when FPR equals zero or the initial network is intact. We find several interesting crossovers in RR and SF networks when FPR is taken into consideration. By defining the cost of attack, we observe diminishing marginal attack efficiency for RA, LA, and TA. Our finding highlights the potential risk of underestimating or ignoring FPR in understanding attack robustness. The results may provide insights into ways of enhancing robustness of network architecture and improve the level of protection of critical infrastructures.

  4. When wastewater has worth: Water reconditioning opportunities in the food industry to achieve sustainable food manufacturing (abstract)

    Science.gov (United States)

    A major sustainability goal of food processing wastewater (FPWW) management is to not only decrease environmental pollution but also utilize valuable co-products present in the FPWW. Many processed food products, especially those from fruits and vegetables, result in FPWW streams that contain compou...

  5. Machine Learning Methods for Attack Detection in the Smart Grid.

    Science.gov (United States)

    Ozay, Mete; Esnaola, Inaki; Yarman Vural, Fatos Tunay; Kulkarni, Sanjeev R; Poor, H Vincent

    2016-08-01

    Attack detection problems in the smart grid are posed as statistical learning problems for different attack scenarios in which the measurements are observed in batch or online settings. In this approach, machine learning algorithms are used to classify measurements as being either secure or attacked. An attack detection framework is provided to exploit any available prior knowledge about the system and surmount constraints arising from the sparse structure of the problem in the proposed approach. Well-known batch and online learning algorithms (supervised and semisupervised) are employed with decision- and feature-level fusion to model the attack detection problem. The relationships between statistical and geometric properties of attack vectors employed in the attack scenarios and learning algorithms are analyzed to detect unobservable attacks using statistical learning methods. The proposed algorithms are examined on various IEEE test systems. Experimental analyses show that machine learning algorithms can detect attacks with performances higher than attack detection algorithms that employ state vector estimation methods in the proposed attack detection framework.

  6. Transient Ischemic Attack

    Medline Plus

    Full Text Available ... stroke symptoms. Popular Topics TIA Cardiac Catheter Cholesterol Heart Attack Stent © 2018, American Heart Association, Inc. All rights reserved. Unauthorized use prohibited. ...

  7. Process model economics of xanthan production from confectionery industry wastewaters.

    Science.gov (United States)

    Bajić, Bojana Ž; Vučurović, Damjan G; Dodić, Siniša N; Grahovac, Jovana A; Dodić, Jelena M

    2017-12-01

    In this research a process and cost model for a xanthan production facility was developed using process simulation software (SuperPro Designer ® ). This work represents a novelty in the field for two reasons. One is that xanthan gum has been produced from several wastes but never from wastewaters from confectionery industries. The other more important is that the aforementioned software, which in intended exclusively for bioprocesses, is used for generating a base case, i.e. starting point for transferring the technology to industrial scales. Previously acquired experimental knowledge about using confectionery wastewaters from five different factories as substitutes for commercially used cultivation medium have been incorporated into the process model in order to obtain an economic viability of implementing such substrates. A lower initial sugar content in the medium based on wastewater (28.41 g/L) compared to the synthetic medium (30.00 g/L) gave a lower xanthan content at the end of cultivation (23.98 and 26.27 g/L, respectively). Although this resulted in somewhat poorer economic parameters, they were still in the range of being an investment of interest. Also the possibility of utilizing a cheap resource (waste) and reducing pollution that would result from its disposal has a positive effect on the environment. Copyright © 2017 Elsevier Ltd. All rights reserved.

  8. Application distribution model and related security attacks in VANET

    Science.gov (United States)

    Nikaein, Navid; Kanti Datta, Soumya; Marecar, Irshad; Bonnet, Christian

    2013-03-01

    In this paper, we present a model for application distribution and related security attacks in dense vehicular ad hoc networks (VANET) and sparse VANET which forms a delay tolerant network (DTN). We study the vulnerabilities of VANET to evaluate the attack scenarios and introduce a new attacker`s model as an extension to the work done in [6]. Then a VANET model has been proposed that supports the application distribution through proxy app stores on top of mobile platforms installed in vehicles. The steps of application distribution have been studied in detail. We have identified key attacks (e.g. malware, spamming and phishing, software attack and threat to location privacy) for dense VANET and two attack scenarios for sparse VANET. It has been shown that attacks can be launched by distributing malicious applications and injecting malicious codes to On Board Unit (OBU) by exploiting OBU software security holes. Consequences of such security attacks have been described. Finally, countermeasures including the concepts of sandbox have also been presented in depth.

  9. Biogas recovery in anaerobic digestion plants for pig wastewater

    International Nuclear Information System (INIS)

    Collivigarelli, C.; Sorlini, S.

    2001-01-01

    This work deals with a monitoring of thee anaerobic digestion plants in mesophilic conditions treating pig wastewater with the aim to study the treatment efficiency and energetic aspects. A good waste stabilization is reached in all plants, as shown by the high removal efficiency of total and volatile solids and COD, mainly due to the digestion process. On the contrary, Kjeldahl nitrogen and ammonia (low) removal takes place mainly in the final storage tank, thanks to ammonia stripping. The digestion process not only produces a well stabilized wastewater, that can be more surely reused for agricultural spreading, but it offers also an important energy recovery from the biogas combustion, whose specific production varies from 0,78 to 0,99 Nm 3 t - 1 (live weight) d - 1. It is used in cogeneration plants for the combined production of thermal energy (that is reused for waste heating in the digestion tank at mesophilic conditions and for other internal utilizations) and electric energy (that is used for internal requirements while the surplus is sent into the public grid) [it

  10. Nonepileptic attack disorder among married women.

    Science.gov (United States)

    Dhanaraj, M; Rangaraj, R; Arulmozhi, T; Vengatesan, A

    2005-06-01

    To study the clinical features, precipitating stressful life events and prognosis of nonepileptic attack disorder (NEAD) among married women. Prospective cohort study with 1-year follow-up. A tertiary care teaching hospital. Of the 1020 patients with epilepsy referred to the epilepsy clinic during 2002-2003, 30 were married women with NEAD. The diagnostic criteria for NEAD included normal EEG during ictal and post-ictal phase of the generalized 'attack.' The data collected included clinical characteristics, semiology of the attacks, precipitating stressful events, and co-morbid psychiatric disorders. The control group included 30 age-matched married women with generalized tonic-clonic seizures. The long-term outcome and factors influencing the outcomes were analyzed. The mean duration of illness was 18 months, and the pattern of the attack was 'fall and lying still' in 53% and 'fall with generalized motor movements' in 47%. The frequency was one or more per week in 57% and occasionally in 43%. The important stressful events were matrimonial discord following illegal relationship of the husband with another woman (chi2 = 9.02, P = 0.003) and constant quarrel with other family members (chi2 = 5.19, P = 0.02). The prevalence of sexual abuse was low (7%). Co-morbid psychiatric disorder was observed in 70%. At the end of 1 year, 39% were free from the attack. Resolution of the stressful life events (chi2 = 4.52, P = 0.03) and lower frequency of attack at the time of reporting (chi2 = 3.88, P = 0.05) correlated with good outcomes. Among patients with NEAD in India, the major precipitating factors were matrimonial discord following illegal relationship of the husband with another woman and constant quarrel with other family members and not sexual abuse. Women with low frequency of attack at the time of reporting and the remission of the stressful events had better outcomes.

  11. Subclinical endophthalmitis following a rooster attack.

    Science.gov (United States)

    Lekse Kovach, Jaclyn; Maguluri, Srilakshmi; Recchia, Franco M

    2006-12-01

    Ocular injury resulting from rooster attacks is rarely reported in the literature. Sadly, the target of these attacks is most often children younger than 3 years old, whose naiveté of the aggressive, territorial behavior of birds can place them at risk. Acute sequelae of these attacks can result in a lifetime of visual impairment. The possibility of a subacute or occult infection is an unusual occurrence that must always be considered. In an effort to prevent future attacks and ocular casualties, we present a case of a 12-month-old boy who suffered an open globe following a rooster attack. The open globe was emergently repaired. One week later, a white cataract was noticed on examination in the absence of systemic or ocular signs of inflammation. Traumatic endophthalmitis and lenticular abscess were suspected during examination under anesthesia. Vitrectomy, lensectomy, and injection of intravitreal antibiotics were performed. Culture of lenticular and vitreous aspirates grew alpha-streptococcus. Alpha-streptococcal endophthalmitis can result from ocular injuries caused by rooster pecking. The infection may present insidiously and without typical ocular or systemic symptoms or signs. Management is challenging and may require surgery.

  12. Solar-mediated thermo-electrochemical oxidation of sodium dodecyl benzene sulfonate by modulating the effective oxidation potential and pathway for green remediation of wastewater

    Science.gov (United States)

    Gu, Di; Gao, Simeng; Jiang, TingTing; Wang, Baohui

    2017-01-01

    To match the relentless pursuit of three research hot points - efficient solar utilization, green and sustainable remediation of wastewater and advanced oxidation processes, solar-mediated thermo-electrochemical oxidation of surfactant was proposed and developed for green remediation of surfactant wastewater. The solar thermal electrochemical process (STEP), fully driven with solar energy to electric energy and heat and without an input of other energy, sustainably serves as efficient thermo-electrochemical oxidation of surfactant, exemplified by SDBS, in wastewater with the synergistic production of hydrogen. The electrooxidation-resistant surfactant is thermo-electrochemically oxidized to CO2 while hydrogen gas is generated by lowing effective oxidation potential and suppressing the oxidation activation energy originated from the combination of thermochemical and electrochemical effect. A clear conclusion on the mechanism of SDBS degradation can be proposed and discussed based on the theoretical analysis of electrochemical potential by quantum chemical method and experimental analysis of the CV, TG, GC, FT-IR, UV-vis, Fluorescence spectra and TOC. The degradation data provide a pilot for the treatment of SDBS wastewater that appears to occur via desulfonation followed by aromatic-ring opening. The solar thermal utilization that can initiate the desulfonation and activation of SDBS becomes one key step in the degradation process. PMID:28294180

  13. Accelerating Innovation that Enhances Resource Recovery in the Wastewater Sector: Advancing a National Testbed Network.

    Science.gov (United States)

    Mihelcic, James R; Ren, Zhiyong Jason; Cornejo, Pablo K; Fisher, Aaron; Simon, A J; Snyder, Seth W; Zhang, Qiong; Rosso, Diego; Huggins, Tyler M; Cooper, William; Moeller, Jeff; Rose, Bob; Schottel, Brandi L; Turgeon, Jason

    2017-07-18

    This Feature examines significant challenges and opportunities to spur innovation and accelerate adoption of reliable technologies that enhance integrated resource recovery in the wastewater sector through the creation of a national testbed network. The network is a virtual entity that connects appropriate physical testing facilities, and other components needed for a testbed network, with researchers, investors, technology providers, utilities, regulators, and other stakeholders to accelerate the adoption of innovative technologies and processes that are needed for the water resource recovery facility of the future. Here we summarize and extract key issues and developments, to provide a strategy for the wastewater sector to accelerate a path forward that leads to new sustainable water infrastructures.

  14. Robustness analysis of interdependent networks under multiple-attacking strategies

    Science.gov (United States)

    Gao, Yan-Li; Chen, Shi-Ming; Nie, Sen; Ma, Fei; Guan, Jun-Jie

    2018-04-01

    The robustness of complex networks under attacks largely depends on the structure of a network and the nature of the attacks. Previous research on interdependent networks has focused on two types of initial attack: random attack and degree-based targeted attack. In this paper, a deliberate attack function is proposed, where six kinds of deliberate attacking strategies can be derived by adjusting the tunable parameters. Moreover, the robustness of four types of interdependent networks (BA-BA, ER-ER, BA-ER and ER-BA) with different coupling modes (random, positive and negative correlation) is evaluated under different attacking strategies. Interesting conclusions could be obtained. It can be found that the positive coupling mode can make the vulnerability of the interdependent network to be absolutely dependent on the most vulnerable sub-network under deliberate attacks, whereas random and negative coupling modes make the vulnerability of interdependent network to be mainly dependent on the being attacked sub-network. The robustness of interdependent network will be enhanced with the degree-degree correlation coefficient varying from positive to negative. Therefore, The negative coupling mode is relatively more optimal than others, which can substantially improve the robustness of the ER-ER network and ER-BA network. In terms of the attacking strategies on interdependent networks, the degree information of node is more valuable than the betweenness. In addition, we found a more efficient attacking strategy for each coupled interdependent network and proposed the corresponding protection strategy for suppressing cascading failure. Our results can be very useful for safety design and protection of interdependent networks.

  15. Optimizing power system investments and resilience against attacks

    International Nuclear Information System (INIS)

    Fang, Yiping; Sansavini, Giovanni

    2017-01-01

    This paper studies the combination of capacity expansion and switch installation in electric systems that ensures optimum performance under nominal operations and attacks. The planner–attacker–defender model is adopted to develop decisions that minimize investment and operating costs, and functionality loss after attacks. The model bridges long-term system planning for transmission expansion and short-term switching operations in reaction to attacks. The mixed-integer optimization is solved by decomposition via two-layer cutting plane algorithm. Numerical results on an IEEE system shows that small investments in transmission line switching enhance resilience by responding to disruptions via system reconfiguration. Sensitivity analyses show that transmission planning under the assumption of small-scale attacks provides the most robust strategy, i.e. the minimum-regret planning, if many constraints and limited investment budget affect the planning. On the other hand, the assumption of large-scale attacks provides the most robust strategy if the planning process involves large flexibility and budget. - Highlights: • Investment optimization in power systems under attacks is presented. • Capacity expansion and switch installation for system reconfiguration are combined. • The problem is solved by decomposition via two-layer cutting plane algorithm. • Small investments in switch installation enhance resilience by response to attacks. • Sensitivity analyses identify robust planning against different attack scenarios.

  16. Treatment of wastewater contaminated with detergents and mineral oils using effective and scalable technology.

    Science.gov (United States)

    Abdelmoez, Wael; Barakat, Nasser A M; Moaz, Asmaa

    2013-01-01

    In this work, effective, cheap and scalable methodology is introduced to treat oily wastewater. The water produced from car-wash processes was utilized as a model because it has various pollutants - oil, lubricants, detergents, solid particles, etc. The results showed that the turbidity and chemical oxygen demand (COD) values dramatically decrease by using the proposed treatment process, which consists of coagulation, flocculation, sand filtration, and oxidation followed by sand as well as activated carbon filtration. Moreover, the operating conditions were optimized. Without adjustment of the pH value of car-wash wastewater, it was found that 200 ppm of ferric chloride, as a coagulant, and 1 ppm of potassium permanganate, as an oxidant, are the optimum doses. The COD and turbidity values of the final treated wastewater were reduced by almost 88 and 100%, respectively. A prototype with 15 L capacity was designed and fabricated to investigate the scaling up and continuity of the proposed treatment strategy. The results were very promising and indicated that the introduced methodology can be industrially applied.

  17. Attacker Modelling in Ubiquitous Computing Systems

    DEFF Research Database (Denmark)

    Papini, Davide

    in with our everyday life. This future is visible to everyone nowadays: terms like smartphone, cloud, sensor, network etc. are widely known and used in our everyday life. But what about the security of such systems. Ubiquitous computing devices can be limited in terms of energy, computing power and memory...... attacker remain somehow undened and still under extensive investigation. This Thesis explores the nature of the ubiquitous attacker with a focus on how she interacts with the physical world and it denes a model that captures the abilities of the attacker. Furthermore a quantitative implementation...

  18. Peacetime Use of Computer Network Attack

    National Research Council Canada - National Science Library

    Busby, Daniel

    2000-01-01

    .... PDD-63 alerts the nation to prepare for impending cyber attacks. This paper examines the nature, scale, and likelihood of cyber attacks posited in PDD-63 and finds that the country does not face an imminent "electronic Pearl Harbor...

  19. Stabilization of heavy metals in fired clay brick incorporated with wastewater treatment plant sludge: Leaching analysis

    Science.gov (United States)

    Kadir, A. A.; Hassan, M. I. H.; Salim, N. S. A.; Sarani, N. A.; Ahmad, S.; Rahmat, N. A. I.

    2018-04-01

    Wastewater treatment sludge or known as sewage sludge is regarded as the residue and produced by the sedimentation of the suspended solid during treatment at the wastewater treatment plant. As such, this sludge was gained from the separation process of the liquids and solids. This sludge wastes has becomes national issues in recent years due to the increasing amount caused by population and industrialization growth in Malaysia. This research was conducted to fully utilize the sludge that rich in dangerous heavy metals and at the same time act as low cost alternative materials in brick manufacturing. The investigation includes determination of heavy metal concentration and chemical composition of the sludge, physical and mechanical properties. Wastewater treatment sludge samples were collected from wastewater treatment plant located in Johor, Malaysia. X-Ray Fluorescence was conducted to determine the heavy metals concentration of wastewater treatment sludge. Different percentage of sludges which are 0%, 1%, 5%, 10%, and 20%, has been incorporated into fired clay brick. The leachability of heavy metals in fired clay brick that incorporated with sludge were determined by using Toxicity Characteristic Leaching Procedure (TCLP) and Synthetic Precipitation Leachability Procedure (SPLP) that has been analyzed by using Inductively Coupled Plasma Mass Spectrometry (ICP-MS). The results show a possibility to stabilize the heavy metals in fired clay brick incorporated with wastewater treatment sludge. 20% of the sludge incorporated into the brick is the most suitable for building materials as it leached less heavy metals concentration and complying with USEPA standard.

  20. Occurrence of bisphenol A in wastewater and wastewater sludge of CUQ treatment plant

    Directory of Open Access Journals (Sweden)

    Dipti Prakash Mohapatra

    2011-09-01

    Full Text Available The identification and quantification of bisphenol A (BPA in wastewater (WW and wastewater sludge (WWS is of major interest to assess the endocrine activity of treated effluent discharged into the environment. BPA is manufactured in high quantities fro its use in adhesives, powder paints, thermal paper and paper coatings among others. Due to the daily use of these products, high concentration of BPA was observed in WW and WWS. BPA was measured in samples from Urban Community of Quebec wastewater treatment plant located in Quebec (Canada using LC-MS/MS method. The results showed that BPA was present in significant quantities (0.07 μg L–1 to 1.68 μg L–1 in wastewater and 0.104 μg g–1 to 0.312 μg g–1 in wastewater sludge in the wastewater treatment plant (WWTP. The treatment plant is efficient (76 % in removal of pollutant from process stream, however, environmentally significant concentrations of 0.41 μg L–1 were still present in the treated effluent. Rheological study established the partitioning of BPA within the treatment plant. This serves as the base to judge the portion of the process stream requiring more treatment for degradation of BPA and also in selection of different treatment methods. Higher BPA concentration was observed in primary and secondary sludge solids (0.36 and 0.24 μg g–1, respectively as compared to their liquid counterpart (0.27 and 0.15 μg L–1, respectively separated by centrifugation. Thus, BPA was present in significant concentrations in the WWTP and mostly partitioned in the solid fraction of sludge (Partition coefficient (Kd for primary, secondary and mixed sludge was 0.013, 0.015 and 0.012, respectively.

  1. Evaluation of Water Quality Renovation by Advanced Soil-Based Wastewater Treatment Systems

    Science.gov (United States)

    Cooper, J.; Loomis, G.; Kalen, D.; Boving, T.; Morales, I.; DeLuca, J.; Amador, J.

    2013-12-01

    25% of US households utilize onsite wastewater treatment systems (OWTS) for wastewater management. Advanced technologies were designed to overcome the inadequate wastewater treatment by conventional OWTS in critical shallow water table areas, such as coastal zones, in order to protect ground water quality. In addition to the septic tank and soil drainfield that comprise a conventional OWTS, advanced systems claim improved water renovation with the addition of sand filtration, timed dosing controls, and shallow placement of the infiltrative zone. We determined water quality renovation functions under current water table and temperature conditions, in anticipation of an experiment to measure OWTS response to a climate change scenario of 30-cm increase in water table elevation and 4C temperature increase. Replicate (n=3) intact soil mesocosms were used to evaluate the effectiveness of drainfields with a conventional wastewater delivery (pipe-and-stone) compared to two types of pressurized, shallow narrow drainfield. Results under steady state conditions indicate complete removal of fecal coliform bacteria, phosphorus and BOD by all soil-based systems. By contrast, removal of total nitrogen inputs was 16% in conventional and 11% for both advanced drainfields. Effluent waters maintained a steady state pH between 3.2 - 3.7 for all technologies. Average DO readings were 2.9mg/L for conventional drainfield effluent and 4.6mg/L for advanced, showing the expected oxygen uptake with shallow placement of the infiltrative zone. The conventional OWTS is outperforming the advanced with respect to nitrogen removal, but renovating wastewater equivalently for all other contaminants of concern. The results of this study are expected to facilitate development of future OWTS regulation and planning guidelines, particularly in coastal zones and in the face of a changing climate.

  2. CO₂-neutral wastewater treatment plants or robust, climate-friendly wastewater management? A systems perspective.

    Science.gov (United States)

    Larsen, Tove A

    2015-12-15

    CO2-neutral wastewater treatment plants can be obtained by improving the recovery of internal wastewater energy resources (COD, nutrients, energy) and reducing energy demand as well as direct emissions of the greenhouse gases N2O and CH4. Climate-friendly wastewater management also includes the management of the heat resource, which is most efficiently recovered at the household level, and robust wastewater management must be able to cope with a possible resulting temperature decrease. At the treatment plant there is a substantial energy optimization potential, both from improving electromechanical devices and sludge treatment as well as through the implementation of more energy-efficient processes like the mainstream anammox process or nutrient recovery from urine. Whether CO2 neutrality can be achieved depends not only on the actual net electricity production, but also on the type of electricity replaced: the cleaner the marginal electricity the more difficult to compensate for the direct emissions, which can be substantial, depending on the stability of the biological processes. It is possible to combine heat recovery at the household scale and nutrient recovery from urine, which both have a large potential to improve the climate friendliness of wastewater management. Copyright © 2015 Elsevier Ltd. All rights reserved.

  3. Water brief-WDM & wastewater reuse

    International Development Research Centre (IDRC) Digital Library (Canada)

    aalfouns

    Wastewater Reuse for Water Demand Management in the Middle East and ... Among the substantial WDM tools in MENA is the use of wastewater to reduce the pressure on scarce freshwater .... recycled water to irrigate crops with associated ...

  4. Cost effective and economic method for cultivation of Chlorella pyrenoidosa for the simultaneous treatment of biogas digester wastewater and biogas production

    OpenAIRE

    Rohit Sharma; Avanish K Tiwari; G. Sanjay Kumar; Bhawna Y. Lamba

    2015-01-01

    Microalgae have recently received a lot of attention as a new biomass source for the production of bio fuels and for the treatment of waste water. In this work, Chlorella pyrenoidosa was cultivated in biogas digester wastewater. The growth kinetics of the algae as well as the bio-remediation effect on the waste water was studied. The Chlorella pyrenoidosa can utilize the nitrogen content present in biogas digester wastewater as a substrate for its growth. The growth of microalgae was found to...

  5. Denial of Service Attack Techniques: Analysis, Implementation and Comparison

    Directory of Open Access Journals (Sweden)

    Khaled Elleithy

    2005-02-01

    Full Text Available A denial of service attack (DOS is any type of attack on a networking structure to disable a server from servicing its clients. Attacks range from sending millions of requests to a server in an attempt to slow it down, flooding a server with large packets of invalid data, to sending requests with an invalid or spoofed IP address. In this paper we show the implementation and analysis of three main types of attack: Ping of Death, TCP SYN Flood, and Distributed DOS. The Ping of Death attack will be simulated against a Microsoft Windows 95 computer. The TCP SYN Flood attack will be simulated against a Microsoft Windows 2000 IIS FTP Server. Distributed DOS will be demonstrated by simulating a distribution zombie program that will carry the Ping of Death attack. This paper will demonstrate the potential damage from DOS attacks and analyze the ramifications of the damage.

  6. Attacks on IEEE 802.11 wireless networks

    Directory of Open Access Journals (Sweden)

    Dejan Milan Tepšić

    2013-06-01

    Full Text Available Security of wireless computer networks was initially secured with the WEP security protocol, which relies on the RC4 encryption algorithm and the CRC algorithm to check the integrity. The basic problems of the WEP are a short initialization vector, unsafe data integrity checking, using a common key, the lack of mechanisms for management and exchange of keys, the lack of protection from the endless insertion of the same package into the network, the lack of authentication of access points and the like. The consequences of these failures are easy attacks against the WEP network, namely their complete insecurity. Therefore, the work began on the IEEE 802.11i protocol, which should radically improve the security of wireless networks. Since the development of a protocol lasted, the WPA standard was released to offset the security gap caused by the WEP. The WPA also relies on RC4 and CRC algorithms, but brings temporary keys and the MIC algorithm for data integrity. The 802.1X authentication was introduced and common keys are no longer needed, since it is possible to use an authentication server. The length of the initialization vector was increased and the vector is obtained based on the packet serial number, in order to prevent the insertion of the same packet into the network. The weakness of the WPA security mechanism is the use of a common key. WPA2 (802.11i later appeared. Unlike the WPA mechanism that worked on old devices with the replacement of software, WPA2 requires new network devices that can perform AES encryption. AES replaces the RC4 algorithm and delivers much greater security. Data integrity is protected by encryption. Despite progress, there are still weaknesses in wireless networks. Attacks for denial of service are possible as well as spoofing package headers attacks. For now, it is not advisable to use wireless networks in environments where unreliability and unavailability are not tolerated. Introduction In the entire history of

  7. Temporal Cyber Attack Detection.

    Energy Technology Data Exchange (ETDEWEB)

    Ingram, Joey Burton [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Draelos, Timothy J. [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Galiardi, Meghan [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Doak, Justin E. [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States)

    2017-11-01

    Rigorous characterization of the performance and generalization ability of cyber defense systems is extremely difficult, making it hard to gauge uncertainty, and thus, confidence. This difficulty largely stems from a lack of labeled attack data that fully explores the potential adversarial space. Currently, performance of cyber defense systems is typically evaluated in a qualitative manner by manually inspecting the results of the system on live data and adjusting as needed. Additionally, machine learning has shown promise in deriving models that automatically learn indicators of compromise that are more robust than analyst-derived detectors. However, to generate these models, most algorithms require large amounts of labeled data (i.e., examples of attacks). Algorithms that do not require annotated data to derive models are similarly at a disadvantage, because labeled data is still necessary when evaluating performance. In this work, we explore the use of temporal generative models to learn cyber attack graph representations and automatically generate data for experimentation and evaluation. Training and evaluating cyber systems and machine learning models requires significant, annotated data, which is typically collected and labeled by hand for one-off experiments. Automatically generating such data helps derive/evaluate detection models and ensures reproducibility of results. Experimentally, we demonstrate the efficacy of generative sequence analysis techniques on learning the structure of attack graphs, based on a realistic example. These derived models can then be used to generate more data. Additionally, we provide a roadmap for future research efforts in this area.

  8. Determination of Biological Treatability Processes of Textile Wastewater and Implementation of a Fuzzy Logic Model

    Directory of Open Access Journals (Sweden)

    Harun Akif Kabuk

    2015-01-01

    Full Text Available This study investigated the biological treatability of textile wastewater. For this purpose, a membrane bioreactor (MBR was utilized for biological treatment after the ozonation process. Due to the refractory organic contents of textile wastewater that has a low biodegradability capacity, ozonation was implemented as an advanced oxidation process prior to the MBR system to increase the biodegradability of the wastewater. Textile wastewater, oxidized by ozonation, was fed to the MBR at different hydraulic retention times (HRT. During the process, color, chemical oxygen demand (COD, and biochemical oxygen demand (BOD removal efficiencies were monitored for 24-hour, 12-hour, 6-hour, and 3-hour retention times. Under these conditions, 94% color, 65% COD, and 55% BOD removal efficiencies were obtained in the MBR system. The experimental outputs were modeled with multiple linear regressions (MLR and fuzzy logic. MLR results suggested that color removal is more related to COD removal relative to BOD removal. A surface map of this issue was prepared with a fuzzy logic model. Furthermore, fuzzy logic was employed to the whole modeling of the biological system treatment. Determination coefficients for COD, BOD, and color removal efficiencies were 0.96, 0.97, and 0.92, respectively.

  9. Scale up of ethanol production using pulp mill wastewater sludge by cellulase and saccharomyces cerevisiae

    International Nuclear Information System (INIS)

    Kunchada Sangasintu; Petchporn Chawakitchareon

    2010-01-01

    This study aimed to evaluate the potential use of pulp mill wastewater sludge as substrate in ethanol production. The simultaneous saccharification and fermentation process was conducted by using Saccharomyces cerevisiae TISTR 5339 under optimum proportion of cellulase and pulp mill wastewater sludge. The ethanol production from cellulosic materials in simultaneous saccharification and fermentation needs cooperation between cellulase and yeast. The cellulase hydrolyzes cellulose to sugar while yeast utilizes sugar to produce ethanol. The pulp mill wastewater sludge has an average content of 73.3 % hemi cellulose, 67.1 % alpha cellulose, 4.7 % beta cellulose and 1.4 % gamma cellulose. The experimental results indicated that the volume of the ethanol tend to increase with time, providing the maximum ethanol yield of 0.69 g/g on the 7"t"h day, the last day of the experiment. The ethanol production was scaled up in 5 L fermentor under optimum proportion and increased the fermentation period. It was found that the ethanol production gave the maximum ethanol yield of 1.14 g/g on the 9"t"h day of the totally 13 days experimentation. These results showed that the cellulose from pulp mill wastewater sludge was as effective substrate for ethanol production and alternative energy for the future. (author)

  10. 12 CFR 263.17 - Collateral attacks on adjudicatory proceeding.

    Science.gov (United States)

    2010-01-01

    ... 12 Banks and Banking 3 2010-01-01 2010-01-01 false Collateral attacks on adjudicatory proceeding... Collateral attacks on adjudicatory proceeding. If an interlocutory appeal or collateral attack is brought in... shall be excused based on the pendency before any court of any interlocutory appeal or collateral attack. ...

  11. 12 CFR 509.17 - Collateral attacks on adjudicatory proceeding.

    Science.gov (United States)

    2010-01-01

    ... 12 Banks and Banking 5 2010-01-01 2010-01-01 false Collateral attacks on adjudicatory proceeding....17 Collateral attacks on adjudicatory proceeding. If an interlocutory appeal or collateral attack is... shall be excused based on the pendency before any court of any interlocutory appeal or collateral attack. ...

  12. Detection of complex cyber attacks

    Science.gov (United States)

    Gregorio-de Souza, Ian; Berk, Vincent H.; Giani, Annarita; Bakos, George; Bates, Marion; Cybenko, George; Madory, Doug

    2006-05-01

    One significant drawback to currently available security products is their inabilty to correlate diverse sensor input. For instance, by only using network intrusion detection data, a root kit installed through a weak username-password combination may go unnoticed. Similarly, an administrator may never make the link between deteriorating response times from the database server and an attacker exfiltrating trusted data, if these facts aren't presented together. Current Security Information Management Systems (SIMS) can collect and represent diverse data but lack sufficient correlation algorithms. By using a Process Query System, we were able to quickly bring together data flowing from many sources, including NIDS, HIDS, server logs, CPU load and memory usage, etc. We constructed PQS models that describe dynamic behavior of complicated attacks and failures, allowing us to detect and differentiate simultaneous sophisticated attacks on a target network. In this paper, we discuss the benefits of implementing such a multistage cyber attack detection system using PQS. We focus on how data from multiple sources can be combined and used to detect and track comprehensive network security events that go unnoticed using conventional tools.

  13. Vulnerability Assessment by Learning Attack Specifications in Graphs

    NARCIS (Netherlands)

    Nunes Leal Franqueira, V.; Lopes, Raul H.C.

    This paper presents an evolutionary approach for learning attack specifications that describe attack scenarios. The objective is to find vulnerabilities in computer networks which minimise the cost of an attack with maximum impact. Although we focus on Insider Threat, the proposed approach applies

  14. Improving the energy efficiency of a pilot-scale UASB-digester for low temperature domestic wastewater treatment

    NARCIS (Netherlands)

    Xu, Shengnan; Zhang, Lei; Huang, Shengle; Zeeman, Grietje; Rijnaarts, Huub; Liu, Yang

    2018-01-01

    A pilot-scale UASB-Settler-Digester (USD) system was utilized to treat raw municipal wastewater collected from a sewer system at 10 °C. During the reactor operation, UASB sludge was continuously transferred from the UASB to a settler; concentrated sludge in the settler was then transferred to a

  15. Attack Tree Generation by Policy Invalidation

    NARCIS (Netherlands)

    Ivanova, Marieta Georgieva; Probst, Christian W.; Hansen, René Rydhof; Kammüller, Florian; Naeem Akram, R.; Jajodia, S.

    2015-01-01

    Attacks on systems and organisations increasingly exploit human actors, for example through social engineering, complicating their formal treatment and automatic identi﬿cation. Formalisation of human behaviour is difficult at best, and attacks on socio-technical systems are still mostly identi﬿ed

  16. Wastewater treatment

    Directory of Open Access Journals (Sweden)

    Ranđel N. Kitanović

    2013-10-01

    Full Text Available Quality of life on Earth in the future will largely depend on the amount of safe water. As the most fundamental source of life, water is relentlessly consumed and polluted. To halt this trend, many countries are taking extensive measures and investing substantial resources in order to stop the contamination of water and return at least tolerably good water quality to nature. The goal of water purification is to obtain clean water with the sewage sludge as a by-product. Clean water is returned to nature, and further treatment of sludge may be subject to other procedures. The conclusion of this paper is simple. The procedure with purified water is easily achievable, purified water is discharged into rivers, lakes and seas, but the problem of further treatment of sludge remains. This paper presents the basic methods of wastewater treatment and procedures for processing the products from contaminated water. The paper can serve as a basis for further elaboration. Water Pollution In order to ensure normal life of living creatures, the water in which they live or the water they use must have a natural chemical composition and natural features. When, as a result of human activities, the chemical composition of water and the ratio of its chemical elements significantly change, we say that water is polluted. When the pollutants come from industrial plants, we are talking about industrial wastewater, and when they come from households and urban areas, we are talking about municipal wastewater. Both contain a huge amount of pollutants that eventually end up in rivers. Then, thousands of defenseless birds, fish and other animals suffer, and environmental consequences become immeasurable. In addition, the waste fed to the water often ends up in the bodies of marine animals, so they can return to us as food. Thermal water pollution also has multiple effects on the changes in the wildlife composition of aquatic ecosystems. Polluted water can be purified by

  17. Kinetic study of treatment of wastewater contains food preservative agent by anaerobic baffled reactor : An overview

    Energy Technology Data Exchange (ETDEWEB)

    Sumantri, Indro; Purwanto,; Budiyono [Chemical Engineering Department, Faculty of Engineering, Diponegoro University Jl. Prof. H. Soedarto, SH, Kampus Baru Tembalang, Semarang (Indonesia)

    2015-12-29

    The characteristic of wastewater of food industries with preservative substances is high content of organic substances, degradable and high total suspended solid. High organic content in this waste forced the treatment is biologically and pointed out to anaerobic treatment. Anaerobic showed the better performance of degradation than aerobic for high content organic and also for toxic materials. During that day the treatment of food wastewater is aerobically which is high consume of energy required and high volume of sludge produced. The advantage of anaerobic is save high energy, less product of sludge, less requirement of nutrients of microorganism and high efficiency reduction of organic load. The high efficiency of reduction will reduce the load of further treatment, so that, the threshold limit based on the regulation would be easy to achieve. Research of treatment of wastewater of food industries would be utilized by both big scale industries and small industries using addition of preservative substances. The type reactor of anaerobic process is anaerobic baffled reactor that will give better contact between wastewater and microorganism in the sludge. The variables conducted in this research are the baffled configuration, sludge height, preservative agent contents, hydralic retention time and influence of micro nutrients. The respons of this research are the COD effluent, remaining preservative agent, pH, formation of volatile fatty acid and total suspended solid. The result of this research is kinetic model of the anaerobic baffled reactor, reaction kinetic of preservative agent degradation and technology of treatment wastewater contains preservative agent. The benefit of this research is to solve the treatment of wastewater of food industries with preservative substance in order to achieve wastewater limit regulation and also to prevent the environmental deterioration.

  18. Kinetic study of treatment of wastewater contains food preservative agent by anaerobic baffled reactor : An overview

    International Nuclear Information System (INIS)

    Sumantri, Indro; Purwanto,; Budiyono

    2015-01-01

    The characteristic of wastewater of food industries with preservative substances is high content of organic substances, degradable and high total suspended solid. High organic content in this waste forced the treatment is biologically and pointed out to anaerobic treatment. Anaerobic showed the better performance of degradation than aerobic for high content organic and also for toxic materials. During that day the treatment of food wastewater is aerobically which is high consume of energy required and high volume of sludge produced. The advantage of anaerobic is save high energy, less product of sludge, less requirement of nutrients of microorganism and high efficiency reduction of organic load. The high efficiency of reduction will reduce the load of further treatment, so that, the threshold limit based on the regulation would be easy to achieve. Research of treatment of wastewater of food industries would be utilized by both big scale industries and small industries using addition of preservative substances. The type reactor of anaerobic process is anaerobic baffled reactor that will give better contact between wastewater and microorganism in the sludge. The variables conducted in this research are the baffled configuration, sludge height, preservative agent contents, hydralic retention time and influence of micro nutrients. The respons of this research are the COD effluent, remaining preservative agent, pH, formation of volatile fatty acid and total suspended solid. The result of this research is kinetic model of the anaerobic baffled reactor, reaction kinetic of preservative agent degradation and technology of treatment wastewater contains preservative agent. The benefit of this research is to solve the treatment of wastewater of food industries with preservative substance in order to achieve wastewater limit regulation and also to prevent the environmental deterioration

  19. Kinetic study of treatment of wastewater contains food preservative agent by anaerobic baffled reactor : An overview

    Science.gov (United States)

    Sumantri, Indro; Purwanto, Budiyono

    2015-12-01

    The characteristic of wastewater of food industries with preservative substances is high content of organic substances, degradable and high total suspended solid. High organic content in this waste forced the treatment is biologically and pointed out to anaerobic treatment. Anaerobic showed the better performance of degradation than aerobic for high content organic and also for toxic materials. During that day the treatment of food wastewater is aerobically which is high consume of energy required and high volume of sludge produced. The advantage of anaerobic is save high energy, less product of sludge, less requirement of nutrients of microorganism and high efficiency reduction of organic load. The high efficiency of reduction will reduce the load of further treatment, so that, the threshold limit based on the regulation would be easy to achieve. Research of treatment of wastewater of food industries would be utilized by both big scale industries and small industries using addition of preservative substances. The type reactor of anaerobic process is anaerobic baffled reactor that will give better contact between wastewater and microorganism in the sludge. The variables conducted in this research are the baffled configuration, sludge height, preservative agent contents, hydralic retention time and influence of micro nutrients. The respons of this research are the COD effluent, remaining preservative agent, pH, formation of volatile fatty acid and total suspended solid. The result of this research is kinetic model of the anaerobic baffled reactor, reaction kinetic of preservative agent degradation and technology of treatment wastewater contains preservative agent. The benefit of this research is to solve the treatment of wastewater of food industries with preservative substance in order to achieve wastewater limit regulation and also to prevent the environmental deterioration.

  20. Chemical Compounds Recovery in Carboxymethyl Cellulose Wastewater Treatment

    Directory of Open Access Journals (Sweden)

    P.-H. Rao

    2015-05-01

    Full Text Available Carboxymethyl cellulose (CMC is a kind of cellulose ether widely used in industrial production. CMC wastewater usually have high chemical oxygen demand (COD and salinity (>10 %, which result from organic and inorganic by-products during CMC production. It is significant that the wastewater is pretreated to decrease salinity and recover valuable organics before biochemical methods are employed. In this paper, distillation-extraction method was used to pretreat CMC wastewater and recover valuable chemical compounds from wastewater (Fig. 1. Initial pH of CMC wastewater was adjusted to different values (6.5, 8.5, 9.5, 10.5, 12.0 before distillation to study the effect of pH on by-products in wastewater. By-products obtained from CMC wastewater were extracted and characterized by NMR, XRD and TGA. Distillate obtained from distillation of wastewater was treated using biological method, i.e., upflow anaerobic sludge blanket (UASB-contact oxidation process. Domestic sewage and flushing water from manufacturing shop was added into distillate to decrease initial COD and increase nutrients such as N, P, K. Experimental results showed that by-products extracted from CMC wastewater mainly include ethoxyacetic acid and NaCl, which were confirmed by NMR and XRD (Fig. 2. TGA results of by-products indicated that the content of NaCl in inorganic by-products reached 96 %. Increasing initial pH value of CMC wastewater might significantly raise the purity of ethoxyacetic acid in organic by-products. UASB-contact oxidation process showed a good resistance to shock loading. Results of 45-day continuous operation revealed that CODCr of final effluent might be controlled below 500 mg l−1 and meet Shanghai Industrial Wastewater Discharge Standard (CODCr −1, which indicated that the treatment process in this study was appropriate to treat distillate of wastewater from CMC production industry.

  1. Neural network classifier of attacks in IP telephony

    Science.gov (United States)

    Safarik, Jakub; Voznak, Miroslav; Mehic, Miralem; Partila, Pavol; Mikulec, Martin

    2014-05-01

    Various types of monitoring mechanism allow us to detect and monitor behavior of attackers in VoIP networks. Analysis of detected malicious traffic is crucial for further investigation and hardening the network. This analysis is typically based on statistical methods and the article brings a solution based on neural network. The proposed algorithm is used as a classifier of attacks in a distributed monitoring network of independent honeypot probes. Information about attacks on these honeypots is collected on a centralized server and then classified. This classification is based on different mechanisms. One of them is based on the multilayer perceptron neural network. The article describes inner structure of used neural network and also information about implementation of this network. The learning set for this neural network is based on real attack data collected from IP telephony honeypot called Dionaea. We prepare the learning set from real attack data after collecting, cleaning and aggregation of this information. After proper learning is the neural network capable to classify 6 types of most commonly used VoIP attacks. Using neural network classifier brings more accurate attack classification in a distributed system of honeypots. With this approach is possible to detect malicious behavior in a different part of networks, which are logically or geographically divided and use the information from one network to harden security in other networks. Centralized server for distributed set of nodes serves not only as a collector and classifier of attack data, but also as a mechanism for generating a precaution steps against attacks.

  2. A Proposal for a Methodology to Develop a Cyber-Attack Penetration Test Scenario Including NPPs Safety

    Energy Technology Data Exchange (ETDEWEB)

    Lee, In Hyo [KAIST, Daejeon (Korea, Republic of); Son, Han Seong [Joongbu Univ., Geumsan (Korea, Republic of); Kim, Si Won [Korea Institute of Nuclear Nonproliferation and Control, Daejeon (Korea, Republic of); Kang, Hyun Gook [Rensselaer Polytechnic Institute, Troy (United States)

    2016-10-15

    Penetration test is a method to evaluate the cyber security of NPPs; so, this approach was performed in some studies. Because they focused on vulnerability finding or test bed construction, scenario based approach was not performed. However, to test the cyber security of NPPs, a proper test scenario should be needed. Ahn et al. developed cyber-attack scenarios but those scenarios couldn't be applied in penetration test because they developed the scenarios based on past incidents of NPPs induced by cyber-attack. That is, those scenarios only covered scenarios which were happened before; so, they couldn't cover other various scenarios and couldn't reflect them into a penetration test. In this study, a method to develop a cyber-attack penetration test scenario of NPPs especially focused on safety point of view is suggested. To evaluate the cyber security of NPPs, penetration test can be a possible way. In this study, a method to develop a penetration test scenario was explained. Especially, the goal of hacker was focused on nuclear fuel integrity deterioration. So, in the methodology, Level 1 PSA results were utilized to reflect plant safety into the security. From the PSA results, basic event was post processed and possible cyber-attacks were reviewed with vulnerabilities of digital control system.

  3. A Proposal for a Methodology to Develop a Cyber-Attack Penetration Test Scenario Including NPPs Safety

    International Nuclear Information System (INIS)

    Lee, In Hyo; Son, Han Seong; Kim, Si Won; Kang, Hyun Gook

    2016-01-01

    Penetration test is a method to evaluate the cyber security of NPPs; so, this approach was performed in some studies. Because they focused on vulnerability finding or test bed construction, scenario based approach was not performed. However, to test the cyber security of NPPs, a proper test scenario should be needed. Ahn et al. developed cyber-attack scenarios but those scenarios couldn't be applied in penetration test because they developed the scenarios based on past incidents of NPPs induced by cyber-attack. That is, those scenarios only covered scenarios which were happened before; so, they couldn't cover other various scenarios and couldn't reflect them into a penetration test. In this study, a method to develop a cyber-attack penetration test scenario of NPPs especially focused on safety point of view is suggested. To evaluate the cyber security of NPPs, penetration test can be a possible way. In this study, a method to develop a penetration test scenario was explained. Especially, the goal of hacker was focused on nuclear fuel integrity deterioration. So, in the methodology, Level 1 PSA results were utilized to reflect plant safety into the security. From the PSA results, basic event was post processed and possible cyber-attacks were reviewed with vulnerabilities of digital control system

  4. SCADA system vulnerabilities to cyber attack

    Energy Technology Data Exchange (ETDEWEB)

    Shaw, W. T. [Cyber Security Consulting (Canada)

    2004-10-01

    The susceptibility to terrorist attacks of computer-based supervisory control (SCADA) systems that are used to monitor and control water distribution systems, oil and gas pipelines and the electrical grid, is discussed. The discussion includes ways in which SCADA systems may be attacked and remedial actions that may be taken to reduce or eliminate the possibility of such attacks. Attacks may take the form of causing the system to generate false data to divert attention from impending system disasters, or commandeer the system to seriously disable it, or cause damage to the process or equipment being controlled by sending improper control commands. SCADA systems are also vulnerable to internal threats, either from an accidental action that results in damage, or an intentional action, as for example by a disgruntled employee, or ex-employee, usually by way of reprogramming an RTU or PLC by accessing the polling/communications circuit. Recent SCADA systems are much more susceptible to concerted cyber attacks because of the adoption of IT technologies and standards into the design of such systems. (Older systems are more likely to be unique designs, hence less susceptible to attack). As far as protection of SCADA systems is concerned, there are no technologies that would prevent a technologically sophisticated terrorist or disgruntled employee from doing major damage to the system, however, the IT world has developed a range of technologies for the protection of IT assets, and many of these same technologies can also be used to safeguard modern SCADA systems.

  5. Combating Memory Corruption Attacks On Scada Devices

    Science.gov (United States)

    Bellettini, Carlo; Rrushi, Julian

    Memory corruption attacks on SCADA devices can cause significant disruptions to control systems and the industrial processes they operate. However, despite the presence of numerous memory corruption vulnerabilities, few, if any, techniques have been proposed for addressing the vulnerabilities or for combating memory corruption attacks. This paper describes a technique for defending against memory corruption attacks by enforcing logical boundaries between potentially hostile data and safe data in protected processes. The technique encrypts all input data using random keys; the encrypted data is stored in main memory and is decrypted according to the principle of least privilege just before it is processed by the CPU. The defensive technique affects the precision with which attackers can corrupt control data and pure data, protecting against code injection and arc injection attacks, and alleviating problems posed by the incomparability of mitigation techniques. An experimental evaluation involving the popular Modbus protocol demonstrates the feasibility and efficiency of the defensive technique.

  6. Application of reverse osmosis in radioactive wastewater treatment

    International Nuclear Information System (INIS)

    Kong Jinsong; Guo Weiqun

    2012-01-01

    Considering the disadvantages of the conventional evaporation and ion exchange process for radioactive wastewater treatment, the reverse osmosis is used to treat the low level radioactive wastewater. The paper summarizes the research and application progress of the reverse osmosis in the radioactive wastewater treatment and indicates that the reverse osmosis in the radioactive wastewater treatment is very important. (authors)

  7. Oceurrence of fungi degrading aniline and its derivatives in biocenoses of wastewater treatment systems

    Directory of Open Access Journals (Sweden)

    Tomasz Słomczyński

    2014-08-01

    Full Text Available It has been found that numerous yeast-like microorganisms from the genera Geotrichum, Trichmporon, Candida, Rhodotorula and Sporobolomyces occurring in wastewater treatment systems biocenoses arę able to utilize aniline, p-nitroaniline and acetanilide as a sole C-source. High active in this respect were strains belonging to the species of Geoirichum candidum, G. sericeum and Candida boidinii.

  8. Electron beam treatment of industrial wastewater

    International Nuclear Information System (INIS)

    Han, Bumsoo; Kim, JinKyu; Kim, Yuri

    2004-01-01

    For industrial wastewater with low impurity levels such as contaminated ground water, cleaning water and etc., purification only with electron beam is possible, but it should be managed carefully with reducing required irradiation doses as low as possible. Also for industrial wastewater with high impurity levels such as dyeing wastewater, leachate and etc., purification only with electron beam requires high amount of doses and far beyond economies. Electron beam treatment combined with conventional purification methods such as coagulation, biological treatment, etc. is suitable for reduction of non-biodegradable impurities in wastewater and will extend the application area of electron beam. A pilot plant with electron beam for treating 1,000 m 3 /day of wastewater from dyeing industries has constructed and operated continuously since Oct 1998. Electron beam irradiation instead of chemical treatment shows much improvement in removing impurities and increases the efficiency of biological treatment. Actual plant is under consideration based upon the experimental results. (author)

  9. Attack Methodology Analysis: Emerging Trends in Computer-Based Attack Methodologies and Their Applicability to Control System Networks

    Energy Technology Data Exchange (ETDEWEB)

    Bri Rolston

    2005-06-01

    Threat characterization is a key component in evaluating the threat faced by control systems. Without a thorough understanding of the threat faced by critical infrastructure networks, adequate resources cannot be allocated or directed effectively to the defense of these systems. Traditional methods of threat analysis focus on identifying the capabilities and motivations of a specific attacker, assessing the value the adversary would place on targeted systems, and deploying defenses according to the threat posed by the potential adversary. Too many effective exploits and tools exist and are easily accessible to anyone with access to an Internet connection, minimal technical skills, and a significantly reduced motivational threshold to be able to narrow the field of potential adversaries effectively. Understanding how hackers evaluate new IT security research and incorporate significant new ideas into their own tools provides a means of anticipating how IT systems are most likely to be attacked in the future. This research, Attack Methodology Analysis (AMA), could supply pertinent information on how to detect and stop new types of attacks. Since the exploit methodologies and attack vectors developed in the general Information Technology (IT) arena can be converted for use against control system environments, assessing areas in which cutting edge exploit development and remediation techniques are occurring can provide significance intelligence for control system network exploitation, defense, and a means of assessing threat without identifying specific capabilities of individual opponents. Attack Methodology Analysis begins with the study of what exploit technology and attack methodologies are being developed in the Information Technology (IT) security research community within the black and white hat community. Once a solid understanding of the cutting edge security research is established, emerging trends in attack methodology can be identified and the gap between

  10. Sequential micro and ultrafiltration of distillery wastewater

    Directory of Open Access Journals (Sweden)

    Vasić Vesna M.

    2015-01-01

    Full Text Available Water reuse and recycling, wastewater treatment, drinking water production and environmental protection are the key challenges for the future of our planet. Membrane separation technologies for the removal of all suspended solids and a fraction of dissolved solids from wastewaters, are becoming more and more promising. Also, these processes are playing a major role in wastewater purification systems because of their high potential for recovery of water from many industrial wastewaters. The aim of this work was to evaluate the application of micro and ultrafiltration for distillery wastewater purification in order to produce water suitable for reuse in the bioethanol industry. The results of the analyses of the permeate obtained after micro and ultrafiltration showed that the content of pollutants in distillery wastewater was significantly reduced. The removal efficiency for chemical oxygen demand, dry matter and total nitrogen was 90%, 99.2% and 99.9%, respectively. Suspended solids were completely removed from the stillage.

  11. Trace Attack against Biometric Mobile Applications

    Directory of Open Access Journals (Sweden)

    Sanaa Ghouzali

    2016-01-01

    Full Text Available With the exponential increase in the dependence on mobile devices in everyday life, there is a growing concern related to privacy and security issues in the Gulf countries; therefore, it is imperative that security threats should be analyzed in detail. Mobile devices store enormous amounts of personal and financial information, unfortunately without any security. In order to secure mobile devices against different threats, biometrics has been applied and shown to be effective. However, biometric mobile applications are also vulnerable to several types of attacks that can decrease their security. Biometric information itself is considered sensitive data; for example, fingerprints can leave traces in touched objects and facial images can be captured everywhere or accessed by the attacker if the facial image is stored in the mobile device (lost or stolen. Hence, an attacker can easily forge the identity of a legitimate user and access data on a device. In this paper, the effects of a trace attack on the sensitivity of biometric mobile applications are investigated in terms of security and user privacy. Experimental results carried out on facial and fingerprint mobile authentication applications using different databases have shown that these mobile applications are vulnerable to the proposed attack, which poses a serious threat to the overall system security and user privacy.

  12. Integrative approach for utilization of olive mill wastewater and lebna's whey for ethanol production

    Energy Technology Data Exchange (ETDEWEB)

    Ibrahim, M.A.; Hayek, B.O.; Al-Hmoud, N.; Al-Gogazeh, L.

    2009-09-15

    The industry of olive oil extraction in Jordan involves an intensive consumption of water and generates large quantities of olive mill wastewater (OMW). This wastewater has a high pollution risk with biological oxygen demand (BOD). The organic fraction of OMW includes sugars, tannins, polyphenols, polyalcohols, pectins and lipids. The presence of remarkable amounts of aromatic compounds in OMW is responsible for its phytotoxic and antimicrobial effects. The environmental problems and potential hazards caused by OMW had led olive oil producing countries to limit their discharge and to propose and develop new technologies for OMW treatments, such as physicochemical and biological treatments. In the present investigation lebna's whey a local byproduct of widely consumed local yogurt was used with OMW for ethanol production. The obtained results showed that the proteins of lebna's whey can remove substantial amounts of aromatic compounds present in OMW. This was reflected on the reduction of the intensity of black color of OMW and removal of 37% polyphenols. Moreover, the production of ethanol was ascertained in fermentation media composed of whey and in presence of various concentrations of OMW up to 20% OMW. The obtained results showed the possibility to develop a process for improvement and enhancement of ethanol production from whey and olive oil waste in mixed yeast cultures. (au)

  13. Limit Asthma Attacks Caused by Colds or Flu

    Science.gov (United States)

    Asthma: Limit asthma attacks caused by colds or flu A cold or the flu can trigger an asthma attack. Here's why — and how to keep your sneeze ... plan. If you notice warning signs of an asthma attack — such as coughing, wheezing, chest tightness or shortness ...

  14. Quantitative Attack Tree Analysis via Priced Timed Automata

    NARCIS (Netherlands)

    Kumar, Rajesh; Ruijters, Enno Jozef Johannes; Stoelinga, Mariëlle Ida Antoinette; Sankaranarayanan, Sriram; Vicario, Enrico

    The success of a security attack crucially depends on the resources available to an attacker: time, budget, skill level, and risk appetite. Insight in these dependencies and the most vulnerable system parts is key to providing effective counter measures. This paper considers attack trees, one of the

  15. Finite Energy and Bounded Actuator Attacks on Cyber-Physical Systems

    Energy Technology Data Exchange (ETDEWEB)

    Djouadi, Seddik M [ORNL; Melin, Alexander M [ORNL; Ferragut, Erik M [ORNL; Laska, Jason A [ORNL; Dong, Jin [ORNL; Drira, Anis [ORNL

    2015-01-01

    As control system networks are being connected to enterprise level networks for remote monitoring, operation, and system-wide performance optimization, these same connections are providing vulnerabilities that can be exploited by malicious actors for attack, financial gain, and theft of intellectual property. Much effort in cyber-physical system (CPS) protection has focused on protecting the borders of the system through traditional information security techniques. Less effort has been applied to the protection of cyber-physical systems from intelligent attacks launched after an attacker has defeated the information security protections to gain access to the control system. In this paper, attacks on actuator signals are analyzed from a system theoretic context. The threat surface is classified into finite energy and bounded attacks. These two broad classes encompass a large range of potential attacks. The effect of theses attacks on a linear quadratic (LQ) control are analyzed, and the optimal actuator attacks for both finite and infinite horizon LQ control are derived, therefore the worst case attack signals are obtained. The closed-loop system under the optimal attack signals is given and a numerical example illustrating the effect of an optimal bounded attack is provided.

  16. Modeling attacker-defender interactions in information networks.

    Energy Technology Data Exchange (ETDEWEB)

    Collins, Michael Joseph

    2010-09-01

    The simplest conceptual model of cybersecurity implicitly views attackers and defenders as acting in isolation from one another: an attacker seeks to penetrate or disrupt a system that has been protected to a given level, while a defender attempts to thwart particular attacks. Such a model also views all non-malicious parties as having the same goal of preventing all attacks. But in fact, attackers and defenders are interacting parts of the same system, and different defenders have their own individual interests: defenders may be willing to accept some risk of successful attack if the cost of defense is too high. We have used game theory to develop models of how non-cooperative but non-malicious players in a network interact when there is a substantial cost associated with effective defensive measures. Although game theory has been applied in this area before, we have introduced some novel aspects of player behavior in our work, including: (1) A model of how players attempt to avoid the costs of defense and force others to assume these costs; (2) A model of how players interact when the cost of defending one node can be shared by other nodes; and (3) A model of the incentives for a defender to choose less expensive, but less effective, defensive actions.

  17. Local desalination treatment plant wastewater reuse and evaluation potential absorption of salts by the halophyte plants

    Directory of Open Access Journals (Sweden)

    Elham Kalantari

    2018-01-01

    Full Text Available The expansion of arid and semi-arid areas and consequently water scarcity are affected by climate change. This can influence on availability and quality of water while demands on food and water are increasing. As pressure on freshwater is increasing, utilization of saline water in a sustainable approach is inevitable. Therefore, bioremediation using salt tolerant plants that is consistent with sustainable development objectives might be an alternative and effective approach. In this study, saline wastewater from a local desalination treatment plant was utilized to irrigate four halophyte plants, including Aloevera, Tamarix aphylla, Rosmarinus officinalis and Matricaria chamomilla. A field experiment was designed and conducted in Zarrindasht, south of Iran in years 2012-2013 accordingly. Two irrigation treatments consisting of freshwater with salinity of 2.04 dS.m-1 and desalination wastewater with salinity of 5.77dSm-1 were applied. The experiment was designed as a split plot in the form of randomized complete block design (RCB with three replications. The results of variance analysis, ANOVA, on salt concentration in Aloevera showed that there was no significant difference between the effects of two irrigation water qualities except for Na. In Rosmarinus officinalis, only the ratio of K/Na showed a significant difference. None of the examined salt elements showed a significant difference in Tamarix aphylla irrigated with both water qualities. In Matricaria chamomilla, only Mg and K/Na ratio showed a significant difference (Duncan 5%. As a result, no significant difference was observed in salt absorption by the examined plants in treatments which were irrigated by desalination wastewater and freshwater. This could be a good result that encourages the use of similar wastewater to save freshwater in a sustainable system.

  18. Production of biogenic manganese oxides coupled with methane oxidation in a bioreactor for removing metals from wastewater.

    Science.gov (United States)

    Matsushita, Shuji; Komizo, Daisuke; Cao, Linh Thi Thuy; Aoi, Yoshiteru; Kindaichi, Tomonori; Ozaki, Noriatsu; Imachi, Hiroyuki; Ohashi, Akiyoshi

    2018-03-01

    Biogenic manganese oxide (BioMnO x ) can efficiently adsorb various minor metals. The production of BioMnO x in reactors to remove metals during wastewater treatment processes is a promising biotechnological method. However, it is difficult to preferentially enrich manganese-oxidizing bacteria (MnOB) to produce BioMnO x during wastewater treatment processes. A unique method of cultivating MnOB using methane-oxidizing bacteria (MOB) to produce soluble microbial products is proposed here. MnOB were successfully enriched in a methane-fed reactor containing MOB. BioMnO x production during the wastewater treatment process was confirmed. Long-term continual operation of the reactor allowed simultaneous removal of Mn(II), Co(II), and Ni(II). The Co(II)/Mn(II) and Ni(II)/Mn(II) removal ratios were 53% and 19%, respectively. The degree to which Mn(II) was removed indicated that the enriched MnOB used utilization-associated products and/or biomass-associated products. Microbial community analysis revealed that methanol-oxidizing bacteria belonging to the Hyphomicrobiaceae family played important roles in the oxidation of Mn(II) by using utilization-associated products. Methane-oxidizing bacteria were found to be inhibited by MnO 2 , but the maximum Mn(II) removal rate was 0.49 kg m -3  d -1 . Copyright © 2017 Elsevier Ltd. All rights reserved.

  19. Activity Modelling and Comparative Evaluation of WSN MAC Security Attacks

    DEFF Research Database (Denmark)

    Pawar, Pranav M.; Nielsen, Rasmus Hjorth; Prasad, Neeli R.

    2012-01-01

    and initiate security attacks that disturb the normal functioning of the network in a severe manner. Such attacks affect the performance of the network by increasing the energy consumption, by reducing throughput and by inducing long delays. Of all existing WSN attacks, MAC layer attacks are considered...... the most harmful as they directly affect the available resources and thus the nodes’ energy consumption. The first endeavour of this paper is to model the activities of MAC layer security attacks to understand the flow of activities taking place when mounting the attack and when actually executing it....... The second aim of the paper is to simulate these attacks on hybrid MAC mechanisms, which shows the performance degradation of aWSN under the considered attacks. The modelling and implementation of the security attacks give an actual view of the network which can be useful in further investigating secure...

  20. Wastewater heat recovery method and apparatus

    Science.gov (United States)

    Kronberg, J.W.

    1991-01-01

    This invention is comprised of a heat recovery system with a heat exchanger and a mixing valve. A drain trap includes a heat exchanger with an inner coiled tube, baffle plate, wastewater inlet, wastewater outlet, cold water inlet, and preheated water outlet. Wastewater enters the drain trap through the wastewater inlet, is slowed and spread by the baffle plate, and passes downward to the wastewater outlet. Cold water enters the inner tube through the cold water inlet and flows generally upward, taking on heat from the wastewater. This preheated water is fed to the mixing valve, which includes a flexible yoke to which are attached an adjustable steel rod, two stationary zinc rods, and a pivoting arm. The free end of the arm forms a pad which rests against a valve seat. The rods and pivoting arm expand or contract as the temperature of the incoming preheated water changes. The zinc rods expand more than the steel rod, flexing the yoke and rotating the pivoting arm. The pad moves towards the valve seat as the temperature of the preheated water rises, and away as the temperature falls, admitting a variable amount of hot water to maintain a nearly constant average process water temperature.

  1. Algebraic Side-Channel Attack on Twofish

    Directory of Open Access Journals (Sweden)

    Chujiao Ma

    2017-05-01

    Full Text Available While algebraic side-channel attack (ASCA has been successful in breaking simple cryptographic algorithms, it has never been done on larger or more complex algorithms such as Twofish. Compared to other algorithms that ASCA has been used on, Twofish is more difficult to attack due to the key-dependent S-boxes as well as the complex key scheduling. In this paper, we propose the first algebraic side-channel attack on Twofish, and examine the importance of side-channel information in getting past the key-dependent S-boxes and the complex key scheduling. The cryptographic algorithm and side-channel information are both expressed as boolean equations and a SAT solver is used to recover the key. While algebraic attack by itself is not sufficient to break the algorithm, with the help of side-channel information such as Hamming weights, we are able to correctly solve for 96 bits of the 128 bits key in under 2 hours with known plaintext/ciphertext.

  2. On localization attacks against cloud infrastructure

    Science.gov (United States)

    Ge, Linqiang; Yu, Wei; Sistani, Mohammad Ali

    2013-05-01

    One of the key characteristics of cloud computing is the device and location independence that enables the user to access systems regardless of their location. Because cloud computing is heavily based on sharing resource, it is vulnerable to cyber attacks. In this paper, we investigate a localization attack that enables the adversary to leverage central processing unit (CPU) resources to localize the physical location of server used by victims. By increasing and reducing CPU usage through the malicious virtual machine (VM), the response time from the victim VM will increase and decrease correspondingly. In this way, by embedding the probing signal into the CPU usage and correlating the same pattern in the response time from the victim VM, the adversary can find the location of victim VM. To determine attack accuracy, we investigate features in both the time and frequency domains. We conduct both theoretical and experimental study to demonstrate the effectiveness of such an attack.

  3. Network attacks and defenses a hands-on approach

    CERN Document Server

    Trabelsi, Zouheir; Al Braiki, Arwa; Mathew, Sujith Samuel

    2012-01-01

    The attacks on computers and business networks are growing daily, and the need for security professionals who understand how malfeasants perform attacks and compromise networks is a growing requirement to counter the threat. Network security education generally lacks appropriate textbooks with detailed, hands-on exercises that include both offensive and defensive techniques. Using step-by-step processes to build and generate attacks using offensive techniques, Network Attacks and Defenses: A Hands-on Approach enables students to implement appropriate network security solutions within a laborat

  4. SDN-Based Double Hopping Communication against Sniffer Attack

    Directory of Open Access Journals (Sweden)

    Zheng Zhao

    2016-01-01

    Full Text Available Sniffer attack has been a severe threat to network communication security. Traditional network usually uses static network configuration, which provides convenience to sniffer attack. In this paper, an SDN-based double hopping communication (DHC approach is proposed to solve this problem. In DHC, ends in communication packets as well as the routing paths are changed dynamically. Therefore, the traffic will be distributed to multiple flows and transmitted along different paths. Moreover, the data from multiple users will be mixed, bringing difficulty for attackers in obtaining and recovering the communication data, so that sniffer attack will be prevented effectively. It is concluded that DHC is able to increase the overhead of sniffer attack, as well as the difficulty of communication data recovery.

  5. Attacks on Bluetooth Security Architecture and Its Countermeasures

    Science.gov (United States)

    Iqbal, Mian Muhammad Waseem; Kausar, Firdous; Wahla, Muhammad Arif

    WPANs compliment the traditional IEEE 802.11 wireless networks by facilitating the clients with flexibility in network topologies, higher mobility and relaxed configuration/hardware requirements. Bluetooth, a WPAN technology, is an open standard for short-range radio frequency (RF) communication. However, it is also susceptible to typical security threats found in wireless LANs. This paper discuses some of the attack scenarios against the bluetooth network such as hostile intrusion, active Man-in-the-Middle (MITM) attack using unit key and various forms of denial of service (DoS) attacks. These threats and attacks compromise the confidentiality and availability of bluetooth data and services. This paper proposes an improved security architecture for bluetooth device which provides protection against the above mentioned attacks.

  6. Factors affecting reuse of wastewater

    Energy Technology Data Exchange (ETDEWEB)

    Haraszti, L

    1981-01-01

    Changing the quality of circulating water, raising the effectiveness of sedimentation, examples of biological treatment of wastewater are presented. The necessity of continuing the studies on biological treatment of wastewater is demonstrated. It is considered useful to define the importance of KhPK and BP5 in each case. During biological treatment in ponds, to define the relation BPK5:N:P, research on conditions for nutrient removal must be done. To do this, as well as decrease the significance of KhPK, a mathematical model for defining the effectiveness of biological treatment of wastewater and consequently their reuse must be developed.

  7. Design considerations for wastewater treatment by reverse osmosis.

    Science.gov (United States)

    Bartels, C R; Wilf, M; Andes, K; Iong, J

    2005-01-01

    phosphate concentrations can reach high values in many wastewaters, and scaling of this compound is not often modeled in most RO projection software. Various process options will be presented to evaluate the most economic means of avoiding phosphate scaling. Finally, data from major RO wastewater treatment plants will be presented to show how the RO membranes operate under actual conditions, utilizing many of these design features. Long-term data from the 2.6 mgd Bedok demonstration Plant demonstrate that the RO membranes operate consistently on wastewater. Experiences from the 8.5 mgd (32,000 m3/day) Bedok and 10.5 mgd (40,000 m3/day) Kranji plants will also be presented. These large plants started operation in the fall of 2002 and have demonstrated an effective means to reclaim high quality water from difficult source waters, such as municipal wastewaters.

  8. Simulations in Cyber-Security: A Review of Cognitive Modeling of Network Attackers, Defenders, and Users

    OpenAIRE

    Vladislav D. Veksler; Norbou Buchler; Blaine E. Hoffman; Daniel N. Cassenti; Char Sample; Shridat Sugrim

    2018-01-01

    Computational models of cognitive processes may be employed in cyber-security tools, experiments, and simulations to address human agency and effective decision-making in keeping computational networks secure. Cognitive modeling can addresses multi-disciplinary cyber-security challenges requiring cross-cutting approaches over the human and computational sciences such as the following: (a) adversarial reasoning and behavioral game theory to predict attacker subjective utilities and decision li...

  9. Enterobius vermicularis as a Novel Surrogate for the Presence of Helminth Ova in Tertiary Wastewater Treatment Plants.

    Science.gov (United States)

    Rudko, Sydney P; Ruecker, Norma J; Ashbolt, Nicholas J; Neumann, Norman F; Hanington, Patrick C

    2017-06-01

    Significant effort has gone into assessing the fate and removal of viruses, bacteria, and protozoan parasites during wastewater treatment to provide data addressing potential health risks associated with reuse options. Comparatively less is known about the fate of parasitic worm species ova in these complex systems. It is largely assumed that these helminths settle, are removed with the sludge, and consequently represent a relatively low risk for wastewater reuse applications. However, helminths are a highly diverse group of organisms that display a wide range of physical properties that complicate the application of a single treatment for helminth reduction during wastewater treatment. Moreover, their diverse biological and physical properties make some ova highly resistant to both disinfection (i.e., with chlorine or UV treatment) and physical removal (settling) through the wastewater treatment train, indicating that there may be reason to broaden the scope of our investigations into whether parasitic worm eggs can be identified in treated wastewater. The ubiquitous human parasitic nematode Enterobius vermicularis (pinworm) produces small, buoyant ova. Utilizing a novel diagnostic quantitative PCR (qPCR), this study monitored E. vermicularis presence at two full-scale wastewater treatment plants over the course of 8 months and demonstrated incomplete physical removal of E. vermicularis ova through tertiary treatment, with removal efficiencies approximating only 0.5 and 1.6 log 10 at the two wastewater treatment plants based on qPCR. These findings demonstrate the need for more-diverse surrogates of helminthic ova to fully assess treatment performance with respect to reclaimed wastewaters. IMPORTANCE Helminths, despite being a diverse and environmentally resistant class of pathogens, are often underestimated and ignored when treatment performance at modern wastewater treatment plants is considered. A one-size-fits-all surrogate for removal of helminth ova may be

  10. An SDN-Based Fingerprint Hopping Method to Prevent Fingerprinting Attacks

    Directory of Open Access Journals (Sweden)

    Zheng Zhao

    2017-01-01

    Full Text Available Fingerprinting attacks are one of the most severe threats to the security of networks. Fingerprinting attack aims to obtain the operating system information of target hosts to make preparations for future attacks. In this paper, a fingerprint hopping method (FPH is proposed based on software-defined networks to defend against fingerprinting attacks. FPH introduces the idea of moving target defense to show a hopping fingerprint toward the fingerprinting attackers. The interaction of the fingerprinting attack and its defense is modeled as a signal game, and the equilibriums of the game are analyzed to develop an optimal defense strategy. Experiments show that FPH can resist fingerprinting attacks effectively.

  11. Treatment of wastewaters from manufactured gas plants

    Energy Technology Data Exchange (ETDEWEB)

    Cocheci, V.; Bogatu, C.; Radovan, C. [Technical University of Timisoara, Timisoara (Romania)

    1995-12-31

    The treatment of wastewaters with high concentrations of organic compounds often represents a difficult problem. In some cases, for the destruction and removal of toxic compounds using processes like biological and chemical oxidation were proposed. Wastewaters from manufactured gas plants contain high concentrations of organic pollutants and ammonia. In this paper a technology for the treatment of these wastewaters is proposed. The experiments were realized with wastewaters from two Romanian manufactured gas plants. The process consists of the following steps: polycondensation-settling-stripping-biological treatment-electrocoagulation-electrochemical oxidation, or chemical oxidation. 6 refs., 4 tabs.

  12. Study on emission characteristics and reduction strategy of nitrous oxide during wastewater treatment by different processes.

    Science.gov (United States)

    Sun, Shichang; Bao, Zhiyuan; Sun, Dezhi

    2015-03-01

    Given the inexorable increase in global wastewater treatment, increasing amounts of nitrous oxide are expected to be emitted from wastewater treatment plants and released to the atmosphere. It has become imperative to study the emission and control of nitrous oxide in the various wastewater treatment processes currently in use. In the present investigation, the emission characteristics and the factors affecting the release of nitrous oxide were studied via full- and pilot-scale experiments in anoxic-oxic, sequencing batch reactor and oxidation ditch processes. We propose an optimal treatment process and relative strategy for nitrous oxide reduction. Our results show that both the bio-nitrifying and bio-denitrifying treatment units in wastewater treatment plants are the predominant sites for nitrous oxide production in each process, while the aerated treatment units are the critical sources for nitrous oxide emission. Compared with the emission of nitrous oxide from the anoxic-oxic (1.37% of N-influent) and sequencing batch reactor (2.69% of N-influent) processes, much less nitrous oxide (0.25% of N-influent) is emitted from the oxidation ditch process, which we determined as the optimal wastewater treatment process for nitrous oxide reduction, given the current technologies. Nitrous oxide emissions differed with various operating parameters. Controlling the dissolved oxygen concentration at a proper level during nitrification and denitrification and enhancing the utilization rate of organic carbon in the influent for denitrification are the two critical methods for nitrous oxide reduction in the various processes considered.

  13. Optimized Production of Coal Fly Ash Derived Synthetic Zeolites for Mercury Removal from Wastewater

    Science.gov (United States)

    Tauanov, Z.; Shah, D.; Itskos, G.; Inglezakis, V.

    2017-09-01

    Coal fly ash (CFA) derived synthetic zeolites have become popular with recent advances and its ever-expanding range of applications, particularly as an adsorbent for water and gas purification and as a binder or additive in the construction industry and agriculture. Among these applications, perpetual interest has been in utilization of CFA derived synthetic zeolites for removal of heavy metals from wastewater. We herein focus on utilization of locally available CFA for efficient adsorption of mercury from wastewater. To this end, experimental conditions were investigated so that to produce synthetic zeolites from Kazakhstani CFAs with conversion into zeolite up to 78%, which has remarkably high magnetite content. In particular, the effect of synthesis reaction temperature, reaction time, and loading of adsorbent were systematically investigated and optimized. All produced synthetic zeolites and the respective CFAs were characterized using XRD, XRF, PSA and porosimetric instruments to obtain microstructural and mineralogical data. Furthermore, the synthesized zeolites were studied for the removal of mercury from aqueous solutions. A comparison of removal eficiency and its relationship to the physical and chemical properties of the synthetic zeolites were analyzed and interpreted.

  14. Detection of a wide variety of human and veterinary fluoroquinolone antibiotics in municipal wastewater and wastewater-impacted surface water.

    Science.gov (United States)

    He, Ke; Soares, Ana Dulce; Adejumo, Hollie; McDiarmid, Melissa; Squibb, Katherine; Blaney, Lee

    2015-03-15

    As annual sales of antibiotics continue to rise, the mass of these specially-designed compounds entering municipal wastewater treatment systems has also increased. Of primary concern here is that antibiotics can inhibit growth of specific microorganisms in biological processes of wastewater treatment plants (WWTPs) or in downstream ecosystems. Growth inhibition studies with Escherichia coli demonstrated that solutions containing 1-10 μg/L of fluoroquinolones can inhibit microbial growth. Wastewater samples were collected on a monthly basis from various treatment stages of a 30 million gallon per day WWTP in Maryland, USA. Samples were analyzed for the presence of 11 fluoroquinolone antibiotics. At least one fluoroquinolone was detected in every sample. Ofloxacin and ciprofloxacin exhibited detection frequencies of 100% and 98%, respectively, across all sampling sites. Concentrations of fluoroquinolones in raw wastewater were as high as 1900 ng/L for ciprofloxacin and 600 ng/L for ofloxacin. Difloxacin, enrofloxacin, fleroxacin, moxifloxacin, norfloxacin, and orbifloxacin were also detected at appreciable concentrations of 9-170 ng/L. The total mass concentration of fluoroquinolones in raw wastewater was in the range that inhibited E. coli growth, suggesting that concerns over antibiotic presence in wastewater and wastewater-impacted surface water are valid. The average removal efficiency of fluoroquinolones during wastewater treatment was approximately 65%; furthermore, the removal efficiency for fluoroquinolones was found to be negatively correlated to biochemical oxygen demand removal and positively correlated to phosphorus removal. Copyright © 2014 Elsevier B.V. All rights reserved.

  15. Public-Private Partnership Enhances Water Utility's Performance in Armenia

    OpenAIRE

    Tokhmakhian, Zaruhi; Eiweida, Ahmed

    2011-01-01

    Public-Private Participation (PPP) schemes were successfully implemented in several water utilities in Armenia, yielding excellent results for the development of the water and wastewater sectors. Armenia is one of the few countries in the region to have had such a successful PPP experience. For many years after the collapse of the Soviet economy, most of the water supply and sanitation sys...

  16. Data-plane Defenses against Routing Attacks on Tor

    Directory of Open Access Journals (Sweden)

    Tan Henry

    2016-10-01

    Full Text Available Tor is susceptible to traffic correlation attacks in which an adversary who observes flows entering and leaving the anonymity network can apply statistical techniques to correlate flows and de-anonymize their endpoints. While an adversary may not be naturally positioned to conduct such attacks, a recent study shows that the Internet’s control-plane can be manipulated to increase an adversary’s view of the network, and consequently, improve its ability to perform traffic correlation. This paper explores, in-depth, the effects of control-plane attacks on the security of the Tor network. Using accurate models of the live Tor network, we quantify Tor’s susceptibility to these attacks by measuring the fraction of the Tor network that is vulnerable and the advantage to the adversary of performing the attacks. We further propose defense mechanisms that protect Tor users from manipulations at the control-plane. Perhaps surprisingly, we show that by leveraging existing trust anchors in Tor, defenses deployed only in the data-plane are sufficient to detect most control-plane attacks. Our defenses do not assume the active participation of Internet Service Providers, and require only very small changes to Tor. We show that our defenses result in a more than tenfold decrease in the effectiveness of certain control-plane attacks.

  17. Feasibility study on recovering hydrogen energy from industrial wastewater

    International Nuclear Information System (INIS)

    Ming Der Bai; Chia-Jung Hsiao

    2006-01-01

    Three wastewater obtained from different industries were evaluated for the feasibility of hydrogen fermentation. Because of the various components of the wastewater, the characteristics of the hydrogen accumulation were different. Several stages with different hydrogen producing rate were observed during the batch hydrogen fermentation of each wastewater. The obvious hydrogen consumption was observed in the last phase of hydrogen fermentation of the wastewater from the winery. It is similar to the reported hydrogen fermentation characteristic of starch. The wastewater coming from the fructose manufactory has the greatest hydrogen potential nearly 150 L-H 2 /kg-COD. The wastewater from food industry has the lower hydrogen potential of 65 L-H 2 /kg-COD. Some of its compounds were not suitable for hydrogen production. The lowest hydrogen potential was observed in the fermentation of the wastewater from the winery, because hydrogen consumption affects the hydrogen recovery from the wastewater from winery. (authors)

  18. About the use and treatment of reclaimed wastewater

    International Nuclear Information System (INIS)

    Marin Galvin, R.

    2009-01-01

    Demand of water in our actual society is increasing each day. Taking into account the irregular climatic situation experienced in a lot of zones of Spain, it is necessary to use all the available resources. Among the conventional resources of sweet waters (surface and underground), we must pay attention to the desalted waters and to the reclaimed wastewater. In this way, the practical use of reclaimed wastewater must be supported in three basic items: normative about reusing of reclaimed wastewater, that of treated wastewater and effluents discarded to natural environment and finally, treatment processes to reclaim wastewater. (Author) 11 refs

  19. Rotational Rebound Attacks on Reduced Skein

    DEFF Research Database (Denmark)

    Khovratovich, Dmitry; Nikolic, Ivica; Rechberger, Christian

    2010-01-01

    In this paper we combine a recent rotational cryptanalysis with the rebound attack, which results in the best cryptanalysis of Skein, a candidate for the SHA-3 competition. The rebound attack approach was so far only applied to AES-like constructions. For the first time, we show that this approach...

  20. Step to improve neural cryptography against flipping attacks.

    Science.gov (United States)

    Zhou, Jiantao; Xu, Qinzhen; Pei, Wenjiang; He, Zhenya; Szu, Harold

    2004-12-01

    Synchronization of neural networks by mutual learning has been demonstrated to be possible for constructing key exchange protocol over public channel. However, the neural cryptography schemes presented so far are not the securest under regular flipping attack (RFA) and are completely insecure under majority flipping attack (MFA). We propose a scheme by splitting the mutual information and the training process to improve the security of neural cryptosystem against flipping attacks. Both analytical and simulation results show that the success probability of RFA on the proposed scheme can be decreased to the level of brute force attack (BFA) and the success probability of MFA still decays exponentially with the weights' level L. The synchronization time of the parties also remains polynomial with L. Moreover, we analyze the security under an advanced flipping attack.

  1. Improved Impossible Differential Attacks on Large-Block Rijndael

    DEFF Research Database (Denmark)

    Wang, Qingju; Gu, Dawu; Rijmen, Vincent

    2012-01-01

    . The improvement can lead to 10-round attack on Rijndael-256 as well. With 2198.1 chosen plaintexts, an attack is demonstrated on 9-round Rijndael-224 with 2 195.2 encryptions and 2140.4 bytes memory. Increasing the data complexity to 2216 plaintexts, the time complexity can be reduced to 2130 encryptions...... and the memory requirements to 2 93.6 bytes. For 9-round Rijndael-256, we provide an attack requiring 2229.3 chosen plaintexts, 2194 encryptions, and 2 139.6 bytes memory. Alternatively, with 2245.3 plaintexts, an attack with a reduced time of 2127.1 encryptions and a memory complexity of 290.9 bytes can...... be mounted. With 2244.2 chosen plaintexts, we can attack 10-round Rijndael-256 with 2253.9 encryptions and 2186.8 bytes of memory....

  2. RAPTOR: Ransomware Attack PredicTOR

    OpenAIRE

    Quinkert, Florian; Holz, Thorsten; Hossain, KSM Tozammel; Ferrara, Emilio; Lerman, Kristina

    2018-01-01

    Ransomware, a type of malicious software that encrypts a victim's files and only releases the cryptographic key once a ransom is paid, has emerged as a potentially devastating class of cybercrimes in the past few years. In this paper, we present RAPTOR, a promising line of defense against ransomware attacks. RAPTOR fingerprints attackers' operations to forecast ransomware activity. More specifically, our method learns features of malicious domains by looking at examples of domains involved in...

  3. Shark attack-related injuries: Epidemiology and implications for plastic surgeons.

    Science.gov (United States)

    Ricci, Joseph A; Vargas, Christina R; Singhal, Dhruv; Lee, Bernard T

    2016-01-01

    The increased media attention to shark attacks has led to a heightened fear and public awareness. Although few sharks are considered dangerous, attacks on humans can result in large soft tissue defects necessitating the intervention of reconstructive surgeons. This study aims to evaluate and describe the characteristics of shark-related injuries in order to improve treatment. The Global Shark Accident File, maintained by the Shark Research Institute (Princeton, NJ, USA), is a compilation of all known worldwide shark attacks. Database records since the 1900s were reviewed to identify differences between fatal and nonfatal attacks, including: geography, injury pattern, shark species, and victim activity. Since the 1900s, there have been 5034 reported shark attacks, of which 1205 (22.7%) were fatal. Although the incidence of attacks per decade has increased, the percentage of fatalities has decreased. Characteristics of fatal attacks included swimming (p = 0.001), boating (p = 0.001), three or more bite sites (p = 0.03), limb loss (p = 0.001), or tiger shark attack (p = 0.002). The most common attacks were bites to the legs (41.8%) or arms (18.4%), with limb loss occurring in 7% of attacks. Geographically, the majority of attacks occurred in North America (36.7%) and Australia (26.5%). Most attacks in the USA occurred in Florida (49.1%) and California (13.6%). Although rare, shark attacks result in devastating injuries to patients. As these injuries often involve multiple sites and limb loss, this creates a significant challenge for reconstructive surgeons. Proper identification of the characteristics of the attack can aid in providing optimal care for those affected. Copyright © 2015 British Association of Plastic, Reconstructive and Aesthetic Surgeons. Published by Elsevier Ltd. All rights reserved.

  4. Nitrogen removal from concentrated latex wastewater by land treatment

    Directory of Open Access Journals (Sweden)

    Vikanda Thongnuekhang

    2004-05-01

    Full Text Available Most of the concentrated latex factories in the South of Thailand discharge treated wastewater that contains high level of nitrogen to a nearby river or canals leading to a water pollution problem. A study of land treatment system was conducted to treat and utilize nitrogen in treated wastewater from the concentrated latex factory. The experimental pilot-scale land treatment system was constructed at the Faculty of Engineering, Prince of Songkla University, Hat Yai Campus. It consisted of water convolvulus (Ipomea aquatica, I. Reptans, tropical carpet grass (Axonopus compresus (Swartz Beav. and control unit (no plantation. The treated wastewater from the stabilization pond system of the selected concentrated latex factoryin Songkhla was used to irrigate each experimental unit. Influent and effluent from the experimental units were analyzed for TKN, NH3-N, Org-N, NO3 --N, NO2 --N, BOD5, sulfate, pH and EC. The land treatment system resulted a high removal efficiency for nitrogen. Tropical carpet grass provided higher removal efficiency than other units for all parameters. The removal efficiency of water convolvulus and control unit were not significantly different. The average removal efficiency of TKN, NH3-N, Org-N, BOD5 and sulfate for tropical carpet grass unit were 92, 97, 61, 88 and 52%, for water convolvulus unit were 75, 80, 43, 41 and 30%, and for control unit were 74, 80, 41, 31 and 28%, respectively. Mass balance of nitrogen transformation was conducted. It revealed that plant uptake was the major mechanism for nitrogen removal in land treatment.

  5. CURRENT TECHNOLOGIES OF AMMONIUM WITHDRAWAL FROM WASTEWATER

    Directory of Open Access Journals (Sweden)

    O. M. Shved

    2014-10-01

    Full Text Available The results of analysis of the current technologies, as well as their trends and developments in the field of wastewater treatment in Ukraine and the world are given. The legal documents and the system of state regulation and control in the field of sanitation and wastewater treatment in Ukraine have been analyzed. The information about government programs aimed at protecting the natural water bodies is also included. The global trends concerning development of biotechnology in the field of wastewater from nitrogen compounds have been investigated. The analysis of traditional (nitrification-denitrification and the latest biotechnology wastewater from inorganic nitrogen has been done. Current status of the present key technologies of nitrogen removal from wastewater has been formulated. The main advantages and disadvantages of these biotechnologies are described. It was determined that a major problem in the field of sanitation and wastewater treatment in Ukraine is the usage of outdated technologies and regulatory documentation that is a consequence of the lack of sufficient funding for the sector and the low level of environmental awareness of the government and the population.

  6. Privacy Leaks through Data Hijacking Attack on Mobile Systems

    Directory of Open Access Journals (Sweden)

    Zhang Daojuan

    2017-01-01

    Full Text Available To persistently eavesdrop on the mobile devices, attackers may obtain the elevated privilege and inject malicious modules into the user devices. Unfortunately, the attackers may not be able to obtain the privilege for a long period of time since the exploitable vulnerabilities may be fixed or the malware may be removed. In this paper, we propose a new data hijacking attack for the mobile apps. By employing the proposed method, the attackers are only required to obtain the root privilege of the user devices once, and they can persistently eavesdrop without any change to the original device. Specifically, we design a new approach to construct a shadow system by hijacking user data files. In the shadow system, attackers possess the identical abilities to the victims. For instance, if a victim has logged into the email app, the attacker can also access the email server in the shadow system without authentication in a long period of time. Without reauthentication of the app, it is difficult for victims to notice the intrusion since the whole eavesdropping is performed on other devices (rather than the user devices. In our experiments, we evaluate the effectiveness of the proposed attack and the result demonstrates that even the Android apps released by the top developers cannot resist this attack. Finally, we discuss some approaches to defend the proposed attack.

  7. Estimation of Economic Value of Use of Wastewater at Agricultural Sector in South of Tehran Province

    Directory of Open Access Journals (Sweden)

    Mohammad Reza Sasouli

    2015-11-01

    Full Text Available Appropriate use of non-conventional water resources including surface runoff and sewage is produced an issue that has emerged as a necessity particularly in Iran. This thread has been created specifically in Tehran. The current study was aimed to investigate the economic value of sewage at Agricultural Sector in South of Tehran with produced approach in the contaminated and clean area. From the results, the average yield of wheat production among the farmers from polluted water was 376 kg ha-1 more than farmers who used clean water. Moreover, the economic value of water was 110 Rials more than farmers who used clean water. According to the results, the total value of wastewater in Tehran in 1405 would be equivalent to 335,480 million Rials. The priorities for interests of irrigation using wastewater from an agricultural perspective suggests that availability and reliability of wastewater than other water sources and low cost of its use is the most important benefit. The next priority result of irrigation with wastewater is increasing crop yield and improving soil fertility. This explains why farmers despite the legal prohibition of the use of untreated sewage continue to utilize this source of irrigation water.

  8. Irrigation Water Quality Standards for Indirect Wastewater Reuse in Agriculture: A Contribution toward Sustainable Wastewater Reuse in South Korea

    Directory of Open Access Journals (Sweden)

    Hanseok Jeong

    2016-04-01

    Full Text Available Climate change and the subsequent change in agricultural conditions increase the vulnerability of agricultural water use. Wastewater reuse is a common practice around the globe and is considered as an alternative water resource in a changing agricultural environment. Due to rapid urbanization, indirect wastewater reuse, which is the type of agricultural wastewater reuse that is predominantly practiced, will increase, and this can cause issues of unplanned reuse. Therefore, water quality standards are needed for the safe and sustainable practice of indirect wastewater reuse in agriculture. In this study, irrigation water quality criteria for wastewater reuse were discussed, and the standards and guidelines of various countries and organizations were reviewed to suggest preliminary standards for indirect wastewater reuse in South Korea. The proposed standards adopted a probabilistic consideration of practicality and classified the use of irrigation water into two categories: upland and rice paddy. The standards suggest guidelines for E. coli, electric conductivity (EC, turbidity, suspended solids (SS, biochemical oxygen demand (BOD, pH, odor, and trace elements. Through proposing the standards, this study attempts to combine features of both the conservative and liberal approaches, which in turn could suggest a new and sustainable practice of agricultural wastewater reuse.

  9. Short-rotation Willow Biomass Plantations Irrigated and Fertilised with Wastewaters. Results from a 4-year multidisciplinary field project in Sweden, France, Northern Ireland and Greece

    Energy Technology Data Exchange (ETDEWEB)

    Larsson, Stig [Svaloef Weibull AB, Svaloef (Sweden); Cuingnet, Christian; Clause, Pierre [Association pour le Developpement des Culture Energetiques, Lille (France); Jakobsson, Ingvar [Swedish Univ. of Agricultural Sciences, Uppsala (Sweden); Dawson, Malcolm [Queens Univ., Northern Ireland (United Kingdom); Backlund, Arne [A and B Backlund ApS, Charlottenlund (Denmark); Mavrogianopoulus, George [Agricultural Univ. of Athens (Greece)

    2003-01-01

    This report summarises results and experiences gathered from field trials with recycling of pre-treated wastewater, diverted human urine mixed with water, and municipal sludge, within plantations of willow species specifically selected for biomass production. Experimental sites were established in Sweden (Roma), France (Orchies), Northern Ireland (Culmore) and Greece (Larissa). The project was carried out during a 4-year period with financial support from the EU FAIR Programme. The experimental sites were supplied with primary effluent from municipal treatment plants (Culmore and Larissa), stored industrial effluent from a chicory processing plant (Orchies), biologically treated and stored municipal wastewater (Roma) and human urine mixture from diverting low-flush toilets mixed with water (Roma). Application rates of the wastewaters or the urine mixture were equivalent to the calculated evapotranspiration rate at each site. Wastewaters were also applied up to three times this value to evaluate any possible negative effects. Estimations and evaluations were carried out mainly concerning: biomass growth, potential biological attacks of the plantations, plant water requirements, fertilisation effects of the wastewater, plant uptake of nutrients and heavy metals from applied wastewater, possible soil or groundwater impact, sanitary aspects, and potentials for removal in the soil-plant filter of nutrients and biodegradable organic material from applied wastewater. The results clearly indicated that biomass production in young willow plantations could be enhanced substantially after recycling of wastewater resources. The impact on soil and groundwater of nutrients (nitrogen and phosphorus) and heavy metals (copper, zinc, lead and cadmium) was limited, even when the application of water and nutrients exceeded the plant requirements. Also, the soil-plant system seemed to function as a natural treatment filter for pre-treated (primary settled) wastewater, with a treatment

  10. Wastewater Districts

    Data.gov (United States)

    Vermont Center for Geographic Information — The Wastewater districts layer is part of a larger dataset that contains administrative boundaries for Vermont's Agency of Natural Resources. The dataset includes...

  11. What Can We Learn?--The Algonquin Bear Attack.

    Science.gov (United States)

    Strickland, Dan

    1992-01-01

    Describes a bear attack in Algonquin Park in Lake Opeongo (Canada) in which a man and woman were killed. Hypothesizes that the bear deliberately preyed on its victims and concludes that the bear was physically normal. Despite this isolated attack, the chance of being attacked by a black bear when camping is virtually nonexistent. (KS)

  12. Combined Heuristic Attack Strategy on Complex Networks

    Directory of Open Access Journals (Sweden)

    Marek Šimon

    2017-01-01

    Full Text Available Usually, the existence of a complex network is considered an advantage feature and efforts are made to increase its robustness against an attack. However, there exist also harmful and/or malicious networks, from social ones like spreading hoax, corruption, phishing, extremist ideology, and terrorist support up to computer networks spreading computer viruses or DDoS attack software or even biological networks of carriers or transport centers spreading disease among the population. New attack strategy can be therefore used against malicious networks, as well as in a worst-case scenario test for robustness of a useful network. A common measure of robustness of networks is their disintegration level after removal of a fraction of nodes. This robustness can be calculated as a ratio of the number of nodes of the greatest remaining network component against the number of nodes in the original network. Our paper presents a combination of heuristics optimized for an attack on a complex network to achieve its greatest disintegration. Nodes are deleted sequentially based on a heuristic criterion. Efficiency of classical attack approaches is compared to the proposed approach on Barabási-Albert, scale-free with tunable power-law exponent, and Erdős-Rényi models of complex networks and on real-world networks. Our attack strategy results in a faster disintegration, which is counterbalanced by its slightly increased computational demands.

  13. Studies on sulfate attack: Mechanisms, test methods, and modeling

    Science.gov (United States)

    Santhanam, Manu

    The objective of this research study was to investigate various issues pertaining to the mechanism, testing methods, and modeling of sulfate attack in concrete. The study was divided into the following segments: (1) effect of gypsum formation on the expansion of mortars, (2) attack by the magnesium ion, (3) sulfate attack in the presence of chloride ions---differentiating seawater and groundwater attack, (4) use of admixtures to mitigate sulfate attack---entrained air, sodium citrate, silica fume, and metakaolin, (5) effects of temperature and concentration of the attack solution, (6) development of new test methods using concrete specimens, and (7) modeling of the sulfate attack phenomenon. Mortar specimens using portland cement (PC) and tricalcium silicate (C 3S), with or without mineral admixtures, were prepared and immersed in different sulfate solutions. In addition to this, portland cement concrete specimens were also prepared and subjected to complete and partial immersion in sulfate solutions. Physical measurements, chemical analyses and microstructural studies were performed periodically on the specimens. Gypsum formation was seen to cause expansion of the C3S mortar specimens. Statistical analyses of the data also indicated that the quantity of gypsum was the most significant factor controlling the expansion of mortar bars. The attack by magnesium ion was found to drive the reaction towards the formation of brucite. Decalcification of the C-S-H and its subsequent conversion to the non-cementitious M-S-H was identified as the mechanism of destruction in magnesium sulfate attack. Mineral admixtures were beneficial in combating sodium sulfate attack, while reducing the resistance to magnesium sulfate attack. Air entrainment did not change the measured physical properties, but reduced the visible distress of the mortars. Sodium citrate caused a substantial reduction in the rate of damage of the mortars due to its retarding effect. Temperature and

  14. Towards a benchmarking tool for minimizing wastewater utility greenhouse gas footprints.

    Science.gov (United States)

    Guo, L; Porro, J; Sharma, K R; Amerlinck, Y; Benedetti, L; Nopens, I; Shaw, A; Van Hulle, S W H; Yuan, Z; Vanrolleghem, P A

    2012-01-01

    A benchmark simulation model, which includes a wastewater treatment plant (WWTP)-wide model and a rising main sewer model, is proposed for testing mitigation strategies to reduce the system's greenhouse gas (GHG) emissions. The sewer model was run to predict methane emissions, and its output was used as the WWTP model input. An activated sludge model for GHG (ASMG) was used to describe nitrous oxide (N(2)O) generation and release in activated sludge process. N(2)O production through both heterotrophic and autotrophic pathways was included. Other GHG emissions were estimated using empirical relationships. Different scenarios were evaluated comparing GHG emissions, effluent quality and energy consumption. Aeration control played a clear role in N(2)O emissions, through concentrations and distributions of dissolved oxygen (DO) along the length of the bioreactor. The average value of N(2)O emission under dynamic influent cannot be simulated by a steady-state model subjected to a similar influent quality, stressing the importance of dynamic simulation and control. As the GHG models have yet to be validated, these results carry a degree of uncertainty; however, they fulfilled the objective of this study, i.e. to demonstrate the potential of a dynamic system-wide modelling and benchmarking approach for balancing water quality, operational costs and GHG emissions.

  15. Mixotrophic cultivation of a microalga Scenedesmus obliquus in municipal wastewater supplemented with food wastewater and flue gas CO2 for biomass production.

    Science.gov (United States)

    Ji, Min-Kyu; Yun, Hyun-Shik; Park, Young-Tae; Kabra, Akhil N; Oh, In-Hwan; Choi, Jaeyoung

    2015-08-15

    The biomass and lipid/carbohydrate production by a green microalga Scenedesmus obliquus under mixotrophic condition using food wastewater and flue gas CO2 with municipal wastewater was investigated. Different dilution ratios (0.5-2%) of municipal wastewater with food wastewater were evaluated in the presence of 5, 10 and 14.1% CO2. The food wastewater (0.5-1%) with 10-14.1% CO2 supported the highest growth (0.42-0.44 g L(-1)), nutrient removal (21-22 mg TN L(-1)), lipid productivity (10-11 mg L(-1)day(-1)) and carbohydrate productivity (13-16 mg L(-1)day(-1)) by S. obliquus after 6 days of cultivation. Food wastewater increased the palmitic and oleic acid contents up to 8 and 6%, respectively. Thus, application of food wastewater and flue gas CO2 can be employed for enhancement of growth, lipid/carbohydrate productivity and wastewater treatment efficiency of S. obliquus under mixotrophic condition, which can lead to development of a cost effective strategy for microalgal biomass production. Copyright © 2015 Elsevier Ltd. All rights reserved.

  16. Feasibility study on recovering hydrogen energy from industrial wastewater

    Energy Technology Data Exchange (ETDEWEB)

    Ming Der Bai; Chia-Jung Hsiao [Energy and Resource Laboratories, Industrial Technology Research Institute, 195, sec. 4 Chung Hsing Rd., Chutung, Hsinchu, Taiwan, 301 R.O.C. (China)

    2006-07-01

    Three wastewater obtained from different industries were evaluated for the feasibility of hydrogen fermentation. Because of the various components of the wastewater, the characteristics of the hydrogen accumulation were different. Several stages with different hydrogen producing rate were observed during the batch hydrogen fermentation of each wastewater. The obvious hydrogen consumption was observed in the last phase of hydrogen fermentation of the wastewater from the winery. It is similar to the reported hydrogen fermentation characteristic of starch. The wastewater coming from the fructose manufactory has the greatest hydrogen potential nearly 150 L-H{sub 2}/kg-COD. The wastewater from food industry has the lower hydrogen potential of 65 L-H{sub 2}/kg-COD. Some of its compounds were not suitable for hydrogen production. The lowest hydrogen potential was observed in the fermentation of the wastewater from the winery, because hydrogen consumption affects the hydrogen recovery from the wastewater from winery. (authors)

  17. Application of radiation for wastewater treatment

    International Nuclear Information System (INIS)

    Han Bumsoo; Kim Jinkyu; Kim Yuri

    2006-01-01

    Electron beam processing of wastewater is non-chemical, and uses fast formation of short-lived reactive radicals that can interact with a wide range of pollutants. Such reactive radicals are strong oxidizing or reducing agents that can transform the pollutants in the liquids wastes. The first studies on the radiation treatment of wastes were carried out in the 1950s principally for disinfection. In the 1960s, these studies were extended to the purification of water and wastewater. After some laboratory research on industrial wastewaters and polluted groundwater in 1970s and 1980s, several pilot plants were built for extended research in the 1990s. The first full-scale application was reported for the purification of wastewater at the Voronezh synthetic rubber plant in Russia. Two accelerators (50 kW each) were used to convert the non-biodegradable emulsifier, 'nekal', present in the wastewater to a biodegradable form . The installation treats up to 2000 m3 of effluent per day. A pilot plant of 1000 m 3 /d for treating textile-dyeing wastewater has been constructed in Daegu, Korea with 1 MeV, 40 kW electron accelerator. High-energy irradiation produces instantaneous radiolytical transformations by energy transfer from accelerated electrons to orbital electrons of water molecules. Absorbed energy disturbs the electron system of the molecule and results in breakage of inter-atomic bonds. Hydrated electron eaq, H atom, . OH and HO 2 . radicals and hydrogen peroxide H 2 O 2 and H 2 are the most important products of the primary interactions (radiolysis products). Generally, radiation processing of wastewater has maximum efficiency at pollutant concentration less than 10 -3 mol/L (∼100 ppm). The treatment of such wastewater is simple, requires low dose (about 1 kGy or less) and gives almost complete elimination of odor, color, taste and turbidity. The radiation processing of polluted water containing specific contaminants may require creation of special conditions to

  18. Impact of Cyber Attacks on High Voltage DC Transmission Damping Control

    Directory of Open Access Journals (Sweden)

    Rui Fan

    2018-04-01

    Full Text Available Hybrid AC/HVDC (AC-HVDC grids have evolved to become huge cyber-physical systems that are vulnerable to cyber attacks because of the wide attack surface and increasing dependence on intelligent electronic devices, computing resources and communication networks. This paper, for the first time, studies the impact of cyber attacks on HVDC transmission oscillation damping control.Three kinds of cyber attack models are considered: timing attack, replay attack and false data injection attack. Followed by a brief introduction of the HVDC model and conventional oscillation damping control method, the design of three attack models is described in the paper. These attacks are tested on a modified IEEE New England 39-Bus AC-HVDC system. Simulation results have shown that all three kinds of attacks are capable of driving the AC-HVDC system into large oscillations or even unstable conditions.

  19. Wastewater treatment plants as a pathway for microplastics: Development of a new approach to sample wastewater-based microplastics.

    Science.gov (United States)

    Ziajahromi, Shima; Neale, Peta A; Rintoul, Llew; Leusch, Frederic D L

    2017-04-01

    Wastewater effluent is expected to be a pathway for microplastics to enter the aquatic environment, with microbeads from cosmetic products and polymer fibres from clothes likely to enter wastewater treatment plants (WWTP). To date, few studies have quantified microplastics in wastewater. Moreover, the lack of a standardized and applicable method to identify microplastics in complex samples, such as wastewater, has limited the accurate assessment of microplastics and may lead to an incorrect estimation. This study aimed to develop a validated method to sample and process microplastics from wastewater effluent and to apply the developed method to quantify and characterise wastewater-based microplastics in effluent from three WWTPs that use primary, secondary and tertiary treatment processes. We applied a high-volume sampling device that fractionated microplastics in situ and an efficient sample processing procedure to improve the sampling of microplastics in wastewater and to minimize the false detection of non-plastic particles. The sampling device captured between 92% and 99% of polystyrene microplastics using 25 μm-500 μm mesh screens in laboratory tests. Microplastic type, size and suspected origin in all studied WWTPs, along with the removal efficiency during the secondary and tertiary treatment stages, was investigated. Suspected microplastics were characterised using Fourier Transform Infrared spectroscopy, with between 22 and 90% of the suspected microplastics found to be non-plastic particles. An average of 0.28, 0.48 and 1.54 microplastics per litre of final effluent was found in tertiary, secondary and primary treated effluent, respectively. This study suggests that although low concentrations of microplastics are detected in wastewater effluent, WWTPs still have the potential to act as a pathway to release microplastics given the large volumes of effluent discharged to the aquatic environment. This study focused on a single sampling campaign, with

  20. Groundwater science in water-utility operations: global reflections on current status and future needs

    Science.gov (United States)

    Foster, Stephen; Sage, Rob

    2017-08-01

    The relevance of groundwater science to water-utility operations is analysed from a broad international perspective, identifying key concerns and specific opportunities for the future. The strategic importance worldwide of water utilities assuming the role of lead stakeholders for integrated groundwater resource management, recognizing their often considerable technical know-how and highly significant data holdings, is emphasized. Concurrently, the utilities themselves will need an ever-closer appreciation of groundwater-system behaviour if they are to manage efficiently their water-supply and wastewater operations.

  1. EQ-5D™-derived utility values for different levels of migraine severity from a UK sample of migraineurs

    Directory of Open Access Journals (Sweden)

    Stafford Megan R

    2012-06-01

    Full Text Available Abstract Background To estimate utility values for different levels of migraine pain severity from a United Kingdom (UK sample of migraineurs. Methods One hundred and six migraineurs completed the EQ-5D to evaluate their health status for mild, moderate and severe levels of migraine pain severity for a recent migraine attack, and for current health defined as health status within seven days post-migraine attack. Statistical tests were used to evaluate differences in mean utility scores by migraine severity. Results Utility scores for each health state were significantly different from 1.0 (no problems on any EQ-5D dimension (p  Conclusions Results indicate that all levels of migraine pain are associated with significantly reduced utility values. As severity worsened, utility decreased and severe migraine pain was considered a health state worse than death. Results can be used in cost-utility models examining the relative economic value of therapeutic strategies for migraine in the UK.

  2. Application of electron beam to industrial wastewater treatment

    International Nuclear Information System (INIS)

    Han, B.; Kim, D.K.; Boo, J.Y.; Kim, J.K.; Kim, Y.; Chung, W.; Choi, J.S.; Kang, H.J.; Pikaev, A.K.

    2001-01-01

    Global withdrawals of water to satisfy human demands have grown dramatically in this century. Between 1900 and 1995, water consumption increased by over six times, more than double the rate of population growth. This rapid growth in water demand is due to the increasing reliance on irrigation to achieve food security, the growth of industrial uses, and the increasing use per capita for domestic purposes. Given the seriousness of the situation and future risk of crises, there is an urgent need to develop the water efficient technologies including economical treatment methods of wastewater and polluted water. In the Central Research Institute of Samsung Heavy Industries (SHI), many industrial wastewater including leachate from landfill area, wastewater from papermill, dyeing complex, petrochemical processes, etc. are under investigation with EB irradiation. For the study of treating dyeing wastewater combined with conventional facilities, an EB pilot plant for treating 1,000m 3 /day of wastewater from 60,000m 3 /day of total dyeing wastewater has been constructed and operated in Taegu Dyeing Industrial Complex. A commercial plant for re-circulation of wastewater from Papermill Company is also designed for S-paper Co. in Cheongwon City, and after the successful installation, up to 80% of wastewater could be re-used in paper producing process. (author)

  3. Micro-electrolysis technology for industrial wastewater treatment.

    Science.gov (United States)

    Jin, Yi-Zhong; Zhang, Yue-Feng; Li, Wei

    2003-05-01

    Experiments were conducted to study the role of micro-electrolysis in removing chromaticity and COD and improving the biodegradability of wastewater from pharmaceutical, dye-printing and papermaking plants. Results showed that the use of micro-electrolysis technology could remove more than 90% of chromaticity and more than 50% of COD and greatly improved the biodegradability of pharmaceutical wastewater. Lower initial pH could be advantageous to the removal of chromaticity. A retention time of 30 minutes was recommended for the process design of micro-electrolysis. For the use of micro-electrolysis in treatment of dye-printing wastewater, the removal rates of both chromaticity and COD were increased from neutral condition to acid condition for disperse blue wastewater; more than 90% of chromaticity and more than 50% of COD could be removed in neutral condition for vital red wastewater.

  4. Feasibility of geothermal heat use in the San Bernardino Municipal Wastewater Treatment Plant. Final report, September 1980-June 1981

    Energy Technology Data Exchange (ETDEWEB)

    Racine, W.C.; Larson, T.C.; Stewart, C.A.; Wessel, H.B.

    1981-06-01

    The results of the feasibility study for utilizing low temperature geothermal heat in the City of San Bernardino Wastewater Treatment Plant are summarized. The study is presented in terms of preliminary engineering design, economic analysis, institutional issues, environmental impacts, resource development, and system implementation.

  5. Quantum leap for treating wastewaters

    International Nuclear Information System (INIS)

    Wallace, Paula

    2012-01-01

    Full text: For many Australian food manufacturers there is increasing pressure from government agencies to reach higher standards of wastewater treatment for environmental discharge. In fact, throughout the western wolrd industrual water users are facing a similar challenge. One of the big problems is ageing pipe networks, particularly sewage pipes. Also, industrial wastewaters with high sugar-nutrient loads can cause serious damage to pipelines. This is because fermentation occurs within the wastewater, eroding and degrading the pipes, causing numerous cracks and fractures. This in turn leads to water ingress, which puts a strain on treatment plants because of the higher volume of water, especially in wet weather. Food manufacturing produces large volumes of mostly biodegradable liquid and solid waste. Wastewaters released from food manufacturing can be 'muddy', with high concentrations of suspended solids, fats, oils and grease (FOGs), and, usually, nutrients such as nitrogen. The issue for many food manufacturers is that existing wastewater treatment systems are unable to reduce the nutrient load in the biological treatment stage to a level allowing acceptable discharge. In addition, most rely on large tanks housing bacteria that are submerged in water and aerated. Aeration is energy-hungry and can create a 'sludge-cake' on top of the water, which is difficult to treat. Most existing technologies also use filters, but they foul easily and require ongoing maintenance. According to BioGill chief executive John West, the BioGill technology is groundbreaking and radically different from conventional bioreactors because the 'gills' are not submerged. Instead, the gills, composed of Nano-Ceramic Membrane sheets arranged vertically in pairs, are suspended in the air, above ground, with wastewater travelling down between them. “Fungi and bacteria, known as biomass, grow on the membranes in direct contact with the air, eating nutrients much faster than other systems

  6. OPERATION COBRA. Deliberate Attack, Exploitation

    Science.gov (United States)

    1984-05-25

    to attack Sens, then continue to Troyes , on the Seine River. CCA was in the north, crossing the Loing River at Souppes against light resistance and...advanced from Troyes and prepared positions close to Sens. Under strong artillery support, a task force from CCA (TF Oden) attacked the enemy frontally...movement towards the Seine River on 24 August with an advance toward Troyes . Facing the combat command were what remained of the 51st SS Brigade, light

  7. Simulations in Cyber-Security: A Review of Cognitive Modeling of Network Attackers, Defenders, and Users.

    Science.gov (United States)

    Veksler, Vladislav D; Buchler, Norbou; Hoffman, Blaine E; Cassenti, Daniel N; Sample, Char; Sugrim, Shridat

    2018-01-01

    Computational models of cognitive processes may be employed in cyber-security tools, experiments, and simulations to address human agency and effective decision-making in keeping computational networks secure. Cognitive modeling can addresses multi-disciplinary cyber-security challenges requiring cross-cutting approaches over the human and computational sciences such as the following: (a) adversarial reasoning and behavioral game theory to predict attacker subjective utilities and decision likelihood distributions, (b) human factors of cyber tools to address human system integration challenges, estimation of defender cognitive states, and opportunities for automation, (c) dynamic simulations involving attacker, defender, and user models to enhance studies of cyber epidemiology and cyber hygiene, and (d) training effectiveness research and training scenarios to address human cyber-security performance, maturation of cyber-security skill sets, and effective decision-making. Models may be initially constructed at the group-level based on mean tendencies of each subject's subgroup, based on known statistics such as specific skill proficiencies, demographic characteristics, and cultural factors. For more precise and accurate predictions, cognitive models may be fine-tuned to each individual attacker, defender, or user profile, and updated over time (based on recorded behavior) via techniques such as model tracing and dynamic parameter fitting.

  8. Utilization of AMD sludges from the anthracite region of Pennsylvania for removal of phosphorus from wastewater

    Science.gov (United States)

    Sibrell, P.L.; Cravotta, C.A.; Lehman, W.G.; Reichert, W.

    2010-01-01

    Excess phosphorus (P) inputs from human sewage, animal feeding operations, and nonpoint source discharges to the environment have resulted in the eutrophication of sensitive receiving bodies of water such as the Great Lakes and Chesapeake Bay. Phosphorus loads in wastewater discharged from such sources can be decreased by conventional treatment with iron and aluminum salts but these chemical reagents are expensive or impractical for many applications. Acid mine drainage (AMD) sludges are an inexpensive source of iron and aluminum hydrous oxides that could offer an attractive alternative to chemical reagent dosing for the removal of P from local wastewater. Previous investigations have focused on AMD sludges generated in the bituminous coal region of western Pennsylvania, and confirmed that some of those sludges are good sorbents for P over a wide range of operating conditions. In this study, we sampled sludges produced by AMD treatment at six different sites in the anthracite region of Pennsylvania for potential use as P sequestration sorbents. Sludge samples were dried, characterized, and then tested for P removal from water. In addition, the concentrations of acid-extractable metals and other impurities were investigated. Test results revealed that sludges from four of the sites showed good P sorption and were unlikely to add contaminants to treated water. These results indicate that AMD sludges could be beneficially used to sequester P from the environment, while at the same time decreasing the expense of sludge disposal.

  9. RECENT ADVANCES IN LEATHER TANNERY WASTEWATER TREATMENT

    Directory of Open Access Journals (Sweden)

    LOFRANO Giusy

    2016-05-01

    Full Text Available The tannery industry is one of the most important economic sectors in many countries, representing an important economic field also in developing countries. Leather tannery industry is water intensive and originates highly polluted wastewater that contain various micropollutants raising environmental and health concerns. Tannery wastewater is difficult to treat biologically because of complex characteristics like high salinity e high content of xenobiotics compounds. After conventional treatment (i.e., chromium precipitation–primary sedimentation–biological oxidation–secondary sedimentation, effluents still do not meet the required limits, at least for some parameters such as BOD, COD, salinity, ammonia and surfactants. The leather industry is being pressured to search cleaner, economically as well as environmentally friendly wastewater treatment technologies alternative or integrative to the conventional treatment in order to face the challenge of sustainability. The most spread approach to manage tannery wastewater is the steam segregation before conveying wastewaters to in treatment plants that typically include pre-treatment, mechanical and physico-chemical treatment, biological treatment, and treatment of the generated sludge. Thus proper treatment technologies are needed to handle tannery wastewater to remove effectively the environmental benign pollutants. However among various processes applied or proposed the sustainable technologies are emerging concern. This paper, as the-state-of-the-art, attempts to revise the over world trends of treatment technologies and advances for pollution prevention from tannery chemicals and wastewater.

  10. Priorities for toxic wastewater management in Pakistan

    Energy Technology Data Exchange (ETDEWEB)

    Rahman, A. [Sustainable Development Policy Institute, Islamabad (Pakistan)

    1996-12-31

    This study assesses the number of industries in Pakistan, the total discharge of wastewater, the biological oxygen demand (BOD) load, and the toxicity of the wastewater. The industrial sector is a major contributor to water pollution, with high levels of BOD, heavy metals, and toxic compounds. Only 30 industries have installed water pollution control equipment, and most are working at a very low operational level. Priority industrial sectors for pollution control are medium- to large-scale textile industries and small-scale tanneries and electroplating industries. Each day the textile industries discharge about 85,000 m{sup 3} of wastewater with a high BOD, while the electroplating industries discharge about 23,000 m{sup 3} of highly toxic and hazardous wastewater. Various in-plant modifications can reduce wastewater discharges. Economic incentives, like tax rebates, subsidies, and soft loans, could be an option for motivating medium- to large-scale industries to control water pollution. Central treatment plants may be constructed for treating wastewater generated by small-scale industries. The estimated costs for the treatment of textile and electroplating wastewater are given. The legislative structure in Pakistan is insufficient for control of industrial pollution; not only do existing laws need revision, but more laws and regulations are needed to improve the state of affairs, and enforcement agencies need to be strengthened. 15 refs., 1 fig., 9 tabs.

  11. NEUTRALIZING WASTEWATER FROM PUBLIC UTILITIES ON RURAL AREAS

    Directory of Open Access Journals (Sweden)

    Piotr Bugajski

    2015-10-01

    Full Text Available The research aimed at determining a potential use of domestic sewage treatment plants based on activated sludge for the disposal of wastes drained from schools in rural areas. Selected pollutant indicators, such as: BOD5, COD, total suspended solids, total nitrogen and phosphates were the basis for determining the composition of raw sewage discharged by public utility objects and the quality of treated sewage considering the days when lessons were taking place at school and days free from classes. The analysis of the results revealed that household sewage treatment plants based on activated sludge may be used for waste disposal from public facilities, such as schools.

  12. Robustness of non-interdependent and interdependent networks against dependent and adaptive attacks

    Science.gov (United States)

    Tyra, Adam; Li, Jingtao; Shang, Yilun; Jiang, Shuo; Zhao, Yanjun; Xu, Shouhuai

    2017-09-01

    Robustness of complex networks has been extensively studied via the notion of site percolation, which typically models independent and non-adaptive attacks (or disruptions). However, real-life attacks are often dependent and/or adaptive. This motivates us to characterize the robustness of complex networks, including non-interdependent and interdependent ones, against dependent and adaptive attacks. For this purpose, dependent attacks are accommodated by L-hop percolation where the nodes within some L-hop (L ≥ 0) distance of a chosen node are all deleted during one attack (with L = 0 degenerating to site percolation). Whereas, adaptive attacks are launched by attackers who can make node-selection decisions based on the network state in the beginning of each attack. The resulting characterization enriches the body of knowledge with new insights, such as: (i) the Achilles' Heel phenomenon is only valid for independent attacks, but not for dependent attacks; (ii) powerful attack strategies (e.g., targeted attacks and dependent attacks, dependent attacks and adaptive attacks) are not compatible and cannot help the attacker when used collectively. Our results shed some light on the design of robust complex networks.

  13. Tertiary Treatment Process of Preserved Wastewater

    Directory of Open Access Journals (Sweden)

    Wang Qingyu

    2016-01-01

    Full Text Available The effects of the composite coagulants on coagulation sedimentation for the preserved wastewater was investigated by changing the composite coagulant dosages, and the coagulant was composed of polymeric ferric sulfate (PFS, polyaluminium chloride (PAC, and polyaluminum ferric silicate (PAFSC, while the effect of the tertiary treatment process on the preserved wastewater was tested, which was exceeded the standard seriously. The results showed that 400 mg/L was the optimum composite coagulant dosage. The removal rates of salt and sugar were as high as 99.1% and 99.5% respectively, and the removal rates of CODCr and SS were 99.3% and 96.0%, respectively after the preserved wastewater was treated by the tertiary treatment technology, which both reached the primary standard of “The Integrated Wastewater Discharge Standard” (GB8978-1996.

  14. Neutral fat hydrolysis and long-chain fatty acid oxidation during anaerobic digestion of slaughterhouse wastewater.

    Science.gov (United States)

    Masse, L; Massé, D I; Kennedy, K J; Chou, S P

    2002-07-05

    Neutral fat hydrolysis and long-chain fatty acid (LCFA) oxidation rates were determined during the digestion of slaughterhouse wastewater in anaerobic sequencing batch reactors operated at 25 degrees C. The experimental substrate consisted of filtered slaughterhouse wastewater supplemented with pork fat particles at various average initial sizes (D(in)) ranging from 60 to 450 microm. At the D(in) tested, there was no significant particle size effect on the first-order hydrolysis rate. The neutral fat hydrolysis rate averaged 0.63 +/- 0.07 d(-1). LCFA oxidation rate was modelled using a Monod-type equation. The maximum substrate utilization rate (kmax) and the half-saturation concentration (Ks) averaged 164 +/- 37 mg LCFA/L/d and 35 +/- 31 mg LCFA/L, respectively. Pork fat particle degradation was mainly controlled by LCFA oxidation rate and, to a lesser extent, by neutral fat hydrolysis rate. Hydrolysis pretreatment of fat-containing wastewaters and sludges should not substantially accelerate their anaerobic treatment. At a D(in) of 450 microm, fat particles were found to inhibit methane production during the initial 20 h of digestion. Inhibition of methane production in the early phase of digestion was the only significant effect of fat particle size on anaerobic digestion of pork slaughterhouse wastewater. Soluble COD could not be used to determine the rate of lipid hydrolysis due to LCFA adsorption on the biomass.

  15. Counteracting Power Analysis Attacks by Masking

    Science.gov (United States)

    Oswald, Elisabeth; Mangard, Stefan

    The publication of power analysis attacks [12] has triggered a lot of research activities. On the one hand these activities have been dedicated toward the development of secure and efficient countermeasures. On the other hand also new and improved attacks have been developed. In fact, there has been a continuous arms race between designers of countermeasures and attackers. This chapter provides a brief overview of the state-of-the art in the arms race in the context of a countermeasure called masking. Masking is a popular countermeasure that has been extensively discussed in the scientific community. Numerous articles have been published that explain different types of masking and that analyze weaknesses of this countermeasure.

  16. Application of Sludges and Wastewaters on Agricultural Land: A Planning and Educational Guide, MCD-35. Research Bulletin 1090.

    Science.gov (United States)

    Knezek, Bernard D., Ed.; Miller, Robert H., Ed.

    This report addresses the application of agricultural processing wastes, industrial and municipal wastes on agricultural land as both a waste management and resource recovery and reuse practice. The document emphasizes the treatment and beneficial utilization of sludge and wastewater as opposed to waste disposal. These objectives are achieved…

  17. Metrics for Assessment of Smart Grid Data Integrity Attacks

    Energy Technology Data Exchange (ETDEWEB)

    Annarita Giani; Miles McQueen; Russell Bent; Kameshwar Poolla; Mark Hinrichs

    2012-07-01

    There is an emerging consensus that the nation’s electricity grid is vulnerable to cyber attacks. This vulnerability arises from the increasing reliance on using remote measurements, transmitting them over legacy data networks to system operators who make critical decisions based on available data. Data integrity attacks are a class of cyber attacks that involve a compromise of information that is processed by the grid operator. This information can include meter readings of injected power at remote generators, power flows on transmission lines, and relay states. These data integrity attacks have consequences only when the system operator responds to compromised data by redispatching generation under normal or contingency protocols. These consequences include (a) financial losses from sub-optimal economic dispatch to service loads, (b) robustness/resiliency losses from placing the grid at operating points that are at greater risk from contingencies, and (c) systemic losses resulting from cascading failures induced by poor operational choices. This paper is focused on understanding the connections between grid operational procedures and cyber attacks. We first offer two examples to illustrate how data integrity attacks can cause economic and physical damage by misleading operators into taking inappropriate decisions. We then focus on unobservable data integrity attacks involving power meter data. These are coordinated attacks where the compromised data are consistent with the physics of power flow, and are therefore passed by any bad data detection algorithm. We develop metrics to assess the economic impact of these attacks under re-dispatch decisions using optimal power flow methods. These metrics can be use to prioritize the adoption of appropriate countermeasures including PMU placement, encryption, hardware upgrades, and advance attack detection algorithms.

  18. A taxonomy of distributed denial of service attacks

    DEFF Research Database (Denmark)

    De Donno, Michele; Giaretta, Alberto; Dragoni, Nicola

    2017-01-01

    Distributed Denial of Service (DDoS) attacks which are now even more powerful and easier to achieve than the past. Understanding how these attacks work, in all their different forms, represents a first crucial step to tackle this urgent issue. To this end, in this paper we propose a new up-to-date taxonomy...... and a comprehensive classification of current DDoS attacks....

  19. Occurrence of Legionella in wastewater treatment plants linked to wastewater characteristics.

    Science.gov (United States)

    Caicedo, C; Beutel, S; Scheper, T; Rosenwinkel, K H; Nogueira, R

    2016-08-01

    In recent years, the occurrence of Legionella in wastewater treatment plants (WWTP) has often been reported. However, until now there is limited knowledge about the factors that promote Legionella's growth in such systems. The aim of this study was to investigate the chemical wastewater parameters that might be correlated to the concentration of Legionella spp. in WWTP receiving industrial effluents. For this purpose, samples were collected at different processes in three WWTP. In 100 % of the samples taken from the activated sludge tanks Legionella spp. were detected at varying concentrations (4.8 to 5.6 log GU/mL) by the quantitative real-time polymerase chain reaction method, but not by the culture method. Statistical analysis with various parameters yielded positive correlations of Legionella spp. concentration with particulate chemical oxygen demand, Kjeldahl nitrogen and protein concentration. Amino acids were quantified in wastewater and activated sludge samples at concentrations that may not support the growth of Legionella, suggesting that in activated sludge tanks this bacterium multiplied in protozoan hosts.

  20. An Explanation of Nakamoto's Analysis of Double-spend Attacks

    OpenAIRE

    Ozisik, A. Pinar; Levine, Brian Neil

    2017-01-01

    The fundamental attack against blockchain systems is the double-spend attack. In this tutorial, we provide a very detailed explanation of just one section of Satoshi Nakamoto's original paper where the attack's probability of success is stated. We show the derivation of the mathematics relied upon by Nakamoto to create a model of the attack. We also validate the model with a Monte Carlo simulation, and we determine which model component is not perfect.